Leveraging Sharing Communities to Achieve Federated Learning for Cybersecurity

04/23/2021
by   Frank W. Bentrem, et al.
0

Automated cyber threat detection in computer networks is a major challenge in cybersecurity. The cyber domain has inherent challenges that make traditional machine learning techniques problematic, specifically the need to learn continually evolving attacks through global collaboration while maintaining data privacy, and the varying resources available to network owners. We present a scheme to mitigate these difficulties through an architectural approach using community model sharing with a streaming analytic pipeline. Our streaming approach trains models incrementally as each log record is processed, thereby adjusting to concept drift resulting from changing attacks. Further, we designed a community sharing approach which federates learning through merging models without the need to share sensitive cyber-log data. Finally, by standardizing data and Machine Learning processes in a modular way, we provide network security operators the ability to manage cyber threat events and model sensitivity through community member and analytic method weighting in ways that are best suited for their available resources and data.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/04/2021

A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection

The uses of Machine Learning (ML) in detection of network attacks have b...
research
08/25/2022

A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain

Cyber Threat Intelligence (CTI) is the knowledge of cyber and physical t...
research
09/15/2023

XFedHunter: An Explainable Federated Learning Framework for Advanced Persistent Threat Detection in SDN

Advanced Persistent Threat (APT) attacks are highly sophisticated and em...
research
06/03/2021

Cybersecurity Information Exchange with Privacy (CYBEX-P) and TAHOE – A Cyberthreat Language

Cybersecurity information sharing (CIS) is envisioned to protect organiz...
research
04/21/2022

Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks

Nowadays, blockchain-based technologies are being developed in various i...
research
04/06/2020

Challenges in Forecasting Malicious Events from Incomplete Data

The ability to accurately predict cyber-attacks would enable organizatio...
research
05/29/2023

Duopoly insurers' incentives for data quality under a mandatory cyber data sharing regime

We study the impact of data sharing policies on cyber insurance markets....

Please sign up or login with your details

Forgot password? Click here to reset