Malicious Cyber Activity Detection Using Zigzag Persistence

09/14/2023
by   Audun Myers, et al.
0

In this study we synthesize zigzag persistence from topological data analysis with autoencoder-based approaches to detect malicious cyber activity and derive analytic insights. Cybersecurity aims to safeguard computers, networks, and servers from various forms of malicious attacks, including network damage, data theft, and activity monitoring. Here we focus on the detection of malicious activity using log data. To do this we consider the dynamics of the data by exploring the changing topology of a hypergraph representation gaining insights into the underlying activity. Hypergraphs provide a natural representation of cyber log data by capturing complex interactions between processes. To study the changing topology we use zigzag persistence which captures how topological features persist at multiple dimensions over time. We observe that the resulting barcodes represent malicious activity differently than benign activity. To automate this detection we implement an autoencoder trained on a vectorization of the resulting zigzag persistence barcodes. Our experimental results demonstrate the effectiveness of the autoencoder in detecting malicious activity in comparison to standard summary statistics. Overall, this study highlights the potential of zigzag persistence and its combination with temporal hypergraphs for analyzing cybersecurity log data and detecting malicious behavior.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/21/2021

Robustness of ML-Enhanced IDS to Stealthy Adversaries

Intrusion Detection Systems (IDS) enhanced with Machine Learning (ML) ha...
research
12/04/2021

Updating Zigzag Persistence and Maintaining Representatives over Changing Filtrations

Computing persistence over changing filtrations give rise to a stack of ...
research
05/23/2022

Temporal Network Analysis Using Zigzag Persistence

This work presents a framework for studying temporal networks using zigz...
research
10/06/2021

Detecting and Quantifying Malicious Activity with Simulation-based Inference

We propose the use of probabilistic programming techniques to tackle the...
research
06/27/2020

Mining Persistent Activity in Continually Evolving Networks

Frequent pattern mining is a key area of study that gives insights into ...
research
01/23/2019

Context-Sensitive Malicious Spelling Error Correction

Misspelled words of the malicious kind work by changing specific keyword...
research
02/06/2023

Topological Analysis of Temporal Hypergraphs

In this work we study the topological properties of temporal hypergraphs...

Please sign up or login with your details

Forgot password? Click here to reset