Robust PCA for Anomaly Detection in Cyber Networks

01/04/2018
by   Randy Paffenroth, et al.
0

This paper uses network packet capture data to demonstrate how Robust Principal Component Analysis (RPCA) can be used in a new way to detect anomalies which serve as cyber-network attack indicators. The approach requires only a few parameters to be learned using partitioned training data and shows promise of ameliorating the need for an exhaustive set of examples of different types of network attacks. For Lincoln Lab's DARPA intrusion detection data set, the method achieves low false-positive rates while maintaining reasonable true-positive rates on individual packets. In addition, the method correctly detected packet streams in which an attack which was not previously encountered, or trained on, appears.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/31/2022

AVTPnet: Convolutional Autoencoder for AVTP anomaly detection in Automotive Ethernet Networks

Network Intrusion Detection Systems are well considered as efficient too...
research
07/27/2021

Detection of cybersecurity attacks through analysis of web browsing activities using principal component analysis

Organizations such as government departments and financial institutions ...
research
06/27/2020

Leveraging Siamese Networks for One-Shot Intrusion Detection Model

The use of supervised Machine Learning (ML) to enhance Intrusion Detecti...
research
04/12/2021

Using a Neural Network to Detect Anomalies given an N-gram Profile

In order to detect unknown intrusions and runtime errors of computer pro...
research
12/06/2018

Cyber Anomaly Detection Using Graph-node Role-dynamics

Intrusion detection systems (IDSs) generate valuable knowledge about net...
research
09/28/2022

Big data analysis and distributed deep learning for next-generation intrusion detection system optimization

With the growing use of information technology in all life domains, hack...
research
08/02/2023

LSF-IDM: Automotive Intrusion Detection Model with Lightweight Attribution and Semantic Fusion

Autonomous vehicles (AVs) are more vulnerable to network attacks due to ...

Please sign up or login with your details

Forgot password? Click here to reset