Using a Neural Network to Detect Anomalies given an N-gram Profile

04/12/2021
by   Byunggu Yu, et al.
0

In order to detect unknown intrusions and runtime errors of computer programs, the cyber-security community has developed various detection techniques. Anomaly detection is an approach that is designed to profile the normal runtime behavior of computer programs in order to detect intrusions and errors as anomalous deviations from the observed normal. However, normal but unobserved behavior can trigger false positives. This limitation has significantly decreased the practical viability of anomaly detection techniques. Reported approaches to this limitation span a simple alert threshold definition to distribution models for approximating all normal behavior based on the limited observation. However, each assumption or approximation poses the potential for even greater false positive rates. This paper presents our study on how to explain the presence of anomalies using a neural network, particularly Long Short-Term Memory, independent of actual data distributions. We present and compare three anomaly detection models, and report on our experience running different types of attacks on an Apache Hypertext Transfer Protocol server. We performed a comparative study, focusing on each model's ability to detect the onset of each attack while avoiding false positives resulting from unknown normal behavior. Our best-performing model detected the true onset of every attack with zero false positives.

READ FULL TEXT

page 9

page 12

research
01/31/2018

One-class Collective Anomaly Detection based on Long Short-Term Memory Recurrent Neural Networks

Intrusion detection for computer network systems has been becoming one o...
research
06/15/2020

A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate

The complexity and ubiquity of modern computing systems is a fertile gro...
research
08/20/2021

CloudShield: Real-time Anomaly Detection in the Cloud

In cloud computing, it is desirable if suspicious activities can be dete...
research
04/27/2023

Detecting inner-LAN anomalies using hierarchical forecasting

Increasing activity and the number of devices online are leading to incr...
research
01/04/2018

Robust PCA for Anomaly Detection in Cyber Networks

This paper uses network packet capture data to demonstrate how Robust Pr...
research
06/08/2010

The DCA:SOMe Comparison A comparative study between two biologically-inspired algorithms

The Dendritic Cell Algorithm (DCA) is an immune-inspired algorithm, deve...
research
12/05/2019

Deep Anomaly Detection in Packet Payload

With the widespread adoption of cloud services, especially the extensive...

Please sign up or login with your details

Forgot password? Click here to reset