Abstract
This paper demonstrates how different machine learning techniques performed on a recent, partially labeled dataset (based on the Locked Shields 2017 exercise) and which features were deemed important. Moreover, a cybersecurity expert analyzed the results and validated that the models were able to classify the known intrusions as malicious and that they discovered new attacks. In a set of 500 detected anomalies, 50 previously unknown intrusions were found. Given that such observations are uncommon, this indicates how well an unlabeled dataset can be used to construct and to evaluate a network intrusion detection system.
| Original language | English |
|---|---|
| Title of host publication | 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI) |
| Subtitle of host publication | [Proceedings] |
| Publisher | IEEE |
| Pages | 784-787 |
| Number of pages | 4 |
| ISBN (Electronic) | 9781538673256 |
| ISBN (Print) | 9781538673263 |
| DOIs | |
| Publication status | Published - 2018 |
| Event | 18th IEEE/WIC/ACM International Conference on Web Intelligence, WI 2018 - Santiago, Chile Duration: 3 Dec 2018 → 6 Dec 2018 |
Conference
| Conference | 18th IEEE/WIC/ACM International Conference on Web Intelligence, WI 2018 |
|---|---|
| Country/Territory | Chile |
| City | Santiago |
| Period | 3/12/18 → 6/12/18 |
Keywords
- Autoencoder
- Cybersecurity
- Gradient boosting machine
- Intrusion detection
- Partially labeled