\n \n \n
\n
\n\n \n \n \n \n \n \n Unsupervised Monitoring of Network and Service Behaviour Using Self Organizing Maps.\n \n \n \n \n\n\n \n Le, D. C.; Zincir-Heywood, A. N.; and Heywood, M. I.\n\n\n \n\n\n\n
Journal of Cyber Security and Mobility, 8(2): 15–52. 2018.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{Le_jcsm2018,\nabstract = {Botnets represent one of the most destructive cybersecurity threats. Given the evolution of the structures and protocols botnets use, many machine learning approaches have been proposed for botnet analysis and detection. In the literature, intrusion and anomaly detection systems based on unsupervised learning techniques showed promising performances. This paper investigates the capability of the Self Organizing Map (SOM), an unsupervised learning technique as a data analytics system. In doing so, the aim is to understand how far such an approach could be pushed to analyze the network traffic, and to detect malicious behaviours in the wild. To this end, three different unsupervised SOM training scenarios for different data acquisition conditions are designed, implemented and evaluated. The approach is evaluated on publicly available network traffic (flows) and web server access (web requests) datasets. The results show that the approach has a high potential as a data analytics tool on unknown traffic/web service requests, and unseen attack behaviours. Malicious behaviours both on network and service datasets used could be identified with a high accuracy. Furthermore, the approach achieves comparable performances to that of popular supervised and unsupervised learning methods in the literature. Last but not the least, it provides unique visualization capabilities for enabling a simple yet effective network/service data analytics for security management.},\nauthor = {Duc C. Le and A. Nur Zincir-Heywood and Malcolm I. Heywood},\njournal = {Journal of Cyber Security and Mobility},\nkeywords = {network and service data analysis, unsupervised learning, malicious behaviour analysis},\nnumber = {2},\npages = {15--52},\ntitle = {Unsupervised Monitoring of Network and Service Behaviour Using Self Organizing Maps},\nvolume = {8},\nissue = {1},\nyear = {2018},\nurl = {https://www.riverpublishers.com/journal_read_html_article.php?j=JCSM/8/1/2},\ndoi = {10.13052/jcsm2245-1439.812}\n}\n\n\n
\n
\n\n\n
\n Botnets represent one of the most destructive cybersecurity threats. Given the evolution of the structures and protocols botnets use, many machine learning approaches have been proposed for botnet analysis and detection. In the literature, intrusion and anomaly detection systems based on unsupervised learning techniques showed promising performances. This paper investigates the capability of the Self Organizing Map (SOM), an unsupervised learning technique as a data analytics system. In doing so, the aim is to understand how far such an approach could be pushed to analyze the network traffic, and to detect malicious behaviours in the wild. To this end, three different unsupervised SOM training scenarios for different data acquisition conditions are designed, implemented and evaluated. The approach is evaluated on publicly available network traffic (flows) and web server access (web requests) datasets. The results show that the approach has a high potential as a data analytics tool on unknown traffic/web service requests, and unseen attack behaviours. Malicious behaviours both on network and service datasets used could be identified with a high accuracy. Furthermore, the approach achieves comparable performances to that of popular supervised and unsupervised learning methods in the literature. Last but not the least, it provides unique visualization capabilities for enabling a simple yet effective network/service data analytics for security management.\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Big Data in Network Anomaly Detection.\n \n \n \n\n\n \n Le, D. C.; and Zincir-Heywood, N.\n\n\n \n\n\n\n In Sakr, S.; and Zomaya, A., editor(s),
Encyclopedia of Big Data Technologies, pages 1–9. Springer International Publishing, 2018.\n
\n\n
\n\n
\n\n
\n\n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@incollection{Le_2018,\nauthor="Le, Duc C.\nand Zincir-Heywood, Nur",\neditor="Sakr, Sherif\nand Zomaya, Albert",\ntitle="Big Data in Network Anomaly Detection",\nbookTitle="Encyclopedia of Big Data Technologies",\nyear="2018",\npublisher="Springer International Publishing",\npages="1--9",\nisbn="978-3-319-63962-8",\ndoi="10.1007/978-3-319-63962-8_161-1",\n_url="https://doi.org/10.1007/978-3-319-63962-8_161-1"\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Benchmarking Evolutionary Computation Approaches to Insider Threat Detection.\n \n \n \n \n\n\n \n Le, D. C.; Khanchi, S.; Zincir-Heywood, A. N.; and Heywood, M. I.\n\n\n \n\n\n\n In
Genetic and Evolutionary Computation Conference (GECCO '18), pages 1286–1293, 2018. \n
Best paper award - RWA track\n\n
\n\n
\n\n
\n\n \n \n
paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{Le_gecco2018,\n abstract = {Insider threat detection represents a challenging problem to compa- nies and organizations where malicious actions are performed by authorized users. This is a highly skewed data problem, where the huge class imbalance makes the adaptation of learning algorithms to the real world context very difficult. In this work, applications of genetic programming (GP) and stream active learning are evaluated for insider threat detection. Linear GP with lexicase/multi-objective selection is employed to address the problem under a stationary data assumption. Moreover, streaming GP is employed to address the problem under a non-stationary data assumption. Experiments conducted on a publicly available corporate data set show the capa- bility of the approaches in dealing with extreme class imbalance, stream learning and adaptation to the real world context.},\n author = {Le, Duc C. and Khanchi, Sara and Zincir-Heywood, A. Nur and Heywood, Malcolm I.},\n title = {Benchmarking Evolutionary Computation Approaches to Insider Threat Detection},\n booktitle = {Genetic and Evolutionary Computation Conference (GECCO '18)},\n year = {2018},\n pages = {1286--1293},\n _url = {http://doi.acm.org/10.1145/3205455.3205612},\n doi = {10.1145/3205455.3205612},\n keywords = {cyber-security, insider threat detection},\n url_Paper = {lcd_gecco18.pdf},\n note = {Best paper award - RWA track},\n} \n\n\n
\n
\n\n\n
\n Insider threat detection represents a challenging problem to compa- nies and organizations where malicious actions are performed by authorized users. This is a highly skewed data problem, where the huge class imbalance makes the adaptation of learning algorithms to the real world context very difficult. In this work, applications of genetic programming (GP) and stream active learning are evaluated for insider threat detection. Linear GP with lexicase/multi-objective selection is employed to address the problem under a stationary data assumption. Moreover, streaming GP is employed to address the problem under a non-stationary data assumption. Experiments conducted on a publicly available corporate data set show the capa- bility of the approaches in dealing with extreme class imbalance, stream learning and adaptation to the real world context.\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning.\n \n \n \n \n\n\n \n Le, D. C.; and Zincir-Heywood, A. N.\n\n\n \n\n\n\n In
IEEE Security and Privacy Workshops (SPW '18), pages 270-275, San Francisco, CA, USA, 2018. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n \n
paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{Le_spw2018,\n abstract = {Insider threat is a prominent cyber-security dan- ger faced by organizations and companies. In this research, we study and evaluate an insider threat detection workflow using supervised and unsupervised learning algorithms. To this end, we study data exploration and analysis, anomaly detection and malicious behaviour classification on a publicly available data set. We evaluate several supervised and unsupervised learning algorithms - HMM, SOM, and DT - using this workflow.},\n author = {Le, Duc C. and Zincir-Heywood, A. Nur},\n title = {Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning},\n booktitle = {IEEE Security and Privacy Workshops (SPW '18)},\n year = {2018},\n address = {San Francisco, CA, USA},\n pages = {270-275},\n doi = {10.1109/SPW.2018.00043},\n keywords = {Insider Threat Detection, Unsupervised Machine Learning, Supervised Machine Learning, Anomaly detection, Behaviour Classification},\n url = {https://ieeexplore.ieee.org/abstract/document/8424659/},\n url_Paper = {lcd_spw2018.pdf}\n}\n\n
\n
\n\n\n
\n Insider threat is a prominent cyber-security dan- ger faced by organizations and companies. In this research, we study and evaluate an insider threat detection workflow using supervised and unsupervised learning algorithms. To this end, we study data exploration and analysis, anomaly detection and malicious behaviour classification on a publicly available data set. We evaluate several supervised and unsupervised learning algorithms - HMM, SOM, and DT - using this workflow.\n
\n\n\n
\n\n\n\n\n\n