论文标题
使用公制学习自动编码器的零一天威胁检测
Zero Day Threat Detection Using Metric Learning Autoencoders
论文作者
论文摘要
零日威胁(ZDT)对公司网络的泛滥量非常高昂,需要新颖的方法来扫描流量以大规模的恶意行为。正常行为的多样性以及巨大的攻击类型的景观使深度学习方法成为捕获高度非线性行为模式的能力的有吸引力的选择。在本文中,作者展示了对先前引入的方法的改进,该方法使用了双Autoencoder方法来识别网络流遥测中的ZDT。除了先前引入的资产级图形功能(有助于抽象地表示主机在其网络中的作用)外,该新模型还使用公制学习来在标记的攻击数据上训练第二个自动编码器。这不仅会产生更强的性能,而且还具有通过允许在潜在空间中进行多类分类来提高模型的可解释性的额外优势。当他们通过向潜在空间附近的哪些已知攻击班展示来调查预测的ZDT时,这可能会节省人类威胁猎人的时间。此处介绍的模型还通过另外两个数据集进行了培训和评估,即使在推广到新的网络拓扑时,也会继续显示出令人鼓舞的结果。
The proliferation of zero-day threats (ZDTs) to companies' networks has been immensely costly and requires novel methods to scan traffic for malicious behavior at massive scale. The diverse nature of normal behavior along with the huge landscape of attack types makes deep learning methods an attractive option for their ability to capture highly-nonlinear behavior patterns. In this paper, the authors demonstrate an improvement upon a previously introduced methodology, which used a dual-autoencoder approach to identify ZDTs in network flow telemetry. In addition to the previously-introduced asset-level graph features, which help abstractly represent the role of a host in its network, this new model uses metric learning to train the second autoencoder on labeled attack data. This not only produces stronger performance, but it has the added advantage of improving the interpretability of the model by allowing for multiclass classification in the latent space. This can potentially save human threat hunters time when they investigate predicted ZDTs by showing them which known attack classes were nearby in the latent space. The models presented here are also trained and evaluated with two more datasets, and continue to show promising results even when generalizing to new network topologies.