论文标题
无监督的异常探测器,以检测当前威胁格局的入侵
Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape
论文作者
论文摘要
异常检测旨在确定给定系统的预期行为中的意外波动。它被认为是对零日攻击的识别的可靠答案,多年来已经提出了几种适合二进制分类的ML算法。但是,尚未研究针对一组全面的攻击数据集的基于异常的侵入检测的广泛无监督算法的实验比较。为了填补此类空白,我们在11个攻击数据集上练习了十七个无监督的异常检测算法。结果可以详细阐述从单个算法的行为到数据集的适用性到异常检测的广泛参数。我们得出的结论是,作为隔离森林,单级支持向量机和自组织地图的算法比其入侵检测的算法更有效,而聚类算法则代表了由于其计算较低的复杂性而代表了一个很好的选择。此外,我们详细介绍了不稳定,分布式或不可重复的行为的攻击,蠕虫和僵尸网络更难检测到。最终,我们介绍了算法在检测一系列未知攻击产生的异常时的功能,这表明实现的公制得分在识别单个攻击方面并没有变化。
Anomaly detection aims at identifying unexpected fluctuations in the expected behavior of a given system. It is acknowledged as a reliable answer to the identification of zero-day attacks to such extent, several ML algorithms that suit for binary classification have been proposed throughout years. However, the experimental comparison of a wide pool of unsupervised algorithms for anomaly-based intrusion detection against a comprehensive set of attacks datasets was not investigated yet. To fill such gap, we exercise seventeen unsupervised anomaly detection algorithms on eleven attack datasets. Results allow elaborating on a wide range of arguments, from the behavior of the individual algorithm to the suitability of the datasets to anomaly detection. We conclude that algorithms as Isolation Forests, One-Class Support Vector Machines and Self-Organizing Maps are more effective than their counterparts for intrusion detection, while clustering algorithms represent a good alternative due to their low computational complexity. Further, we detail how attacks with unstable, distributed or non-repeatable behavior as Fuzzing, Worms and Botnets are more difficult to detect. Ultimately, we digress on capabilities of algorithms in detecting anomalies generated by a wide pool of unknown attacks, showing that achieved metric scores do not vary with respect to identifying single attacks.