Stream-Based Machine Learning for Network Security and Anomaly Detection

Stream-Based Machine Learning for Network Security and Anomaly Detection

Stream-based Machine Learning for Network Security and Anomaly Detection Pavol Mulinka Pedro Casas CTU Czech Technical University in Prague AIT Austrian Institute of Technology AIT Austrian Institute of Technology [email protected] [email protected] ABSTRACT ACM Reference format: Data Stream Machine Learning is rapidly gaining popularity within Pavol Mulinka and Pedro Casas. 2018. Stream-based Machine Learning for the network monitoring community as the big data produced by Network Security and Anomaly Detection. In Proceedings of ACM SIGCOMM 2018 Workshop on Big Data Analytics and Machine Learning for Data Com- network devices and end-user terminals goes beyond the memory munication Networks, Budapest, Hungary, August 20, 2018 (Big-DAMA’18), constraints of standard monitoring equipment. Critical network 7 pages. monitoring applications such as the detection of anomalies, network https://doi.org/10.1145/3229607.3229612 attacks and intrusions, require fast and continuous mechanisms for on-line analysis of data streams. In this paper we consider a stream-based machine learning approach for network security and The research leading to these results has been partially funded anomaly detection, applying and evaluating multiple machine learn- by the Vienna Science and Technology Fund (WWTF) through ing algorithms in the analysis of continuously evolving network project ICT15-129, “BigDAMA”. data streams. The continuous evolution of the data stream analysis algorithms coming from the data stream mining domain, as well as Pavol Mulinka has been partially supported by the scienti c the multiple evaluation approaches conceived for benchmarking bilateral cooperation grant Aktion Österreich-Tschechien, such kind of algorithms makes it di cult to choose the appropri- AÖCZ-Semesterstipendien, ref.num. ICM-2017-08733 and ate machine learning model. Results of the di!erent approaches through CTU student grant SGS18/077/OHK3/1T/13. may signi"cantly di!er and it is crucial to determine which ap- proach re#ects the algorithm performance the best. We therefore 1 INTRODUCTION compare and analyze the results from the most recent evaluation Network tra c monitoring and analysis has taken a paramount role approaches for sequential data on commonly used batch-based ma- to understand the functioning of the Internet, especially to get a chine learning algorithms and their corresponding stream-based broader and clearer visibility of unexpected events. One of the major extensions, for the speci"c problem of on-line network security and challenges faced by large-scale network monitoring applications is anomaly detection. Similar to our previous "ndings when dealing the processing and analysis of large amounts of heterogeneous and with o!-line machine learning approaches for network security and fast network monitoring data. Network monitoring data usually anomaly detection, our results suggest that adaptive random forests comes in the form of high-speed streams, which need to be rapidly and stochastic gradient descent models are able to keep up with and continuously processed and analyzed. However, detecting and important concept drifts in the underlying network data streams, adapting to strong variations in the underlying statistical properties by keeping high accuracy with continuous re-training at concept of the modeled data makes learning data stream analysis a very drift detection times. di cult task. The application of machine learning models to network security CCS CONCEPTS and anomaly detection problems has largely increased in the last • Computing methodologies → Machine learning; • Security decade; however, the general approach in the literature still consid- and privacy → Network security; ers the analysis as an o!-line learning problem, where models are trained once and then applied to the incoming measurements. A ma- KEYWORDS jor challenge is how to deal with network monitoring and analysis applications when considering big and fast network measurements. Data Stream mining; Machine Learning; Network Attacks; High- Critical network monitoring applications such as the detection of Dimensional Data. anomalies and network attacks, require fast mechanisms for on-line analysis of thousands of events per second. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed In this paper we consider a stream-based approach for machine- for pro"t or commercial advantage and that copies bear this notice and the full citation learning-based network security and anomaly detection, using a on the "rst page. Copyrights for components of this work owned by others than ACM collection of machine learning algorithms tailored for the analysis must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior speci"c permission and/or a of continuously evolving data. Stream machine learning analysis fee. Request permissions from [email protected]. consists of processing a data instance at a time, inspecting it only Big-DAMA’18, August 20, 2018, Budapest, Hungary once, and as such, using a limited amount of memory; stream ap- © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-5904-7/18/08...$15.00 proaches work in a limited amount of time, and have the advantage https://doi.org/10.1145/3229607.3229612 of performing a prediction at any point in time during the stream. 1 Big-DAMA’18, August 20, 2018, Budapest, Hungary P. Mulinka and P. Casas We consider two specic problems within the stream data analytics Naturally, the data stream machine learning domain has a long domain: (i) rstly, we train and evaluate models taking into ac- standing tradition and many interesting references are worth men- count the recent history of the observed stream, training in recent tioning when considering the application and evaluation of stream xed-length or adaptive-length batches of data and testing in sub- machine learning models; these cover general problems related sequent observations; (ii) secondly, we build continuous learning to the learning properties for stream-based algorithms [11, 12], models, which take into account the concept drift - i.e., the changes the mining and evaluation processes when dealing with massive in the underlying statistics of the learning/prediction target, to datasets [13], the identication of model evaluation issues [14] as periodically re-update the machine learning model through on-line well as propositions of general frameworks for data streaming [15]. learning. We evaluate the performance of the proposed models on Of particular relevance for stream machine learning model evalua- the detection of dierent types of network attacks and anomalies, tion are the problems of imbalanced classes and concept drift, which using real network measurements collected at the WIDE backbone are extensively addressed in [16]. network, relying on the well-known MAWILab dataset for attacks It is possible today to extensively apply stream machine learning labeling [1]. approaches, based on the availability of multiple publicly avail- Similar to our previous ndings when dealing with o-line ma- able machine learning tools integrating the data stream analyt- chine learning approaches for network security and anomaly detec- ics paradigms. Tools range from toolkits (VFML [17]), libraries tion, our results suggest that adaptive random forests and stochastic (Apache Spark Mlib [18] and Spark ML) to standalone applica- gradient descent models are able to keep up with important con- tions (MOA [19], RapidMiner - formerly YALE [20]) and distributed cept drifts in the underlying data by keeping high accuracy with frameworks (SAMOA [21]). In this paper we use in particular the continuous re-training at concept drift detection times. We hope MOA (Massive Online Analysis) framework. these results would motivate a broader adoption of stream-based Within the data stream mining domain, the most used evaluation machine learning models and approaches to network security and scheme is known as the prequential or interleaved-test-then-train anomaly detection in real-time scenarios. evolution. The idea is very simple, using each instance rst to test an initial or bootstrapped model, and then to train or update the 2 RELATED WORK & CONTRIBUTIONS corresponding model. Prequential evaluation can be used to mea- sure the accuracy of a model since the start of the evaluation, by The application of learning techniques to the problems of network keeping in memory all previous history of instances and evalu- security and anomaly detection is largely extended in the literature. ating the model in each new instance, but it is generally applied There are a couple of extensive surveys on general domain anomaly using sliding windows or decaying factors, which forgets previ- detection techniques [2] as well as network anomaly detection ously seen instances in the model update process and focuses on [3, 4], including machine learning-based approaches. There is a those instances in current sliding window. Dierent from more particularly extensive literature in the application of learning-based traditional fold-cross validation, generally used in the evaluation of approaches for automatic tra c analysis and classication. We refer o-line machine learning models, the weakness of the prequential the interested reader to [5] for a detailed survey on the dierent evaluation is in general

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us