Active learning for network intrusion detection

Publikation: Beiträge in SammelwerkenAufsätze in KonferenzbändenForschungbegutachtet

Standard

Active learning for network intrusion detection. / Görnitz, Nico; Kloft, Marius; Rieck, Konrad et al.
AISec '09: Proceedings of the ACM Conference on Computer and Communications Security. Hrsg. / Dirk Balfanz; Jessica Staddon. New York: Association for Computing Machinery, Inc, 2009. S. 47-54.

Publikation: Beiträge in SammelwerkenAufsätze in KonferenzbändenForschungbegutachtet

Harvard

Görnitz, N, Kloft, M, Rieck, K & Brefeld, U 2009, Active learning for network intrusion detection. in D Balfanz & J Staddon (Hrsg.), AISec '09: Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, Inc, New York, S. 47-54, 2nd ACM Workshop on Security and Artificial Intelligence, AISec '09, Co-located with the 16th ACM Computer and Communications Security Conference, Chicago, USA / Vereinigte Staaten, 09.11.09. https://doi.org/10.1145/1654988.1655002

APA

Görnitz, N., Kloft, M., Rieck, K., & Brefeld, U. (2009). Active learning for network intrusion detection. In D. Balfanz, & J. Staddon (Hrsg.), AISec '09: Proceedings of the ACM Conference on Computer and Communications Security (S. 47-54). Association for Computing Machinery, Inc. https://doi.org/10.1145/1654988.1655002

Vancouver

Görnitz N, Kloft M, Rieck K, Brefeld U. Active learning for network intrusion detection. in Balfanz D, Staddon J, Hrsg., AISec '09: Proceedings of the ACM Conference on Computer and Communications Security. New York: Association for Computing Machinery, Inc. 2009. S. 47-54 doi: 10.1145/1654988.1655002

Bibtex

@inbook{7b99007d947e499ca831a3484b8a2c28,
title = "Active learning for network intrusion detection",
abstract = "Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere enclosing network data, mapped to a vector space, such that points outside of the ball are considered anomalous. However, this setup ignores relevant information such as expert and background knowledge. In this paper, we rephrase anomaly detection as an active learning task. We propose an effective active learning strategy to query low-confidence observations and to expand the data basis with minimal labeling effort. Our empirical evaluation on network intrusion detection shows that our approach consistently outperforms existing methods in relevant scenarios.",
keywords = "Informatics, Active learning, Anomaly detection, Intrusion detection, Machine learning, Network security, Support vector data description, Business informatics",
author = "Nico G{\"o}rnitz and Marius Kloft and Konrad Rieck and Ulf Brefeld",
year = "2009",
month = nov,
day = "9",
doi = "10.1145/1654988.1655002",
language = "English",
isbn = "978-1-60558-781-3",
pages = "47--54",
editor = "Dirk Balfanz and Jessica Staddon",
booktitle = "AISec '09",
publisher = "Association for Computing Machinery, Inc",
address = "United States",
note = "2nd ACM Workshop on Security and Artificial Intelligence, AISec '09, Co-located with the 16th ACM Computer and Communications Security Conference ; Conference date: 09-11-2009 Through 13-11-2009",

}

RIS

TY - CHAP

T1 - Active learning for network intrusion detection

AU - Görnitz, Nico

AU - Kloft, Marius

AU - Rieck, Konrad

AU - Brefeld, Ulf

N1 - Conference code: 2

PY - 2009/11/9

Y1 - 2009/11/9

N2 - Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere enclosing network data, mapped to a vector space, such that points outside of the ball are considered anomalous. However, this setup ignores relevant information such as expert and background knowledge. In this paper, we rephrase anomaly detection as an active learning task. We propose an effective active learning strategy to query low-confidence observations and to expand the data basis with minimal labeling effort. Our empirical evaluation on network intrusion detection shows that our approach consistently outperforms existing methods in relevant scenarios.

AB - Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere enclosing network data, mapped to a vector space, such that points outside of the ball are considered anomalous. However, this setup ignores relevant information such as expert and background knowledge. In this paper, we rephrase anomaly detection as an active learning task. We propose an effective active learning strategy to query low-confidence observations and to expand the data basis with minimal labeling effort. Our empirical evaluation on network intrusion detection shows that our approach consistently outperforms existing methods in relevant scenarios.

KW - Informatics

KW - Active learning

KW - Anomaly detection

KW - Intrusion detection

KW - Machine learning

KW - Network security

KW - Support vector data description

KW - Business informatics

U2 - 10.1145/1654988.1655002

DO - 10.1145/1654988.1655002

M3 - Article in conference proceedings

AN - SCOPUS:74049088533

SN - 978-1-60558-781-3

SP - 47

EP - 54

BT - AISec '09

A2 - Balfanz, Dirk

A2 - Staddon, Jessica

PB - Association for Computing Machinery, Inc

CY - New York

T2 - 2nd ACM Workshop on Security and Artificial Intelligence, AISec '09, Co-located with the 16th ACM Computer and Communications Security Conference

Y2 - 9 November 2009 through 13 November 2009

ER -

DOI

Zuletzt angesehen

Publikationen

  1. Exploring governance learning
  2. Repeated sampling detects gene flow in a flightless ground beetle in a fragmented landscape
  3. Do You Like What You (Can't) See? The Differential Effects of Hardware and Software Upgrades on High-Tech Product Evaluations
  4. Ruins of Excess
  5. Lessons learned — The case of CROCUS
  6. RAWSim-O: A Simulation Framework for Robotic Mobile Fulfillment Systems
  7. Desynchronization of Public and Private
  8. A review on the use of calcium chloride in applied thermal engineering
  9. Behind the Scenes of Automation
  10. Simon Denny
  11. Explorations in regional variation
  12. Transition management as an approach to deal with climate change
  13. Green your community click by click
  14. I'd prefer not to
  15. Analyzing a transition to a sustainability-oriented science system in Germany
  16. Welteis
  17. First automatic size measurements for the separation of dwarf birch and tree birch pollen in MIS 6 to MIS 1 records from Northern Germany
  18. Implementing inquiry-based science education to foster emotional engagement of special-needs students
  19. The effects of hybrid order processing strategies on economic and logistic objectives
  20. On the Problems of Honorary Work in German Sports Clubs – A Qualitative-Dominated Crossover Mixed Methods Study
  21. Tree species richness strengthens relationships between ants and the functional composition of spider assemblages in a highly diverse forest
  22. “Self-centered, self-promoting, and self-legitimizing”
  23. Introduction: Art Alone Can Do Nothing
  24. Mental models and attentional processes in car driving
  25. Audio games