Active learning for network intrusion detection

Research output: Contributions to collected editions/worksArticle in conference proceedingsResearchpeer-review

Authors

Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere enclosing network data, mapped to a vector space, such that points outside of the ball are considered anomalous. However, this setup ignores relevant information such as expert and background knowledge. In this paper, we rephrase anomaly detection as an active learning task. We propose an effective active learning strategy to query low-confidence observations and to expand the data basis with minimal labeling effort. Our empirical evaluation on network intrusion detection shows that our approach consistently outperforms existing methods in relevant scenarios.

Original languageEnglish
Title of host publicationAISec '09 : Proceedings of the ACM Conference on Computer and Communications Security
EditorsDirk Balfanz, Jessica Staddon
Number of pages8
Place of PublicationNew York
PublisherAssociation for Computing Machinery, Inc
Publication date09.11.2009
Pages47-54
ISBN (print)978-1-60558-781-3
DOIs
Publication statusPublished - 09.11.2009
Externally publishedYes
Event2nd ACM Workshop on Security and Artificial Intelligence, AISec '09, Co-located with the 16th ACM Computer and Communications Security Conference - Chicago, United States
Duration: 09.11.200913.11.2009
Conference number: 2

    Research areas

  • Informatics - Active learning, Anomaly detection, Intrusion detection, Machine learning, Network security, Support vector data description
  • Business informatics

DOI

Recently viewed

Researchers

  1. Marcus Erben

Activities

  1. Student Gender and Teachers' Grading and Written Feedback on Math or Language Assignments
  2. The golden age of software architecture better named the middle age of software architecture - Some provocative thoughts
  3. EXIT
  4. Tracing the Unknown: Learning from Provenance Data
  5. Project Workshop on "Worker Flows, Match Quality, and Productivity" - 2019
  6. Modelling biodegradability based on OECD 301D data for the design of mineralising ionic liquids
  7. Workshop: The conceptualization of sound within a studio environment 2011
  8. Field Experimentation in Governance Research. Early insights from researching the effectiveness of public participation in implementing the EU Floods Directive
  9. From Magic to Systemics. Heinz von Foerster and the Reenchantment of Science
  10. Automatization of comprehension in adult L2 learning
  11. Creating pathways for transformation through amplifying approaches: a case-study from Southern Transylvania
  12. Analyzing diary data: The relationships between activities and the individual mood level
  13. Navigating in the Digital Jungle: Articulating Combinatory Affordances of Digital Infrastructures for Collaboration
  14. Acceptance and Feasibility of a mobile application for panic with and without agoraphobia
  15. Enhancing EFL classroom instruction via an ICALL platform: effects on language development and transfer to tasks (EUROCALL)
  16. Towards an International Keywords for Children's Literature (Roundtable): Presenters: Lissa Paul, Philip Nel, Nina Alonso, Nina Christensen, Francesca Orestano and Emer O’Sullivan
  17. Managing the present generations’ conflicts on the backs of future generations: How current generation’s negotiators create and claim value for themselves and future others

Publications

  1. Complexity of traffic scenes and EEG-measures of processing workload in car driving
  2. Material flow during constrained friction processing and its effects on the local properties of AM50 rods
  3. Mirrored piezo servo hydraulic actuators for use in camless combustion engines and its Control with mirrored inputs and MPC
  4. Scale-dependent diversity patterns affect spider assemblages of two contrasting forest ecosystems
  5. An Outcome-Oriented, Social-Ecological Framework for Assessing Protected Area Effectiveness
  6. The Creation of the Concept through the Interaction of Philosophy with Science and Art
  7. From "cracking the orthographic code" to "playing with language"
  8. Project and Design of a Catamaran Prototype with Aerial Propulsion System
  9. Intraspecific trait variation increases species diversity in a trait-based grassland model
  10. Cost effectiveness of guided Internet-based interventions for depression in comparison with control conditions
  11. Studying properties of water data using manifold-aware anomaly detectors
  12. Constraints are the solution, not the problem
  13. Orchestrating distributed data governance in open social innovation
  14. Teaching methods for modelling problems and students’ task-specific enjoyment, value, interest and self-efficacy expectations
  15. Self-regulation in error management training: emotion control and metacognition as mediators of performance effects
  16. Understanding and Supporting Management Decision-Making
  17. Topic selection and development in learner-native speaker voice-based telecollaborative discourse
  18. Effect of gap distortion on the field splitting of collective modes in superfluid He3-B
  19. Estimation and interpretation of a Heckman selection model with endogenous covariates
  20. Adaptive control of the nonlinear dynamic behavior of the cantilever-sample system of an atomic force microscope
  21. Comparing Empirical Methodologies in Pragmatics
  22. Jackson networks in nonautonomous random environments
  23. The generative drawing principle in multimedia learning
  24. Imaginary practices as the nexus between continuity and disruptive change
  25. Aspect-oriented software development
  26. Using corpus-linguistic methods to track longitudinal development
  27. The Impact of AGVs and Priority Rules in a Real Production Setup – A Simulation Study
  28. The buffering effect of selection, optimization, and compensation strategy use on the relationship between problem solving demands and occupational well-being