Active learning for network intrusion detection

Research output: Contributions to collected editions/worksArticle in conference proceedingsResearchpeer-review

Authors

Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere enclosing network data, mapped to a vector space, such that points outside of the ball are considered anomalous. However, this setup ignores relevant information such as expert and background knowledge. In this paper, we rephrase anomaly detection as an active learning task. We propose an effective active learning strategy to query low-confidence observations and to expand the data basis with minimal labeling effort. Our empirical evaluation on network intrusion detection shows that our approach consistently outperforms existing methods in relevant scenarios.

Original languageEnglish
Title of host publicationAISec '09 : Proceedings of the ACM Conference on Computer and Communications Security
EditorsDirk Balfanz, Jessica Staddon
Number of pages8
Place of PublicationNew York
PublisherAssociation for Computing Machinery, Inc
Publication date09.11.2009
Pages47-54
ISBN (print)978-1-60558-781-3
DOIs
Publication statusPublished - 09.11.2009
Externally publishedYes
Event2nd ACM Workshop on Security and Artificial Intelligence, AISec '09, Co-located with the 16th ACM Computer and Communications Security Conference - Chicago, United States
Duration: 09.11.200913.11.2009
Conference number: 2

    Research areas

  • Informatics - Active learning, Anomaly detection, Intrusion detection, Machine learning, Network security, Support vector data description
  • Business informatics

DOI

Recently viewed

Activities

  1. Employer Longevity Readiness Index Workshop: Session 2: How do you build a longevity readiness Index?
  2. Field Experimentation in Governance Research. Early insights from researching the effectiveness of public participation in implementing the EU Floods Directive
  3. Co-supervisor of the dissertation "Diversity and functions of plant-insect interactions along a forest retention gradient"
  4. Provenance as (Linked) Data
  5. Removal of Methotrexate, 5-Fluorouracil and Cyclophosphamide from water by UV, UV/H2O2 and UV/Fe2+/H2O2 processe
  6. Sub-Plenary: Partial Organization: Perspectives, Promises and Pitfalls after a Decade of Research
  7. Verification of Measuring the Bearing Clearance Using Kurtosis, Recurrences and Neural Networks and Comparison of These Approaches
  8. The view of the young generation on (E)SD in Germany
  9. Video or Text Cases in Problem-Oriented or Direct Instructional Settings for Preservice Teachers?
  10. Curator (Zeitschrift)
  11. Speaking with One Voice While Being Different - Effects of Comparison Mindsets in Negotiations between Groups
  12. Differentiating forest types using Terrasar-X spotlight images based on factor analysis
  13. Ecological Applications (Zeitschrift)
  14. Stretching, shrinking, shape-shifting: a processual and communication-centred perspective on the elasticity and boundedness of organization
  15. Time and Space of Technopolitics
  16. Developing the ‘Benign by Design’ Approach for a Rational Design of Green Derivatives of b -Blockers: Propranolol as an Example
  17. Digital Media and Organization
  18. Negotiating normativity: discourses of (non) belonging and (non) coincidences in the context of transnational adoption
  19. Analysing Improvement Processes in the Context of School Inspection

Publications

  1. Global Finite-Time Stabilization of Planar Linear Systems With Actuator Saturation
  2. Simple saturated PID control for fast transient of motion systems
  3. Embarrassment as a public vs. private emotion and symbolic coping behaviour
  4. Adaptive control of the nonlinear dynamic behavior of the cantilever-sample system of an atomic force microscope
  5. Transductive support vector machines for structured variables
  6. »HOW TO MAKE YOUR OWN SAMPLES«
  7. E-stability and stability of adaptive learning in models with private information
  8. How secondary-school students deal with issues of sustainable development in class*
  9. ZooKeys, unlocking Earth's incredible biodiversity and building a sustainable bridge into the public domain: From "print-based" to "web-based" taxonomy, systematics, and natural history ZooKeys Editorial Opening Paper
  10. Discrete Lyapunov Controllers for an Actuator in Camless Engines
  11. Calibration of a simple method for determining ammonia loss in the field
  12. An optimal minimum phase approximating PD regulator for robust control of a throttle plate
  13. The case of the composite Higgs
  14. Foreword to applied data science, demo, and nectar tracks
  15. An introductional lecture on chaotic systems through Lorenz attractor and forced Lotka Volterra equation for interdisciplinary education
  16. Effect of grain size and structure, solid solution elements, precipitates and twinning on nanohardness of Mg-Re alloys
  17. Informatik
  18. Differentiating Different Types of Cognitive Load
  19. Conceptualizing community in energy systems
  20. Integrating Common Ground and Informativeness in Pragmatic Word Learning
  21. The Crowd in Flux
  22. Multi-view hidden markov perceptrons
  23. Diffusion of the Balanced Scorecard
  24. Perceptron and SVM learning with generalized cost models
  25. Interplay of formative assessment and instructional quality—interactive effects on students’ mathematics achievement
  26. Properties of some overlapping self-similar and some self-affine measures