Active learning for network intrusion detection

Research output: Contributions to collected editions/worksArticle in conference proceedingsResearchpeer-review

Authors

Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere enclosing network data, mapped to a vector space, such that points outside of the ball are considered anomalous. However, this setup ignores relevant information such as expert and background knowledge. In this paper, we rephrase anomaly detection as an active learning task. We propose an effective active learning strategy to query low-confidence observations and to expand the data basis with minimal labeling effort. Our empirical evaluation on network intrusion detection shows that our approach consistently outperforms existing methods in relevant scenarios.

Original languageEnglish
Title of host publicationAISec '09 : Proceedings of the ACM Conference on Computer and Communications Security
EditorsDirk Balfanz, Jessica Staddon
Number of pages8
Place of PublicationNew York
PublisherAssociation for Computing Machinery, Inc
Publication date09.11.2009
Pages47-54
ISBN (print)978-1-60558-781-3
DOIs
Publication statusPublished - 09.11.2009
Externally publishedYes
Event2nd ACM Workshop on Security and Artificial Intelligence, AISec '09, Co-located with the 16th ACM Computer and Communications Security Conference - Chicago, United States
Duration: 09.11.200913.11.2009
Conference number: 2

    Research areas

  • Informatics - Active learning, Anomaly detection, Intrusion detection, Machine learning, Network security, Support vector data description
  • Business informatics

DOI

Recently viewed

Publications

  1. Complexity of traffic scenes and EEG-measures of processing workload in car driving
  2. Mirrored piezo servo hydraulic actuators for use in camless combustion engines and its Control with mirrored inputs and MPC
  3. Simple saturated PID control for fast transient of motion systems
  4. A Lyapunov based PI controller with an anti-windup scheme for a purification process of potable water
  5. Embarrassment as a public vs. private emotion and symbolic coping behaviour
  6. The Creation of the Concept through the Interaction of Philosophy with Science and Art
  7. From "cracking the orthographic code" to "playing with language"
  8. Strategies of postural control in static and in dynamic testing situations
  9. Cost effectiveness of guided Internet-based interventions for depression in comparison with control conditions
  10. Design of an Information-Based Distributed Production Planning System
  11. Operations Systems of Container Terminals
  12. Sensor concept for solving the direct kinematics problem of the Stewart-Gough platform
  13. Topic selection and development in learner-native speaker voice-based telecollaborative discourse
  14. Adaptive control of the nonlinear dynamic behavior of the cantilever-sample system of an atomic force microscope
  15. Explaining and controlling for the psychometric properties of computer-generated figural matrix items
  16. »HOW TO MAKE YOUR OWN SAMPLES«
  17. Aspect-oriented software development
  18. The buffering effect of selection, optimization, and compensation strategy use on the relationship between problem solving demands and occupational well-being
  19. Measuring Learning Styles with Questionnaires Versus Direct Observation of Preferential Choice Behavior in Authentic Learning Situations
  20. Oddih
  21. Performance of process-based models for simulation of grain N in crop rotations across Europe
  22. “Ideation is Fine, but Execution is Key”
  23. Understanding storytelling in the context of information systems
  24. Towards a spatial understanding of identity play