DAEMON: Dynamic Auto-encoders for Contextualised Anomaly Detection Applied to Security MONitoring

Alexandre Dey, Eric Totel, Benjamin Costé

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The slow adoption rate of machine learning-based methods for novel attack detection by Security Operation Centers (SOC) analysts can be partly explained by their lack of data science expertise and the insufficient explainability of the results provided by these approaches. In this paper, we present an anomaly-based detection method that fuses events coming from heterogeneous sources into sets describing the same phenomenons and relies on a deep auto-encoder model to highlight anomalies and their context. To implicate security analysts and benefit from their expertise, we focus on limiting the need of data science knowledge during the configuration phase. Results on a lab environment, monitored using off-the-shelf tools, show good detection performances on several attack scenarios (F1 score ≈ 0.9 ), and eases the investigation of anomalies by quickly finding similar anomalies through clustering.

Original languageEnglish
Title of host publicationICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Proceedings
EditorsWeizhi Meng, Simone Fischer-Hübner, Christian D. Jensen
PublisherSpringer Science and Business Media Deutschland GmbH
Pages53-69
Number of pages17
ISBN (Print)9783031069741
DOIs
Publication statusPublished - 1 Jan 2022
Event37th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2022 - Copenhagen, Denmark
Duration: 13 Jun 202215 Jun 2022

Publication series

NameIFIP Advances in Information and Communication Technology
Volume648 IFIP
ISSN (Print)1868-4238
ISSN (Electronic)1868-422X

Conference

Conference37th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2022
Country/TerritoryDenmark
CityCopenhagen
Period13/06/2215/06/22

Keywords

  • Anomaly detection
  • Heterogeneous log analysis
  • Human-automation cooperation
  • Intrusion detection
  • Machine learning

Fingerprint

Dive into the research topics of 'DAEMON: Dynamic Auto-encoders for Contextualised Anomaly Detection Applied to Security MONitoring'. Together they form a unique fingerprint.

Cite this