TY - JOUR
T1 - Machine Learning (In) Security
T2 - A Stream of Problems
AU - Ceschin, Fabrício
AU - Botacin, Marcus
AU - Bifet, Albert
AU - Pfahringer, Bernhard
AU - Oliveira, Luiz S.
AU - Gomes, Heitor Murilo
AU - Grégio, André
N1 - Publisher Copyright:
© 2024 Copyright held by the owner/author(s).
PY - 2024/3/21
Y1 - 2024/3/21
N2 - Machine Learning (ML) has been widely applied to cybersecurity and is considered state-of-the-art for solving many of the open issues in that field. However, it is very difficult to evaluate how good the produced solutions are, since the challenges faced in security may not appear in other areas. One of these challenges is the concept drift, which increases the existing arms race between attackers and defenders: malicious actors can always create novel threats to overcome the defense solutions, which may not consider them in some approaches. Due to this, it is essential to know how to properly build and evaluate an ML-based security solution. In this article, we identify, detail, and discuss the main challenges in the correct application of ML techniques to cybersecurity data. We evaluate how concept drift, evolution, delayed labels, and adversarial ML impact the existing solutions. Moreover, we address how issues related to data collection affect the quality of the results presented in the security literature, showing that new strategies are needed to improve current solutions. Finally, we present how existing solutions may fail under certain circumstances and propose mitigations to them, presenting a novel checklist to help the development of future ML solutions for cybersecurity.
AB - Machine Learning (ML) has been widely applied to cybersecurity and is considered state-of-the-art for solving many of the open issues in that field. However, it is very difficult to evaluate how good the produced solutions are, since the challenges faced in security may not appear in other areas. One of these challenges is the concept drift, which increases the existing arms race between attackers and defenders: malicious actors can always create novel threats to overcome the defense solutions, which may not consider them in some approaches. Due to this, it is essential to know how to properly build and evaluate an ML-based security solution. In this article, we identify, detail, and discuss the main challenges in the correct application of ML techniques to cybersecurity data. We evaluate how concept drift, evolution, delayed labels, and adversarial ML impact the existing solutions. Moreover, we address how issues related to data collection affect the quality of the results presented in the security literature, showing that new strategies are needed to improve current solutions. Finally, we present how existing solutions may fail under certain circumstances and propose mitigations to them, presenting a novel checklist to help the development of future ML solutions for cybersecurity.
KW - Machine learning
KW - cybersecurity
KW - data streams
U2 - 10.1145/3617897
DO - 10.1145/3617897
M3 - Article
AN - SCOPUS:85188880853
SN - 2576-5337
VL - 5
JO - Digital Threats: Research and Practice
JF - Digital Threats: Research and Practice
IS - 1
M1 - 9
ER -