Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning

Author:

Ali Muhammad Qasim1,Al-Shaer Ehab1,Khan Hassan2,Khayam Syed Ali3

Affiliation:

1. University of North Carolina Charlotte (UNCC)

2. National University of Sciences and Technology (NUST), Pakistan

3. PLUMgrid Inc

Abstract

Real-time network- and host-based Anomaly Detection Systems (ADSs) transform a continuous stream of input data into meaningful and quantifiable anomaly scores. These scores are subsequently compared to a fixed detection threshold and classified as either benign or malicious. We argue that a real-time ADS’ input changes considerably over time and a fixed threshold value cannot guarantee good anomaly detection accuracy for such a time-varying input. In this article, we propose a simple and generic technique to adaptively tune the detection threshold of any ADS that works on threshold method. To this end, we first perform statistical and information-theoretic analysis of network- and host-based ADSs’ anomaly scores to reveal a consistent time correlation structure during benign activity periods. We model the observed correlation structure using Markov chains, which are in turn used in a stochastic target tracking framework to adapt an ADS’ detection threshold in accordance with real-time measurements. We also use statistical techniques to make the proposed algorithm resilient to sporadic changes and evasion attacks. In order to evaluate the proposed approach, we incorporate the proposed adaptive thresholding module into multiple ADSs and evaluate those ADSs over comprehensive and independently collected network and host attack datasets. We show that, while reducing the need of human threshold configuration, the proposed technique provides considerable and consistent accuracy improvements for all evaluated ADSs.

Publisher

Association for Computing Machinery (ACM)

Subject

Safety, Risk, Reliability and Quality,General Computer Science

Reference54 articles.

1. A framework for on-demand classification of evolving data streams

2. On achieving good operating points on an ROC plane using stochastic anomaly score prediction

3. On mitigating sampling-induced accuracy loss in traffic anomaly detection systems

4. Arbor PeakFlow. Arbor networks’ peakflow product. http://www.arbornetworks.com/peakflowsp. Arbor PeakFlow. Arbor networks’ peakflow product. http://www.arbornetworks.com/peakflowsp.

Cited by 14 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Abnormal data detection for structural health monitoring: State-of-the-art review;Developments in the Built Environment;2024-03

2. A Novel Threat Intelligence Detection Model Using Neural Networks;IEEE Access;2022

3. Adaptive Threshold for Anomaly Detection in ATM Radar Data Streams;Pattern Recognition and Artificial Intelligence;2022

4. DAICS: A Deep Learning Solution for Anomaly Detection in Industrial Control Systems;IEEE Transactions on Emerging Topics in Computing;2021

5. A Cloud-Based Anomaly Detection for IoT Big Data;Cyber-Physical Security for Critical Infrastructures Protection;2021

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3