Daily Arxiv

This is a page that curates AI-related papers published worldwide.
All content here is summarized using Google Gemini and operated on a non-profit basis.
Copyright for each paper belongs to the authors and their institutions; please make sure to credit the source when sharing.

Adversarial Augmentation and Active Sampling for Robust Cyber Anomaly Detection

Created by
  • Haebom

Author

Sidahmed Benabderrahmane, Talal Rahwan

Outline

This paper presents a novel method for detecting persistent advanced threat (APT) attacks. To address the challenges of securing the massive amounts of labeled data required by conventional supervised learning methods, we combine anomaly detection using autoencoders with active learning. Active learning, which selectively requests labels from an oracle for uncertain or ambiguous samples, reduces labeling costs and improves detection accuracy. Specifically, we present an anomaly detection framework based on the Attention Adversarial Dual AutoEncoder and demonstrate how an active learning loop improves model performance. Using real-world imbalanced process trace data from the DARPA Transparent Computing program (APT-like attacks account for only 0.004% of the data), we evaluate our approach under two attack scenarios across various operating systems, including Android, Linux, BSD, and Windows, demonstrating a significant improvement in detection rates over existing methods.

Takeaways, Limitations

Takeaways:
We demonstrate that combining autoencoders and active learning enables effective APT detection even with limited labeled data.
Achieves excellent performance even on imbalanced datasets in real environments.
Presenting the possibility of APT detection on various operating systems.
Reducing labeling costs through active learning.
Limitations:
Further validation of generalization performance is needed due to the use of a very small amount (0.004%) of real APT attack data.
Lack of discussion about the performance and reliability of the oracles used.
Lack of generalized performance evaluations for various APT attack types.
Further research is needed on the scalability and real-time processing performance of the framework.
👍