scholarly journals Dataset Generation for Development of Multi-Node Cyber Threat Detection Systems

Electronics ◽  
2021 ◽  
Vol 10 (21) ◽  
pp. 2711
Author(s):  
Jędrzej Bieniasz ◽  
Krzysztof Szczypiorski

This paper presents a new approach to generate datasets for cyber threat research in a multi-node system. For this purpose, the proof-of-concept of such a system is implemented. The system will be used to collect unique datasets with examples of information hiding techniques. These techniques are not present in publicly available cyber threat detection datasets, while the cyber threats that use them represent an emerging cyber defense challenge worldwide. The network data were collected thanks to the development of a dedicated application that automatically generates random network configurations and runs scenarios of information hiding techniques. The generated datasets were used in the data-driven research workflow for cyber threat detection, including the generation of data representations (network flows), feature selection based on correlations, data augmentation of training datasets, and preparation of machine learning classifiers based on Random Forest and Multilayer Perceptron architectures. The presented results show the usefulness and correctness of the design process to detect information hiding techniques. The challenges and research directions to detect cyber deception methods are discussed in general in the paper.

2021 ◽  
Author(s):  
Jacob Hendriks ◽  
Patrick Dumond

Abstract This paper demonstrates various data augmentation techniques that can be used when working with limited run-to-failure data to estimate health indicators related to the remaining useful life of roller bearings. The PRONOSTIA bearing prognosis dataset is used for benchmarking data augmentation techniques. The input to the networks are multi-dimensional frequency representations obtained by combining the spectra taken from two accelerometers. Data augmentation techniques are adapted from other machine learning fields and include adding Gaussian noise, region masking, masking noise, and pitch shifting. Augmented datasets are used in training a conventional CNN architecture comprising two convolutional and pooling layer sequences with batch normalization. Results from individually separating each bearing’s data for the purpose of validation shows that all methods, except pitch shifting, give improved validation accuracy on average. Masking noise and region masking both show the added benefit of dataset regularization by giving results that are more consistent after repeatedly training each configuration with new randomly generated augmented datasets. It is shown that gradually deteriorating bearings and bearings with abrupt failure are not treated significantly differently by the augmentation techniques.


2019 ◽  
Vol 24 (1) ◽  
pp. 147-169 ◽  
Author(s):  
Britta Søgaard ◽  
Heather Dawn Skipworth ◽  
Michael Bourlakis ◽  
Carlos Mena ◽  
Richard Wilding

PurposeThis paper aims to explore how purchasing could respond to disruptive technologies by examining the assumptions underlying purchasing strategic alignment and purchasing maturity through a contingency lens.Design/methodology/approachThis study uses a systematic review across purchasing maturity and purchasing strategic alignment literature. This is supplemented with exploratory case studies to include practitioners’ views.FindingsThis research demonstrates that neither purchasing maturity nor purchasing strategic alignment are suitable approaches to respond to disruptive technologies. Purchasing maturity does not allow purchasing managers to select relevant practices. It also shows no consideration of any contingencies, which practitioners highlight as important for the selection of practices. Purchasing strategic alignment includes the company strategy as a contingency but does not provide any practices to choose from. It does not include any other contextual contingencies considered important by practitioners. The findings indicate that linking the two research streams may provide a more suitable approach to responding to disruptive technologies.Research limitations/implicationsThis research demonstrates the requirement to develop a new approach to responding to disruptive technologies, by linking purchasing maturity and purchasing strategic alignment to contextual contingencies. This is a currently unexplored approach in academic literature, which refutes the generally accepted premise that higher maturity unilaterally supports a better positioning towards technological disruption. This research also highlights a requirement for practitioners to shift their approach to “best practices”.Originality/valueThis is the first research to systematically review the relationships between purchasing maturity and purchasing strategic alignment. It adds to contingency theory by suggesting that purchasing maturity models can support the achievement of strategic alignment. Also, future research directions are suggested to explore these relationships.


2020 ◽  
Author(s):  
Xiaojie Guo ◽  
Liang Zhao

Graphs are important data representations for describing objects and their relationships, which appear in a wide diversity of real-world scenarios. As one of a critical problem in this area, graph generation considers learning the distributions of given graphs and generating more novel graphs. Owing to its wide range of applications, generative models for graphs have a rich history, which, however, are traditionally hand-crafted and only capable of modeling a few statistical properties of graphs. Recent advances in deep generative models for graph generation is an important step towards improving the fidelity of generated graphs and paves the way for new kinds of applications. This article provides an extensive overview of the literature in the field of deep generative models for graph generation. Firstly, the formal definition of deep generative models for the graph generation as well as preliminary knowledge is provided. Secondly, two taxonomies of deep generative models for unconditional, and conditional graph generation respectively are proposed; the existing works of each are compared and analyzed. After that, an overview of the evaluation metrics in this specific domain is provided. Finally, the applications that deep graph generation enables are summarized and five promising future research directions are highlighted.


2021 ◽  
Author(s):  
Khloud Al Jallad

Abstract New Attacks are increasingly used by attackers every day but many of them are not detected by Intrusion Detection Systems as most IDS ignore raw packet information and only care about some basic statistical information extracted from PCAP files. Using networking programs to extract fixed statistical features from packets is good, but may not enough to detect nowadays challenges. We think that it is time to utilize big data and deep learning for automatic dynamic feature extraction from packets. It is time to get inspired by deep learning pre-trained models in computer vision and natural language processing, so security deep learning solutions will have its pre-trained models on big datasets to be used in future researches. In this paper, we proposed a new approach for embedding packets based on character-level embeddings, inspired by FastText success on text data. We called this approach FastPacket. Results are measured on subsets of CIC-IDS-2017 dataset, but we expect promising results on big data pre-trained models. We suggest building pre-trained FastPacket on MAWI big dataset and make it available to community, similar to FastText. To be able to outperform currently used NIDS, to start a new era of packet-level NIDS that can better detect complex attacks


2021 ◽  
Vol 16 (1/2) ◽  
pp. 137
Author(s):  
Shade O. Kuyoro ◽  
Emmanuel C. Ogu ◽  
Oludele Awodele ◽  
Olusegun A. Ojesanmi

Author(s):  
Zafar Sultan ◽  
Paul Kwan

In this paper, a hybrid identity fusion model at decision level is proposed for Simultaneous Threat Detection Systems. The hybrid model is comprised of mathematical and statistical data fusion engines; Dempster Shafer, Extended Dempster and Generalized Evidential Processing (GEP). Simultaneous Threat Detection Systems improve threat detection rate by 39%. In terms of efficiency and performance, the comparison of 3 inference engines of the Simultaneous Threat Detection Systems showed that GEP is the better data fusion model. GEP increased precision of threat detection from 56% to 95%. Furthermore, set cover packing was used as a middle tier data fusion tool to discover the reduced size groups of threat data. Set cover provided significant improvement and reduced threat population from 2272 to 295, which helped in minimizing the processing complexity of evidential processing cost and time in determining the combined probability mass of proposed Multiple Simultaneous Threat Detection System. This technique is particularly relevant to on-line and Internet dependent applications including portals.


2010 ◽  
Vol 2 (2) ◽  
pp. 51-67
Author(s):  
Zafar Sultan ◽  
Paul Kwan

In this paper, a hybrid identity fusion model at decision level is proposed for Simultaneous Threat Detection Systems. The hybrid model is comprised of mathematical and statistical data fusion engines; Dempster Shafer, Extended Dempster and Generalized Evidential Processing (GEP). Simultaneous Threat Detection Systems improve threat detection rate by 39%. In terms of efficiency and performance, the comparison of 3 inference engines of the Simultaneous Threat Detection Systems showed that GEP is the better data fusion model. GEP increased precision of threat detection from 56% to 95%. Furthermore, set cover packing was used as a middle tier data fusion tool to discover the reduced size groups of threat data. Set cover provided significant improvement and reduced threat population from 2272 to 295, which helped in minimizing the processing complexity of evidential processing cost and time in determining the combined probability mass of proposed Multiple Simultaneous Threat Detection System. This technique is particularly relevant to on-line and Internet dependent applications including portals.


2020 ◽  
Vol 10 (15) ◽  
pp. 5208
Author(s):  
Mohammed Nasser Al-Mhiqani ◽  
Rabiah Ahmad ◽  
Z. Zainal Abidin ◽  
Warusia Yassin ◽  
Aslinda Hassan ◽  
...  

Insider threat has become a widely accepted issue and one of the major challenges in cybersecurity. This phenomenon indicates that threats require special detection systems, methods, and tools, which entail the ability to facilitate accurate and fast detection of a malicious insider. Several studies on insider threat detection and related areas in dealing with this issue have been proposed. Various studies aimed to deepen the conceptual understanding of insider threats. However, there are many limitations, such as a lack of real cases, biases in making conclusions, which are a major concern and remain unclear, and the lack of a study that surveys insider threats from many different perspectives and focuses on the theoretical, technical, and statistical aspects of insider threats. The survey aims to present a taxonomy of contemporary insider types, access, level, motivation, insider profiling, effect security property, and methods used by attackers to conduct attacks and a review of notable recent works on insider threat detection, which covers the analyzed behaviors, machine-learning techniques, dataset, detection methodology, and evaluation metrics. Several real cases of insider threats have been analyzed to provide statistical information about insiders. In addition, this survey highlights the challenges faced by other researchers and provides recommendations to minimize obstacles.


1990 ◽  
Vol 38 (3) ◽  
pp. 315-318 ◽  
Author(s):  
J M Robinson ◽  
B E Batten

Scanning laser confocal microscopy was utilized to visualize sites of hydrogen peroxide release from stimulated neutrophils and lysosomal acid phosphatase in these and other cells using cerium in the detection systems. Imaging of the cerium-containing reactions was achieved by employing the reflectance mode of this instrument. Localization of these products at the light microscope level was direct and did not require other reactions to generate a visible product. This new approach to cerium cytochemistry should prove useful for many applications.


Sign in / Sign up

Export Citation Format

Share Document