skip to main content
10.1145/3433210.3453098acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs

Authors Info & Claims
Published:04 June 2021Publication History

ABSTRACT

One of the most challenging problems in the field of intrusion detection is anomaly detection for discrete event logs. While most earlier work focused on applying unsupervised learning upon engineered features, most recent work has started to resolve this challenge by applying deep learning methodology to abstraction of discrete event entries. Inspired by natural language processing, LSTM-based anomaly detection models were proposed. They try to predict upcoming events, and raise an anomaly alert when a prediction fails to meet a certain criterion. However, such a predict-next-event methodology has a fundamental limitation: event predictions may not be able to fully exploit the distinctive characteristics of sequences. This limitation leads to high false positives (FPs). It is also critical to examine the structure of sequences and the bi-directional causality among individual events. To this end, we propose a new methodology: Recomposing event sequences as anomaly detection. We propose DabLog, a LSTM-based Deep Autoencoder-Based anomaly detection method for discrete event Logs. The fundamental difference is that, rather than predicting upcoming events, our approach determines whether a sequence is normal or abnormal by analyzing (encoding) and reconstructing (decoding) the given sequence. Our evaluation results show that our new methodology can significantly reduce the numbers of FPs, hence achieving a higher F1 score.

Skip Supplemental Material Section

Supplemental Material

dablog_2021-04-28 13-00-29.mp4

mp4

64.7 MB

References

  1. Mejbah Alam, Justin Gottschlich, Nesime Tatbul, Javier Turek, Timothy Mattson, and Abdullah Muzahid. 2017. A Zero-Positive Learning Approach for Diagnosing Software Performance Regressions. arxiv: 1709.07536 [cs.SE]Google ScholarGoogle Scholar
  2. Arwa Aldweesh, Abdelouahid Derhab, and Ahmed Z. Emam. 2020. Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues. Knowledge-Based Systems, Vol. 189 (2020), 105124.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Y. Bengio, P. Simard, and P. Frasconi. 1994. Learning long-term dependencies with gradient descent is difficult. IEEE Transactions on Neural Networks, Vol. 5, 2 (1994), 157--166.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Andy Brown, Aaron Tuor, Brian Hutchinson, and Nicole Nichols. 2018. Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection. In Proceedings of the First Workshop on Machine Learning for Computing Systems (Tempe, AZ, USA) (MLCS'18). Association for Computing Machinery, New York, NY, USA, Article 1, 8 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Raghavendra Chalapathy, Aditya Krishna Menon, and Sanjay Chawla. 2017. Robust, Deep and Inductive Anomaly Detection. In Machine Learning and Knowledge Discovery in Databases, Michelangelo Ceci, Jaakko Hollmén, Ljupvc o Todorovski, Celine Vens, and Savs o Dvz eroski (Eds.). Springer International Publishing, Cham, 36--51.Google ScholarGoogle Scholar
  6. Zouhair Chiba, Noureddine Abghour, Khalid Moussaid, Amina El Omri, and Mohamed Rida. 2018. A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection. Computers & Security, Vol. 75 (2018), 36 -- 58.Google ScholarGoogle ScholarCross RefCross Ref
  7. Kyunghyun Cho, Bart van Merrienboer, Caglar Gülcehre, Fethi Bougares, Holger Schwenk, and Yoshua Bengio. 2014. Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine Translation. CoRR, Vol. abs/1406.1078 (2014). arxiv: 1406.1078Google ScholarGoogle Scholar
  8. Min Du, Zhi Chen, Chang Liu, Rajvardhan Oak, and Dawn Song. 2019. Lifelong Anomaly Detection Through Unlearning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (London, United Kingdom) (CCS '19). Association for Computing Machinery, New York, NY, USA, 1283--1297.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Du and F. Li. 2016. Spell: Streaming Parsing of System Event Logs. In 2016 IEEE 16th International Conference on Data Mining (ICDM). 859--864.Google ScholarGoogle Scholar
  10. Min Du, Feifei Li, Guineng Zheng, and Vivek Srikumar. 2017. DeepLog: Anomaly Detection and Diagnosis from System Logs Through Deep Learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (Dallas, Texas, USA) (CCS '17). ACM, New York, NY, USA, 1285--1298.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. O. Ezeme, Q. H. Mahmoud, and A. Azim. 2018. Hierarchical Attention-Based Anomaly Detection Model for Embedded Operating Systems. In 2018 IEEE 24th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA). 225--231.Google ScholarGoogle Scholar
  12. O. M. Ezeme, Q. H. Mahmoud, and A. Azim. 2019. DReAM: Deep Recursive Attentive Model for Anomaly Detection in Kernel Events. IEEE Access, Vol. 7 (2019), 18860--18870.Google ScholarGoogle ScholarCross RefCross Ref
  13. Filipe Falcao, Tommaso Zoppi, Caio Barbosa Viera Silva, Anderson Santos, Baldoino Fonseca, Andrea Ceccarelli, and Andrea Bondavalli. 2019. Quantitative Comparison of Unsupervised Anomaly Detection Algorithms for Intrusion Detection. In Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing (Limassol, Cyprus) (SAC '19). Association for Computing Machinery, New York, NY, USA, 318--327.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Alex Graves, Abdelrahman Mohamed, and Geoffrey Hinton. 2013. Speech Recognition with Deep Recurrent Neural Networks. arxiv: 1303.5778 [cs.NE]Google ScholarGoogle Scholar
  15. Klaus Greff, Rupesh Kumar Srivastava, Jan Koutn'i k, Bas R. Steunebrink, and Jürgen Schmidhuber. 2015. LSTM: A Search Space Odyssey. CoRR, Vol. abs/1503.04069 (2015). arxiv: 1503.04069Google ScholarGoogle Scholar
  16. Michiel Hermans and Benjamin Schrauwen. 2013. Training and Analysing Deep Recurrent Neural Networks. In Advances in Neural Information Processing Systems 26, C. J. C. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 190--198.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long Short-Term Memory. Neural Computation, Vol. 9, 8 (1997), 1735--1780.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Q. Hu, B. Tang, and D. Lin. 2017. Anomalous User Activity Detection in Enterprise Multi-source Logs. In 2017 IEEE International Conference on Data Mining Workshops (ICDMW). 797--803.Google ScholarGoogle Scholar
  19. Rafal Jozefowicz, Wojciech Zaremba, and Ilya Sutskever. 2015. An empirical exploration of recurrent network architectures. In International conference on machine learning. 2342--2350.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Tayeb Kenaza, Khadidja Bennaceur, and Abdenour Labed. 2018. An Efficient Hybrid SVDD/Clustering Approach for Anomaly-Based Intrusion Detection. In Proceedings of the 33rd Annual ACM Symposium on Applied Computing (Pau, France) (SAC '18). Association for Computing Machinery, New York, NY, USA, 435--443.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Fucheng Liu, Yu Wen, Dongxue Zhang, Xihe Jiang, Xinyu Xing, and Dan Meng. 2019 b. Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (London, United Kingdom) (CCS '19). Association for Computing Machinery, New York, NY, USA, 1777--1794.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. L. Liu, C. Chen, J. Zhang, O. De Vel, and Y. Xiang. 2019. Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs. IEEE Access, Vol. 7 (2019), 183162--183176.Google ScholarGoogle ScholarCross RefCross Ref
  23. Liu Liu, Chao Chen, Jun Zhang, Olivier De Vel, and Yang Xiang. 2019 a. Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation. In Network and System Security, Joseph K. Liu and Xinyi Huang (Eds.). Springer International Publishing, Cham, 18--36.Google ScholarGoogle Scholar
  24. L. Liu, O. De Vel, C. Chen, J. Zhang, and Y. Xiang. 2018a. Anomaly-Based Insider Threat Detection Using Deep Autoencoders. In 2018 IEEE International Conference on Data Mining Workshops (ICDMW). 39--48.Google ScholarGoogle Scholar
  25. Z. Liu, T. Qin, X. Guan, H. Jiang, and C. Wang. 2018b. An Integrated Method for Anomaly Detection From Massive System Logs. IEEE Access, Vol. 6 (2018), 30602--30611.Google ScholarGoogle ScholarCross RefCross Ref
  26. X. Lu, W. Zhang, and J. Huang. 2020. Exploiting Embedding Manifold of Autoencoders for Hyperspectral Anomaly Detection. IEEE Transactions on Geoscience and Remote Sensing, Vol. 58, 3 (March 2020), 1527--1537.Google ScholarGoogle ScholarCross RefCross Ref
  27. Marcus A. Maloof and Gregory D. Stephens. 2007. ELICIT: A System for Detecting Insiders Who Violate Need-to-Know. In Proceedings of the 10th International Conference on Recent Advances in Intrusion Detection (Gold Goast, Australia) (RAID'07). Springer-Verlag, Berlin, Heidelberg, 146--166.Google ScholarGoogle Scholar
  28. Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, and Asaf Shabtai. 2018. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. arxiv: 1802.09089 [cs.CR]Google ScholarGoogle Scholar
  29. N. Moustafa and J. Slay. 2015. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In 2015 Military Communications and Information Systems Conference (MilCIS). 1--6.Google ScholarGoogle Scholar
  30. Q. P. Nguyen, K. W. Lim, D. M. Divakaran, K. H. Low, and M. C. Chan. 2019. GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection. In 2019 IEEE Conference on Communications and Network Security (CNS). 91--99.Google ScholarGoogle Scholar
  31. A. Oprea, Z. Li, T. Yen, S. H. Chin, and S. Alrwais. 2015. Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data. In 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. 45--56.Google ScholarGoogle Scholar
  32. Razvan Pascanu, Caglar Gulcehre, Kyunghyun Cho, and Yoshua Bengio. 2013. How to Construct Deep Recurrent Neural Networks. arxiv: 1312.6026 [cs.NE]Google ScholarGoogle Scholar
  33. Yuval Pinter, Robert Guthrie, and Jacob Eisenstein. 2017. Mimicking Word Embeddings using Subword RNNs. In Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, Copenhagen, Denmark, 102--112.Google ScholarGoogle ScholarCross RefCross Ref
  34. Mayu Sakurada and Takehisa Yairi. 2014. Anomaly Detection Using Autoencoders with Nonlinear Dimensionality Reduction. In Proceedings of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis (Gold Coast, Australia QLD, Australia) (MLSDA'14). Association for Computing Machinery, New York, NY, USA, 4--11.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi. 2018. A Deep Learning Approach to Network Intrusion Detection. IEEE Transactions on Emerging Topics in Computational Intelligence, Vol. 2, 1 (Feb 2018), 41--50.Google ScholarGoogle ScholarCross RefCross Ref
  36. Nitish Srivastava, Elman Mansimov, and Ruslan Salakhutdinov. 2015. Unsupervised Learning of Video Representations using LSTMs. CoRR, Vol. abs/1502.04681 (2015). arxiv: 1502.04681Google ScholarGoogle Scholar
  37. Xuhong Wang, Ying Du, Shijie Lin, Ping Cui, Yuntian Shen, and Yupu Yang. 2020. adVAE: A self-adversarial variational autoencoder with Gaussian anomaly prior knowledge for anomaly detection. Knowledge-Based Systems, Vol. 190 (2020), 105187.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Wei Xu, Ling Huang, Armando Fox, David Patterson, and Michael Jordan. 2009a. Online System Problem Detection by Mining Patterns of Console Logs. In Proceedings of the 2009 Ninth IEEE International Conference on Data Mining (ICDM '09). IEEE Computer Society, USA, 588--597.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Wei Xu, Ling Huang, Armando Fox, David Patterson, and Michael I. Jordan. 2009b. Detecting Large-Scale System Problems by Mining Console Logs. In Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles (Big Sky, Montana, USA) (SOSP '09). Association for Computing Machinery, New York, NY, USA, 117--132.Google ScholarGoogle Scholar
  40. R. Yang, D. Qu, Y. Gao, Y. Qian, and Y. Tang. 2019. nLSALog: An Anomaly Detection Framework for Log Sequence in Security Management. IEEE Access, Vol. 7 (2019), 181152--181164.Google ScholarGoogle ScholarCross RefCross Ref
  41. M. Yousefi-Azar, V. Varadharajan, L. Hamey, and U. Tupakula. 2017. Autoencoder-based feature learning for cyber security applications. In 2017 International Joint Conference on Neural Networks (IJCNN). 3854--3861.Google ScholarGoogle Scholar
  42. Chong Zhou and Randy C. Paffenroth. 2017. Anomaly Detection with Robust Deep Autoencoders. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (Halifax, NS, Canada) (KDD '17). Association for Computing Machinery, New York, NY, USA, 665--674.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Bo Zong, Qi Song, Martin Renqiang Min, Wei Cheng, Cristian Lumezanu, Daeki Cho, and Haifeng Chen. 2018. Deep Autoencoding Gaussian Mixture Model for Unsupervised Anomaly Detection. In International Conference on Learning Representations.Google ScholarGoogle Scholar

Index Terms

  1. Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security
      May 2021
      975 pages
      ISBN:9781450382878
      DOI:10.1145/3433210
      • General Chairs:
      • Jiannong Cao,
      • Man Ho Au,
      • Program Chairs:
      • Zhiqiang Lin,
      • Moti Yung

      Copyright © 2021 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 June 2021

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate418of2,322submissions,18%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader