This application claims priority to and the benefit of Korean Patent Application No. 10-2018-0071 694 filed in the Korean Intellectual Property Office on Jun. 21, 2018, the entire contents of which are incorporated herein by reference.
The present disclosure relates to a method and apparatus for detecting cyber threats using a deep neural network.
Various security systems and solutions are being developed to detect intelligent cyber-target attacks that are significant threats to the enterprise network. In general, a control solution used by a security center of the enterprise automatically detects the threats by performing filtering, scenario analysis, and impact analysis on collected security events. However, the general control solution of the security center is more likely to detect false threats when the amount of security events is large. In particular, traditional rule-based control solutions fail to utilize past analytical data due to difficulties in retrieval and time.
An exemplary embodiment provides a method for detecting cyber threats using a neural network.
Another exemplary embodiment provides a computation apparatus for detecting cyber threats of a neural network.
Yet another exemplary embodiment provides a neural network system for detecting cyber threats.
According to an exemplary embodiment, a method for detecting cyber threats using a neural network is provided. The detecting method includes: generating a learning model by performing machine learning on training data based on baseline data, converting a security event collected in real time into input data for the neural network, and determining, as an output corresponding to the input data based on the learning model, whether the security event is normal or threat.
The generating a learning model by performing machine learning on training data based on baseline data may include performing the machine learning based on a predetermined label of raw data and a plurality of similarity values between a training profile of raw data for the machine learning and a plurality of baseline profiles of the baseline data, wherein the predetermined label indicates normal when the raw data is data related to a normal security event and indicates threat when the raw data is data related to threat security event.
The performing the machine learning may include learning that the predetermined label of the raw data is output after the plurality of similarity values are input.
The training data may include a label of the raw data and a similarity vector including a plurality of similarity values between a training profile of the raw data for the machine learning and a plurality of baseline profiles of the baseline data as an element.
The converting a security event collected in real time into input data for the neural network may include generating a plurality of similarity values between a data profile of the security event and a plurality of baseline profiles of the baseline data as input data of the neural network.
According to another exemplary embodiment, a computation apparatus for detecting cyber threats of a neural network is provided. The computation apparatus include: a processor, a memory, and a communication interface, wherein the processor executes a program stored in the memory to perform: generating a learning model by performing machine learning on training data based on baseline data, converting a security event collected in real time through the communication interface into input data for the neural network, and determining, as an output corresponding to the input data based on the learning model, whether the security event is normal or threat.
When the processor performs the generating a learning model by performing machine learning on training data based on baseline data, the processor may execute the program to perform performing the machine learning based on a predetermined label of raw data and a plurality of similarity values between a training profile of raw data for the machine learning and a plurality of baseline profiles of the baseline data, wherein the predetermined label indicates normal when the raw data is data related to a normal security event and indicates threat when the raw data is data related to threat security event.
When the processor performs the performing the machine learning, the processor may execute the program to perform learning that the predetermined label of the raw data is output after the plurality of similarity values are input.
The training data may include a label of the raw data and a similarity vector including a plurality of similarity values between a training profile of the raw data for the machine learning and a plurality of baseline profiles of the baseline data as an element.
When the processor performs the converting a security event collected in real time through the communication interface into input data for the neural network, the processor may execute the program to perform generating a plurality of similarity values between a data profile of the security event and a plurality of baseline profiles of the baseline data as input data of the neural network.
According to yet another exemplary embodiment, a neural network system for detecting cyber threats is provided. The neural network system includes: a plurality of hidden layers configured to generate a learning model by performing machine learning on training data based on baseline data; and a computation processor configured to convert a security event collected in real time into input data for the neural network system and determine, as an output corresponding to the input data based on the learning model, whether the security event is normal or threat.
In the following detailed description, only certain exemplary embodiments of the present invention have been shown and described, simply by way of illustration. As those skilled in the art would realize, the described embodiments may be modified in various different ways, all without departing from the spirit or scope of the present invention. Accordingly, the drawings and description are to be regarded as illustrative in nature and not restrictive, and like reference numerals designate like elements throughout the specification.
An artificial neural network 100 in the field of machine learning (ML) is used to build security intelligence. The neural network 100 performs the machine learning using training data according to the learning rule, and outputs a result based on the machine learning when the data is input. In the neural network 100, information is stored in such a manner as to change a connection relationship between nodes corresponding to neurons. The node in the neural network 100 transmits signals transmitted from other nodes to another node, and a connection state of the nodes indicates the information stored in the neural network 100. The connection relationship of the most important neurons in the brain may correspond to connection weight of the inter-node connection in the neural network 100.
The neural network 100 that performs supervised learning among the machine learning schemes learns the training data having a correct answer based on instances and outputs a value closest to the input data among the learning results when the data is input. If various parameters in the neural network 100 are repeatedly learned, the accuracy of the output of the neural network 100 may be enhanced. Referring to
Regression analysis is needed to find out the relationship between variables for the machine learning and to perform statistical prediction based on the machine learning. The regression analysis may be classified according to the output types as follows. One is a binary classification that outputs one of two results according to the output type and another is a multi-label classification that outputs one of a plurality of results.
First, a set of security events consisting of an aggregation of security events which occur during a predetermined time interval (e.g., 1 minute or 5 minutes) is generated (S110).
Next, the number of occurrences of the security events among the security event set is counted for each event type (S130). The number of times for which each security event occurs in the security event set is converted into a vectorized data profile based on the correlation analysis algorithm (S140). The data profile may be a vector of the form {e1, e2, . . . , en}. The baseline profile is then saved in a database (S150) and then, is used to detect the security breach through the machine learning.
According to the exemplary embodiment, a term frequency-inverse document frequency (TF-IDF) algorithm may be used as an algorithm for determining a correlation between the security event set and the security event. Since the TF-IDF algorithm is used to determine a correlation between a specific word and a document, according to the exemplary embodiment, the specific words of the TF-IDF algorithm corresponds to a name of the security event and the document of the TF-IDF corresponds to the security event set aggregated during the predetermined time interval. In the TF-IDF algorithm, TF indicates a frequency for which each security event occurred within each security event set, and IDF indicates a frequency for which each security event occurred within the entire security event set. The TF-IDF may be calculated as the multiplication of the two frequencies described above.
In
In
Referring to
Referring to
When the input data is input to the computation processor of the neural network, the computation processor determines one of the NORMAL or the THREAT as the output based on the learning model (S330). In this exemplary embodiment, the output of the neural network is a binary classification for regression analysis, and the neural network includes a plurality of hidden layers. The neural network may generate the learning model using the plurality of hidden layers and determine an output corresponding to input data based on the learning model. The output of the neural network may indicate whether the real-time security event is NORMAL or THREAT.
As described above, the detection experience for the past attack is learned by the regression analysis of the neural network to generate a learning model, and it is possible to accurately determine whether the real-time security event is normal or threat based on the learning model.
In addition, computing resources for security as a service (SecaaS) may also be saved since the security event is determined through a relatively simple process such as a comparison of similarities between profiles.
The neural network according to an exemplary embodiment may be implemented as a computer system, for example a computer readable medium. Referring to
Thus, embodiments of the present invention may be embodied as a computer-implemented method or as a non-volatile computer-readable medium having computer-executable instructions stored thereon. In the exemplary embodiment, when executed by a processor, the computer-readable instructions may perform the method according to at least one aspect of the present disclosure. The communication device 1220 may transmit or receive a wired signal or a wireless signal.
On the contrary, the embodiments of the present invention are not implemented only by the apparatuses and/or methods described so far, but may be implemented through a program realizing the function corresponding to the configuration of the embodiment of the present disclosure or a recording medium on which the program is recorded. Such an embodiment can be easily implemented by those skilled in the art from the description of the embodiments described above. Specifically, methods (e.g., network management methods, data transmission methods, transmission schedule generation methods, etc.) according to embodiments of the present disclosure may be implemented in the form of program instructions that may be executed through various computer means, and be recorded in the computer-readable medium. The computer-readable medium may include program instructions, data files, data structures, and the like, alone or in combination. The program instructions to be recorded on the computer-readable medium may be those specially designed or constructed for the embodiments of the present disclosure or may be known and available to those of ordinary skill in the computer software arts. The computer-readable recording medium may include a hardware device configured to store and execute program instructions. For example, the computer-readable recording medium can be any type of storage media such as magnetic media like hard disks, floppy disks, and magnetic tapes, optical media like CD-ROMs, DVDs, magneto-optical media like floptical disks, and ROM, RAM, flash memory, and the like. Program instructions may include machine language code such as those produced by a compiler, as well as high-level language code that may be executed by a computer via an interpreter, or the like.
While this invention has been described in connection with what is presently considered to be practical example embodiments, it is to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
10-2018-0071694 | Jun 2018 | KR | national |