2022 IEEE International Performance, Computing, and Communications Conference (IPCCC) 2022
DOI: 10.1109/ipccc55026.2022.9894328
|View full text |Cite
|
Sign up to set email alerts
|

APEX: Characterizing Attack Behaviors from Network Anomalies

Abstract: Networks regularly face various threats and attacks that manifest in their communication traffic. Recent works proposed unsupervised approaches, e.g., using a variational autoencoder, that are not only effective in detecting anomalies in network traffic, but also practical as they do not require ground truth or labeled data. However, the problem of characterizing anomalies into different attack behaviors is still less explored; in this work, we study this specific problem. We develop APEX, a framework that emp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Meanwhile, works that leverage and build on top of the explanations to provide additional functionalities (such as giving context to anomalies in order to group or characterize them) are scarce and are designed for centralized or distributed architectures that do not offer the same benefits as FL. Moreover, most works require labeled data in certain stages of their proposal [22,24,[27][28][29][30], which might not be feasible in practical settings.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Meanwhile, works that leverage and build on top of the explanations to provide additional functionalities (such as giving context to anomalies in order to group or characterize them) are scarce and are designed for centralized or distributed architectures that do not offer the same benefits as FL. Moreover, most works require labeled data in certain stages of their proposal [22,24,[27][28][29][30], which might not be feasible in practical settings.…”
Section: Discussionmentioning
confidence: 99%
“…However, this particular point is underexplored in the paper, and the gradient method is specific to the VAE model. Liyanage et al [27] leverage GEE to develop a framework for characterizing attacks from network flow anomalies. Instead of using XAI techniques or GEE's gradient-based explanation methods, they use two levels of frequent itemset mining (FIM) to extract anomalous data patterns.…”
Section: Explainability For Cybersecurity Anomaly or Attack Detection...mentioning
confidence: 99%