Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security 2017
DOI: 10.1145/3128572.3140445
|View full text |Cite
|
Sign up to set email alerts
|

Practical Machine Learning for Cloud Intrusion Detection

Abstract: Operationalizing machine learning based security detections is extremely challenging, especially in a continuously evolving cloud environment. Conventional anomaly detection does not produce satisfactory results for analysts that are investigating security incidents in the cloud. Model evaluation alone presents its own set of problems due to a lack of benchmark datasets. When deploying these detections, we must deal with model compliance, localization, and data silo issues, among many others. We pose the probl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(20 citation statements)
references
References 12 publications
0
19
0
1
Order By: Relevance
“…There exists empirical studies [6] and experience reports [7,15,19,21] published across different disciplines that present an end-to-end development process and challenges of operational AI-enabled applications. In a field study of how intelligent systems are developed, Hill et al [6] describe a high-level process that includes the following activities that are not necessarily sequential: defining problem, collecting data, establishing ground truth, selecting algorithm, selecting features and creating and evaluating ML model.…”
Section: Background and Related Workmentioning
confidence: 99%
“…There exists empirical studies [6] and experience reports [7,15,19,21] published across different disciplines that present an end-to-end development process and challenges of operational AI-enabled applications. In a field study of how intelligent systems are developed, Hill et al [6] describe a high-level process that includes the following activities that are not necessarily sequential: defining problem, collecting data, establishing ground truth, selecting algorithm, selecting features and creating and evaluating ML model.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The primary motivation behind the model was to offer access to an approved client in the cloud and choose the confided in the asset for his calculation [16]. In Reference [84], the advantages are ensuring high data privacy consistency, restriction, and information and disadvantage are difficulties to manage information. In Reference [16], the advantage is that a trust-based access control model is an efficient method for security in CC, and the disadvantage is security issues.…”
Section: Discussion and Lessons Learnedmentioning
confidence: 99%
“…Kumar et al [84] described the framework, challenges, and open questions surrounding the successful operation of ML-based security detection in a cloud environment. Regular irregularity recognition does not create acceptable outcomes for investigators who examine security episodes in the Cloud.…”
Section: Singular Value Decomposition (Svd)mentioning
confidence: 99%
“…Una de las limitaciones para los sistemas de detección es la falta de conjuntos de datos etiquetados de manera exhaustiva. Muchas veces, los expertos etiquetan los conjuntos de datos en dominios limitados y esto conduce a la falta de muestras etiquetadas y a numerosos errores de etiquetado, conjuntos de datos desbalanceados, dificultad para identificar fuentes maliciosas y más [11].…”
Section: Malwareunclassified