Home [SP2024] Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics
Post
Cancel

[SP2024] Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics

Title: Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics

Author: Jiacen Xu, Xiaokui Shu and Zhou Li

Conference: 2024 IEEE Symposium on Security and Privacy (SP)

Paper: link

Code: https://github.com/C0ldstudy/Argus

Bibtex:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
@INPROCEEDINGS {,
author = {J. Xu and X. Shu and Z. Li},
booktitle = {2024 IEEE Symposium on Security and Privacy (SP)},
title = {Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics},
year = {2024},
volume = {},
issn = {2375-1207},
pages = {12-12},
doi = {10.1109/SP54263.2024.00012},
url = {https://doi.ieeecomputersociety.org/10.1109/SP54263.2024.00012},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
month = {may}
}

Main Idea

We revisit the previous Unsupervised Network Representation Learning (UNRL)-based Graph Security Analysis and argue that generic attack characteristics should be considered instead of a standard UNRL model in an attack-agnostic way. We design Argus with a new encoder and decoder considering discrete temporal graphs (DTG) to exploit the graph temporal dynamics. We evaluate Argus on LANL and OpTC datasets and achieve performance better than the SOTA.

Key insight

Issues of the previous papers: Issue-A: Gap between link prediction and attack detection. Issue-B: Missing edge features. Issue-C: Static graph modeling over long period.

Our solutions:

  • To integrate the useful event fields as edge features, we designed a new encoder on top of Message Passing Neural Networks (MPNNs).
  • Instead of training GSA model to achieve high accuracy, we adopt new loss functions AP Loss to optimize the model for high precision.
  • For the downstream decoder, we redesign it to capture the community patterns that are likely exhibited by the attacker (e.g., lateral movement and port scanning), by adjusting previous methods in graph anomaly detection.

Framework

framework

Evaluation

Datasets:

  • LANL: https://csr.lanl.gov/data/cyber1/
  • OpTC: https://github.com/FiveDirections/OpTC-data

Baselines:

  • Netwalk: https://dl.acm.org/doi/10.1145/3219819.3220024
  • PIKACHU: https://ieeexplore.ieee.org/document/9789921/
  • VGRNN: https://arxiv.org/abs/1611.07308
  • Euler: https://www.ndss-symposium.org/ndss-paper/auto-draft-227/

Experiment:

Overall Effectiveness:

effectiveness

Ablation Study:

ablation

Robustness:

robust

This post is licensed under CC BY 4.0 by the author.

LLM Paper Summary

LLM Deploy