Cybersecurity has become a primary global concern with the rapid increase in security attacks and data breaches. Artificial intelligence is promising to help humans analyzing and identifying attacks. However, labeling millions of packets for supervised learning is never easy. This study aims to leverage transfer learning technique that stores the knowledge gained from well-defined attack lifecycle documents and applies it to hundred thousands of unlabeled attacks (packets) for identifying their attack tactics. We anticipate the knowledge of an attack is well-described in the documents, and the cutting edge transformer-based language model can embed the knowledge into a high-dimensional latent space. Then, reusing the information from the language model for the learning of attack tactic carried by packets to improve the learning efficiency. We propose a system, PELAT, that fine-tunes BERT model with 1,417 articles from MITRE ATT&CK lifecycle framework to enhance its attack knowledge (including syntax used and semantic meanings embedded). PELAT then transfers its knowledge to perform semi-supervised learning for unlabeled packets to generate their tactic labels. Further, when a new attack packet arrives, the packet payload will be processed by the PELAT language model with a downstream classifier to predict its tactics. In this way, we can effectively reduce the burden of manually labeling big datasets. In a one-week honeypot attack dataset (227 thousand packets per day), PELAT performs 99% of precision, recall, and F1 on testing dataset. PELAT can infer over 99% of tactics on two other testing datasets (while nearly 90% of tactics are identified).
翻译:网络安全已成为全球对安全攻击和数据破坏迅速增加的主要关注。 人工智能有希望帮助人类分析和识别攻击。 然而, 标记数百万包用于监督学习的标签绝非易事。 本研究旨在利用转移学习技术, 储存从定义明确的攻击生命周期文件中获得的知识, 并将其应用到数十万次未标记的攻击( 包) 来识别其攻击战术。 我们预计文件对攻击的知识有很好的描述, 以尖端变异器为基础的语言模型可以将知识嵌入一个高维潜藏空间。 然后, 重新使用语言模型的信息来学习由各包携带的攻击策略, 以提高学习效率。 我们提议了一个系统, PELAT, 将它储存从定义明确的攻击生命周期文件中获得的知识储存起来, 并将其应用到有1,417篇文章的未标记攻击战术攻击战术( 包括所使用的语法和语义含义) 。 PELLAT 之后, 将它的知识传输到 99 类类的学习, 以生成其战术模型。 此外, 当一个新的攻击策略接近的战术, PELT, 将有效地进行这个数据库的测试, 我们的B 的 将用一个 的 IM 。