Visible to the public Feature Cultivation in Privileged Information-Augmented Detection

TitleFeature Cultivation in Privileged Information-Augmented Detection
Publication TypeConference Paper
Year of Publication2017
AuthorsCelik, Z. Berkay, McDaniel, Patrick, Izmailov, Rauf
Conference NameProceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4909-3
KeywordsHuman Behavior, human factors, information forensics, Intrusion detection, Metrics, privileged information, pubcrawl, resilience, Resiliency, Scalability
Abstract

Modern detection systems use sensor outputs available in the deployment environment to probabilistically identify attacks. These systems are trained on past or synthetic feature vectors to create a model of anomalous or normal behavior. Thereafter, run-time collected sensor outputs are compared to the model to identify attacks (or the lack of attack). While this approach to detection has been proven to be effective in many environments, it is limited to training on only features that can be reliably collected at detection time. Hence, they fail to leverage the often vast amount of ancillary information available from past forensic analysis and post-mortem data. In short, detection systems do not train (and thus do not learn from) features that are unavailable or too costly to collect at run-time. Recent work proposed an alternate model construction approach that integrates forensic "privilege" information--features reliably available at training time, but not at run-time--to improve accuracy and resilience of detection systems. In this paper, we further evaluate two of proposed techniques to model training with privileged information: knowledge transfer, and model influence. We explore the cultivation of privileged features, the efficiency of those processes and their influence on the detection accuracy. We observe that the improved integration of privileged features makes the resulting detection models more accurate. Our evaluation shows that use of privileged information leads to up to 8.2% relative decrease in detection error for fast-flux bot detection over a system with no privileged information, and 5.5% for malware classification.

URLhttps://dl.acm.org/citation.cfm?doid=3041008.3041018
DOI10.1145/3041008.3041018
Citation Keycelik_feature_2017