论文标题
通过转移学习语言模型来攻击策略识别
Attack Tactic Identification by Transfer Learning of Language Model
论文作者
论文摘要
随着安全攻击和数据泄露的迅速增加,网络安全已成为全球关注的主要问题。人工智能有望帮助人类分析和识别攻击。但是,标记数百万个用于监督学习的数据包绝非易事。这项研究旨在利用转移学习技术,该技术存储从定义明确的攻击生命周期文档中获得的知识,并将其应用于数十万未标记的攻击(数据包)来识别其攻击策略。我们预计攻击的知识在文档中很好地描述了,基于尖端变压器的语言模型可以将知识嵌入到高维的潜在空间中。然后,从语言模型中重用信息来学习数据包进行的攻击策略以提高学习效率。我们提出了一个系统,即Pelat,该系统是通过MITER ATT&CK Lifececle框架的1,417篇文章的微型BERT模型,以增强其攻击知识(包括使用的语法和嵌入的语义含义)。然后,佩拉特转移其知识,以对未标记的数据包进行半监督学习,以生成其战术标签。此外,当新的攻击数据包到达时,Pelat语言模型将使用下游分类器来处理数据包有效负载,以预测其策略。这样,我们可以有效地减轻手动标记大数据集的负担。在一个为期一周的Honeypot攻击数据集(每天227,000个数据包)中,Pelat在测试数据集中执行99%的精度,召回和F1。 Pelat可以在另外两个测试数据集上推断出超过99%的策略(识别近90%的战术)。
Cybersecurity has become a primary global concern with the rapid increase in security attacks and data breaches. Artificial intelligence is promising to help humans analyzing and identifying attacks. However, labeling millions of packets for supervised learning is never easy. This study aims to leverage transfer learning technique that stores the knowledge gained from well-defined attack lifecycle documents and applies it to hundred thousands of unlabeled attacks (packets) for identifying their attack tactics. We anticipate the knowledge of an attack is well-described in the documents, and the cutting edge transformer-based language model can embed the knowledge into a high-dimensional latent space. Then, reusing the information from the language model for the learning of attack tactic carried by packets to improve the learning efficiency. We propose a system, PELAT, that fine-tunes BERT model with 1,417 articles from MITRE ATT&CK lifecycle framework to enhance its attack knowledge (including syntax used and semantic meanings embedded). PELAT then transfers its knowledge to perform semi-supervised learning for unlabeled packets to generate their tactic labels. Further, when a new attack packet arrives, the packet payload will be processed by the PELAT language model with a downstream classifier to predict its tactics. In this way, we can effectively reduce the burden of manually labeling big datasets. In a one-week honeypot attack dataset (227 thousand packets per day), PELAT performs 99% of precision, recall, and F1 on testing dataset. PELAT can infer over 99% of tactics on two other testing datasets (while nearly 90% of tactics are identified).