论文标题
radial尖峰和平板贝叶斯神经网络,用于勒索软件攻击中的稀疏数据
Radial Spike and Slab Bayesian Neural Networks for Sparse Data in Ransomware Attacks
论文作者
论文摘要
勒索软件攻击以惊人的速度增加,导致财务损失巨大,无法恢复的加密数据,数据泄漏和隐私问题。需要迅速检测勒索软件攻击以最大程度地减少进一步的损害,尤其是在加密阶段。但是,观察到的勒索软件攻击数据的频率和结构使得在实践中难以完成此任务。与勒索软件攻击相对应的数据代表了时间上的高维稀疏信号,记录有限和非常不平衡的类。尽管传统的深度学习模型已经能够实现最新的域名,但贝叶斯神经网络(这是一类概率模型)更适合勒索软件数据的问题。这些模型将贝叶斯统计数据的思想与神经网络的富有表现力结合在一起。在本文中,我们提出了径向尖峰和平板贝叶斯神经网络,该网络是一种新型的贝叶斯神经网络,其中包括一种近似后验分布的新形式。该模型可以很好地扩展到大型体系结构,并恢复目标函数的稀疏结构。我们为使用这种类型的分布提供了理论上的理由,以及一种执行各种推断的计算有效方法。我们在勒索软件攻击的真实数据集上演示了我们的模型的性能,并在许多基准中显示了改进,包括神经odes等最新模型(普通微分方程)。此外,我们建议将低级事件表示为MITER ATT \&CK策略,技术和程序(TTPS),该战术,技术和程序(TTPS)允许该模型更好地概括到看不见的勒索软件攻击。
Ransomware attacks are increasing at an alarming rate, leading to large financial losses, unrecoverable encrypted data, data leakage, and privacy concerns. The prompt detection of ransomware attacks is required to minimize further damage, particularly during the encryption stage. However, the frequency and structure of the observed ransomware attack data makes this task difficult to accomplish in practice. The data corresponding to ransomware attacks represents temporal, high-dimensional sparse signals, with limited records and very imbalanced classes. While traditional deep learning models have been able to achieve state-of-the-art results in a wide variety of domains, Bayesian Neural Networks, which are a class of probabilistic models, are better suited to the issues of the ransomware data. These models combine ideas from Bayesian statistics with the rich expressive power of neural networks. In this paper, we propose the Radial Spike and Slab Bayesian Neural Network, which is a new type of Bayesian Neural network that includes a new form of the approximate posterior distribution. The model scales well to large architectures and recovers the sparse structure of target functions. We provide a theoretical justification for using this type of distribution, as well as a computationally efficient method to perform variational inference. We demonstrate the performance of our model on a real dataset of ransomware attacks and show improvement over a large number of baselines, including state-of-the-art models such as Neural ODEs (ordinary differential equations). In addition, we propose to represent low-level events as MITRE ATT\&CK tactics, techniques, and procedures (TTPs) which allows the model to better generalize to unseen ransomware attacks.