Skip to main content

The Concept of Applying Lifelong Learning Paradigm to Cybersecurity

  • Conference paper
  • First Online:
Intelligent Computing Methodologies (ICIC 2017)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10363))

Included in the following conference series:

Abstract

One of the current challenges in machine learning is to develop intelligent systems that are able to learn consecutive tasks, and to transfer knowledge from previously learnt basis to learn new tasks. Such capability is termed as lifelong learning and, as we believe, it matches very well to counter current problems in cybersecurity domain, where each new cyber attack can be considered as a new task. One of the main motivations for our research is the fact that many cybersecurity solutions adapting machine learning are concerned as STL (Single Task Learning problem), which in our opinion is not the optimal approach (particularly in the area of malware detection) to solve the classification problem. Therefore, in this paper we present the concept applying the lifelong learning approach to cybersecurity (attack detection).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.ietf.org/rfc/rfc3954.txt.

  2. 2.

    http://spark.apache.org/.

  3. 3.

    http://spark.apache.org/mllib/.

References

  1. Chen, Z., Liu, B.: Lifelong machine learning. Synth. Lect. Artif. Intell. Mach. Learn. 10(3), 1–145 (2016)

    Article  Google Scholar 

  2. García, S., Zunino, A., Campo, M.: Survey on network-based botnet detection methods. Secur. Commun. Netw. 7(5), 878–903 (2014)

    Article  Google Scholar 

  3. Pentina, A., Lampert, C.H.: Lifelong learning with non-i.i.d. tasks. In: Advances in Neural Information Processing Systems (2015)

    Google Scholar 

  4. Chen, Z., Lium, B.: Lifelong machine learning in the big data era. In: IJCAI 2015 Tutorial (2015)

    Google Scholar 

  5. Pentina, A., Lampert, C.H.: A PAC-Bayesian bound for lifelong learning. In: ICML (2014)

    Google Scholar 

  6. Baxter, J.: A model of inductive bias learning. J. Artif. Intell. Res. (JAIR) 12, 149–198 (2000)

    MathSciNet  MATH  Google Scholar 

  7. Maurer, A.: Algorithmic stability and meta-learning. J. Mach. Learn. Res. 6, 967–994 (2005)

    MathSciNet  MATH  Google Scholar 

  8. Balcan, M., Blum, A., Vempala, S.: Efficient representations for lifelong learning and autoencoding. In: Workshop on Computational Learning Theory (COLT) (2015)

    Google Scholar 

  9. Segev, N., et al.: Learn on source, refine on target: a model transfer learning framework with random forests. IEEE Trans. Pattern Anal. Mach. Intell. PP(99), 1 (2015)

    Google Scholar 

  10. Ammar, H.B., Tutunov, R., Eaton, E.: Safe policy search for lifelong reinforcement learning with sublinear regret. In: Proceedings of the 32nd International Conference on Machine Learning, vol. 37, pp. 2361–2369. JMLR.org (2015)

    Google Scholar 

  11. Qiu, Q., Sapiro, G.: Learning transformations for clustering and classification. J. Mach. Learn. Res. 16, 187–225 (2015)

    MathSciNet  MATH  Google Scholar 

  12. Chen, Z., Liu, B.: Topic modeling using topics from many domains, lifelong learning and big data. In: Proceedings of the 31st International Conference on Machine Learning (2014)

    Google Scholar 

  13. Yang, H.L., Crawford, M.M.: Domain adaptation with preservation of manifold geometry for hyperspectral image classification. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 9(2), 543–555 (2016)

    Article  Google Scholar 

  14. Yang, H.L., Crawford, M.M.: Spectral and spatial proximity-based manifold alignment for multitemporal hyperspectral image classification. IEEE Trans. Geosci. Remote Sens. 54(1), 51–64 (2016)

    Article  Google Scholar 

  15. Widmer, G., Kubat, M.: Learning in the presence of concept drift and hidden contexts. Mach. Learn. 23(1), 69–101 (1996)

    Google Scholar 

  16. Sim, K., Hart, E., Paechter, B.: A lifelong learning hyper-heuristic method for bin packing. Evol. Comput. 23(1), 37–67 (2015)

    Article  Google Scholar 

  17. Conţiu, Ş., Groza, A.: Improving remote sensing crop classification by argumentation-based conflict resolution in ensemble learning. Expert Syst. Appl. 64, 269–286 (2016)

    Article  Google Scholar 

  18. Choraś, M., Kozik, R., Bruna, M.P.T., Yautsiukhin, A., Churchill, A., Maciejewska, I., Eguinoa, I., Jomni, A.: Comprehensive approach to increase cyber security and resielience. In: Proceedings of ARES (International Conference on Availability, Reliability and Security), Touluse, pp. 686–692. IEEE (2015)

    Google Scholar 

  19. Kozik, R., Choraś, M., Renk, R., Hołubowicz, W.: Cyber security of the application layer of mission critical industrial systems. In: Saeed, K., Homenda, W. (eds.) CISIM 2016. LNCS, vol. 9842, pp. 342–351. Springer, Cham (2016). doi:10.1007/978-3-319-45378-1_31

    Chapter  Google Scholar 

  20. Choraś, M., Kozik, R., Flizikowski, A., Renk, R., Hołubowicz, W.: Cyber threats impacting critical infrastructures. In: Setola, R., Rosato, V., Kyriakides, E., Rome, E. (eds.) Managing the Complexity of Critical Infrastructures. Studies in Systems, Decision and Control, vol. 90, pp. 139–161. Springer, Heidelberg (2017). doi:10.1007/978-3-319-51043-9_7

    Chapter  Google Scholar 

  21. Choraś, M., Kozik, R., Puchalski, D., Hołubowicz, W.: Correlation approach for SQL injection attacks detection. In: Herrero, Á., et al. (eds.) International Joint Conference CISIS’12-ICEUTE’12-SOCO’12 Special Sessions. AISC, vol. 189, pp. 177–186. Springer, Heidelberg (2012). doi:10.1007/978-3-642-33018-6_18

    Chapter  Google Scholar 

  22. Gómez, S.A., Chesñevar, C.I., Simari, G.R.: ONTOarg: a decision support framework for ontology integration based on argumentation. Expert Syst. Appl. 40(5), 1858–1870 (2013)

    Article  Google Scholar 

  23. Moguillansky, M.O., Simari, G.R.: A generalized abstract argumentation framework for inconsistency-tolerant ontology reasoning. Expert Syst. Appl. 64, 141–168 (2016)

    Article  Google Scholar 

  24. Choraś, M., Kozik, R., Flizikowski, A., Hołubowicz, W.: Ontology applied in decision support system for critical infrastructures protection. In: García-Pedrajas, N., Herrera, F., Fyfe, C., Benítez, J.M., Ali, M. (eds.) IEA/AIE 2010. LNCS, vol. 6096, pp. 671–680. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13022-9_67

    Chapter  Google Scholar 

  25. Bentahar, J., Moulin, B., Bélanger, M.: A taxonomy of argumentation models used for knowledge representation. Artif. Intell. Rev. 33(3), 211–259 (2010)

    Article  Google Scholar 

  26. OWASP: The Open Web Application Project – OWASP Top Ten

    Google Scholar 

  27. Kozik, R., Choraś, M., Hołubowicz, W.: Evolutionary-based packets classification for anomaly detection in web layer. Secur. Commun. Netw. 9(15), 2901–2910 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michał Choraś .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Choraś, M., Kozik, R., Renk, R., Hołubowicz, W. (2017). The Concept of Applying Lifelong Learning Paradigm to Cybersecurity. In: Huang, DS., Hussain, A., Han, K., Gromiha, M. (eds) Intelligent Computing Methodologies. ICIC 2017. Lecture Notes in Computer Science(), vol 10363. Springer, Cham. https://doi.org/10.1007/978-3-319-63315-2_58

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63315-2_58

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63314-5

  • Online ISBN: 978-3-319-63315-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics