Abstract
One of the current challenges in machine learning is to develop intelligent systems that are able to learn consecutive tasks, and to transfer knowledge from previously learnt basis to learn new tasks. Such capability is termed as lifelong learning and, as we believe, it matches very well to counter current problems in cybersecurity domain, where each new cyber attack can be considered as a new task. One of the main motivations for our research is the fact that many cybersecurity solutions adapting machine learning are concerned as STL (Single Task Learning problem), which in our opinion is not the optimal approach (particularly in the area of malware detection) to solve the classification problem. Therefore, in this paper we present the concept applying the lifelong learning approach to cybersecurity (attack detection).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, Z., Liu, B.: Lifelong machine learning. Synth. Lect. Artif. Intell. Mach. Learn. 10(3), 1–145 (2016)
García, S., Zunino, A., Campo, M.: Survey on network-based botnet detection methods. Secur. Commun. Netw. 7(5), 878–903 (2014)
Pentina, A., Lampert, C.H.: Lifelong learning with non-i.i.d. tasks. In: Advances in Neural Information Processing Systems (2015)
Chen, Z., Lium, B.: Lifelong machine learning in the big data era. In: IJCAI 2015 Tutorial (2015)
Pentina, A., Lampert, C.H.: A PAC-Bayesian bound for lifelong learning. In: ICML (2014)
Baxter, J.: A model of inductive bias learning. J. Artif. Intell. Res. (JAIR) 12, 149–198 (2000)
Maurer, A.: Algorithmic stability and meta-learning. J. Mach. Learn. Res. 6, 967–994 (2005)
Balcan, M., Blum, A., Vempala, S.: Efficient representations for lifelong learning and autoencoding. In: Workshop on Computational Learning Theory (COLT) (2015)
Segev, N., et al.: Learn on source, refine on target: a model transfer learning framework with random forests. IEEE Trans. Pattern Anal. Mach. Intell. PP(99), 1 (2015)
Ammar, H.B., Tutunov, R., Eaton, E.: Safe policy search for lifelong reinforcement learning with sublinear regret. In: Proceedings of the 32nd International Conference on Machine Learning, vol. 37, pp. 2361–2369. JMLR.org (2015)
Qiu, Q., Sapiro, G.: Learning transformations for clustering and classification. J. Mach. Learn. Res. 16, 187–225 (2015)
Chen, Z., Liu, B.: Topic modeling using topics from many domains, lifelong learning and big data. In: Proceedings of the 31st International Conference on Machine Learning (2014)
Yang, H.L., Crawford, M.M.: Domain adaptation with preservation of manifold geometry for hyperspectral image classification. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 9(2), 543–555 (2016)
Yang, H.L., Crawford, M.M.: Spectral and spatial proximity-based manifold alignment for multitemporal hyperspectral image classification. IEEE Trans. Geosci. Remote Sens. 54(1), 51–64 (2016)
Widmer, G., Kubat, M.: Learning in the presence of concept drift and hidden contexts. Mach. Learn. 23(1), 69–101 (1996)
Sim, K., Hart, E., Paechter, B.: A lifelong learning hyper-heuristic method for bin packing. Evol. Comput. 23(1), 37–67 (2015)
Conţiu, Ş., Groza, A.: Improving remote sensing crop classification by argumentation-based conflict resolution in ensemble learning. Expert Syst. Appl. 64, 269–286 (2016)
Choraś, M., Kozik, R., Bruna, M.P.T., Yautsiukhin, A., Churchill, A., Maciejewska, I., Eguinoa, I., Jomni, A.: Comprehensive approach to increase cyber security and resielience. In: Proceedings of ARES (International Conference on Availability, Reliability and Security), Touluse, pp. 686–692. IEEE (2015)
Kozik, R., Choraś, M., Renk, R., Hołubowicz, W.: Cyber security of the application layer of mission critical industrial systems. In: Saeed, K., Homenda, W. (eds.) CISIM 2016. LNCS, vol. 9842, pp. 342–351. Springer, Cham (2016). doi:10.1007/978-3-319-45378-1_31
Choraś, M., Kozik, R., Flizikowski, A., Renk, R., Hołubowicz, W.: Cyber threats impacting critical infrastructures. In: Setola, R., Rosato, V., Kyriakides, E., Rome, E. (eds.) Managing the Complexity of Critical Infrastructures. Studies in Systems, Decision and Control, vol. 90, pp. 139–161. Springer, Heidelberg (2017). doi:10.1007/978-3-319-51043-9_7
Choraś, M., Kozik, R., Puchalski, D., Hołubowicz, W.: Correlation approach for SQL injection attacks detection. In: Herrero, Á., et al. (eds.) International Joint Conference CISIS’12-ICEUTE’12-SOCO’12 Special Sessions. AISC, vol. 189, pp. 177–186. Springer, Heidelberg (2012). doi:10.1007/978-3-642-33018-6_18
Gómez, S.A., Chesñevar, C.I., Simari, G.R.: ONTOarg: a decision support framework for ontology integration based on argumentation. Expert Syst. Appl. 40(5), 1858–1870 (2013)
Moguillansky, M.O., Simari, G.R.: A generalized abstract argumentation framework for inconsistency-tolerant ontology reasoning. Expert Syst. Appl. 64, 141–168 (2016)
Choraś, M., Kozik, R., Flizikowski, A., Hołubowicz, W.: Ontology applied in decision support system for critical infrastructures protection. In: García-Pedrajas, N., Herrera, F., Fyfe, C., Benítez, J.M., Ali, M. (eds.) IEA/AIE 2010. LNCS, vol. 6096, pp. 671–680. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13022-9_67
Bentahar, J., Moulin, B., Bélanger, M.: A taxonomy of argumentation models used for knowledge representation. Artif. Intell. Rev. 33(3), 211–259 (2010)
OWASP: The Open Web Application Project – OWASP Top Ten
Kozik, R., Choraś, M., Hołubowicz, W.: Evolutionary-based packets classification for anomaly detection in web layer. Secur. Commun. Netw. 9(15), 2901–2910 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Choraś, M., Kozik, R., Renk, R., Hołubowicz, W. (2017). The Concept of Applying Lifelong Learning Paradigm to Cybersecurity. In: Huang, DS., Hussain, A., Han, K., Gromiha, M. (eds) Intelligent Computing Methodologies. ICIC 2017. Lecture Notes in Computer Science(), vol 10363. Springer, Cham. https://doi.org/10.1007/978-3-319-63315-2_58
Download citation
DOI: https://doi.org/10.1007/978-3-319-63315-2_58
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-63314-5
Online ISBN: 978-3-319-63315-2
eBook Packages: Computer ScienceComputer Science (R0)