AnomalyAdapters: Parameter-Efficient Multi-Anomaly Task Detection
dc.authorid | Unal, Ugur/0000-0001-6552-6044 | |
dc.authorid | DAG, HASAN/0000-0001-6252-1870 | |
dc.authorwosid | DAG, HASAN/T-5301-2018 | |
dc.contributor.author | Dağ, Hasan | |
dc.contributor.author | Dag, Hasan | |
dc.date.accessioned | 2023-10-19T15:11:53Z | |
dc.date.available | 2023-10-19T15:11:53Z | |
dc.date.issued | 2022 | |
dc.department-temp | [Unal, Ugur; Dag, Hasan] Kadir Has Univ, Management Informat Syst, TR-34083 Istanbul, Turkey | en_US |
dc.description.abstract | The emergence of technological innovations brings sophisticated threats. Cyberattacks are increasing day by day aligned with these innovations and entails rapid solutions for defense mechanisms. These attacks may hinder enterprise operations or more importantly, interrupt critical infrastructure systems, that are essential to safety, security, and well-being of a society. Anomaly detection, as a protection step, is significant for ensuring a system security. Logs, which are accepted sources universally, are utilized in system health monitoring and intrusion detection systems. Recent developments in Natural Language Processing (NLP) studies show that contextual information decreases false-positives yield in detecting anomalous behaviors. Transformers and their adaptations to various language understanding tasks exemplify the enhanced ability to extract this information. Deep network based anomaly detection solutions use generally feature-based transfer learning methods. This type of learning presents a new set of weights for each log type. It is unfeasible and a redundant way considering various log sources. Also, a vague representation of model decisions prevents learning from threat data and improving model capability. In this paper, we propose AnomalyAdapters (AAs) which is an extensible multi-anomaly task detection model. It uses pretrained transformers' variant to encode a log sequences and utilizes adapters to learn a log structure and anomaly types. Adapter-based approach collects contextual information, eliminates information loss in learning, and learns anomaly detection tasks from different log sources without overuse of parameters. Lastly, our work elucidates the decision making process of the proposed model on different log datasets to emphasize extraction of threat data via explainability experiments. | en_US |
dc.description.sponsorship | Scientific and Technological Research Council of Turkey (TUBITAK) [120E487] | en_US |
dc.description.sponsorship | This work was supported in part by The Scientific and Technological Research Council of Turkey (TUBITAK) under Grant 120E487. | en_US |
dc.identifier.citation | 4 | |
dc.identifier.doi | 10.1109/ACCESS.2022.3141161 | en_US |
dc.identifier.endpage | 5646 | en_US |
dc.identifier.issn | 2169-3536 | |
dc.identifier.scopus | 2-s2.0-85122849406 | en_US |
dc.identifier.scopusquality | Q1 | |
dc.identifier.startpage | 5635 | en_US |
dc.identifier.uri | https://doi.org/10.1109/ACCESS.2022.3141161 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12469/5266 | |
dc.identifier.volume | 10 | en_US |
dc.identifier.wos | WOS:000744487400001 | en_US |
dc.identifier.wosquality | Q2 | |
dc.khas | 20231019-WoS | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE-Inst Electrical Electronics Engineers Inc | en_US |
dc.relation.ispartof | Ieee Access | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Task analysis | en_US |
dc.subject | Anomaly detection | en_US |
dc.subject | Adaptation models | en_US |
dc.subject | Transformers | en_US |
dc.subject | Security | en_US |
dc.subject | Semantics | en_US |
dc.subject | Monitoring | en_US |
dc.subject | Anomaly detection | en_US |
dc.subject | adapters | en_US |
dc.subject | cyber threat intelligence | en_US |
dc.subject | explainability | en_US |
dc.subject | log | en_US |
dc.subject | transfer learning | en_US |
dc.title | AnomalyAdapters: Parameter-Efficient Multi-Anomaly Task Detection | en_US |
dc.type | Article | en_US |
dspace.entity.type | Publication | |
relation.isAuthorOfPublication | e02bc683-b72e-4da4-a5db-ddebeb21e8e7 | |
relation.isAuthorOfPublication.latestForDiscovery | e02bc683-b72e-4da4-a5db-ddebeb21e8e7 |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- 5266.pdf
- Size:
- 1.06 MB
- Format:
- Adobe Portable Document Format
- Description:
- Tam Metin / Full Text