Anomalyadapters: Parameter-Efficient Multi-Anomaly Task Detection

dc.authorid Unal, Ugur/0000-0001-6552-6044
dc.authorid DAG, HASAN/0000-0001-6252-1870
dc.authorwosid DAG, HASAN/T-5301-2018
dc.contributor.author Unal, Ugur
dc.contributor.author Dağ, Hasan
dc.contributor.author Dag, Hasan
dc.contributor.other Management Information Systems
dc.date.accessioned 2023-10-19T15:11:53Z
dc.date.available 2023-10-19T15:11:53Z
dc.date.issued 2022
dc.department-temp [Unal, Ugur; Dag, Hasan] Kadir Has Univ, Management Informat Syst, TR-34083 Istanbul, Turkey en_US
dc.description.abstract The emergence of technological innovations brings sophisticated threats. Cyberattacks are increasing day by day aligned with these innovations and entails rapid solutions for defense mechanisms. These attacks may hinder enterprise operations or more importantly, interrupt critical infrastructure systems, that are essential to safety, security, and well-being of a society. Anomaly detection, as a protection step, is significant for ensuring a system security. Logs, which are accepted sources universally, are utilized in system health monitoring and intrusion detection systems. Recent developments in Natural Language Processing (NLP) studies show that contextual information decreases false-positives yield in detecting anomalous behaviors. Transformers and their adaptations to various language understanding tasks exemplify the enhanced ability to extract this information. Deep network based anomaly detection solutions use generally feature-based transfer learning methods. This type of learning presents a new set of weights for each log type. It is unfeasible and a redundant way considering various log sources. Also, a vague representation of model decisions prevents learning from threat data and improving model capability. In this paper, we propose AnomalyAdapters (AAs) which is an extensible multi-anomaly task detection model. It uses pretrained transformers' variant to encode a log sequences and utilizes adapters to learn a log structure and anomaly types. Adapter-based approach collects contextual information, eliminates information loss in learning, and learns anomaly detection tasks from different log sources without overuse of parameters. Lastly, our work elucidates the decision making process of the proposed model on different log datasets to emphasize extraction of threat data via explainability experiments. en_US
dc.description.sponsorship Scientific and Technological Research Council of Turkey (TUBITAK) [120E487] en_US
dc.description.sponsorship This work was supported in part by The Scientific and Technological Research Council of Turkey (TUBITAK) under Grant 120E487. en_US
dc.identifier.citationcount 4
dc.identifier.doi 10.1109/ACCESS.2022.3141161 en_US
dc.identifier.endpage 5646 en_US
dc.identifier.issn 2169-3536
dc.identifier.scopus 2-s2.0-85122849406 en_US
dc.identifier.scopusquality Q1
dc.identifier.startpage 5635 en_US
dc.identifier.uri https://doi.org/10.1109/ACCESS.2022.3141161
dc.identifier.uri https://hdl.handle.net/20.500.12469/5266
dc.identifier.volume 10 en_US
dc.identifier.wos WOS:000744487400001 en_US
dc.identifier.wosquality Q2
dc.khas 20231019-WoS en_US
dc.language.iso en en_US
dc.publisher IEEE-Inst Electrical Electronics Engineers Inc en_US
dc.relation.ispartof Ieee Access en_US
dc.relation.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.scopus.citedbyCount 8
dc.subject Task analysis en_US
dc.subject Anomaly detection en_US
dc.subject Adaptation models en_US
dc.subject Transformers en_US
dc.subject Security en_US
dc.subject Semantics en_US
dc.subject Monitoring en_US
dc.subject Anomaly detection en_US
dc.subject adapters en_US
dc.subject cyber threat intelligence en_US
dc.subject explainability en_US
dc.subject log en_US
dc.subject transfer learning en_US
dc.title Anomalyadapters: Parameter-Efficient Multi-Anomaly Task Detection en_US
dc.type Article en_US
dc.wos.citedbyCount 7
dspace.entity.type Publication
relation.isAuthorOfPublication e02bc683-b72e-4da4-a5db-ddebeb21e8e7
relation.isAuthorOfPublication.latestForDiscovery e02bc683-b72e-4da4-a5db-ddebeb21e8e7
relation.isOrgUnitOfPublication ff62e329-217b-4857-88f0-1dae00646b8c
relation.isOrgUnitOfPublication.latestForDiscovery ff62e329-217b-4857-88f0-1dae00646b8c

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
5266.pdf
Size:
1.06 MB
Format:
Adobe Portable Document Format
Description:
Tam Metin / Full Text