dc.contributor.author | Rendall, Kieran | |
dc.contributor.author | Mylonas, Alexios | |
dc.contributor.author | Vidalis, Stilianos | |
dc.contributor.author | Gritzalis, Dimitris | |
dc.date.accessioned | 2024-12-06T10:30:00Z | |
dc.date.available | 2024-12-06T10:30:00Z | |
dc.date.issued | 2025-01-30 | |
dc.identifier.citation | Rendall , K , Mylonas , A , Vidalis , S & Gritzalis , D 2025 , ' MIDAS: Multi-layered attack detection architecture with decision optimisation ' , Computers and Security , vol. 148 , 104154 , pp. 1-14 . https://doi.org/10.1016/j.cose.2024.104154 | |
dc.identifier.issn | 0167-4048 | |
dc.identifier.other | RIS: urn:65E0DE5208AE3CDA3CCD21EB4123F52E | |
dc.identifier.other | ORCID: /0000-0001-8819-5831/work/173286381 | |
dc.identifier.uri | http://hdl.handle.net/2299/28517 | |
dc.description | © 2024 The Author(s). Published by Elsevier Ltd. This is an open access article distributed under the Creative Commons Attribution License, to view a copy of the license, see: https://creativecommons.org/licenses/by/4.0/ | |
dc.description.abstract | The proliferation of cyber attacks has led to the use of data-driven detection countermeasures, in an effort to mitigate this threat. Machine learning techniques, such as the use of neural networks, have become mainstream and proven effective in attack detection. However, these data-driven solutions are limited by: a) high computational overhead associated with data pre-processing and inference cost, b) inability to scale beyond a centralised deployment to cope with environmental variances, and c) requirement to use multiple bespoke detection models for effective attack detection coverage across the cyber kill chain. In this context, this paper introduces MIDAS, a cost-effective framework for attack detection, which introduces a dynamic decision boundary that is used in a multi-layered detection architecture. This is achieved by modelling the decision confidence of the participating detection models and judging its benefits using a novel reward policy. Specifically, a reward is assigned to a set of available actions, corresponding to a decision boundary, based on its cost-to-performance, where an overall cost-saving is prioritised. We evaluate our approach on two widely used datasets representing two of the most common threats today, i.e., phishing and malware. MIDAS shows that it effectively reduces the expenditure on detection inference and processing costs by controlling the frequency of expensive detection operations. This is achieved without significant sacrifice of attack detection performance. | en |
dc.format.extent | 14 | |
dc.format.extent | 3144332 | |
dc.language.iso | eng | |
dc.relation.ispartof | Computers and Security | |
dc.subject | Multi-armed bandits | |
dc.subject | Attack detection | |
dc.subject | Machine learning | |
dc.subject | Efficiency | |
dc.subject | Decision optimisation | |
dc.title | MIDAS: Multi-layered attack detection architecture with decision optimisation | en |
dc.contributor.institution | School of Physics, Engineering & Computer Science | |
dc.contributor.institution | Department of Computer Science | |
dc.contributor.institution | Cybersecurity and Computing Systems | |
dc.contributor.institution | Centre for Computer Science and Informatics Research | |
dc.description.status | Peer reviewed | |
rioxxterms.versionofrecord | 10.1016/j.cose.2024.104154 | |
rioxxterms.type | Journal Article/Review | |
herts.preservation.rarelyaccessed | true | |