Show simple item record

dc.contributor.authorRendall, Kieran
dc.contributor.authorMylonas, Alexios
dc.contributor.authorVidalis, Stilianos
dc.contributor.authorGritzalis, Dimitris
dc.date.accessioned2024-12-06T10:30:00Z
dc.date.available2024-12-06T10:30:00Z
dc.date.issued2025-01-30
dc.identifier.citationRendall , K , Mylonas , A , Vidalis , S & Gritzalis , D 2025 , ' MIDAS: Multi-layered attack detection architecture with decision optimisation ' , Computers and Security , vol. 148 , 104154 , pp. 1-14 . https://doi.org/10.1016/j.cose.2024.104154
dc.identifier.issn0167-4048
dc.identifier.otherRIS: urn:65E0DE5208AE3CDA3CCD21EB4123F52E
dc.identifier.otherORCID: /0000-0001-8819-5831/work/173286381
dc.identifier.urihttp://hdl.handle.net/2299/28517
dc.description© 2024 The Author(s). Published by Elsevier Ltd. This is an open access article distributed under the Creative Commons Attribution License, to view a copy of the license, see: https://creativecommons.org/licenses/by/4.0/
dc.description.abstractThe proliferation of cyber attacks has led to the use of data-driven detection countermeasures, in an effort to mitigate this threat. Machine learning techniques, such as the use of neural networks, have become mainstream and proven effective in attack detection. However, these data-driven solutions are limited by: a) high computational overhead associated with data pre-processing and inference cost, b) inability to scale beyond a centralised deployment to cope with environmental variances, and c) requirement to use multiple bespoke detection models for effective attack detection coverage across the cyber kill chain. In this context, this paper introduces MIDAS, a cost-effective framework for attack detection, which introduces a dynamic decision boundary that is used in a multi-layered detection architecture. This is achieved by modelling the decision confidence of the participating detection models and judging its benefits using a novel reward policy. Specifically, a reward is assigned to a set of available actions, corresponding to a decision boundary, based on its cost-to-performance, where an overall cost-saving is prioritised. We evaluate our approach on two widely used datasets representing two of the most common threats today, i.e., phishing and malware. MIDAS shows that it effectively reduces the expenditure on detection inference and processing costs by controlling the frequency of expensive detection operations. This is achieved without significant sacrifice of attack detection performance.en
dc.format.extent14
dc.format.extent3144332
dc.language.isoeng
dc.relation.ispartofComputers and Security
dc.subjectMulti-armed bandits
dc.subjectAttack detection
dc.subjectMachine learning
dc.subjectEfficiency
dc.subjectDecision optimisation
dc.titleMIDAS: Multi-layered attack detection architecture with decision optimisationen
dc.contributor.institutionSchool of Physics, Engineering & Computer Science
dc.contributor.institutionDepartment of Computer Science
dc.contributor.institutionCybersecurity and Computing Systems
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.description.statusPeer reviewed
rioxxterms.versionofrecord10.1016/j.cose.2024.104154
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record