Skip to content

Artifacts for the paper "SHIL: Self-Supervised Hybrid Learning for Security Attack Detection in Containerized Applications"

License

Notifications You must be signed in to change notification settings

NCSU-DANCE-Research-Group/SHIL

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SHIL: Self-Supervised Hybrid Learning for Security Attack Detection in Containerized Applications

This contains the code and data for our paper "SHIL: Self-Supervised Hybrid Learning for Security Attack Detection in Containerized Applications" accepted by ACSOS 2022.

Approach

SHIL is a self-supervised hybrid learning solution, which combines unsupervised and supervised learning methods to achieve high accuracy without requiring any manual data labelling. We have implemented a prototype of SHIL and conducted experiments over 41 real world security attacks in 28 commonly used server applications. Our experimental results show that SHIL can reduce false alarms by 39-91% compared to existing supervised or unsupervised machine learning schemes while achieving a higher or similar detection rate.

Data

We evaluated 41 CVEs. The traces are in shaped-transformed folder.

Environment

This system was evaluated using Python 3.6.9, 3.7.0, and 3.7.3. The packages used and the corresponding versions are listed below, which can be installed using pip3 install -r requirements.txt:

joblib==1.1.0
tensorflow==1.13.1
Keras==2.2.4
numpy==1.19.5
pandas==0.24.0
scikit-learn==0.21.3
scipy==1.1.0
xlrd==1.2.0

One button script to reproduce the result

The partial result of the unsupervised model and supervised models are saved in the data and result folder. Please keep all contents in the data, result and shaped-transformed folders to run the verify.sh with sh or bash. After it stops running, you can do either of the following to compare with the paper result of SHIL using 200% boundary case:

  • open the file ./result/SHIL/boundary-2.0/final-stats.txt to view average FPR, detection rate, and lead time.
  • copy the whole content from ./result/SHIL/boundary-2.0/testing-res-formatted.csv and paste into the cell J3 (in red) of the sheet ./result/result.xlsx

Unsupervised Model

classification&save_file.py prepares the data for training the unsupervised model. train_all-classified.sh trains the unsupervised model. classification&testing.py tests the unsupervised model.

Outlier detection

outlier_detection_IsolationForest_nonoutlier_normal.py labels the outliers and non-outliers and saves to CSV files.

Self-supervised Models

Self-supervised random forest (used in SHIL)

supervised_binary_randomforest_training.py is the training code for self-supervised random forest. supervised_binary_randomforest_testing.py is the testing code for self-supervised random forest. The first argument is the minimum confident.

Self-supervised CNN (alternative model)

supervised_CNN_training.py is the training code for self-supervised CNN. supervised_CNN_testing.py is the testing code for self-supervised CNN. The first argument is the minimum confident.

SHIL

SHIL_analysis_experiment.py contains the code for final cross validaton. Please change the paths in this code so that it compares the decisions made by the unsupervised model and the correct supervised model.

About

Artifacts for the paper "SHIL: Self-Supervised Hybrid Learning for Security Attack Detection in Containerized Applications"

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published