ar - log:一种抗对抗性攻击的鲁棒日志异常检测方法

IF 4.6 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Jiahao Wu , Sanfeng Zhang , Hongxian Liu , Wang Yang
{"title":"ar - log:一种抗对抗性攻击的鲁棒日志异常检测方法","authors":"Jiahao Wu ,&nbsp;Sanfeng Zhang ,&nbsp;Hongxian Liu ,&nbsp;Wang Yang","doi":"10.1016/j.comnet.2025.111471","DOIUrl":null,"url":null,"abstract":"<div><div>In recent years, adversarial evasion attacks against log-based anomaly detection systems have been proven to pose severe threats. Existing detection models lack targeted defense mechanisms against such attacks, enabling malicious actors to conceal anomalous activities. This not only prevents timely detection of system failures or intrusions, but also significantly elevates security risks and potential losses. To address this challenge, this paper proposes AAR-log, a novel adversarial-resilient log anomaly detection framework. The key innovations of AAR-log include: (1) integrating various types of features including log components, log levels, and log templates to construct a more comprehensive representation of log sequences; (2) employing ensemble learning to enhance model diversity and mitigate the vulnerability of single-model approaches; and (3) incorporating adversarial training to constrain the adversarial sample space, thereby significantly improving the framework’s robustness under adversarial conditions. Extensive experiments on benchmark log datasets demonstrate that AAR-log exhibits superior adversarial robustness. Its ensemble learning mechanism and adversarial training strategy effectively enhance resistance against evasion attacks, achieving higher TPR and F1 scores compared to baseline models. Notably, AAR-log also maintains strong generalization performance in non-adversarial environment. In the HDFS dataset, AAR-log improves TPR by 2.8%–9.5% and F1-score by 4.6%–14.3% over baseline models. In the BGL dataset, it achieves even greater gains, increasing TPR by 17.1%–26.7% and F1-score by 3.9%–28.4%. These results validate the effectiveness and robustness of AAR-log in log-based anomaly detection.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"269 ","pages":"Article 111471"},"PeriodicalIF":4.6000,"publicationDate":"2025-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"AAR-Log: A robust log anomaly detection method resisting adversarial attacks\",\"authors\":\"Jiahao Wu ,&nbsp;Sanfeng Zhang ,&nbsp;Hongxian Liu ,&nbsp;Wang Yang\",\"doi\":\"10.1016/j.comnet.2025.111471\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>In recent years, adversarial evasion attacks against log-based anomaly detection systems have been proven to pose severe threats. Existing detection models lack targeted defense mechanisms against such attacks, enabling malicious actors to conceal anomalous activities. This not only prevents timely detection of system failures or intrusions, but also significantly elevates security risks and potential losses. To address this challenge, this paper proposes AAR-log, a novel adversarial-resilient log anomaly detection framework. The key innovations of AAR-log include: (1) integrating various types of features including log components, log levels, and log templates to construct a more comprehensive representation of log sequences; (2) employing ensemble learning to enhance model diversity and mitigate the vulnerability of single-model approaches; and (3) incorporating adversarial training to constrain the adversarial sample space, thereby significantly improving the framework’s robustness under adversarial conditions. Extensive experiments on benchmark log datasets demonstrate that AAR-log exhibits superior adversarial robustness. Its ensemble learning mechanism and adversarial training strategy effectively enhance resistance against evasion attacks, achieving higher TPR and F1 scores compared to baseline models. Notably, AAR-log also maintains strong generalization performance in non-adversarial environment. In the HDFS dataset, AAR-log improves TPR by 2.8%–9.5% and F1-score by 4.6%–14.3% over baseline models. In the BGL dataset, it achieves even greater gains, increasing TPR by 17.1%–26.7% and F1-score by 3.9%–28.4%. These results validate the effectiveness and robustness of AAR-log in log-based anomaly detection.</div></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":\"269 \",\"pages\":\"Article 111471\"},\"PeriodicalIF\":4.6000,\"publicationDate\":\"2025-06-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128625004384\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625004384","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

摘要

近年来,针对基于日志的异常检测系统的对抗性规避攻击已被证明会造成严重的威胁。现有的检测模型缺乏针对此类攻击的目标防御机制,使得恶意行为者能够隐藏异常活动。这不仅不能及时发现系统故障或入侵,而且会大大增加安全风险和潜在损失。为了解决这一挑战,本文提出了一种新的对抗弹性日志异常检测框架AAR-log。ar -log的主要创新包括:(1)集成了日志组件、日志级别和日志模板等多种特征,构建了更全面的日志序列表示;(2)采用集成学习增强模型多样性,降低单模型方法的脆弱性;(3)结合对抗性训练约束对抗性样本空间,从而显著提高了框架在对抗条件下的鲁棒性。在基准测井数据集上的大量实验表明,ar -log具有优越的对抗鲁棒性。它的集成学习机制和对抗训练策略有效地增强了对逃避攻击的抵抗力,与基线模型相比,获得了更高的TPR和F1分数。值得注意的是,ar -log在非对抗环境中也保持了较强的泛化性能。在HDFS数据集中,AAR-log比基线模型的TPR提高了2.8%-9.5%,F1-score提高了4.6%-14.3%。在BGL数据集中,它获得了更大的收益,TPR提高了17.1%-26.7%,F1-score提高了3.9%-28.4%。这些结果验证了ar -log在基于日志的异常检测中的有效性和鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
AAR-Log: A robust log anomaly detection method resisting adversarial attacks
In recent years, adversarial evasion attacks against log-based anomaly detection systems have been proven to pose severe threats. Existing detection models lack targeted defense mechanisms against such attacks, enabling malicious actors to conceal anomalous activities. This not only prevents timely detection of system failures or intrusions, but also significantly elevates security risks and potential losses. To address this challenge, this paper proposes AAR-log, a novel adversarial-resilient log anomaly detection framework. The key innovations of AAR-log include: (1) integrating various types of features including log components, log levels, and log templates to construct a more comprehensive representation of log sequences; (2) employing ensemble learning to enhance model diversity and mitigate the vulnerability of single-model approaches; and (3) incorporating adversarial training to constrain the adversarial sample space, thereby significantly improving the framework’s robustness under adversarial conditions. Extensive experiments on benchmark log datasets demonstrate that AAR-log exhibits superior adversarial robustness. Its ensemble learning mechanism and adversarial training strategy effectively enhance resistance against evasion attacks, achieving higher TPR and F1 scores compared to baseline models. Notably, AAR-log also maintains strong generalization performance in non-adversarial environment. In the HDFS dataset, AAR-log improves TPR by 2.8%–9.5% and F1-score by 4.6%–14.3% over baseline models. In the BGL dataset, it achieves even greater gains, increasing TPR by 17.1%–26.7% and F1-score by 3.9%–28.4%. These results validate the effectiveness and robustness of AAR-log in log-based anomaly detection.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Computer Networks
Computer Networks 工程技术-电信学
CiteScore
10.80
自引率
3.60%
发文量
434
审稿时长
8.6 months
期刊介绍: Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信