HuntGPT: Integrating Machine Learning-Based Anomaly Detection and Explainable AI with Large Language Models (LLMs) (2309.16021v1)
Abstract: Machine learning (ML) is crucial in network anomaly detection for proactive threat hunting, reducing detection and response times significantly. However, challenges in model training, maintenance, and frequent false positives impact its acceptance and reliability. Explainable AI (XAI) attempts to mitigate these issues, allowing cybersecurity teams to assess AI-generated alerts with confidence, but has seen limited acceptance from incident responders. LLMs present a solution through discerning patterns in extensive information and adapting to different functional requirements. We present HuntGPT, a specialized intrusion detection dashboard applying a Random Forest classifier using the KDD99 dataset, integrating XAI frameworks like SHAP and Lime for user-friendly and intuitive model interaction, and combined with a GPT-3.5 Turbo, it delivers threats in an understandable format. The paper delves into the system's architecture, components, and technical accuracy, assessed through Certified Information Security Manager (CISM) Practice Exams, evaluating response quality across six metrics. The results demonstrate that conversational agents, supported by LLM and integrated with XAI, provide robust, explainable, and actionable AI solutions in intrusion detection, enhancing user understanding and interactive experience.
- Steve Morgan “2023 Cybersecurity Almanac: 100 Facts, Figures, Predictions, And Statistics — cybersecurityventures.com” [Accessed 23-09-2023], https://cybersecurityventures.com/cybersecurity-almanac-2023/
- Critical Infrastructure Cybersecurity “Framework for improving critical infrastructure cybersecurity” In URL: https://nvlpubs. nist. gov/nistpubs/CSWP/NIST. CSWP 4162018, 2018
- “Threat intelligence computing” In Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, 2018, pp. 1883–1898
- Monowar H. Bhuyan, D.K. Bhattacharyya and J.K. Kalita “Network Anomaly Detection: Methods, Systems and Tools” In IEEE Communications Surveys & Tutorials 16.1, 2014, pp. 303–336 DOI: 10.1109/SURV.2013.052213.00046
- “Data-Driven Threat Hunting Using Sysmon” In Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, ICCSP 2018 Guiyang, China: Association for Computing Machinery, 2018, pp. 82–88 DOI: 10.1145/3199478.3199490
- “Threat Hunting Using Elastic Stack: An Evaluation” In 2021 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), 2021, pp. 1–6 DOI: 10.1109/SOLI54607.2021.9672347
- Fatimah Aldauiji, Omar Batarfi and Manal Bayousef “Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art” In IEEE Access 10, 2022, pp. 61695–61706 DOI: 10.1109/ACCESS.2022.3181278
- “Anomaly detection in IP networks” In IEEE Transactions on Signal Processing 51.8, 2003, pp. 2191–2204 DOI: 10.1109/TSP.2003.814797
- “Are Machine Learning Models for Malware Detection Ready for Prime Time?” In IEEE Security & Privacy 21.2 IEEE, 2023, pp. 53–56
- “Explainable artificial intelligence for cybersecurity: a literature survey” In Annals of Telecommunications 77.11-12 Springer, 2022, pp. 789–812
- “Cybertrust: From Explainable to Actionable and Interpretable Artificial Intelligence” In Computer 53.9, 2020, pp. 91–96 DOI: 10.1109/MC.2020.2993623
- “Explainable AI in Cybersecurity Operations: Lessons Learned from xAI Tool Deployment” In Proceedings of the Usable Security and Privacy (USEC) Symposium, San Diego, CA, USA 28, 2022
- “KDD Cup 1999 Data” DOI: https://doi.org/10.24432/C51C7N, UCI Machine Learning Repository, 1999
- P.H. Gregory “CISM Certified Information Security Manager Practice Exams, Second Edition” McGraw Hill LLC, 2023 URL: https://books.google.fi/books?id=4I-nEAAAQBAJ
- “Security challenges in small- and medium-sized manufacturing enterprises” In 2016 International Symposium on Small-scale Intelligent Manufacturing Systems (SIMS), 2016, pp. 25–30 DOI: 10.1109/SIMS.2016.7802895
- SharkStriker Inc “What is the Cost of Building a Robust 24/7 SOC for Your Organization”, 2022 URL: https://sharkstriker.com/blog/what-is-the-cost-of-building-a-robust-24-7-soc-for-your-organization/
- Dhruba K Bhattacharyya and Jugal Kalita “Network Anomaly Detection: A Machine Learning Perspective”, 2013 DOI: 10.1201/b15088
- Fekadu Yihunie, Eman Abdelfattah and Amish Regmi “Applying Machine Learning to Anomaly-Based Intrusion Detection Systems” In 2019 IEEE Long Island Systems, Applications and Technology Conference (LISAT), 2019, pp. 1–5 DOI: 10.1109/LISAT.2019.8817340
- “Machine Learning Techniques for Network Anomaly Detection: A Survey” In 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), 2020, pp. 156–162 DOI: 10.1109/ICIoT48696.2020.9089465
- “Multi-Task Network Anomaly Detection Using Federated Learning” In Proceedings of the 10th International Symposium on Information and Communication Technology Association for Computing Machinery, 2019, pp. 273–279 DOI: 10.1145/3368926.3369705
- “Chained Anomaly Detection Models for Federated Learning: An Intrusion Detection Case Study” In Applied Sciences 8.12, 2018 DOI: 10.3390/app8122663
- “Cyber threat hunting using unsupervised federated learning and adversary emulation” In 2023 IEEE International Conference on Cyber Security and Resilience (CSR), 2023, pp. 315–320 IEEE
- “Federated-Learning-Based Anomaly Detection for IoT Security Attacks” In IEEE Internet of Things Journal 9.4, 2022, pp. 2545–2554 DOI: 10.1109/JIOT.2021.3077803
- “DÏoT: A Federated Self-learning Anomaly Detection System for IoT” In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), 2019, pp. 756–767 DOI: 10.1109/ICDCS.2019.00080
- “The roadmap to 6G security and privacy” In IEEE Open Journal of the Communications Society 2 IEEE, 2021, pp. 1094–1122
- “DDoS attack detection using unsupervised federated learning for 5G networks and beyond” In 2023 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 2023, pp. 442–447 DOI: 10.1109/EuCNC/6GSummit58263.2023.10188245
- “XAI—Explainable artificial intelligence” In Science Robotics 4.37, 2019, pp. eaay7120 DOI: 10.1126/scirobotics.aay7120
- “GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection”, 2019 DOI: 10.1109/CNS.2019.8802833
- “DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications”, 2021
- “Sok: Explainable machine learning for computer security applications” In 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 2023, pp. 221–240 IEEE
- Dania Ben Peretz “A Siri for Network Security: How Chatbots can Enhance Business Agility”, 2020 URL: https://www.infosecurity-magazine.com/opinions/network-chatbots-agility/
- “SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management” In 2020 16th International Conference on Network and Service Management (CNSM), 2020, pp. 1–7 DOI: 10.23919/CNSM50824.2020.9269037
- “Harnessing GPT-4 for Generation of Cybersecurity GRC Policies: A Focus on Ransomware Attack Mitigation” In Computers & Security 134, 2023 DOI: 10.1016/j.cose.2023.103424
- “GPT-2C: A Parser for Honeypot Logs Using Large Pre-Trained Language Models” In Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM ’21 New York, NY, USA: Association for Computing Machinery, 2022, pp. 649–653 DOI: 10.1145/3487351.3492723
- Boubakr Nour, Makan Pourzandi and Mourad Debbabi “A Survey on Threat Hunting in Enterprise Networks” In IEEE Communications Surveys & Tutorials IEEE, 2023
- Glorin Sebastian “Do ChatGPT and other AI chatbots pose a cybersecurity risk?: An exploratory study” In International Journal of Security and Privacy in Pervasive Computing (IJSPPC) 15.1 IGI Global, 2023, pp. 1–11
- Thomas Yue “Democratizing Financial Knowledge with ChatGPT by OpenAI: Unleashing the Power of Technology” In SSRN Electronic Journal, 2023 DOI: 10.2139/ssrn.4346152
- Wikipedia contributors “Prompt engineering — Wikipedia, The Free Encyclopedia” [Online; accessed 26-September-2023], 2023 URL: https://en.wikipedia.org/w/index.php?title=Prompt_engineering&oldid=1176364192
- “Prompting GPT-3 To Be Reliable”, 2022 DOI: 10.48550/arXiv.2210.09150
- “How Does ChatGPT Perform on the United States Medical Licensing Examination? The Implications of Large Language Models for Medical Education and Knowledge Assessment” In JMIR Med Educ 9, 2023, pp. e45312 DOI: 10.2196/45312
- Mi-Na Chu “Assessing the Benefits of ChatGPT for Business: An Empirical Study on Organizational Performance” In IEEE Access 11, 2023, pp. 76427–76436 DOI: 10.1109/ACCESS.2023.3297447
- Wikipedia contributors “ISACA — Wikipedia, The Free Encyclopedia” [Online; accessed 3-August-2023], 2023 URL: https://en.wikipedia.org/w/index.php?title=ISACA&oldid=1170788297
- Aditi Jain “CISM Difficulty Level: Exam Format and Study Guide”, 2023 URL: https://www.knowledgehut.com/blog/security/cism-difficulty-level#cism-exam-format%C2%A0%C2%A0
- “py-readability-metrics: A Python library for computing readability metrics” Accessed: Sep. 2023, https://pypi.org/project/py-readability-metrics/