[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2488222.2488276acmconferencesArticle/Chapter ViewAbstractPublication PagesdebsConference Proceedingsconference-collections
research-article

Event stream database based architecture to detect network intrusion: (industry article)

Published: 29 June 2013 Publication History

Abstract

This paper presents a novel network intrusion detection architecture built on a real-time streaming database platform. The architecture addresses both misuse and anomaly detection and is built to handle the high data volume, velocity and variety of traffic seen in enterprise networks through the use of in-memory stream processing. Traditional intrusion pattern detection systems look at the internal attributes of individual events to determine malicious intent; our architecture supports and extends that paradigm by adding the ability to detect both malicious and anomalous intrusion patterns in multi-step event sequences. The approach uses context based stream partitioning to minimize noise in input streams. The solution employs event labeling to reduce dimensionality and manage complexity of raw input streams. The architecture allows for aggregating alerts from an ensemble of detectors to provide a more reliable result by minimizing false positives. Furthermore, it allows domain experts to define high-level rules to filter trivial alerts. In this publication we will present the internals our architecture, its merits, along with a detailed description of our reference implementation.

References

[1]
A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras, and B. Stiller. 2010. An Overview of IP Flow-Based Intrusion Detection. Commun. Surveys Tuts. 12, 3 (July 2010), 343--356. DOI=10.1109/SURV.2010.032210.00054 http://dx.doi.org/10.1109/SURV.2010.032210.00054
[2]
Amer Farroukh, Mohammad Sadoghi, and Hans-Arno Jacobsen. 2011. Towards vulnerability-based intrusion detection with event processing. In Proceedings of the 5th ACM international conference on Distributed event-based system (DEBS '11). ACM, New York, NY, USA, 171--182. DOI=10.1145/2002259.2002284 http://doi.acm.org/10.1145/2002259.2002284
[3]
Chris Sinclair, Lyn Pierce, and Sara Matzner. 1999. An Application of Machine Learning to Network Intrusion Detection. In Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC '99). IEEE Computer Society, Washington, DC, USA, 371-.
[4]
Chuck Cranor, Theodore Johnson, Oliver Spataschek, and Vladislav Shkapenyuk. 2003. Gigascope: a stream database for network applications. In Proceedings of the 2003 ACM SIGMOD international conference on Management of data (SIGMOD '03). ACM, New York, NY, USA, 647--651.
[5]
Drools, http://www.jboss.org/drools/
[6]
Franklin, M. J., Krishnamurthy, S., Conway, N., Li, A., Russakovsky, A., & Thombre, N. 2009. Continuous analytics: Rethinking query processing in a network-effect world. In CIDR Conference.
[7]
Gianpaolo Cugola and Alessandro Margara. 2012. Processing flows of information: From data stream to complex event processing. ACM Comput. Surv. 44, 3, Article 15 (June 2012), 62 pages.
[8]
Gregor Schaffrath and Burkhard Stiller. 2008. Conceptual Integration of Flow-Based and Packet-Based Network Intrusion Detection. In Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services (AIMS '08). Springer-Verlag, Berlin, Heidelberg, 190--194.
[9]
Hervé Debar and Andreas Wespi. 2001. Aggregation and Correlation of Intrusion-Detection Alerts. In Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID '00), Wenke Lee, Ludovic Mé, and Andreas Wespi (Eds.). Springer-Verlag, London, UK, UK, 85--103.
[10]
Hu, W., Liao, Y., & Vemuri, V. R. 2003. Robust anomaly detection using support vector machines. In Proceedings of the international conference on machine learning, 282--289.
[11]
Kai Hwang, Min Cai, Ying Chen, and Min Qin. 2007. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes. IEEE Trans. Dependable Secur. Comput. 4, 1 (January 2007), 41--55.
[12]
Karen A. Scarfone and Peter M. Mell. 2007. SP 800--94. Guide to Intrusion Detection and Prevention Systems (Idps). Technical Report. NIST, Gaithersburg, MD, United States.
[13]
Lunt, T. F., Jagannathan, R., Lee, R., Whitehurst, A., & Listgarten, S. 1989. Knowledge-based intrusion detection. In AI Systems in Government Conference, 1989., Proceedings of the Annual, 102--107. IEEE.
[14]
M. Ali Aydin, A. Halim Zaim, and K. Gokhan Ceylan. 2009. A hybrid intrusion detection system design for computer network security. Comput. Electr. Eng. 35, 3 (May 2009),
[15]
Nahla Ben Amor, Salem Benferhat, and Zied Elouedi. 2004. Naive Bayes vs decision trees in intrusion detection systems. In Proceedings of the 2004 ACM symposium on Applied computing (SAC '04). ACM, New York, NY, USA, 420--424.
[16]
Robin Sommer and Vern Paxson. 2003. Enhancing byte-level network intrusion detection signatures with context. In Proceedings of the 10th ACM conference on Computer and communications security (CCS '03). ACM, New York, NY,
[17]
Robin Sommer and Vern Paxson. 2010. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. In Proceedings of the 2010 IEEE Symposium on Security and Privacy (SP '10). IEEE Computer Society, Washington, DC, USA, 305--316.
[18]
Shashank Shanbhag and Tilman Wolf. 2009. Accurate anomaly detection through parallelism. Netwrk. Mag. of Global Internetwkg. 23, 1 (January 2009), 22--28.
[19]
Steven Andrew Hofmeyr. 1999. An Immunological Model of Distributed Detection and its Application to Computer Security. Ph.D. Dissertation. The University of New Mexico. Advisor(s) Stephanie Forrest. AAI9926862.
[20]
Varun Chandola, Arindam Banerjee, and Vipin Kumar. 2012. Anomaly Detection for Discrete Sequences: A Survey. IEEE Trans. on Knowl. and Data Eng. 24, 5 (May 2012), 823--839.
[21]
Wang, K., & Stolfo, S. 2004. Anomalous payload-based network intrusion detection. In Recent Advances in Intrusion Detection, 203--222. Springer Berlin/Heidelberg.
[22]
Young, G., & Pescatore, J. 2009. Magic quadrant for network intrusion prevention system appliances. Gartner Core RAS Research Note G, 167303, 1--12.
[23]
Zhang, Z., Li, J., Manikopoulos, C. N., Jorgenson, J., & Ucles, J. 2001. HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification. In Proc. IEEE Workshop on Information Assurance and Security, 85--90

Cited By

View all
  • (2021)Event stream classification with limited labeled data for e-commerce monitoring2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS)10.1109/QRS54544.2021.00089(796-806)Online publication date: Dec-2021
  • (2018)A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection SystemsACM Computing Surveys10.1145/318489851:3(1-41)Online publication date: 22-Jun-2018
  • (2017)Evolution of a Stream Transformation DSLProceedings of the 2nd International Workshop on Real World Domain Specific Languages10.1145/3039895.3039897(1-10)Online publication date: 4-Feb-2017
  • Show More Cited By

Index Terms

  1. Event stream database based architecture to detect network intrusion: (industry article)

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      DEBS '13: Proceedings of the 7th ACM international conference on Distributed event-based systems
      June 2013
      360 pages
      ISBN:9781450317580
      DOI:10.1145/2488222
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 29 June 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. intrusion detection
      2. real-time pattern detection
      3. stream database

      Qualifiers

      • Research-article

      Conference

      DEBS '13

      Acceptance Rates

      DEBS '13 Paper Acceptance Rate 16 of 58 submissions, 28%;
      Overall Acceptance Rate 145 of 583 submissions, 25%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 20 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)Event stream classification with limited labeled data for e-commerce monitoring2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS)10.1109/QRS54544.2021.00089(796-806)Online publication date: Dec-2021
      • (2018)A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection SystemsACM Computing Surveys10.1145/318489851:3(1-41)Online publication date: 22-Jun-2018
      • (2017)Evolution of a Stream Transformation DSLProceedings of the 2nd International Workshop on Real World Domain Specific Languages10.1145/3039895.3039897(1-10)Online publication date: 4-Feb-2017
      • (2015)Improving network traffic acquisition and processing with the Java Virtual Machine2015 IEEE Symposium on Computers and Communication (ISCC)10.1109/ISCC.2015.7405539(347-352)Online publication date: Jul-2015

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media