PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks

被引:0
作者
Javed Y. [1 ]
Khayat M.A. [2 ]
Elghariani A.A. [3 ]
Ghafoor A. [1 ]
机构
[1] Purdue University, Elmore Family School of Electrical and Computer Engineering, West Lafayette, 47907, IN
[2] Umm Al-Qura University, Department of Computer Engineering, Makkah
[3] XCOM-Labs, San Diego, 92121, CA
关键词
intrusion detection; machine learning; Network security; network traffic sampling; stream processing; threat forecasting;
D O I
10.1109/TDSC.2023.3240315
中图分类号
学科分类号
摘要
The increase in scale of cyber networks and the rise in sophistication of cyber-attacks have introduced several challenges in intrusion detection. The primary challenge is the requirement to detect complex multi-stage attacks in realtime by processing the immense amount of traffic produced by present-day networks. In this paper we present PRISM, a hierarchical intrusion detection architecture that uses a novel attacker behavior model-based sampling technique to minimize the realtime traffic processing overhead. PRISM has a unique multi-layered architecture that monitors network traffic distributedly to provide efficiency in processing and modularity in design. PRISM employs a Hidden Markov Model-based prediction mechanism to identify multi-stage attacks and ascertain the attack progression for a proactive response. Furthermore, PRISM introduces a stream management procedure that rectifies the issue of alert reordering when collected from distributed alert reporting systems. To evaluate the performance of PRISM, multiple metrics have been proposed, and various experiments have been conducted on multi-stage attack datasets. The results exhibit up to 7.5x improvement in processing overhead as compared to a standard centralized IDS without the loss of prediction accuracy while demonstrating the ability to predict different attack stages promptly. © 2004-2012 IEEE.
引用
收藏
页码:5070 / 5086
页数:16
相关论文
共 52 条
[1]  
(2020)
[2]  
Lukaseder T., Security in High-bandwidth Networks, (2020)
[3]  
Gilder G., Afterword: The twenty laws of the telecosm, TELECOSM: How Infinite Bandwidth Will Revolutionize Our World, pp. 265-271, (2000)
[4]  
Sommer R., Paxson V., Outside the closed world: On using machine learning for network intrusion detection, Proc. IEEE Symp. Secur. Privacy, pp. 305-316, (2010)
[5]  
Zeek Cluster Architecture
[6]  
Snort Intrusion Detection/prevention System
[7]  
Zeek Network Security Monitor
[8]  
Mai J., Chuah C., Sridharan A., Ye T., Zang H., Is sampled data sufficient for anomaly detection?, Proc. 6th ACM SIGCOMM Conf. Internet Meas., pp. 165-176, (2006)
[9]  
Shiravi A., Shiravi H., Tavallaee M., Ghorbani A., Toward developing a systematic approach to generate benchmark datasets for intrusion detection, Comput. Secur., 31, 3, pp. 357-374, (2012)
[10]  
Sharafaldin I., Lashkari A.H., Ghorbani A., Toward generating a new intrusion detection dataset and intrusion traffic characterization, Proc. 4th Int. Conf. Inf. Syst. Secur. Privacy, pp. 108-116, (2018)