Big-Data Analysis of Multi-Source Logs for Anomaly Detection on Network-based System

被引:0
作者
Jia Zhanpei [1 ]
Shen Chao [1 ,2 ]
Yi Xiao [1 ]
Chen Yufei [1 ]
Yu Tianwen [1 ]
Guan Xiaohong [1 ]
机构
[1] Xi An Jiao Tong Univ, Xian 710049, Shaanxi, Peoples R China
[2] MOE Key Lab Intelligent Networks & Network Secur, Xian, Shaanxi, Peoples R China
来源
2017 13TH IEEE CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE) | 2017年
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
FRAMEWORK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Log data are important audit basis to record routine events occurring on computer or network system, which are also critical data source for detecting system anomalies. By analyzing the data from multi-source logs, it is helpful to detect abnormal system behaviors and discover intruder attacks in real time. In this paper, a Spark-based log data security platform is designed and built to analyze the large-scale log data and detect abnormal network behaviors. By integrating data mining, machine learning, and statistical analysis technologies, our proposed framework can quickly analyze large-scale multi-source log data and accurately discriminate the abnormal behaviors. Furthermore, the association analysis is applied to detect abnormal behaviors or potential threats in the system. Under a real-world network environment, extensive experiments are conducted to evaluate the system performance, which can achieve a fast and accurate detection for abnormal network behaviors, and significantly improve the accuracies under various types of network attack scenarios.
引用
收藏
页码:1136 / 1141
页数:6
相关论文
共 17 条
  • [1] [Anonymous], DATA ANAL MINIMALLY
  • [2] Ashfaq R.A.R., 2016, INFORM SCI
  • [3] Filtering events using clustering in heterogeneous security logs
    Asif-Iqbal H.
    Udzir N.I.
    Mahmod R.
    Abd.Ghani A.A.
    [J]. Information Technology Journal, 2011, 10 (04) : 798 - 806
  • [4] A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid
    Baek, Joonsang
    Quang Hieu Vu
    Liu, Joseph K.
    Huang, Xinyi
    Xiang, Yang
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2015, 3 (02) : 233 - 244
  • [5] AN INTRUSION-DETECTION MODEL
    DENNING, DE
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 222 - 232
  • [6] A Framework for Fast and Efficient Cyber Security Network Intrusion Detection using Apache Spark
    Gupta, Govind P.
    Kulariya, Manish
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS, 2016, 93 : 824 - 831
  • [7] An unsupervised heterogeneous log-based framework for anomaly detection
    Hajamydeen, Asif Iqbal
    Udzir, Nur Izura
    Mahmod, Ramlan
    Abdul Ghani, Abdul Azim
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2016, 24 (03) : 1117 - 1134
  • [8] Hoque MS., 2012, INT J NETWORK SECURI, V4, P109, DOI [DOI 10.5121/IJNSA.2012.4208, 10.5121/ijnsa.2012.4208]
  • [9] Jacobs K, 2016, 2016006 CERNIT
  • [10] Efficient Integration Method of Large-Scale Heterogeneous Security Logs Using NoSQL in Cloud Computing Environment
    Jeong, Huijin
    Piao, Xuefeng
    Choi, Junho
    Shin, Juhyun
    Kim, Pankoo
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 267 - 275