Intrusion Detection in Enterprise Systems by Combining and Clustering Diverse Monitor Data

被引:23
作者
Bohara, Atul [1 ]
Thakore, Uttam [1 ]
Sanders, William H. [2 ]
机构
[1] Univ Illinois, Dept Comp Sci, Champaign, IL 61801 USA
[2] Univ Illinois, Dept Elect & Comp Engn, Champaign, IL USA
来源
SYMPOSIUM AND BOOTCAMP ON THE SCIENCE OF SECURITY | 2016年
关键词
Security; Monitoring; Intrusion Detection; Anoialy Detection; Machine Learning; Clustering;
D O I
10.1145/2898375.2898400
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusioun detection using iultiple security devices has received much attention recently. The large volume of information generated by these tools, however, increases the burden on both computing resources and security administrators. Moreover, attack detection does not improve as expected if these tools work without any coordination. In this work, we propose a simple method to join information generated by security monitors with diverse data formats. We present a novel intrusion detection technique that uses unsupervised clustering algorithns to identify malicious behavior within large volumes of diverse security monitor data. First, we extract a set of features from network-level and host-level security logs that aid in detecting malicious host behavior and flooding-based network attacks in an enterprise network system. We then apply clustering algorithms to the separate and joined logs and use statistical tools to identify anonalous usage behaviors captured by the logs. We evaluate our approach on an enterprise network data set, which contains network and host activity logs. Our approach correctly identifies and prioritizes anoialous behaviors in the logs by their likelihood of maliciousness. By combining network and host logs, we are able to detect malicious behavior that cannot be detected by either log alone.
引用
收藏
页码:7 / 16
页数:10
相关论文
共 23 条
  • [1] Alfonso V., 2001, RECENT ADV INTRUSION, P54
  • [2] Allaince C. S., 2013, BIG DATA ANAL SECURI
  • [3] Almgren M, 2008, LECT NOTES COMPUT SC, V5230, P291, DOI 10.1007/978-3-540-87403-4_16
  • [4] [Anonymous], INT SEC THREAT REP
  • [5] [Anonymous], 2000, P 2000 IEEE WORKSHOP
  • [6] Intrusion detection systems and multisensor data fusion
    Bass, T
    [J]. COMMUNICATIONS OF THE ACM, 2000, 43 (04) : 99 - 105
  • [7] Cao P., 2015, P 2015 S BOOTC SCI S
  • [8] Debar H., 2001, P 4 INT S RECENT ADV, P85, DOI 10.1007/3-540-45474-86
  • [9] Dreger H, 2005, LECT NOTES COMPUT SC, V3548, P206
  • [10] Ester M., 1996, KDD-96 Proceedings. Second International Conference on Knowledge Discovery and Data Mining, P226