The Next Generation Cognitive Security Operations Center: Adaptive Analytic Lambda Architecture for Efficient Defense against Adversarial Attacks

被引:29
作者
Demertzis, Konstantinos [1 ]
Tziritas, Nikos [2 ]
Kikiras, Panayiotis [3 ]
Sanchez, Salvador Llopis [4 ]
Iliadis, Lazaros [1 ]
机构
[1] Democritus Univ Thrace, Sch Engn, Dept Civil Engn, Xanthi 67100, Greece
[2] Chinese Acad Sci, Res Ctr Cloud Comp, Shenzhen Inst Adv Technol, Shenzhen 518000, Peoples R China
[3] Univ Thessaly, Sch Sci, Dept Comp Sci, Lamia 35131, Greece
[4] Univ Politecn Valencia, Commun Dept, Valencia 46022, Spain
关键词
network flow forensics; adversarial attacks; malware traffic analysis; security operations center; cognitive cybersecurity intelligence; lambda architecture;
D O I
10.3390/bdcc3010006
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A Security Operations Center (SOC) is a central technical level unit responsible for monitoring, analyzing, assessing, and defending an organization's security posture on an ongoing basis. The SOC staff works closely with incident response teams, security analysts, network engineers and organization managers using sophisticated data processing technologies such as security analytics, threat intelligence, and asset criticality to ensure security issues are detected, analyzed and finally addressed quickly. Those techniques are part of a reactive security strategy because they rely on the human factor, experience and the judgment of security experts, using supplementary technology to evaluate the risk impact and minimize the attack surface. This study suggests an active security strategy that adopts a vigorous method including ingenuity, data analysis, processing and decision-making support to face various cyber hazards. Specifically, the paper introduces a novel intelligence driven cognitive computing SOC that is based exclusively on progressive fully automatic procedures. The proposed lambda -Architecture Network Flow Forensics Framework (lambda-Nu F3) is an efficient cybersecurity defense framework against adversarial attacks. It implements the Lambda machine learning architecture that can analyze a mixture of batch and streaming data, using two accurate novel computational intelligence algorithms. Specifically, it uses an Extreme Learning Machine neural network with Gaussian Radial Basis Function kernel (ELM/GRBFk) for the batch data analysis and a Self-Adjusting Memory k-Nearest Neighbors classifier (SAM/k-NN) to examine patterns from real-time streams. It is a forensics tool for big data that can enhance the automate defense strategies of SOCs to effectively respond to the threats their environments face.
引用
收藏
页码:1 / 21
页数:21
相关论文
共 53 条
[1]  
Almubayed Alaeddin, 2015, International Journal of Computer Network and Information Security, V7, P10, DOI 10.5815/ijcnis.2015.07.02
[2]  
[Anonymous], 2014, LECT NOTES BUSINESS
[3]  
[Anonymous], 2016, J APPL MATH BIOINFOR
[4]  
[Anonymous], 2014, COMPUTATION CRYPTOGR
[5]  
[Anonymous], P 2016 IEEE NUCL SCI, DOI DOI 10.1109/NSSMIC.2016.8069637
[6]  
[Anonymous], WORKSH REC SYST EV D
[7]  
[Anonymous], 2013, Dagstuhl Manifestos
[8]   Asymmetric loss functions and the rationality of expected stock returns [J].
Aretz, Kevin ;
Bartram, Soehnke M. ;
Pope, Peter F. .
INTERNATIONAL JOURNAL OF FORECASTING, 2011, 27 (02) :413-437
[9]  
Arndt D. J., 2011, 2011 IEEE SSCI Symposium on Computational Intelligence for Security and Defense Applications (CISDA 2011), P107, DOI 10.1109/CISDA.2011.5945941
[10]  
Burguera I., 2011, P 1 ACM WORKSH SEC P, P15, DOI DOI 10.1145/2046614.2046619