A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures

被引:59
作者
Chen, Zhijiang [1 ]
Xu, Guobin [1 ]
Mahalingam, Vivek [1 ]
Ge, Linqiang [1 ]
James Nguyen [1 ]
Yu, Wei [1 ]
Lu, Chao [1 ]
机构
[1] Towson Univ, Dept Comp & Informat Sci, Towson, MD 21252 USA
关键词
Network monitoring; Threat detection; Cloud computing; BIG-DATA;
D O I
10.1016/j.bdr.2015.11.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Critical infrastructure systems perform functions and missions that are essential for our national economy, health, and security. These functions are vital to commerce, government, and society and are closely interrelated with people's lives. To provide highly secured critical infrastructure systems, a scalable, reliable and robust threat monitoring and detection system should be developed to efficiently mitigate cyber threats. In addition, big data from threat monitoring systems pose serious challenges for cyber operations because an ever growing number of devices in the system and the amount of complex monitoring data collected from critical infrastructure systems require scalable methods to capture, store, manage, and process the big data. To address these challenges, in this paper, we propose a cloud computing based network monitoring and threat detection system to make critical infrastructure systems secure. Our proposed system consists of three main components: monitoring agents, cloud infrastructure, and an operation center. To build our proposed system, we use both Hadoop MapReduce and Spark to speed up data processing by separating and processing data streams concurrently. With a real-world data set, we conducted real-world experiments to evaluate the effectiveness of our developed network monitoring and threat detection system in terms of network monitoring, threat detection, and system performance. Our empirical data indicates that the proposed system can efficiently monitor network activities, find abnormal behaviors, and detect network threats to protect critical infrastructure systems. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:10 / 23
页数:14
相关论文
共 23 条
[1]  
Aljarah I, 2013, GECCO GENETIC EVOLUT
[2]  
[Anonymous], 2013, ACM SIGCOMM Computer Communication Review
[3]  
[Anonymous], 2008, P 6 INT C MOB SYST A
[4]  
[Anonymous], 2013, P 46 HAW INT C SYST
[5]  
Bertot J.C., 2013, P 14 ANN INT C DIGIT
[6]  
Bloedorn E., 2001, DATA MINING NETWORK
[7]   CRITICAL QUESTIONS FOR BIG DATA Provocations for a cultural, technological, and scholarly phenomenon [J].
Boyd, Danah ;
Crawford, Kate .
INFORMATION COMMUNICATION & SOCIETY, 2012, 15 (05) :662-679
[8]  
BRYANT RE., 2008, BIG DATA COMPUTING C
[9]  
Chen Ching-Han, 2014, P BIG DAT BIGDATA C
[10]  
Chen HC, 2012, MIS QUART, V36, P1165