An adaptive analysis framework for correlating cyber-security-related data

被引:5
作者
Jin, Xiaohui [1 ]
Cui, Baojing [1 ]
Yang, Jun [2 ]
Cheng, Zishuai [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Comp Sci & Technol, Beijing, Peoples R China
来源
PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) | 2018年
基金
中国国家自然科学基金;
关键词
big data; analysis framework; cyber security;
D O I
10.1109/AINA.2018.00134
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, due to the rise of APT attacks and the failure of traditional security facilities, organizations have to collect a large amount of cyber-security-related data and try to unveil the previously unknown attacks by analyzing them. Additionally, a report from Gartner claims, "Information security is becoming a big data analytics problem, where massive amounts of data will be correlated, analyzed and mined for meaningful patterns". Generally, the research work of big data analytics for cyber security mainly includes building big data systems, designing efficient processing algorithms and exploring specific analysis methods and applications, such as detecting DDoS attacks, identifying malicious URLs, correlating IDS alert incidents and extracting threat intelligence from certain unstructured data. Of all these work, most is the extension of previous methods in the big data context, by employing big data techniques to improve the storage capacity, accelerate the calculation or carry out correlation analysis in a much longer time window. Instead, only a few cares about the real coordination of these multi-source, heterogeneous data. In this paper, we propose an adaptive analysis framework for correlating different kinds of cyber-security-related data, such as network traffic, alert incidents and external threat intelligence. This framework can help to improve the pertinence of analysis and better discover potential threats.
引用
收藏
页码:915 / 919
页数:5
相关论文
共 26 条
[1]  
[Anonymous], 2012, USENIX SECURITY
[2]  
[Anonymous], 2013, P 29 ANN COMP SEC AP, DOI DOI 10.1145/2523649.2523670
[3]  
[Anonymous], SCIENCE
[4]  
[Anonymous], USENIX SRUTI
[5]  
[Anonymous], IEEE LCN
[6]  
Antonakakis Manos, COMMAND STRUCTURE AU
[7]  
Bilge L., 2012, ACSAC
[8]  
Binde Be., 2011, Assessing Outbound Traffic to Uncover Advanced Persistent Threat p, P35
[9]  
Brauckhoff D., 2009, IMC
[10]   Big Data Analytics for Security [J].
Cardenas, Alvaro A. ;
Manadhata, Pratyusa K. ;
Rajan, Sreeranga P. .
IEEE SECURITY & PRIVACY, 2013, 11 (06) :74-76