CoreFlow: Enriching Bro security events using network traffic monitoring data

被引:9
作者
Koning, Ralph [1 ,2 ]
Buraglio, Nick [2 ]
de Laat, Cees [1 ,2 ]
Grosso, Paola [1 ]
机构
[1] Univ Amsterdam, Sci Pk 904, Amsterdam, Netherlands
[2] Lawrence Berkeley Lab, Energy Sci Network, Berkeley, CA USA
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 79卷
关键词
Security; Network; IDS; Netflow; Flow; Detection; IPFIX; DDoS; Carrier networks; Transit networks; TAXONOMY;
D O I
10.1016/j.future.2017.04.017
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attacks against network infrastructures can be detected by Intrusion Detection Systems (IDS). Still reaction to these events are often limited by the lack of larger contextual information in which they occurred. In this paper we present CoreFlow, a framework for the correlation and enrichment of IDS data with network flow information. CoreFlow ingests data from the Bro IDS and augments this with flow data from the devices in the network. By doing this the network providers are able to reconstruct more precisely the route followed by the malicious flows. This enables them to devise tailored countermeasures, e.g. blocking close to the source of the attack. We tested the initial CoreFlow prototype in the ESnet network, using inputs from 3 Bro systems and more than 50 routers. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:235 / 242
页数:8
相关论文
共 20 条
[1]   Network Anomaly Detection and Classification via Opportunistic Sampling [J].
Androulidakis, Georgios ;
Chatzigiannakis, Vassilis ;
Papavassiliou, Symeon .
IEEE NETWORK, 2009, 23 (01) :6-12
[2]  
[Anonymous], THESIS
[3]  
Boschi E., 2008, 5153 RFC IETF
[4]  
Campbell S, 2011, STATE PRACTICE REPOR, P14
[5]  
Carasso D., 2012, Exploring splunk, P978
[6]   Towards a taxonomy of intrusion-detection systems [J].
Debar, H ;
Dacier, M ;
Wespi, A .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08) :805-822
[7]  
Guok C., 2007, 2006 3 INT C BROADB, P1
[8]  
Hall K., 2016, ACAD NETWORK JANET C
[9]  
Koning R., 2017, OPT FIB COMM C OPT S
[10]  
Koning R, 2016, 2016 IEEE NETSOFT CONFERENCE AND WORKSHOPS (NETSOFT), P483, DOI 10.1109/NETSOFT.2016.7502489