Autonomic Intrusion Detection and Response Using Big Data

被引:14
作者
Vieira, Kleber [1 ]
Koch, Fernando L. [2 ]
Sobral, Joao Bosco M. [3 ]
Westphall, Carlos Becker [3 ]
de Souza Leao, Jorge Lopes [4 ]
机构
[1] SENAI Inst Embedded Syst, Florianopolis, SC, Brazil
[2] IBM Serv, New York, NY 10016 USA
[3] Univ Fed Santa Catarina, BR-88040900 Florianopolis, SC, Brazil
[4] Univ Fed Rio de Janeiro, BR-21941901 Rio De Janeiro, RJ, Brazil
来源
IEEE SYSTEMS JOURNAL | 2020年 / 14卷 / 02期
关键词
Big Data; Intrusion detection; Knowledge based systems; Phishing; Monitoring; Autonomic computing; big data; cybersecurity; distributed computing; intrusion detection systems;
D O I
10.1109/JSYST.2019.2945555
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a method for autonomic intrusion detection and response to optimize processes of cybersecurity in large distributed systems. These environments are characterized by technology fragmentation and complex operations making them highly susceptible to attacks like hijacking, man-in-the-middle, denial-of-service, phishing, and others. The autonomic intrusion response system introduces models of operational analysis and reaction based on the combination of autonomic computing and big data. We implemented a proof-of-concept and executed experiments that demonstrate significant improvement in effectiveness and scalability of the method in complex environments.
引用
收藏
页码:1984 / 1991
页数:8
相关论文
共 34 条
[1]  
Ahn SH, 2014, INT CONF ADV COMMUN, DOI 10.1109/ICACT.2014.6778962
[2]  
[Anonymous], 2015, 2015 2 WORLD S WEB A
[3]   Grids of agents for computer and telecommunication network management [J].
Assunçao, MD ;
Koch, FL ;
Westphall, CB .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2004, 16 (05) :413-424
[4]  
BIONDI P., 2005, CANSECWEST CORE05
[5]   A Decision-Analytic Approach to Reliability-Based Design Optimization [J].
Bordley, Robert F. ;
Pollock, Stephen M. .
OPERATIONS RESEARCH, 2009, 57 (05) :1262-1270
[6]  
Briggs R.A., 2017, The Stanford encyclopedia of philosophy, VSpring 2017
[7]  
Buyya R, 2012, PROC INT CONF EMERG, P3, DOI 10.1109/EAIT.2012.6407847
[8]  
Castelli C., 2018, TECH REP
[9]   Simulating cyber attacks, defences, and consequences [J].
Cohen, F .
COMPUTERS & SECURITY, 1999, 18 (06) :479-518
[10]  
Dean J, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDE '04), P137