Toward a monitoring and threat detection system based on stream processing as a virtual network function for big data

被引:16
作者
Lopez, Martin Andreoni [1 ,3 ]
Mattos, Diogo M. F. [1 ,2 ]
Duarte, Otto Carlos M. B. [1 ]
Pujolle, Guy [3 ]
机构
[1] Univ Fed Rio de Janeiro, GTA COPPE UFRJ, BR-21945970 Rio De Janeiro, RJ, Brazil
[2] Univ Fed Fluminense, TET PPGEET UFF, Niteroi, RJ, Brazil
[3] Sorbonne Univ, CNRS, Lab Informat Paris 6, Paris, France
基金
巴西圣保罗研究基金会;
关键词
big data; network traffic classification; stream processing; threat detection; virtual network function;
D O I
10.1002/cpe.5344
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The late detection of security threats causes a significant increase in the risk of irreparable damages and restricts any defense attempt. In this paper, we propose a sCAlable TRAffic Classifier and Analyzer (CATRACA). CATRACA works as an efficient online Intrusion Detection and Prevention System implemented as a Virtualized Network Function. CATRACA is based on Apache Spark, a Big Data Streaming processing system, and it is deployed over the Open Platform for Network Functions Virtualization (OPNFV), providing an accurate real-time threat-detection service. The system presents a friendly graphical interface that provides real-time visualization of the traffic and the attacks that occur in the network. Our prototype can differentiate normal traffic from denial of service (DoS) attacks and vulnerability probes over 95% accuracy under three different datasets. Moreover, CATRACA handles streaming data under concept drift detection with more than 85% of accuracy.
引用
收藏
页数:17
相关论文
共 33 条
  • [21] [Anonymous], INT C INF COMM TECHN
  • [22] [Anonymous], 2016, ESCHERICHIA PHAGE UF
  • [23] [Anonymous], 2005, ENCY STAT BEHAV SCI
  • [24] SMOTE: Synthetic minority over-sampling technique
    Chawla, Nitesh V.
    Bowyer, Kevin W.
    Hall, Lawrence O.
    Kegelmeyer, W. Philip
    [J]. 2002, American Association for Artificial Intelligence (16)
  • [25] Du Y., 2014, DATE
  • [26] Toward Stream-Based IP Flow Analysis
    Jirsik, Tomas
    Cermak, Milan
    Tovarnak, Daniel
    Celeda, Pavel
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (07) : 70 - 76
  • [27] Tracking recurring contexts using ensemble classifiers: an application to email filtering
    Katakis, Ioannis
    Tsoumakas, Grigorios
    Vlahavas, Ioannis
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2010, 22 (03) : 371 - 391
  • [28] Towards a multi-layers anomaly detection framework for analyzing network traffic
    Li, Bo
    Zhang, Simin
    Li, Ke
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (14)
  • [29] An elastic intrusion detection system for software networks
    Lopez, Martin Andreoni
    Ferrazani Mattos, Diogo Menezes
    Duarte, Otto Carlos M. B.
    [J]. ANNALS OF TELECOMMUNICATIONS, 2016, 71 (11-12) : 595 - 605
  • [30] On the reliable detection of concept drift from streaming unlabeled data
    Sethi, Tegjyot Singh
    Kantardzic, Mehmed
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2017, 82 : 77 - 99