Skip to main content
Erschienen in: Wireless Personal Communications 3/2017

16.11.2015

A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records

verfasst von: Jakub Breier, Jana Branišová

Erschienen in: Wireless Personal Communications | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Evidence of security breaches can be found in log files, created by various network devices in order to provide information about their operation. Huge amount of data contained within these files usually prevents to analyze them manually, therefore it is necessary to utilize automatic methods capable of revealing potential attacks. In this paper we propose a method for anomaly detection in log files, based on data mining techniques for dynamic rule creation. To support parallel processing, we employ Apache Hadoop framework, providing distributed storage and distributed processing of data. Outcomes of our testing show potential to discover new types of breaches and plausible error rates below 10 %. Also, rule generation and anomaly detection speeds are competitive to currently used algorithms, such as FP-growth and apriori.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Frei, A., & Rennhard, M. (2008). Histogram matrix: Log file visualization for anomaly detection. In Third international conference on availability, reliability and security. ARES 08 (pp. 610–617). doi:10.1109/ARES.2008.148. Frei, A., & Rennhard, M. (2008). Histogram matrix: Log file visualization for anomaly detection. In Third international conference on availability, reliability and security. ARES 08 (pp. 610–617). doi:10.​1109/​ARES.​2008.​148.
4.
Zurück zum Zitat Fu, Q., Lou, J. G., Wang, Y., & Li, J. (2009). Execution anomaly detection in distributed systems through unstructured log analysis. In Proceedings of the 2009 ninth IEEE international conference on data mining, ICDM ’09, (pp. 149–158). Washington, DC: IEEE Computer Society. doi:10.1109/ICDM.2009.60. Fu, Q., Lou, J. G., Wang, Y., & Li, J. (2009). Execution anomaly detection in distributed systems through unstructured log analysis. In Proceedings of the 2009 ninth IEEE international conference on data mining, ICDM ’09, (pp. 149–158). Washington, DC: IEEE Computer Society. doi:10.​1109/​ICDM.​2009.​60.
5.
Zurück zum Zitat Grace, L., Maheswari, V., & Nagamalai, D. (2011). Web log data analysis and mining. In N. Meghanathan, B. Kaushik, & D. Nagamalai (Eds.), Advanced computing, communications in computer and information science (Vol. 133, pp. 459–469). Berlin: Springer. Grace, L., Maheswari, V., & Nagamalai, D. (2011). Web log data analysis and mining. In N. Meghanathan, B. Kaushik, & D. Nagamalai (Eds.), Advanced computing, communications in computer and information science (Vol. 133, pp. 459–469). Berlin: Springer.
6.
Zurück zum Zitat Kent, K., & Souppaya, M. P. (2006). Sp 800-92. guide to computer security log management. Tech. rep., Gaithersburg, MD. Kent, K., & Souppaya, M. P. (2006). Sp 800-92. guide to computer security log management. Tech. rep., Gaithersburg, MD.
7.
Zurück zum Zitat Lee, W., & Stolfo, S. J. (1998). Data mining approaches for intrusion detection. In Proceedings of the 7th Conference on USENIX Security Symposium-Volume 7 (SSYM'98) (Vol. 7, pp. 6-6). Berkeley: USENIX Association. Lee, W., & Stolfo, S. J. (1998). Data mining approaches for intrusion detection. In Proceedings of the 7th Conference on USENIX Security Symposium-Volume 7 (SSYM'98) (Vol. 7, pp. 6-6). Berkeley: USENIX Association.
8.
Zurück zum Zitat Makanju, A., Zincir-Heywood, A., & Milios, E. (2013). Investigating event log analysis with minimum apriori information. In 2013 IFIP/IEEE international symposium on, integrated network management (IM 2013), (pp. 962–968). Makanju, A., Zincir-Heywood, A., & Milios, E. (2013). Investigating event log analysis with minimum apriori information. In 2013 IFIP/IEEE international symposium on, integrated network management (IM 2013), (pp. 962–968).
9.
Zurück zum Zitat Schultz, M., Eskin, E., Zadok, E., & Stolfo, S. (2001). Data mining methods for detection of new malicious executables. In Proceedings 2001 IEEE symposium on security and privacy, 2001. S P 2001 (pp. 38–49). doi:10.1109/SECPRI.2001.924286. Schultz, M., Eskin, E., Zadok, E., & Stolfo, S. (2001). Data mining methods for detection of new malicious executables. In Proceedings 2001 IEEE symposium on security and privacy, 2001. S P 2001 (pp. 38–49). doi:10.​1109/​SECPRI.​2001.​924286.
10.
Zurück zum Zitat Siddiqui, M. A. (2011). Data mining methods for malware detection. Ann Arbor: ProQuest. Siddiqui, M. A. (2011). Data mining methods for malware detection. Ann Arbor: ProQuest.
11.
Zurück zum Zitat Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the kdd cup 99 data set. In Proceedings of the second IEEE international conference on computational intelligence for security and defense applications, CISDA’09 (pp. 53–58). Piscataway, NJ: IEEE Press. http://dl.acm.org/citation.cfm?id=1736481.1736489. Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the kdd cup 99 data set. In Proceedings of the second IEEE international conference on computational intelligence for security and defense applications, CISDA’09 (pp. 53–58). Piscataway, NJ: IEEE Press. http://​dl.​acm.​org/​citation.​cfm?​id=​1736481.​1736489.
Metadaten
Titel
A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records
verfasst von
Jakub Breier
Jana Branišová
Publikationsdatum
16.11.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-3128-1

Weitere Artikel der Ausgabe 3/2017

Wireless Personal Communications 3/2017 Zur Ausgabe

Neuer Inhalt