Skip to main content

2020 | OriginalPaper | Buchkapitel

Data Analytics for Security Management of Complex Heterogeneous Systems: Event Correlation and Security Assessment Tasks

verfasst von : Igor Kotenko, Andrey Fedorchenko, Elena Doynikova

Erschienen in: Advances in Cyber Security Analytics and Decision Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter considers the methods and techniques for security management of complex heterogeneous systems with an emphasis on event correlation and security assessment. The approach suggested in the chapter is based on the integrated analysis of big heterogeneous security data for event correlation, including syntactic and semantic analysis of security events and information. The key feature of the approach is the definition of various relationships between event properties within an automated adaptive correlation process. Correlation of heterogeneous security data allows detecting security incidents, as well as the chains of security events that led to these incidents. The results of event correlation are used in various tasks of security assessment. The approach to the security assessment is based on the Bayesian attack graphs, open security data representation standards, and vulnerability indexes from the Common Vulnerability Scoring System. The results of correlation are used on the stage of system assets criticality assessment for assets inventory and on the stage of security assessment to calculate probability of ongoing attack success considering incident statistics. A technique for vulnerability assessment based on the data mining is also described. The advantages and disadvantages of the suggested approaches, methods and techniques are outlined. The purpose of this chapter is to form a methodological basis for data analysis in security management, as well as to demonstrate its practical application, using the data set of event logs from the Windows operating system and from the SCADA power management system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Ahmed, M. S., Al-Shaer, E., & Khan, L. (2008). A novel quantitative approach for measuring network security. In: INFOCOM proceedings, Phoenix, AZ, USA, April 2008. IEEE, pp. 1957–1965. Ahmed, M. S., Al-Shaer, E., & Khan, L. (2008). A novel quantitative approach for measuring network security. In: INFOCOM proceedings, Phoenix, AZ, USA, April 2008. IEEE, pp. 1957–1965.
Zurück zum Zitat Balepin, I., Maltsev, S., Rowe, J., & Levitt, K. (2003). Using specification-based intrusion detection for automated response. In Proceedings of the sixth international symposium on recent advances in intrusion detection (RAID), Pittsburgh, PA, USA, September 2003. Lecture notes in computer science (LNCS) (Vol. 2820, pp. 136–154). Berlin, Heidelberg: Springer-Verlag. Balepin, I., Maltsev, S., Rowe, J., & Levitt, K. (2003). Using specification-based intrusion detection for automated response. In Proceedings of the sixth international symposium on recent advances in intrusion detection (RAID), Pittsburgh, PA, USA, September 2003. Lecture notes in computer science (LNCS) (Vol. 2820, pp. 136–154). Berlin, Heidelberg: Springer-Verlag.
Zurück zum Zitat Beliakov, G., Yearwood, J., & Kelarev, A. (2012). Application of rank correlation, clustering and classification in information security. Journal of Networks, 7, 935–945.CrossRef Beliakov, G., Yearwood, J., & Kelarev, A. (2012). Application of rank correlation, clustering and classification in information security. Journal of Networks, 7, 935–945.CrossRef
Zurück zum Zitat Brown, A., Kar, G., & Keller, A. (2001). An active approach to characterizing dynamic dependencies for problem determination in a distributed environment. In: 2001 7th IEEE/IFIP international symposium on integrated network management proceedings: Integrated management strategies for the new millennium, Seattle, WA, USA, May 2001. Brown, A., Kar, G., & Keller, A. (2001). An active approach to characterizing dynamic dependencies for problem determination in a distributed environment. In: 2001 7th IEEE/IFIP international symposium on integrated network management proceedings: Integrated management strategies for the new millennium, Seattle, WA, USA, May 2001.
Zurück zum Zitat Bursztein, E., & Mitchell, J. C. (2010). Using strategy objectives for network security analysis. Lecture Notes in Computer Science, 6151, 337–349.MathSciNetCrossRef Bursztein, E., & Mitchell, J. C. (2010). Using strategy objectives for network security analysis. Lecture Notes in Computer Science, 6151, 337–349.MathSciNetCrossRef
Zurück zum Zitat Caralli, R. A., Stevens, J. F., Young, L. R., & Wilson, W. R. (2007). Introducing OCTAVE allegro: Improving the information security risk assessment process (Technical report). Software Engineering Institute. Caralli, R. A., Stevens, J. F., Young, L. R., & Wilson, W. R. (2007). Introducing OCTAVE allegro: Improving the information security risk assessment process (Technical report). Software Engineering Institute.
Zurück zum Zitat Davis, M., Korkmaz, E., Dolgikh, A., & Skormin, V. (2017). Resident security system for government/industry owned computers. Lecture Notes in Computer Science, 10446, 185–194.CrossRef Davis, M., Korkmaz, E., Dolgikh, A., & Skormin, V. (2017). Resident security system for government/industry owned computers. Lecture Notes in Computer Science, 10446, 185–194.CrossRef
Zurück zum Zitat Doynikova, E., & Kotenko, I. (2017). CVSS-based probabilistic risk assessment for cyber situational awareness and countermeasure selection. In: Proceedings of the 25th Euromicro international conference on parallel, distributed and network-based processing, St. Petersburg, Russia, March 2017. Doynikova, E., & Kotenko, I. (2017). CVSS-based probabilistic risk assessment for cyber situational awareness and countermeasure selection. In: Proceedings of the 25th Euromicro international conference on parallel, distributed and network-based processing, St. Petersburg, Russia, March 2017.
Zurück zum Zitat Elshoush, H. T., & Osman, I. M. (2011). Alert correlation in collaborative intelligent intrusion detection systems – A survey. Applied Soft Computing, 11, 4349–4365.CrossRef Elshoush, H. T., & Osman, I. M. (2011). Alert correlation in collaborative intelligent intrusion detection systems – A survey. Applied Soft Computing, 11, 4349–4365.CrossRef
Zurück zum Zitat Ensel, C. (2001). A scalable approach to automated service dependency modeling in heterogeneous environments. In: Proceedings of the 5th IEEE international enterprise distributed object computing conference, Seattle, WA, USA, September 2001. Ensel, C. (2001). A scalable approach to automated service dependency modeling in heterogeneous environments. In: Proceedings of the 5th IEEE international enterprise distributed object computing conference, Seattle, WA, USA, September 2001.
Zurück zum Zitat Fedorchenko, A., Kotenko, I., & El Baz, D. (2017). Correlation of security events based on the analysis of structures of event types. In: Proceedings of the 9th IEEE international conference on intelligent data acquisition and advanced computing systems: Technology and applications (IDAACS’2017). IEEE, Bucharest, Romania, pp. 270–276. Fedorchenko, A., Kotenko, I., & El Baz, D. (2017). Correlation of security events based on the analysis of structures of event types. In: Proceedings of the 9th IEEE international conference on intelligent data acquisition and advanced computing systems: Technology and applications (IDAACS’2017). IEEE, Bucharest, Romania, pp. 270–276.
Zurück zum Zitat Ghorbani, A. A., Lu, W., & Tavallaee, M. (2010). Network intrusion detection and prevention concepts and techniques. New York: Springer.CrossRef Ghorbani, A. A., Lu, W., & Tavallaee, M. (2010). Network intrusion detection and prevention concepts and techniques. New York: Springer.CrossRef
Zurück zum Zitat Hanemann, A. (2007). Automated IT service fault diagnosis based on event correlation techniques. Dissertation, LMU of Munich. Hanemann, A. (2007). Automated IT service fault diagnosis based on event correlation techniques. Dissertation, LMU of Munich.
Zurück zum Zitat Hanemann, A., & Marcu, P. (2008). Algorithm design and application of service-oriented event correlation. In: 3rd IEEE/IFIP international workshop on business-driven IT management, Salvador, Brazil, April 2008. Hanemann, A., & Marcu, P. (2008). Algorithm design and application of service-oriented event correlation. In: 3rd IEEE/IFIP international workshop on business-driven IT management, Salvador, Brazil, April 2008.
Zurück zum Zitat Hasan, M. (1991). A conceptual framework for network management event correlation and filtering systems. In: Proceedings of the 6th IFIP/IEEE international symposium on integrated in network management, pp. 233–246. Hasan, M. (1991). A conceptual framework for network management event correlation and filtering systems. In: Proceedings of the 6th IFIP/IEEE international symposium on integrated in network management, pp. 233–246.
Zurück zum Zitat Hazewinkel, M. (2001). Correlation (in statistics). In Encyclopedia of mathematics (p. 5402). Cham: Springer Science+Business Media B.V. Hazewinkel, M. (2001). Correlation (in statistics). In Encyclopedia of mathematics (p. 5402). Cham: Springer Science+Business Media B.V.
Zurück zum Zitat Hoo, K. J. S. (2000). How much is enough? A risk-management approach to computer security. Dissertation, Stanford University. Hoo, K. J. S. (2000). How much is enough? A risk-management approach to computer security. Dissertation, Stanford University.
Zurück zum Zitat ISO/IEC 19770-1:2017(en). (2017). Information technology – IT asset management – Part 1: IT asset management systems – Requirements. ISO/IEC 19770-1:2017(en). (2017). Information technology – IT asset management – Part 1: IT asset management systems – Requirements.
Zurück zum Zitat ISO/IEC 27001:2013. (2013). Information technology – Security techniques – Information security management systems – Requirements. ISO/IEC 27001:2013. (2013). Information technology – Security techniques – Information security management systems – Requirements.
Zurück zum Zitat ISO/IEC 27005:2008. (2008). Information technology – Security techniques – Information security risk management. ISO/IEC 27005:2008. (2008). Information technology – Security techniques – Information security risk management.
Zurück zum Zitat Jahnke, M., Thul, C., & Martini, P. (2007). Graph based metrics for intrusion response measures in computer networks. In: Proceedings of the conference on local computer networks, Dublin, Ireland, October 2007. Jahnke, M., Thul, C., & Martini, P. (2007). Graph based metrics for intrusion response measures in computer networks. In: Proceedings of the conference on local computer networks, Dublin, Ireland, October 2007.
Zurück zum Zitat Jiang, G., & Cybenko, G. (2004). Temporal and spatial distributed event correlation for network security. In: Proceedings of the American Control Conference. IEEE Xplore, pp. 996–1001. Jiang, G., & Cybenko, G. (2004). Temporal and spatial distributed event correlation for network security. In: Proceedings of the American Control Conference. IEEE Xplore, pp. 996–1001.
Zurück zum Zitat Joshi, C., & Singh, U. K. (2018). An enhanced framework for identification and risks assessment of zero-day vulnerabilities. International Journal of Applied Engineering Research, 13, 10861–10870. Joshi, C., & Singh, U. K. (2018). An enhanced framework for identification and risks assessment of zero-day vulnerabilities. International Journal of Applied Engineering Research, 13, 10861–10870.
Zurück zum Zitat Kheir, N., Cuppens-Boulahia, N., Cuppens, F., & Al, E. (2010). A service dependency model for cost-sensitive intrusion response. In: 15th European conference on research in computer security, pp. 626–642. Kheir, N., Cuppens-Boulahia, N., Cuppens, F., & Al, E. (2010). A service dependency model for cost-sensitive intrusion response. In: 15th European conference on research in computer security, pp. 626–642.
Zurück zum Zitat Kotenko, I., & Doynikova, E. (2014). Security assessment of computer networks based on attack graphs and security events. Lecture Notes in Computer Science, 8407, 462–471.CrossRef Kotenko, I., & Doynikova, E. (2014). Security assessment of computer networks based on attack graphs and security events. Lecture Notes in Computer Science, 8407, 462–471.CrossRef
Zurück zum Zitat Kou, G., Lu, Y., Peng, Y., & Shi, Y. (2012). Evaluation of classification algorithms using MCDM and rank correlation. International Journal of Information Technology & Decision Making, 11, 197–225.CrossRef Kou, G., Lu, Y., Peng, Y., & Shi, Y. (2012). Evaluation of classification algorithms using MCDM and rank correlation. International Journal of Information Technology & Decision Making, 11, 197–225.CrossRef
Zurück zum Zitat Kruegel, C., Valeur, F., & Vigna, G. (2005). Intrusion detection and correlation. Challanges and solutions (Vol. 14). New York: Springer US.MATH Kruegel, C., Valeur, F., & Vigna, G. (2005). Intrusion detection and correlation. Challanges and solutions (Vol. 14). New York: Springer US.MATH
Zurück zum Zitat Limmer, T., & Dressler, F. (2019). Survey of event correlation techniques for attack detection in early warning systems (Technical report 01/08). University of Erlangen, Germany. Limmer, T., & Dressler, F. (2019). Survey of event correlation techniques for attack detection in early warning systems (Technical report 01/08). University of Erlangen, Germany.
Zurück zum Zitat Lippmann, R., Ingols, K., Scott, C., Piwowarski, K., Kratkiewicz, K., Artz, M., & Cunningham, R. (2007). Validating and restoring defense in depth using attack graphs. In: Proceedings of the IEEE military communications conference, Washington, DC, USA, October 2006. Lippmann, R., Ingols, K., Scott, C., Piwowarski, K., Kratkiewicz, K., Artz, M., & Cunningham, R. (2007). Validating and restoring defense in depth using attack graphs. In: Proceedings of the IEEE military communications conference, Washington, DC, USA, October 2006.
Zurück zum Zitat Lockstep Consulting. (2004). A guide for government agencies calculating return on security investment. Version 2.0. Sydney: New South Wales Department of Commerce Government Chief Information Office. Lockstep Consulting. (2004). A guide for government agencies calculating return on security investment. Version 2.0. Sydney: New South Wales Department of Commerce Government Chief Information Office.
Zurück zum Zitat Manadhata, P. K., Kaynar, D. K., & Wing, J. M. (2007). A formal model for a system’s attack surface (Technical report CMU-CS-07-144). Carnegie Mellon University, Pittsburgh. Manadhata, P. K., Kaynar, D. K., & Wing, J. M. (2007). A formal model for a system’s attack surface (Technical report CMU-CS-07-144). Carnegie Mellon University, Pittsburgh.
Zurück zum Zitat Mell, P., Scarfone, K., & Romanosky, S. (2007). A complete guide to the Common Vulnerability Scoring System Version 2.0. FIRST Forum Incid Response Secur Teams, NIST. Mell, P., Scarfone, K., & Romanosky, S. (2007). A complete guide to the Common Vulnerability Scoring System Version 2.0. FIRST Forum Incid Response Secur Teams, NIST.
Zurück zum Zitat Müller, A. (2009). Event correlation engine. Master’s thesis, ETH. Müller, A. (2009). Event correlation engine. Master’s thesis, ETH.
Zurück zum Zitat Noel, S., Jajodia, S., O’Berry, B., & Al, E. (2003). Efficient minimum-cost network hardening via exploit dependency graphs. In: Proceedings of the 19th annual computer security applications conference, 2003, pp. 86–95. Noel, S., Jajodia, S., O’Berry, B., & Al, E. (2003). Efficient minimum-cost network hardening via exploit dependency graphs. In: Proceedings of the 19th annual computer security applications conference, 2003, pp. 86–95.
Zurück zum Zitat Peltier, T. R. (2010). Information security risk analysis (3rd ed.). Boca Raton: CRC Press.CrossRef Peltier, T. R. (2010). Information security risk analysis (3rd ed.). Boca Raton: CRC Press.CrossRef
Zurück zum Zitat Sadoddin, R., & Ghorbani, A. (2006). Alert correlation survey: Framework and techniques. In: Proceedings of the international conference on privacy, security and trust: Bridge the gap between PST Technologies and Business Services. Sadoddin, R., & Ghorbani, A. (2006). Alert correlation survey: Framework and techniques. In: Proceedings of the international conference on privacy, security and trust: Bridge the gap between PST Technologies and Business Services.
Zurück zum Zitat Toth, T., & Kruegel, C. (2002). Evaluating the impact of automated intrusion response mechanisms. In: Proceedings of the IEEE annual computer security applications conference, Las Vegas, NV, USA, December 2002. Toth, T., & Kruegel, C. (2002). Evaluating the impact of automated intrusion response mechanisms. In: Proceedings of the IEEE annual computer security applications conference, Las Vegas, NV, USA, December 2002.
Zurück zum Zitat Tuchs, K. D., & Jobmann, K. (2001). Intelligent search for correlated alarm events in databases. In: Proceedings of the 2001 7th IEEE/IFIP international symposium on integrated network management, Seattle, WA, USA, May 2001. Integrated Management Strategies for the New Millennium, IEEE. Tuchs, K. D., & Jobmann, K. (2001). Intelligent search for correlated alarm events in databases. In: Proceedings of the 2001 7th IEEE/IFIP international symposium on integrated network management, Seattle, WA, USA, May 2001. Integrated Management Strategies for the New Millennium, IEEE.
Zurück zum Zitat Wayne, W. D. (1990a). Spearman rank correlation coefficient. In Applied nonparametric statistics (2nd ed., pp. 358–365). Boston: PWS-Kent. Wayne, W. D. (1990a). Spearman rank correlation coefficient. In Applied nonparametric statistics (2nd ed., pp. 358–365). Boston: PWS-Kent.
Zurück zum Zitat Wayne, W. D. (1990b). Kendall’s tau. In Applied nonparametric statistics (2nd ed., pp. 365–377). Boston: PWS-Kent. Wayne, W. D. (1990b). Kendall’s tau. In Applied nonparametric statistics (2nd ed., pp. 365–377). Boston: PWS-Kent.
Zurück zum Zitat Wei, W., Chen, F., Xia, Y., & Jin, G. (2013). A rank correlation based detection against distributed reflection DoS attacks. IEEE Communications Letters, 17, 173–175.CrossRef Wei, W., Chen, F., Xia, Y., & Jin, G. (2013). A rank correlation based detection against distributed reflection DoS attacks. IEEE Communications Letters, 17, 173–175.CrossRef
Zurück zum Zitat Zurutuza, U., & Uribeetxeberria, R. (2004). Intrusion detection alarm correlation: A survey. In: Proceedings of the IADAT international conference on telecommunications and computer networks, pp. 1–3. Zurutuza, U., & Uribeetxeberria, R. (2004). Intrusion detection alarm correlation: A survey. In: Proceedings of the IADAT international conference on telecommunications and computer networks, pp. 1–3.
Metadaten
Titel
Data Analytics for Security Management of Complex Heterogeneous Systems: Event Correlation and Security Assessment Tasks
verfasst von
Igor Kotenko
Andrey Fedorchenko
Elena Doynikova
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-19353-9_5

Neuer Inhalt