Skip to main content
Top
Published in: Wireless Personal Communications 3/2017

16-11-2015

A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records

Authors: Jakub Breier, Jana Branišová

Published in: Wireless Personal Communications | Issue 3/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Evidence of security breaches can be found in log files, created by various network devices in order to provide information about their operation. Huge amount of data contained within these files usually prevents to analyze them manually, therefore it is necessary to utilize automatic methods capable of revealing potential attacks. In this paper we propose a method for anomaly detection in log files, based on data mining techniques for dynamic rule creation. To support parallel processing, we employ Apache Hadoop framework, providing distributed storage and distributed processing of data. Outcomes of our testing show potential to discover new types of breaches and plausible error rates below 10 %. Also, rule generation and anomaly detection speeds are competitive to currently used algorithms, such as FP-growth and apriori.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Frei, A., & Rennhard, M. (2008). Histogram matrix: Log file visualization for anomaly detection. In Third international conference on availability, reliability and security. ARES 08 (pp. 610–617). doi:10.1109/ARES.2008.148. Frei, A., & Rennhard, M. (2008). Histogram matrix: Log file visualization for anomaly detection. In Third international conference on availability, reliability and security. ARES 08 (pp. 610–617). doi:10.​1109/​ARES.​2008.​148.
4.
go back to reference Fu, Q., Lou, J. G., Wang, Y., & Li, J. (2009). Execution anomaly detection in distributed systems through unstructured log analysis. In Proceedings of the 2009 ninth IEEE international conference on data mining, ICDM ’09, (pp. 149–158). Washington, DC: IEEE Computer Society. doi:10.1109/ICDM.2009.60. Fu, Q., Lou, J. G., Wang, Y., & Li, J. (2009). Execution anomaly detection in distributed systems through unstructured log analysis. In Proceedings of the 2009 ninth IEEE international conference on data mining, ICDM ’09, (pp. 149–158). Washington, DC: IEEE Computer Society. doi:10.​1109/​ICDM.​2009.​60.
5.
go back to reference Grace, L., Maheswari, V., & Nagamalai, D. (2011). Web log data analysis and mining. In N. Meghanathan, B. Kaushik, & D. Nagamalai (Eds.), Advanced computing, communications in computer and information science (Vol. 133, pp. 459–469). Berlin: Springer. Grace, L., Maheswari, V., & Nagamalai, D. (2011). Web log data analysis and mining. In N. Meghanathan, B. Kaushik, & D. Nagamalai (Eds.), Advanced computing, communications in computer and information science (Vol. 133, pp. 459–469). Berlin: Springer.
6.
go back to reference Kent, K., & Souppaya, M. P. (2006). Sp 800-92. guide to computer security log management. Tech. rep., Gaithersburg, MD. Kent, K., & Souppaya, M. P. (2006). Sp 800-92. guide to computer security log management. Tech. rep., Gaithersburg, MD.
7.
go back to reference Lee, W., & Stolfo, S. J. (1998). Data mining approaches for intrusion detection. In Proceedings of the 7th Conference on USENIX Security Symposium-Volume 7 (SSYM'98) (Vol. 7, pp. 6-6). Berkeley: USENIX Association. Lee, W., & Stolfo, S. J. (1998). Data mining approaches for intrusion detection. In Proceedings of the 7th Conference on USENIX Security Symposium-Volume 7 (SSYM'98) (Vol. 7, pp. 6-6). Berkeley: USENIX Association.
8.
go back to reference Makanju, A., Zincir-Heywood, A., & Milios, E. (2013). Investigating event log analysis with minimum apriori information. In 2013 IFIP/IEEE international symposium on, integrated network management (IM 2013), (pp. 962–968). Makanju, A., Zincir-Heywood, A., & Milios, E. (2013). Investigating event log analysis with minimum apriori information. In 2013 IFIP/IEEE international symposium on, integrated network management (IM 2013), (pp. 962–968).
9.
go back to reference Schultz, M., Eskin, E., Zadok, E., & Stolfo, S. (2001). Data mining methods for detection of new malicious executables. In Proceedings 2001 IEEE symposium on security and privacy, 2001. S P 2001 (pp. 38–49). doi:10.1109/SECPRI.2001.924286. Schultz, M., Eskin, E., Zadok, E., & Stolfo, S. (2001). Data mining methods for detection of new malicious executables. In Proceedings 2001 IEEE symposium on security and privacy, 2001. S P 2001 (pp. 38–49). doi:10.​1109/​SECPRI.​2001.​924286.
10.
go back to reference Siddiqui, M. A. (2011). Data mining methods for malware detection. Ann Arbor: ProQuest. Siddiqui, M. A. (2011). Data mining methods for malware detection. Ann Arbor: ProQuest.
11.
go back to reference Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the kdd cup 99 data set. In Proceedings of the second IEEE international conference on computational intelligence for security and defense applications, CISDA’09 (pp. 53–58). Piscataway, NJ: IEEE Press. http://dl.acm.org/citation.cfm?id=1736481.1736489. Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the kdd cup 99 data set. In Proceedings of the second IEEE international conference on computational intelligence for security and defense applications, CISDA’09 (pp. 53–58). Piscataway, NJ: IEEE Press. http://​dl.​acm.​org/​citation.​cfm?​id=​1736481.​1736489.
Metadata
Title
A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records
Authors
Jakub Breier
Jana Branišová
Publication date
16-11-2015
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2017
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-3128-1

Other articles of this Issue 3/2017

Wireless Personal Communications 3/2017 Go to the issue