Skip to main content
Top
Published in: Cluster Computing 3/2019

24-02-2018

Analysis of alarms to prevent the organizations network in real-time using process mining approach

Authors: Ved Prakash Mishra, Balvinder Shukla, Abhay Bansal

Published in: Cluster Computing | Special Issue 3/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The analysis of alarms in the current intrusion detection system depends upon the manual system by network administrators. Due to the manual analysis, still many organizations are facing the false alarm problem causing the performance deficiency. In this manuscript, a model has been proposed for profile-based system, which will work on real time to analyze the suspicious activities and detect the intrusion automatically. The proposed model will also analyze the alarms to detect attacks and give the automatic response to prevent in real time. Processes were compared with original log events with tempered log events and the difference was found. Our extended work will be to develop the plugin in java with the combination of proposed algorithm, which could be imbedded in the tool to get the automatic response.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ambre, A., Shekokar, N.: Insider Threat Detection Using Log analysis and Event Correlation, Procedia Computer Science 45(2015), pp. 436–445. Elsevier Science Direct, Amsterdam (2015) Ambre, A., Shekokar, N.: Insider Threat Detection Using Log analysis and Event Correlation, Procedia Computer Science 45(2015), pp. 436–445. Elsevier Science Direct, Amsterdam (2015)
4.
go back to reference Pawar, M.V., Anuradha, J.: Network Security and Types of Attack in Network, Procedia Computer Science 48(2015), pp. 503–506. Elsevier Science Direct, Amsterdam (2015) Pawar, M.V., Anuradha, J.: Network Security and Types of Attack in Network, Procedia Computer Science 48(2015), pp. 503–506. Elsevier Science Direct, Amsterdam (2015)
5.
go back to reference Salama, S.E., Marie, M.I., El-Fangary, L.M., Helmy, Y.K.: Web server logs preprocessing for web intrusion detection. Comput. Inf. Sci. 4(4), 123–133 (2011) Salama, S.E., Marie, M.I., El-Fangary, L.M., Helmy, Y.K.: Web server logs preprocessing for web intrusion detection. Comput. Inf. Sci. 4(4), 123–133 (2011)
7.
go back to reference Mostaque, Md, Hassan, M.: Current studies on intrusion detection system, genetic algorithm and fuzzy logic. Int. J. Distrib. Parallel Syst. (IJDPS) 4(2), 35–47 (2013)CrossRef Mostaque, Md, Hassan, M.: Current studies on intrusion detection system, genetic algorithm and fuzzy logic. Int. J. Distrib. Parallel Syst. (IJDPS) 4(2), 35–47 (2013)CrossRef
8.
go back to reference Corney, M., Mohay, G., Clack, A.: Detection of Anomalies from User Profiles Generated from System Logs, AISC 2011, Perth Australia, CRPIT Volume 116-Information Security 2011, pp. 23–31 (2011) Corney, M., Mohay, G., Clack, A.: Detection of Anomalies from User Profiles Generated from System Logs, AISC 2011, Perth Australia, CRPIT Volume 116-Information Security 2011, pp. 23–31 (2011)
10.
go back to reference de Alvarenga, S.C., Zarpelão, B.B., Barbon, S., Jr., Miani, R.S., Cukier, M.: Discovering Attack Strategies Using Process Mining, AICT 2015: The Eleventh Advanced International Conference on Telecommunications, pp. 119–125 (2015) de Alvarenga, S.C., Zarpelão, B.B., Barbon, S., Jr., Miani, R.S., Cukier, M.: Discovering Attack Strategies Using Process Mining, AICT 2015: The Eleventh Advanced International Conference on Telecommunications, pp. 119–125 (2015)
11.
go back to reference Beerra, F., Wainer, J.: Anomaly detection algorithms in business process logs, ICEIS 2008. In: Proceedings of the Tenth International Conference on Enterprise Information Systems, AIDSS (2008) Beerra, F., Wainer, J.: Anomaly detection algorithms in business process logs, ICEIS 2008. In: Proceedings of the Tenth International Conference on Enterprise Information Systems, AIDSS (2008)
12.
go back to reference Escamilla, T.: Intrusion Detection: Network Security Beyond the Firewall. Wiley, New York, NY, USA. ISBN:0-471-29000-9, ACM, (1998) Escamilla, T.: Intrusion Detection: Network Security Beyond the Firewall. Wiley, New York, NY, USA. ISBN:0-471-29000-9, ACM, (1998)
13.
go back to reference Bezerra, F., Wainer, J.: Anomaly detection algorithms in logs of process aware systems, SAC 2008: In: Proceedings of the 2008 ACM Symposium on Applied Computing, ACM Press, pp. 951–952 (2008) Bezerra, F., Wainer, J.: Anomaly detection algorithms in logs of process aware systems, SAC 2008: In: Proceedings of the 2008 ACM Symposium on Applied Computing, ACM Press, pp. 951–952 (2008)
14.
go back to reference Van der Aalst, W.M.P.: Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer, New York (2011)CrossRef Van der Aalst, W.M.P.: Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer, New York (2011)CrossRef
15.
go back to reference Claes, J., Poels, G.: Merging event logs for process mining: a rule based merging method and rule suggestion algorithm. Expert Syst. Appl. 41(16), 7291–7306 (2014)CrossRef Claes, J., Poels, G.: Merging event logs for process mining: a rule based merging method and rule suggestion algorithm. Expert Syst. Appl. 41(16), 7291–7306 (2014)CrossRef
16.
go back to reference Green Technologies for the Energy-optimized Cloud. Asian J. Res. Soc. Sci. Hum. 6(6), Special Issue June (2016) Green Technologies for the Energy-optimized Cloud. Asian J. Res. Soc. Sci. Hum. 6(6), Special Issue June (2016)
17.
go back to reference Bae, J., Liu, L., Caverlee, J., Rouse, W.B.: Process mining, discovery, and integration using distance measures. In: IEEE International Conference on Web Services (ICWS’06) (2006) Bae, J., Liu, L., Caverlee, J., Rouse, W.B.: Process mining, discovery, and integration using distance measures. In: IEEE International Conference on Web Services (ICWS’06) (2006)
19.
go back to reference Mishra, V.P., Balvinder, S.: Process Mining in Intrusion Detection—The Need of Current Digital World. Springer Nature Singapore Pte Ltd. 2017: CCIS 712, pp. 238–246 (2017) Mishra, V.P., Balvinder, S.: Process Mining in Intrusion Detection—The Need of Current Digital World. Springer Nature Singapore Pte Ltd. 2017: CCIS 712, pp. 238–246 (2017)
20.
go back to reference Mishra, V.P., Balvinder, S.: Development of Simulator for Intrusion Detection System to Detect and Alarm the DDoS Attacks. In: IEEE International Conference on Infocom Technologies and Unmanned Systems (ICTUS’2017) (Trends and Future Directions), 10–12 December 2017 (2017) Mishra, V.P., Balvinder, S.: Development of Simulator for Intrusion Detection System to Detect and Alarm the DDoS Attacks. In: IEEE International Conference on Infocom Technologies and Unmanned Systems (ICTUS’2017) (Trends and Future Directions), 10–12 December 2017 (2017)
21.
go back to reference Mishra, V.P., Yogesh, W., Subheshree, J: Detecting attacks using big data with process mining. Int. J. Syst. Model. Simul. 2(2), 5–7 (2017)CrossRef Mishra, V.P., Yogesh, W., Subheshree, J: Detecting attacks using big data with process mining. Int. J. Syst. Model. Simul. 2(2), 5–7 (2017)CrossRef
Metadata
Title
Analysis of alarms to prevent the organizations network in real-time using process mining approach
Authors
Ved Prakash Mishra
Balvinder Shukla
Abhay Bansal
Publication date
24-02-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 3/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-2064-8

Other articles of this Special Issue 3/2019

Cluster Computing 3/2019 Go to the issue

Premium Partner