On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis

被引:2
|
作者
Chrun, Danielle [1 ]
Cukier, Michel [1 ]
Sneeringer, Gerry [2 ]
机构
[1] Univ Maryland, Dept Mech Engn, Ctr Risk & Reliabil, College Pk, MD 20742 USA
[2] Univ Maryland, Off Informat Technol, College Pk, MD 20742 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/HASE.2008.52
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing number of attacks on the Internet, a primary concern for organizations is the protection of their network. To do so, organizations install security devices such as intrusion prevention systems to monitor network traffic. However, data that are collected by these devices are often imperfect. The contribution of this paper is to try to define some practical metrics based on imperfect data collected by an intrusion prevention system. Since attacks greatly differ, we propose to group the attacks into several attack type groups. We then define a set of metrics for each attack type group. We introduce an approach that consists in analyzing the evolution of these metrics per attack type group by focusing on outliers in order to give an insight into an organization's security. The method is assessed for an organization of about 40,000 computers. The results were encouraging: outliers could be related to security issues that, in some cases, had not been previously flagged.
引用
收藏
页码:49 / +
页数:2
相关论文
共 50 条
  • [1] A Practical Experience on Evaluating Intrusion Prevention System Event Data as Indicators of Security Issues
    Miani, Rodrigo Sanches
    Zarpelao, Bruno Bogaz
    Sobesto, Bertrand
    Cukier, Michel
    [J]. 2015 IEEE 34TH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2015, : 296 - 305
  • [2] Performance Analysis and Security Based on Intrusion Detection and Prevention Systems in Cloud Data Centers
    El Mir, Iman
    Haqiq, Abdelkrim
    Kim, Dong Seong
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS 2016), 2017, 552 : 456 - 465
  • [3] Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data
    Chrun, Danielle
    Cukier, Michel
    Sneeringer, Gerry
    [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2008, 5219 : 221 - +
  • [4] Intrusion Prevention in Depth System Research Based on Data Mining
    Wang Jie
    Zheng Xiao
    Liu Yabin
    Shi Chenghui
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01): : 22 - 22
  • [5] Intrusion prevention in depth system research based on data mining
    Wang Jie
    Zheng Xiao
    Liu Yabin
    Shi Chenghui
    [J]. INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 376 - 382
  • [6] New Hybrid Intrusion Detection and Prevention System to Ensure Security and Privacy in Big Data
    Bakir, Cigdem
    [J]. PROCEEDINGS OF 26TH INTERNATIONAL CONFERENCE ELECTRONICS 2022, 2022,
  • [7] On Service Security Analysis for Event Log of IoT System Based on Data Petri Net
    Bin Ahmadon, Mohd Anuaruddin
    Yamaguchi, Shingo
    Saon, Sharifah
    Mahamad, Abd Kadir
    [J]. 2017 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS (ISCE), 2017, : 4 - 8
  • [8] REAL-TIME TRAFFIC DETECTION and ANALYSIS of NETWORK SECURITY INTRUSION ATTACK: SNORT INTRUSION PREVENTION SYSTEM
    Zhou, A.L.
    [J]. Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2020, 79 (12): : 1055 - 1062
  • [9] Intrusion Prevention System for DDoS Attack on VANET With reCAPTCHA Controller Using Information Based Metrics
    Poongodi, M.
    Vijayakumar, V.
    Al-Turjman, Fadi
    Hamdi, Mounir
    Ma, Maode
    [J]. IEEE ACCESS, 2019, 7 : 158481 - 158491
  • [10] Analysis of Data Dependency Based Intrusion Detection System
    Nugmanov, Yermek
    Panda, Brajendra
    Hu, Yi
    [J]. DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 111 - +