A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures

被引:56
|
作者
Chen, Zhijiang [1 ]
Xu, Guobin [1 ]
Mahalingam, Vivek [1 ]
Ge, Linqiang [1 ]
James Nguyen [1 ]
Yu, Wei [1 ]
Lu, Chao [1 ]
机构
[1] Towson Univ, Dept Comp & Informat Sci, Towson, MD 21252 USA
关键词
Network monitoring; Threat detection; Cloud computing; BIG-DATA;
D O I
10.1016/j.bdr.2015.11.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Critical infrastructure systems perform functions and missions that are essential for our national economy, health, and security. These functions are vital to commerce, government, and society and are closely interrelated with people's lives. To provide highly secured critical infrastructure systems, a scalable, reliable and robust threat monitoring and detection system should be developed to efficiently mitigate cyber threats. In addition, big data from threat monitoring systems pose serious challenges for cyber operations because an ever growing number of devices in the system and the amount of complex monitoring data collected from critical infrastructure systems require scalable methods to capture, store, manage, and process the big data. To address these challenges, in this paper, we propose a cloud computing based network monitoring and threat detection system to make critical infrastructure systems secure. Our proposed system consists of three main components: monitoring agents, cloud infrastructure, and an operation center. To build our proposed system, we use both Hadoop MapReduce and Spark to speed up data processing by separating and processing data streams concurrently. With a real-world data set, we conducted real-world experiments to evaluate the effectiveness of our developed network monitoring and threat detection system in terms of network monitoring, threat detection, and system performance. Our empirical data indicates that the proposed system can efficiently monitor network activities, find abnormal behaviors, and detect network threats to protect critical infrastructure systems. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:10 / 23
页数:14
相关论文
共 50 条
  • [1] Neural Network Based Intrusion Detection System for Critical Infrastructures
    Linda, Ondrej
    Vollmer, Todd
    Manic, Milos
    [J]. IJCNN: 2009 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1- 6, 2009, : 102 - 109
  • [2] Design of network threat detection and classification based on machine learning on cloud computing
    Hyunjoo Kim
    Jonghyun Kim
    Youngsoo Kim
    Ikkyun Kim
    Kuinam J. Kim
    [J]. Cluster Computing, 2019, 22 : 2341 - 2350
  • [3] Design of network threat detection and classification based on machine learning on cloud computing
    Kim, Hyunjoo
    Kim, Jonghyun
    Kim, Youngsoo
    Kim, Ikkyun
    Kim, Kuinam J.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 2341 - 2350
  • [4] AAD: Adaptive Anomaly Detection System for Cloud Computing Infrastructures
    Pannu, Husanbir S.
    Liu, Jianguo
    Fu, Song
    [J]. 2012 31ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2012), 2012, : 396 - +
  • [5] AFD: Adaptive Failure Detection System for Cloud Computing Infrastructures
    Pannu, Husanbir S.
    Liu, Jianguo
    Guan, Qiang
    Fu, Song
    [J]. 2012 IEEE 31ST INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2012, : 71 - 80
  • [6] Malware Detection in Cloud Computing Infrastructures
    Watson, Michael R.
    Shirazi, Noor-ul-Hassan
    Marnerides, Angelos K.
    Mauthe, Andreas
    Hutchison, David
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (02) : 192 - 205
  • [7] Ensemble approach for network threat detection and classification on cloud computing
    Krishnaveni, S.
    Prabakaran, S.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (03):
  • [8] MoniLog: An Automated Log-Based Anomaly Detection System for Cloud Computing Infrastructures
    Vervaet, Arthur
    [J]. 2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 2739 - 2743
  • [9] A Streaming-Based Network Monitoring and Threat Detection System
    Chen, Zhijiang
    Zhang, Hanlin
    Hatcher, William G.
    Nguyen, James
    Yu, Wei
    [J]. 2016 IEEE/ACIS 14TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), 2016, : 31 - 37
  • [10] Anomaly Detection System in Cloud Computing Network
    Reddy, S. Bharath
    Malathi, D.
    Jose, S. Shijoe
    [J]. HELIX, 2018, 8 (02): : 3188 - 3197