Pagoda: A Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments

被引:31
|
作者
Xie, Yulai [1 ]
Feng, Dan [1 ]
Hu, Yuchong [1 ]
Li, Yan [2 ]
Sample, Staunton [3 ]
Long, Darrell Long [3 ]
机构
[1] Huazhong Univ Sci & Technol, Wuhan Natl Lab Optoelect, Sch Comp, Wuhan 430074, Peoples R China
[2] TuneUp Ai San Francisco Bay Area, San Francisco, CA 94122 USA
[3] Univ Calif Santa Cruz, Jack Baskin Sch Engn, Santa Cruz, CA 95064 USA
基金
美国国家科学基金会;
关键词
Intrusion detection; Databases; Noise measurement; Big Data; Real-time systems; Aggregates; Provenance; intrusion detection; big data; real-time;
D O I
10.1109/TDSC.2018.2867595
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Efficient intrusion detection and analysis of the security landscape in big data environments present challenge for today's users. Intrusion behavior can be described by provenance graphs that record the dependency relationships between intrusion processes and the infected files. Existing intrusion detection methods typically analyze and identify the anomaly either in a single provenance path or the whole provenance graph, neither of which can achieve the benefit on both detection accuracy and detection time. We propose Pagoda, a hybrid approach that takes into account the anomaly degree of both a single provenance path and the whole provenance graph. It can identify intrusion quickly if a serious compromise has been found on one path, and can further improve the detection rate by considering the behavior representation in the whole provenance graph. Pagoda uses a persistent memory database to store provenance and aggregates multiple similar items into one provenance record to maximumly reduce unnecessary I/O during the detection analysis. In addition, it encodes duplicate items in the rule database and filters noise that does not contain intrusion information. The experimental results on a wide variety of real-world applications demonstrate its performance and efficiency.
引用
收藏
页码:1283 / 1296
页数:14
相关论文
共 50 条
  • [1] A real-time adaptive network intrusion detection for streaming data: a hybrid approach
    Saeed, Mozamel M.
    [J]. NEURAL COMPUTING & APPLICATIONS, 2022, 34 (08): : 6227 - 6240
  • [2] A real-time adaptive network intrusion detection for streaming data: a hybrid approach
    Mozamel M. Saeed
    [J]. Neural Computing and Applications, 2022, 34 : 6227 - 6240
  • [3] A hybrid approach for real-time network intrusion detection systems
    Lee, Sang Min
    Kim, Dong Seong
    Park, Jong Sou
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 712 - 715
  • [4] Paradise: Real-Time, Generalized, and Distributed Provenance-Based Intrusion Detection
    Wu, Yafeng
    Xie, Yulai
    Liao, Xuelong
    Zhou, Pan
    Feng, Dan
    Wu, Lin
    Li, Xuan
    Wildani, Avani
    Long, Darrell
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1624 - 1640
  • [5] Real time intrusion detection system for ultra-high-speed big data environments
    Rathore, M. Mazhar
    Ahmad, Awais
    Paul, Anand
    [J]. JOURNAL OF SUPERCOMPUTING, 2016, 72 (09): : 3489 - 3510
  • [6] Real time intrusion detection system for ultra-high-speed big data environments
    M. Mazhar Rathore
    Awais Ahmad
    Anand Paul
    [J]. The Journal of Supercomputing, 2016, 72 : 3489 - 3510
  • [7] Efficient Provenance Management via Clustering and Hybrid Storage in Big Data Environments
    Hu, Die
    Feng, Dan
    Xie, Yulai
    Xu, Gongming
    Gu, Xinrui
    Long, Darrell
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2020, 6 (04) : 792 - 803
  • [8] Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques
    Ahlem Abid
    Farah Jemili
    Ouajdi Korbaa
    [J]. Cluster Computing, 2024, 27 : 2217 - 2238
  • [9] Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques
    Abid, Ahlem
    Jemili, Farah
    Korbaa, Ouajdi
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 2217 - 2238
  • [10] Real-Time and Resilient Intrusion Detection: A Flow-Based Approach
    Hofstede, Rick
    Pras, Aiko
    [J]. DEPENDABLE NETWORKS AND SERVICES, 2012, 7279 : 109 - 112