Correlation-based Streaming Anomaly Detection in Cyber-Security

被引:0
|
作者
Noble, Jordan [1 ]
Adams, Niall M. [1 ,2 ]
机构
[1] Imperial Coll London, Dept Math, London, England
[2] Univ Bristol, Heilbronn Inst Math Res, Bristol, Avon, England
关键词
D O I
10.1109/ICDMW.2016.25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Methodology for statistical analysis of enterprise network data is becoming more important in cyber-security. The volume and velocity of enterprise network data sources puts a premium on streaming analytics - procedures that pass over the data once, while handling temporal variation in the process. In this paper we sketch SCAD: a procedure for streaming anomaly detection in the correlation between a pair of variables. This procedure is intended to detect anomalies on individual edges of the network graph. The approach is illustrated on real Netflow data, where novel ideas are introduced to assess performance on a single edge. The procedure is then successfully extended to combine and score anomalies across multiple edges.
引用
收藏
页码:311 / 318
页数:8
相关论文
共 50 条
  • [1] An anomaly detection framework for cyber-security data
    Evangelou, Marina
    Adams, Niall M.
    [J]. COMPUTERS & SECURITY, 2020, 97
  • [2] Anomaly Detection for Cyber-Security Based on Convolution Neural Network : A survey
    Alabadi, Montdher
    Celik, Yuksel
    [J]. 2ND INTERNATIONAL CONGRESS ON HUMAN-COMPUTER INTERACTION, OPTIMIZATION AND ROBOTIC APPLICATIONS (HORA 2020), 2020, : 558 - 571
  • [3] Towards Zero-Shot Flow-Based Cyber-Security Anomaly Detection Framework
    Komisarek, Mikolaj
    Kozik, Rafal
    Pawlicki, Marek
    Choras, Michal
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (19):
  • [4] ACE - An Anomaly Contribution Explainer for Cyber-Security Applications
    Zhang, Xiao
    Marwah, Manish
    Lee, I-ta
    Arlitt, Martin
    Goldwasser, Dan
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 1991 - 2000
  • [5] Correlation-Based Anomaly Detection in Industrial Control Systems
    Jadidi, Zahra
    Pal, Shantanu
    Hussain, Mukhtar
    Thanh, Kien Nguyen
    [J]. SENSORS, 2023, 23 (03)
  • [6] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    [J]. SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [7] A Spiking One-Class Anomaly Detection Framework for Cyber-Security on Industrial Control Systems
    Demertzis, Konstantinos
    Iliadis, Lazaros
    Spartalis, Stefanos
    [J]. ENGINEERING APPLICATIONS OF NEURAL NETWORKS, EANN 2017, 2017, 744 : 122 - 134
  • [8] An Integrated Cyber Security Monitoring System Using Correlation-based Techniques
    Wu, Qishi
    Ferebee, Denise
    Lin, Yunyue
    Dasgupta, Dipankar
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING SOSE 2009, 2009, : 164 - 169
  • [9] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    [J]. NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568
  • [10] Cyber-security threat
    Klebba, Jesse
    [J]. CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9