An Experimental Approach to Network Monitoring Using Quantitative Security Metrics

被引:0
|
作者
El-Hassan, Fadi [1 ]
Matrawy, Ashraf [1 ]
Seddigh, Nabil [2 ]
Nandy, Biswajit [2 ]
机构
[1] Carleton Univ, Dept Syst & Comp Engn, Elect Engn, Ottawa, ON, Canada
[2] Solana Networks, Ottawa, ON, Canada
来源
基金
加拿大自然科学与工程研究理事会;
关键词
Network Security; Information Assurance; Quantitative Security Metrics; Intrusion Detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents our work in developing quantitative metrics for network security evaluation and monitoring. We introduce a unified security health index that indicates the security status of the network. Recent efforts have focused on a framework of security metrics derived from a variety of technical, organizational, and operational sources. However, network administrators have faced challenges in deploying these frameworks in operational networks. The challenges stem from the sheer volume of metrics and the difficulty of combining them into a unified security health index. Regardless, the time has come for security metrics to make the bridge from the theoretical to the practical. In this paper, our contribution is threefold. First, we conduct practical experiments of fusing security alerts extracted from the logs of the Snort Intrusion Detection System. The experiments are conducted against real network traces. Second, we classify Snort security alerts into well-defined metric groups. Our final contribution is to study the fusing of metric groups into a single overall metric using simple combination criterion. This metric represents the security status of a network. The results of this experimental work demonstrate that operational deployment of a security network health index framework is viable and can produce meaningful results if combined with existing security tools such as IDSs.
引用
收藏
页码:48 / 62
页数:15
相关论文
共 50 条
  • [41] A NETWORK MONITORING AND CONTROL SECURITY ARCHITECTURE
    SEVCIK, PJ
    KORN, LK
    [J]. INTEGRATED NETWORK MANAGEMENT, 1, 1989, : 257 - 268
  • [42] A Survey on Network Security Monitoring Systems
    Ghafir, Ibrahim
    Prenosil, Vaclav
    Svoboda, Jakub
    Hammoudeh, Mohammad
    [J]. 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 77 - 82
  • [43] Network security monitoring - Intrusion detection
    Davis, J
    Hill, E
    Spradley, L
    Wright, M
    Scherer, W
    Zhang, YY
    [J]. 2003 IEEE SYSTEMS & INFORMATION ENGINEERING DESIGN SYMPOSIUM, 2003, : 241 - 246
  • [44] Visualization for Monitoring Network Security Events
    Humphries, Christopher
    Prigent, Nicolas
    Bidan, Christophe
    [J]. ERCIM NEWS, 2012, (90): : 31 - 32
  • [45] Security by Simple Network Traffic Monitoring
    Tsunoda, Hiroshi
    Keeni, Glenn Mansfield
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 201 - 204
  • [46] Present and Future of Network Security Monitoring
    Fuentes-Garcia, Marta
    Camacho, Jose
    Macia-Fernandez, Gabriel
    [J]. IEEE ACCESS, 2021, 9 : 112744 - 112760
  • [47] A Neural Network Approach for Predicting Manufacturing Performance using Knowledge Management Metrics
    Tan, Li Pin
    Wong, Kuan Yew
    [J]. CYBERNETICS AND SYSTEMS, 2017, 48 (04) : 348 - 364
  • [48] A Comprehensive Approach for Network Security
    Rm, Manikandan
    Radha, D.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 420 - 426
  • [49] Adaptive Approach to Network Security
    Ksiezopolski, Bogdan
    Kotulski, Zbigniew
    Szalachowski, Pawel
    [J]. COMPUTER NETWORKS, PROCEEDINGS, 2009, 39 : 233 - +
  • [50] Evaluating Obfuscation Security: A Quantitative Approach
    Mohsen, Rabih
    Pinto, Alexandre Miranda
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 174 - 192