首页> 外文会议>IEEE Conference on Communications and Network Security >Insider Attack Detection for Science DMZs Using System Performance Data
【24h】

Insider Attack Detection for Science DMZs Using System Performance Data

机译:使用系统性能数据检测科学DMZ的内部攻击

获取原文

摘要

The science DMZ is a specialized network model developed to guarantee secure and efficient transfer of data for large-scale distributed research. To enable a high level of performance, the Science DMZ includes dedicated data transfer nodes (DTNs). Protecting these DTNs is crucial to maintaining the overall security of the network and the data, and insider attacks are a major threat. Although some limited network intrusion detection systems (NIDS) are deployed to monitor DTNs, this alone is not sufficient to detect insider threats. Monitoring for abnormal system behavior, such as unusual sequences of system calls, is one way to detect insider threats. However, the relatively predictable behavior of the DTN suggests that we can also detect unusual activity through monitoring system performance, such as CPU and disk usage, along with network activity. In this paper, we introduce a potential insider attack scenario, and show how readily available system performance metrics can be employed to detect data tampering within DTNs, using DBSCAN clustering to actively monitor for unexpected behavior.
机译:科学DMZ是一种专门的网络模型,旨在为大规模分布式研究保证安全有效地传输数据。为了实现较高的性能,Science DMZ包括专用的数据传输节点(DTN)。保护这些DTN对维护网络和数据的整体安全性至关重要,内部攻击是主要威胁。尽管已部署了一些有限的网络入侵检测系统(NIDS)来监视DTN,但仅凭这一点还不足以检测内部威胁。监视异常系统行为(例如异常的系统调用序列)是检测内部威胁的一种方法。但是,DTN的相对可预测的行为表明,我们还可以通过监视系统性能(例如CPU和磁盘使用情况以及网络活动)来检测异常活动。在本文中,我们介绍了潜在的内部攻击情形,并展示了如何利用DBSCAN群集主动监视意外行为,利用现有的系统性能指标来检测DTN中的数据篡改。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号