首页> 外文会议>IEEE International Conference on Big Data Science and Engineering >ChainSpot: Mining Service Logs for Cyber Security Threat Detection
【24h】

ChainSpot: Mining Service Logs for Cyber Security Threat Detection

机译:Chainspot:用于网络安全威胁检测的挖掘服务日志

获取原文

摘要

Given service logs of who used what service, and when, how can we find intrusions and anomalies? In this paper, a cyber threat detection framework - ChainSpot was proposed, in which the novelty is to build graphical patterns by summarizing user's sequential behaviors of using application-layer services, and to discover deviations against one's normal patterns. Besides modeling, the issue of justifying trade-off between feature explicity and computation complexity is properly addressed, as well. Effectiveness and performance of proposed method are evaluated using dataset collected in real circumstance. Experiments show that ChainSpot can provide very good supports for awaring abnormal behaivors which is starting point of threat detection. The detection results are highly correlated to expert-labeled ground truth, therefore, ChainSpot is proven helpful for saving forensics efforts significantly. Even more, case investigations demonstrate that the differences between benign and suspicious patterns can be further interpreted to reconstruct the attack scenarios. Then the analytic findings may be treated as indicators of compromise for threat detection and in-depth clues for digital forensics.
机译:给予谁使用什么服务的服务日志,以及何时,我们如何找到入侵和异常?在本文中,提出了一种网络威胁检测框架 - ChainePot,其中新颖性是通过总结用户使用应用层服务的顺序行为来构建图形模式,并发现针对一个人的正常模式的偏差。除了建模外,还正确解决了特征性陈述与计算复杂性之间的权衡问题。使用实际情况收集的数据集评估所提出的方法的有效性和性能。实验表明,Chainepot可以提供非常好的支持,用于了解威胁检测的起始点的异常代表性。检测结果与专家标记的地面真理高度相关,因此,Chainspot被证明有助于节省取证措施。甚至更多,案例调查表明,可以进一步解释良性和可疑模式之间的差异来重建攻击情景。然后,分析结果可以被视为威胁检测和数字取证线索的妥协指标。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号