首页> 外文学位 >Unknown threat detection with honeypot ensemble analsyis using big data security architecture.
【24h】

Unknown threat detection with honeypot ensemble analsyis using big data security architecture.

机译:使用大数据安全性架构的蜜罐集成分析进行未知威胁检测。

获取原文
获取原文并翻译 | 示例

摘要

The amount of data that is being generated continues to rapidly grow in size and complexity. Frameworks such as Apache Hadoop and Apache Spark are evolving at a rapid rate as organizations are building data driven applications to gain competitive advantages. Data analytics frameworks decomposes our problems to build applications that are more than just inference and can help make predictions as well as prescriptions to problems in real time instead of batch processes.;Information Security is becoming more important to organizations as the Internet and cloud technologies become more integrated with their internal processes. The number of attacks and attack vectors has been increasing steadily over the years. Border defense measures (e.g. Intrusion Detection Systems) are no longer enough to identify and stop attackers. Data driven information security is not a new approach to solving information security; however there is an increased emphasis on combining heterogeneous sources to gain a broader view of the problem instead of isolated systems. Stitching together multiple alerts into a cohesive system can increase the number of True Positives.;With the increased concern of unknown insider threats and zero-day attacks, identifying unknown attack vectors becomes more difficult. Previous research has shown that with as little as 10 commands it is possible to identify a masquerade attack against a user's profile.;This thesis is going to look at a data driven information security architecture that relies on both behavioral analysis of SSH profiles and bad actor data collected from an SSH honeypot to identify bad actor attack vectors. Honeypots should collect only data from bad actors; therefore have a high True Positive rate. Using Apache Spark and Apache Hadoop we can create a real time data driven architecture that can collect and analyze new bad actor behaviors from honeypot data and monitor legitimate user accounts to create predictive and prescriptive models. Previously unidentified attack vectors can be cataloged for review.
机译:所生成的数据量在大小和复杂性上继续迅速增长。随着组织正在构建数据驱动的应用程序以获得竞争优势,诸如Apache Hadoop和Apache Spark之类的框架正在快速发展。数据分析框架分解了我们的问题,以构建不仅仅是推理的应用程序,还可以帮助您实时地对问题进行预测和对问题进行处理,而不是对批处理过程进行处理。随着Internet和云技术的发展,信息安全对于组织而言变得越来越重要。与他们的内部流程更加融合。这些年来,攻击和攻击媒介的数量一直在稳定增长。边界防御措施(例如入侵检测系统)已不足以识别和阻止攻击者。数据驱动的信息安全并不是解决信息安全的新方法。但是,人们越来越强调结合异类源而不是孤立的系统来更广泛地了解问题。将多个警报汇总到一个内聚的系统中可以增加“真实肯定”的数量。随着对未知内部威胁和零日攻击的关注增加,识别未知攻击媒介变得更加困难。先前的研究表明,只需使用10条命令,就可以识别对用户个人资料的假冒攻击。;本论文将着眼于一种数据驱动的信息安全体系结构,该体系结构同时依赖于SSH个人资料的行为分析和不良行为者从SSH蜜罐收集的数据,以识别错误的actor攻击媒介。蜜罐应该只收集不良行为者的数据;因此具有很高的真实肯定率。使用Apache Spark和Apache Hadoop,我们可以创建一个实时数据驱动的体系结构,该体系结构可以从蜜罐数据中收集和分析新的不良行为者行为,并监视合法用户帐户以创建预测性和说明性模型。可以将以前未识别的攻击媒介分类以进行检查。

著录项

  • 作者

    Sanders, Michael E.;

  • 作者单位

    Illinois State University.;

  • 授予单位 Illinois State University.;
  • 学科 Information technology.
  • 学位 M.S.
  • 年度 2015
  • 页码 87 p.
  • 总页数 87
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号