首页> 外文期刊>Journal of algorithms & computational technology >Cyber anomaly detection: Using tabulated vectors and embedded analytics for efficient data mining
【24h】

Cyber anomaly detection: Using tabulated vectors and embedded analytics for efficient data mining

机译:网络异常检测:使用列表化矢量和嵌入式分析功能进行有效的数据挖掘

获取原文
获取原文并翻译 | 示例
       

摘要

Firewalls, especially at large organizations, process high velocity internet traffic and flag suspicious events and activities. Flagged events can be benign, such as misconfigured routers, or malignant, such as a hacker trying to gain access to a specific computer. Confounding this is that flagged events are not always obvious in their danger and the high velocity nature of the problem. Current work in firewall log analysis is manual intensive and involves manpower hours to find events to investigate. This is predominantly achieved by manually sorting firewall and intrusion detection/prevention system log data. This work aims to improve the ability of analysts to find events for cyber forensics analysis. A tabulated vector approach is proposed to create meaningful state vectors from time-oriented blocks. Multivariate and graphical analysis is then used to analyze state vectors in human-machine collaborative interface. Statistical tools, such as the Mahalanobis distance, factor analysis, and histogram matrices, are employed for outlier detection. This research also introduces the breakdown distance heuristic as a decomposition of the Mahalanobis distance, by indicating which variables contributed most to its value. This work further explores the application of the tabulated vector approach methodology on collected firewall logs. Lastly, the analytic methodologies employed are integrated into embedded analytic tools so that cyber analysts on the front-line can efficiently deploy the anomaly detection capabilities.
机译:防火墙,尤其是大型组织中的防火墙,处理高速Internet流量并标记可疑事件和活动。标记的事件可以是良性的,例如路由器配置错误,也可以是恶性的,例如黑客试图获取对特定计算机的访问权限。令人困惑的是,标记事件的危险性和问题的高速性并不总是显而易见的。防火墙日志分析的当前工作是人工密集型工作,需要花费大量人力来查找事件进行调查。这主要是通过手动分类防火墙和入侵检测/预防系统日志数据来实现的。这项工作旨在提高分析师发现事件以进行网络取证分析的能力。提出了一种列表向量方法,用于从面向时间的块中创建有意义的状态向量。然后使用多元和图形分析来分析人机协作界面中的状态向量。统计工具(例如马氏距离,因子分析和直方图矩阵)用于离群值检测。这项研究还通过指出哪些变量对其值的贡献最大,将击穿距离启发式方法作为马氏距离的分解而引入。这项工作进一步探索了列表向量方法在收集的防火墙日志中的应用。最后,所采用的分析方法已集成到嵌入式分析工具中,因此一线网络分析人员可以有效地部署异常检测功能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号