DocumentCode :
3570848
Title :
Stream computing for large-scale, multi-channel cyber threat analytics
Author :
Schales, Douglas L. ; Christodorescu, Mihai ; Xin Hu ; Jiyong Jang ; Rao, Josyula R. ; Sailer, Reiner ; Stoecklin, Marc Ph ; Venema, Wietse ; Ting Wang
fYear :
2014
Firstpage :
8
Lastpage :
15
Abstract :
The cyber threat landscape, controlled by organized crime and nation states, is evolving rapidly towards evasive, multi-channel attacks, as impressively shown by malicious operations such as GhostNet, Aurora, Stuxnet, Night Dragon, or APT1. As threats blend across diverse data channels, their detection requires scalable distributed monitoring and cross-correlation with a substantial amount of contextual information. With threats evolving more rapidly, the classical defense life cycle of post-mortem detection, analysis, and signature creation becomes less effective. In this paper, we present a highly-scalable, dynamic cybersecurity analytics platform extensible at runtime. It is specifically designed and implemented to deliver generic capabilities as a basis for future cybersecurity analytics that effectively detect threats across multiple data channels while recording relevant context information, and that support automated learning and mining for new and evolving malware behaviors. Our implementation is based on stream computing middleware that has proven high scalability, and that enables cross-correlation and analysis of millions of events per second with millisecond latency. We report the lessons we have learned from applying stream computing to monitoring malicious activity across multiple data channels (e.g., DNS, NetFlow, ARP, DHCP, HTTP) in a production network of about fifteen thousand nodes.
Keywords :
data mining; invasive software; learning (artificial intelligence); automated learning; context information recording; cyber threat landscape; data mining; highly-scalable dynamic cybersecurity analytics; large-scale multichannel cyber threat analytics; malicious activity monitoring; multichannel attacks; multiple data channels; nation states; organized crime; stream computing middleware; Analytical models; Computational modeling; Computer architecture; Computer security; IP networks; Monitoring; Real-time systems;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on
Type :
conf
DOI :
10.1109/IRI.2014.7051865
Filename :
7051865
Link To Document :
بازگشت