DocumentCode :
738025
Title :
Interdependent Security Risk Analysis of Hosts and Flows
Author :
Rezvani, Mohsen ; Sekulic, Verica ; Ignjatovic, Aleksandar ; Bertino, Elisa ; Jha, Sanjay
Author_Institution :
Sch. of Comput. Sci. & Eng., Univ. of New South Wales, Sydney, NSW, Australia
Volume :
10
Issue :
11
fYear :
2015
Firstpage :
2325
Lastpage :
2339
Abstract :
Detection of high risk hosts and flows continues to be a significant problem in security monitoring of high throughput networks. A comprehensive risk assessment method should consider the risk propagation among risky hosts and flows. In this paper, this is achieved by introducing two novel concepts. First, an interdependency relationship among the risk scores of a network flow and its source and destination hosts. On the one hand, the risk score of a host depends on risky flows initiated by or terminated at the host. On the other hand, the risk score of a flow depends on the risk scores of its source and destination hosts. Second, which we call flow provenance, represents risk propagation among network flows which considers the likelihood that a particular flow is caused by the other flows. Based on these two concepts, we develop an iterative algorithm for computing the risk score of hosts and network flows. We give a rigorous proof that our algorithm rapidly converges to unique risk estimates, and provide its extensive empirical evaluation using two real-world data sets. Our evaluation shows that our method is effective in detecting high risk hosts and flows and is sufficiently efficient to be deployed in the high throughput networks.
Keywords :
computer network security; invasive software; risk management; botnet initiated attacks; comprehensive risk assessment method; distributed denial-of-service attacks; flow provenance; high risk flow detection; high risk host detection; high throughput network security monitoring; interdependency relationship; interdependent security risk analysis; real-world data sets; risk propagation; risk scores; Computational modeling; Correlation; Iterative methods; Monitoring; Risk management; Web servers; Network risk assessment; flow provenance; network risk assessment; risk propagation;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2015.2455414
Filename :
7154480
Link To Document :
بازگشت