DocumentCode
124390
Title
Risk-driven aggregation and transmission prioritization of cyber alerts over mobile networks
Author
Cam, Hasan ; Mouallem, Pierre
Author_Institution
Network Sci. Div., Army Res. Lab., Adelphi, MD, USA
fYear
2014
fDate
3-6 Feb. 2014
Firstpage
58
Lastpage
62
Abstract
Alert Aggregation in mobile networks plays an important role in mitigating the adverse impact of alert generation by reducing the amount of communication and security data to be transmitted. However, it is not guaranteed that the bandwidth necessary to transmit all aggregated alerts is always available, which usually result in the transmission of a portion of the alerts, while others are discarded or queued. The transmission of insufficient alert information hinders making correct decisions about attacks, leading to compromising network security. In order to maximize the benefits of data aggregation while minimizing the impact of partial alerts, this paper presents a risk-driven real-time transmission prioritization technique for implementing lossy and lossless aggregation of cyber alerts. Lossy alert aggregation and transmission are managed adaptively by allowing the prioritization and transmission of aggregated alerts according to the risk assessment of such alerts. This paper also presents a risk-driven utilization model that further adapts the aggregation and prioritization in response to dynamic network conditions. The performance results of the proposed techniques are obtained by running simulations on data collected from a mobile network. Simulation results for the aggregation of raw alerts have shown an average reduction of 51% in data storage space and bandwidth usage.
Keywords
mobile computing; security of data; alert aggregation; alert generation; alert information; cyber alerts; data aggregation; lossless aggregation; lossy aggregation; lossy alert aggregation; mobile networks; partial alerts; real-time transmission prioritization technique; risk driven aggregation prioritization; risk driven utilization model; security data; Aggregates; Bandwidth; Intrusion detection; Mobile communication; Mobile computing; Propagation losses; Alert Aggregation; Cyber Security; Intrusion Detection System; Mobile Networks; Transmission Prioritization;
fLanguage
English
Publisher
ieee
Conference_Titel
Computing, Networking and Communications (ICNC), 2014 International Conference on
Conference_Location
Honolulu, HI
Type
conf
DOI
10.1109/ICCNC.2014.6785305
Filename
6785305
Link To Document