• DocumentCode
    262245
  • Title

    Event Pattern Discovery on IDS Traces of Cloud Services

  • Author

    Shin-Ying Huang ; Yennun Huang ; Suri, Neeraj

  • Author_Institution
    Res. Center for IT Innovation, Taipei, Taiwan
  • fYear
    2014
  • fDate
    3-5 Dec. 2014
  • Firstpage
    25
  • Lastpage
    32
  • Abstract
    The value of Intrusion Detection System (IDS) traces is based on being able to meaningfully parse the complex data patterns appearing therein as based on the pre-defined intrusion ´detection´ rule sets. As IDS traces monitor large groups of servers, large amounts of network data and also spanning a variety of patterns, efficient analytical approaches are needed to address this big heterogeneous data analysis problem. We believe that using unsupervised learning methods can help to classify data that allows analysts to find out meaningful insights and extract the value of the collected data more precisely and efficiently. This study demonstrates how the technique of growing hierarchical self-organizing maps (GHSOM) can be utilized to facilitate efficient event data analysis. For the collected IDS traces, GHSOM is used to cluster data and reveal the geometric distances between each cluster in a topological space such that the attack signatures for each cluster can be easily identified. The experimental results from a real-world IDS traces show that our proposed approach can efficiently discover several critical attack patterns and significantly reduce the size of IDS trace log which needs to be further analyzed. The proposed approach can help internet security administrators/analysts to conduct network forensics analysis, discover suspicious attack sources, and set up recovery processes to prevent previously unknown security threats such as zero-day attacks.
  • Keywords
    cloud computing; data analysis; digital signatures; pattern classification; pattern clustering; self-organising feature maps; unsupervised learning; GHSOM; IDS traces; Internet security administrators; Internet security analysts; analytical approach; attack signatures; cloud services; cluster geometric distances; complex data pattern parsing; critical attack patterns; data classification; data clustering; event data analysis; event pattern discovery; growing hierarchical self-organizing maps; heterogeneous data analysis problem; intrusion detection rule sets; intrusion detection system; network forensics analysis; recovery process; suspicious attack source discovery; topological space; unsupervised learning methods; Correlation; Data mining; IP networks; Intrusion detection; Ports (Computers); Telecommunication traffic; cloud services; forensic analysis; growing hierarchical self-organizing map; internet security; intrusion detection system;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Big Data and Cloud Computing (BdCloud), 2014 IEEE Fourth International Conference on
  • Conference_Location
    Sydney, NSW
  • Type

    conf

  • DOI
    10.1109/BDCloud.2014.92
  • Filename
    7034762