DocumentCode
738025
Title
Interdependent Security Risk Analysis of Hosts and Flows
Author
Rezvani, Mohsen ; Sekulic, Verica ; Ignjatovic, Aleksandar ; Bertino, Elisa ; Jha, Sanjay
Author_Institution
Sch. of Comput. Sci. & Eng., Univ. of New South Wales, Sydney, NSW, Australia
Volume
10
Issue
11
fYear
2015
Firstpage
2325
Lastpage
2339
Abstract
Detection of high risk hosts and flows continues to be a significant problem in security monitoring of high throughput networks. A comprehensive risk assessment method should consider the risk propagation among risky hosts and flows. In this paper, this is achieved by introducing two novel concepts. First, an interdependency relationship among the risk scores of a network flow and its source and destination hosts. On the one hand, the risk score of a host depends on risky flows initiated by or terminated at the host. On the other hand, the risk score of a flow depends on the risk scores of its source and destination hosts. Second, which we call flow provenance, represents risk propagation among network flows which considers the likelihood that a particular flow is caused by the other flows. Based on these two concepts, we develop an iterative algorithm for computing the risk score of hosts and network flows. We give a rigorous proof that our algorithm rapidly converges to unique risk estimates, and provide its extensive empirical evaluation using two real-world data sets. Our evaluation shows that our method is effective in detecting high risk hosts and flows and is sufficiently efficient to be deployed in the high throughput networks.
Keywords
computer network security; invasive software; risk management; botnet initiated attacks; comprehensive risk assessment method; distributed denial-of-service attacks; flow provenance; high risk flow detection; high risk host detection; high throughput network security monitoring; interdependency relationship; interdependent security risk analysis; real-world data sets; risk propagation; risk scores; Computational modeling; Correlation; Iterative methods; Monitoring; Risk management; Web servers; Network risk assessment; flow provenance; network risk assessment; risk propagation;
fLanguage
English
Journal_Title
Information Forensics and Security, IEEE Transactions on
Publisher
ieee
ISSN
1556-6013
Type
jour
DOI
10.1109/TIFS.2015.2455414
Filename
7154480
Link To Document