Applying High-Performance Bioinformatics Tools for Outlier Detection in Log Data

01/18/2021
by   Markus Wurzenberger, et al.
0

Most of today's security solutions, such as security information and event management (SIEM) and signature based IDS, require the operator to evaluate potential attack vectors and update detection signatures and rules in a timely manner. However, today's sophisticated and tailored advanced persistent threats (APT), malware, ransomware and rootkits, can be so complex and diverse, and often use zero day exploits, that a pure signature-based blacklisting approach would not be sufficient to detect them. Therefore, we could observe a major paradigm shift towards anomaly-based detection mechanisms, which try to establish a system behavior baseline – either based on netflow data or system logging data – and report any deviations from this baseline. While these approaches look promising, they usually suffer from scalability issues. As the amount of log data generated during IT operations is exponentially growing, high-performance analysis methods are required that can handle this huge amount of data in real-time. In this paper, we demonstrate how high-performance bioinformatics tools can be applied to tackle this issue. We investigate their application to log data for outlier detection to timely reveal anomalous system behavior that points to cyber attacks. Finally, we assess the detection capability and run-time performance of the proposed approach.

READ FULL TEXT

page 3

page 4

page 5

page 6

page 7

page 8

page 9

page 10

research
02/01/2018

Anomaly Detection in Log Data using Graph Databases and Machine Learning to Defend Advanced Persistent Threats

Advanced Persistent Threats (APTs) are a main impendence in cyber securi...
research
01/06/2020

UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats

Advanced Persistent Threats (APTs) are difficult to detect due to their ...
research
07/22/2020

Event-based Detection of Changes in IaaS Performance Signatures

We propose a novel ECA approach to manage changes in IaaS performance si...
research
07/09/2018

Recurrent Neural Networks for Enhancement of Signature-based Network Intrusion Detection Systems

Security of information passing through the Internet is threatened by to...
research
07/27/2021

Detection of cybersecurity attacks through analysis of web browsing activities using principal component analysis

Organizations such as government departments and financial institutions ...
research
03/19/2019

A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security

The need for countering Advanced Persistent Threat (APT) attacks has led...
research
05/20/2021

A Rule Mining-Based Advanced Persistent Threats Detection System

Advanced persistent threats (APT) are stealthy cyber-attacks that are ai...

Please sign up or login with your details

Forgot password? Click here to reset