Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior

06/12/2022
by   Enes Altinisik, et al.
0

Enterprise networks are one of the major targets for cyber attacks due to the vast amount of sensitive and valuable data they contain. A common approach to detecting attacks in the enterprise environment relies on modeling the behavior of users and systems to identify unexpected deviations. The feasibility of this approach crucially depends on how well attack-related events can be isolated from benign and mundane system activities. Despite the significant focus on end-user systems, the background behavior of servers running critical services for the enterprise is less studied. To guide the design of detection methods tailored for servers, in this work, we examine system event records from 46 servers in a large enterprise obtained over a duration of ten weeks. We analyze the rareness characteristics and the similarity of the provenance relations in the event log data. Our findings show that server activity, in general, is highly variant over time and dissimilar across different types of servers. However, careful consideration of profiling window of historical events and service level grouping of servers improve rareness measurements by 24.5 Further, utilizing better contextual representations, the similarity in provenance relationships could be improved. An important implication of our findings is that detection techniques developed considering experimental setups with non-representative characteristics may perform poorly in practice.

READ FULL TEXT

page 11

page 12

research
11/06/2020

User-Dependent Neural Sequence Models for Continuous-Time Event Data

Continuous-time event data are common in applications such as individual...
research
06/27/2022

Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale

Active measurements can be used to collect server characteristics on a l...
research
11/21/2022

A Tale of Frozen Clouds: Quantifying the Impact of Algorithmic Complexity Vulnerabilities in Popular Web Servers

Algorithmic complexity vulnerabilities are a class of security problems ...
research
10/21/2022

A General Architecture for Client-Agnostic Hybrid Model Editors as a Service

In this paper, we propose a general architecture for designing language ...
research
06/19/2023

Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy

IoT Servers that receive and process packets from IoT devices should mee...
research
10/12/2021

StateAFL: Greybox Fuzzing for Stateful Network Servers

Fuzzing network servers is a technical challenge, since the behavior of ...
research
10/31/2022

Do You Really Need to Disguise Normal Servers as Honeypots?

A honeypot, which is a kind of deception strategy, has been widely used ...

Please sign up or login with your details

Forgot password? Click here to reset