zeek-osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection

02/11/2020
by   Steffen Haas, et al.
0

Intrusion Detection Systems (IDSs) can analyze network traffic for signs of attacks and intrusions. However, encrypted communication limits their visibility and sophisticated attackers additionally try to evade their detection. To overcome these limitations, we extend the scope of Network IDSs (NIDSs) with additional data from the hosts. For that, we propose the integrated open-source zeek-osquery platform that combines the Zeek IDS with the osquery host monitor. Our platform can collect, process, and correlate host and network data at large scale, e.g., to attribute network connections to processes and users. The platform can be flexibly extended with own detection scripts using the already correlated, but also additional dynamically retrieved host data. A distributed deployment enables it to scale with an arbitrary number of osquery hosts. Our evaluation results indicate that a single Zeek instance can manage more than 870 osquery hosts and can attribute more than 96 of TCP connections to host-side applications and users in real-time.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/24/2021

SCADS: A Scalable Approach Using Spark in Cloud for Host-based Intrusion Detection System with System Calls

Following the current big data trend, the scale of real-time system call...
research
11/21/2017

Intrusion Detection and Ubiquitous Host to Host Encryption

Growing concern for individual privacy, driven by an increased public aw...
research
04/20/2021

Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring

Internet traffic is increasingly encrypted. While this protects the conf...
research
12/06/2017

Sequence Covering for Efficient Host-Based Intrusion Detection

This paper introduces a new similarity measure, the covering similarity,...
research
11/08/2021

threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning

Host-based threats such as Program Attack, Malware Implantation, and Adv...
research
05/16/2018

A Survey of Intrusion Detection Systems Leveraging Host Data

This survey focuses on intrusion detection systems (IDS) that leverage h...
research
10/21/2021

Decentralised Trustworthy Collaborative Intrusion Detection System for IoT

Intrusion Detection Systems (IDS) have been the industry standard for se...

Please sign up or login with your details

Forgot password? Click here to reset