Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
6884211 | Computers & Security | 2016 | 27 Pages |
Abstract
The huge number of alerts generated by network-based defense systems prevents detailed manual inspections of security events. Existing proposals for automatic alerts analysis work well in relatively stable and homogeneous environments, but in modern networks, that are characterized by extremely complex and dynamic behaviors, understanding which approaches can be effective requires exploratory data analysis and descriptive modeling. We propose a novel framework for automatically investigating temporal trends and patterns of security alerts with the goal of understanding whether and which anomaly detection approaches can be adopted for identifying relevant security events. Several examples referring to a real large network show that, despite the high intrinsic dynamism of the system, the proposed framework is able to extract relevant descriptive statistics that allow to determine the effectiveness of popular anomaly detection approaches on different alerts groups.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Fabio Pierazzi, Sara Casolari, Michele Colajanni, Mirco Marchetti,