Identifying compromised users in shared computing infrastructures: A data-driven Bayesian network approach

Antonio Pecchia, Aashish Sharma, Zbigniew Kalbarczyk, Domenico Cotroneo, Ravishankar K. Iyer

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The growing demand for processing and storage capabilities has led to the deployment of high-performance computing infrastructures. Users log into the computing infrastructure remotely, by providing their credentials (e.g., username and password), through the public network and using well-established authentication protocols, e.g., SSH. However, user credentials can be stolen and an attacker (using a stolen credential) can masquerade as the legitimate user and penetrate the system as an insider. This paper deals with security incidents initiated by using stolen credentials and occurred during the last three years at the National Center for Supercomputing Applications (NCSA) at the University of Illinois. We analyze the key characteristics of the security data produced by the monitoring tools during the incidents and use a Bayesian network approach to correlate (i) data provided by different security tools (e.g., IDS and Net Flows) and (ii) information related to the users' profiles to identify compromised users, i.e., the users whose credentials have been stolen. The technique is validated with the real incident data. The experimental results demonstrate that the proposed approach is effective in detecting compromised users, while allows eliminating around 80% of false positives (i.e., not compromised user being declared compromised).

Original languageEnglish (US)
Title of host publicationProceedings - 2011 30th IEEE International Symposium on Reliable Distributed Systems, SRDS 2011
Pages127-136
Number of pages10
DOIs
StatePublished - 2011
Event2011 30th IEEE International Symposium on Reliable Distributed Systems, SRDS 2011 - Madrid, Spain
Duration: Oct 4 2011Oct 7 2011

Publication series

NameProceedings of the IEEE Symposium on Reliable Distributed Systems
ISSN (Print)1060-9857

Other

Other2011 30th IEEE International Symposium on Reliable Distributed Systems, SRDS 2011
Country/TerritorySpain
CityMadrid
Period10/4/1110/7/11

Keywords

  • Bayesian network
  • correlation
  • credential stealing
  • intrusion detection
  • security

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Identifying compromised users in shared computing infrastructures: A data-driven Bayesian network approach'. Together they form a unique fingerprint.

Cite this