Intrusion detection in enterprise systems by combining and clustering diverse monitor data

Atul Bohara, Uttam Thakore, William H. Sanders

Research output: Contribution to conferencePaperpeer-review

Abstract

Intrusion detection using multiple security devices has received much attention recently. The large volume of information generated by these tools, however, increases the burden on both computing resources and security administrators. Moreover, attack detection does not improve as expected if these tools work without any coordination. In this work, we propose a simple method to join information generated by security monitors with diverse data formats. We present a novel intrusion detection technique that uses unsupervised clustering algorithms to identify malicious behavior within large volumes of diverse security monitor data. First, we extract a set of features from network-level and host-level security logs that aid in detecting malicious host behavior and flooding-based network attacks in an enterprise network system. We then apply clustering algorithms to the separate and joined logs and use statistical tools to identify anomalous usage behaviors captured by the logs. We evaluate our approach on an enterprise network data set, which contains network and host activity logs. Our approach correctly identifies and prioritizes anomalous behaviors in the logs by their likelihood of maliciousness. By combining network and host logs, we are able to detect malicious behavior that cannot be detected by either log alone.

Original languageEnglish (US)
Pages7-16
Number of pages10
DOIs
StatePublished - 2016
EventSymposium and Bootcamp on the Science of Security, HotSos 2016 - Pittsburgh, United States
Duration: Apr 19 2016Apr 21 2016

Conference

ConferenceSymposium and Bootcamp on the Science of Security, HotSos 2016
Country/TerritoryUnited States
CityPittsburgh
Period4/19/164/21/16

Keywords

  • anomaly detection
  • clustering
  • intrusion detection
  • machine learning
  • monitoring
  • security

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Intrusion detection in enterprise systems by combining and clustering diverse monitor data'. Together they form a unique fingerprint.

Cite this