DocumentCode :
124390
Title :
Risk-driven aggregation and transmission prioritization of cyber alerts over mobile networks
Author :
Cam, Hasan ; Mouallem, Pierre
Author_Institution :
Network Sci. Div., Army Res. Lab., Adelphi, MD, USA
fYear :
2014
fDate :
3-6 Feb. 2014
Firstpage :
58
Lastpage :
62
Abstract :
Alert Aggregation in mobile networks plays an important role in mitigating the adverse impact of alert generation by reducing the amount of communication and security data to be transmitted. However, it is not guaranteed that the bandwidth necessary to transmit all aggregated alerts is always available, which usually result in the transmission of a portion of the alerts, while others are discarded or queued. The transmission of insufficient alert information hinders making correct decisions about attacks, leading to compromising network security. In order to maximize the benefits of data aggregation while minimizing the impact of partial alerts, this paper presents a risk-driven real-time transmission prioritization technique for implementing lossy and lossless aggregation of cyber alerts. Lossy alert aggregation and transmission are managed adaptively by allowing the prioritization and transmission of aggregated alerts according to the risk assessment of such alerts. This paper also presents a risk-driven utilization model that further adapts the aggregation and prioritization in response to dynamic network conditions. The performance results of the proposed techniques are obtained by running simulations on data collected from a mobile network. Simulation results for the aggregation of raw alerts have shown an average reduction of 51% in data storage space and bandwidth usage.
Keywords :
mobile computing; security of data; alert aggregation; alert generation; alert information; cyber alerts; data aggregation; lossless aggregation; lossy aggregation; lossy alert aggregation; mobile networks; partial alerts; real-time transmission prioritization technique; risk driven aggregation prioritization; risk driven utilization model; security data; Aggregates; Bandwidth; Intrusion detection; Mobile communication; Mobile computing; Propagation losses; Alert Aggregation; Cyber Security; Intrusion Detection System; Mobile Networks; Transmission Prioritization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computing, Networking and Communications (ICNC), 2014 International Conference on
Conference_Location :
Honolulu, HI
Type :
conf
DOI :
10.1109/ICCNC.2014.6785305
Filename :
6785305
Link To Document :
بازگشت