DocumentCode :
1820329
Title :
Complex Event Processing based Hybrid Intrusion Detection System
Author :
Mohan, Ranjan ; Vaidehi, V. ; Krishna A, Ajay ; Mahalakshmi, M. ; Chakkaravarthy, S. Sibi
Author_Institution :
Dept. of Electron. Eng., Anna Univ., Chennai, India
fYear :
2015
fDate :
26-28 March 2015
Firstpage :
1
Lastpage :
6
Abstract :
Insider threats are evolving constantly and misuse the granted resource access for various malicious activities. These insider threats make use of internal network flaws as the loop holes and are the root cause for data exfiltration and infiltration (Data leakage). Organizations are devising and deploying new solutions for analyzing, monitoring and predicting these insider threats. However data leakage and network breach problems still exist and are increasing day by day. This is due to multiple root accounts, top priority privileges, shared root access, shared file system privileges etc. In this paper a new Hybrid Intrusion Detection System (IDS) is developed to overcome the above stated problem. The objective of this research is to develop a Complex Event Processing (CEP) based Hybrid IDS that integrates the output of the Host IDS and Network IDS into the CEP Module and produces a consolidated output with higher accuracy. The overall deployment protects the internal information system without any data leakage by Stateful Packet Inspection. Multivariate Correlation Analysis (MCA) is used to estimate and characterize the normal behavior of the network and send the values to the CEP Engine which alerts in case of any deviation from the normal pattern. The performance of the proposed Hybrid IDS is examined using test bed with normal and various attack scenarios.
Keywords :
computer network security; peer-to-peer computing; CEP engine; CEP module; complex event processing; data exfiltration; data infiltration; data leakage problem; file system privilege sharing; file system sharing; host IDS; hybrid IDS; hybrid intrusion detection system; internal information system; internal network flaw; loop hole; multivariate correlation analysis; network IDS; network breach problem; root access sharing; stateful packet inspection; threat analysis; threat monitoring; threat prediction; Covariance matrices; Feature extraction; Linux; Random access memory; Servers; Standards; Testing; CEP; Hybrid IDS; IDS; Insider Threat; MCA; Multivariate Correlation Analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Signal Processing, Communication and Networking (ICSCN), 2015 3rd International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4673-6822-3
Type :
conf
DOI :
10.1109/ICSCN.2015.7219827
Filename :
7219827
Link To Document :
بازگشت