Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1162666.1162677acmotherconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free access

Resource-aware multi-format network security data storage

Published: 11 September 2006 Publication History

Abstract

Internet security systems like intrusion detection and intrusion prevention systems are based on a simple input-output principle: they receive a high-bandwidth stream of input data and produce summaries of suspicious events. This simple model has serious drawbacks, including the inability to attach context to security alerts, a lack of detailed historical information for anomaly detection baselines, and a lack of detailed forensics information. Together these problems highlight a need for fine-grained security data in the shortterm, and coarse-grained security data in the long-term. To address these limitations we propose resource-aware multi-format security data storage. Our approach is to develop an architecture for recording different granularities of security data simultaneously. To explore this idea we present a novel framework for analyzing security data as a spectrum of information and a set of algorithms for collecting and storing multi-format data. We construct a prototype system and deploy it on darknets at academic, Fortune 100 enterprise, and ISP networks. We demonstrate how a hybrid algorithm that provides guarantees on time and space satisfies the short and long-term goals across a four month deployment period and during a series of large-scale denial of service attacks.

References

[1]
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson. The Internet Motion Sensor: A distributed blackhole monitoring system. In Proceedings of Network and Distributed System Security Symposium (NDSS '05), San Diego, CA, February 2005.
[2]
E. Cooke, M. Bailey, F. Jahanian, and R. Mortier. The dark oracle: Perspective-aware unused and unreachable address discovery. In Proceedings of the 3rd USENIX Symposium on Networked Systems Design and Implementation (NSDI '06), May 2006.
[3]
N. Duffield and C. Lund. Predicting Resource Usage and Estimation Accuracy in an IP Flow Measurement Collection Infrastructure. In ACM SIGCOMM Internet Measurement Conference, 2003.
[4]
N. Duffield, C. Lund, and M. Thorup. Charging from sampled network usage. In ACM SIGCOMM Internet Measurement Workshop, 2001.
[5]
C. Estan, K. Keys, D. Moore, and G. Varghese. Building a better netflow. In Proc of ACM SIGCOMM, Portland, Oregon, USA, 2004.
[6]
C. S. Inc. Netflow services and applications. http://www.cisco.com/warp/public/cc/pd/iosw/ioft/neflct/tech/napps_wp.h%tm, 2002.
[7]
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson. Characteristics of Internet background radiation. In Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pages 27--40. ACM Press, 2004.
[8]
V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23--24):2435--2463, 1999.
[9]
S. Phaal, S. Panchen, and N. McKee. RFC 3176: InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed Networks. 2001.
[10]
M. Roesch. Snort --- lightweight intrusion detection for networks. In USENIX, editor, Proceedings of the Thirteenth Systems Administration Conference (LISA XIII): November 7--12, 1999, Seattle, WA, USA, Berkeley, CA, USA, 1999. USENIX.

Cited By

View all
  • (2016)Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and CharacterizationIEEE Communications Surveys & Tutorials10.1109/COMST.2015.249769018:2(1197-1227)Online publication date: Oct-2017
  • (2015)FloSISProceedings of the 2015 USENIX Conference on Usenix Annual Technical Conference10.5555/2813767.2813800(445-457)Online publication date: 8-Jul-2015
  • (2015)MAD: A Middleware Framework for Multi-step Attack Detection2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)10.1109/BADGERS.2015.012(8-15)Online publication date: Nov-2015
  • Show More Cited By

Index Terms

  1. Resource-aware multi-format network security data storage

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    LSAD '06: Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense
    September 2006
    91 pages
    ISBN:1595935711
    DOI:10.1145/1162666
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 September 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. anomaly classification
    2. anomaly detection
    3. darknet
    4. network-wide traffic analysis

    Qualifiers

    • Article

    Conference

    SIGCOMM06
    SIGCOMM06: ACM SIGCOMM 2006 Conference
    September 11 - 15, 2006
    Pisa, Italy

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)46
    • Downloads (Last 6 weeks)9
    Reflects downloads up to 14 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2016)Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and CharacterizationIEEE Communications Surveys & Tutorials10.1109/COMST.2015.249769018:2(1197-1227)Online publication date: Oct-2017
    • (2015)FloSISProceedings of the 2015 USENIX Conference on Usenix Annual Technical Conference10.5555/2813767.2813800(445-457)Online publication date: 8-Jul-2015
    • (2015)MAD: A Middleware Framework for Multi-step Attack Detection2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)10.1109/BADGERS.2015.012(8-15)Online publication date: Nov-2015
    • (2013)Horizon extenderProceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security10.1145/2484313.2484378(499-504)Online publication date: 8-May-2013
    • (2012)Extended Time Machine Design using Reconfigurable Computing for Efficient Recording and Retrieval of Gigabit Network TrafficComputer Engineering10.4018/978-1-61350-456-7.ch313(699-709)Online publication date: 2012
    • (2011)Extended Time Machine Design using Reconfigurable Computing for Efficient Recording and Retrieval of Gigabit Network TrafficCyber Security, Cyber Crime and Cyber Forensics10.4018/978-1-60960-123-2.ch012(168-177)Online publication date: 2011
    • (2010)RRDtraceProceedings of the 2010 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems10.1109/MASCOTS.2010.19(101-110)Online publication date: 17-Aug-2010
    • (2008)Enriching network security analysis with time travelProceedings of the ACM SIGCOMM 2008 conference on Data communication10.1145/1402958.1402980(183-194)Online publication date: 17-Aug-2008
    • (2008)Enriching network security analysis with time travelACM SIGCOMM Computer Communication Review10.1145/1402946.140298038:4(183-194)Online publication date: 17-Aug-2008

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media