Interdependent Security Risk Analysis of Hosts and Flows

作者: Mohsen Rezvani , Verica Sekulic , Aleksandar Ignjatovic , Elisa Bertino , Sanjay Jha

DOI: 10.1109/TIFS.2015.2455414

关键词:

摘要: Detection of high risk hosts and flows continues to be a significant problem in security monitoring throughput networks. A comprehensive assessment method should consider the propagation among risky flows. In this paper, is achieved by introducing two novel concepts. First, an interdependency relationship scores network flow its source destination hosts. On one hand, score host depends on initiated or terminated at host. other Second, which we call provenance, represents considers likelihood that particular caused Based these concepts, develop iterative algorithm for computing We give rigorous proof our rapidly converges unique estimates, provide extensive empirical evaluation using real-world data sets. Our shows effective detecting sufficiently efficient deployed

参考文章(18)
Amir Houmansadr, Nikita Borisov, The Need for Flow Fingerprints to Link Correlated Network Flows Privacy Enhancing Technologies. pp. 205- 224 ,(2013) , 10.1007/978-3-642-39077-7_11
Paramvir Bahl, Z. Morley Mao, Xu Chen, Ming Zhang, Automating network application dependency discovery: experiences, limitations, and new solutions operating systems design and implementation. pp. 117- 130 ,(2008) , 10.5555/1855741.1855750
Ali Zand, Giovanni Vigna, Richard Kemmerer, Christopher Kruegel, Rippler: Delay Injection for Service Dependency Detection international conference on computer communications. pp. 2157- 2165 ,(2014) , 10.1109/INFOCOM.2014.6848158
Hyo-Sang Lim, Yang-Sae Moon, Elisa Bertino, Provenance-based trustworthiness assessment in sensor networks Proceedings of the Seventh International Workshop on Data Management for Sensor Networks - DMSN '10. pp. 2- 7 ,(2010) , 10.1145/1858158.1858162
Baris Coskun, Sven Dietrich, Nasir Memon, Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts annual computer security applications conference. pp. 131- 140 ,(2010) , 10.1145/1920261.1920283
Kevin M. Carter, Nwokedi Idika, William W. Streilein, Probabilistic Threat Propagation for Network Security IEEE Transactions on Information Forensics and Security. ,vol. 9, pp. 1394- 1405 ,(2014) , 10.1109/TIFS.2014.2334272
Nan Feng, Minqiang Li, An information systems security risk assessment model under uncertain environment soft computing. ,vol. 11, pp. 4332- 4340 ,(2011) , 10.1016/J.ASOC.2010.06.005
Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay Jha, Provenance-aware security risk analysis for hosts and network flows 2014 IEEE Network Operations and Management Symposium (NOMS). pp. 1- 8 ,(2014) , 10.1109/NOMS.2014.6838250