Event stream database based architecture to detect network intrusion: (industry article)

  • Authors:
  • Vikram Kumaran

  • Affiliations:
  • Cisco Systems, Inc., RTP, NC, USA

  • Venue:
  • Proceedings of the 7th ACM international conference on Distributed event-based systems
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a novel network intrusion detection architecture built on a real-time streaming database platform. The architecture addresses both misuse and anomaly detection and is built to handle the high data volume, velocity and variety of traffic seen in enterprise networks through the use of in-memory stream processing. Traditional intrusion pattern detection systems look at the internal attributes of individual events to determine malicious intent; our architecture supports and extends that paradigm by adding the ability to detect both malicious and anomalous intrusion patterns in multi-step event sequences. The approach uses context based stream partitioning to minimize noise in input streams. The solution employs event labeling to reduce dimensionality and manage complexity of raw input streams. The architecture allows for aggregating alerts from an ensemble of detectors to provide a more reliable result by minimizing false positives. Furthermore, it allows domain experts to define high-level rules to filter trivial alerts. In this publication we will present the internals our architecture, its merits, along with a detailed description of our reference implementation.