Detecting Periodic Subsequences in Cyber Security Data
Title | Detecting Periodic Subsequences in Cyber Security Data |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Price-Williams, M., Heard, N., Turcotte, M. |
Conference Name | 2017 European Intelligence and Security Informatics Conference (EISIC) |
Keywords | anomaly detection, authentication, automated network events, changepoint detection framework, Computational modeling, computer network behaviour, computer network security, computer networks, cyber security data, cyber-security defence, Data models, data sets, digital signatures, identifyingautomated network events, invasive software, Los Alamos National Laboratory's enterprise computer network, maximum likelihood estimation, probability, probability models, pubcrawl, resilience, Resiliency, Scalability, signature based defense, statistical analysis, traditional signature-based detection systems |
Abstract | Anomaly detection for cyber-security defence hasgarnered much attention in recent years providing an orthogonalapproach to traditional signature-based detection systems.Anomaly detection relies on building probability models ofnormal computer network behaviour and detecting deviationsfrom the model. Most data sets used for cyber-security havea mix of user-driven events and automated network events,which most often appears as polling behaviour. Separating theseautomated events from those caused by human activity is essentialto building good statistical models for anomaly detection. This articlepresents a changepoint detection framework for identifyingautomated network events appearing as periodic subsequences ofevent times. The opening event of each subsequence is interpretedas a human action which then generates an automated, periodicprocess. Difficulties arising from the presence of duplicate andmissing data are addressed. The methodology is demonstrated usingauthentication data from Los Alamos National Laboratory'senterprise computer network. |
URL | https://ieeexplore.ieee.org/document/8240773 |
DOI | 10.1109/EISIC.2017.40 |
Citation Key | price-williams_detecting_2017 |
- identifyingautomated network events
- traditional signature-based detection systems
- statistical analysis
- signature based defense
- Scalability
- Resiliency
- resilience
- pubcrawl
- probability models
- probability
- maximum likelihood estimation
- Los Alamos National Laboratory's enterprise computer network
- invasive software
- Anomaly Detection
- digital signatures
- data sets
- Data models
- cyber-security defence
- cyber security data
- computer networks
- computer network security
- computer network behaviour
- Computational modeling
- changepoint detection framework
- automated network events
- authentication