Provenance-aware security risk analysis for hosts and network flows
Title | Provenance-aware security risk analysis for hosts and network flows |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Rezvani, M., Ignjatovic, A., Bertino, E., Jha, S. |
Conference Name | Network Operations and Management Symposium (NOMS), 2014 IEEE |
Date Published | May |
Keywords | Computational modeling, computer network security, deep packet inspection, Educational institutions, high risk hosts, high risk network flows, Iterative methods, Monitoring, Ports (Computers), provenance aware security risk analysis, risk analysis, risk management, risk score, security |
Abstract | Detection of high risk network flows and high risk hosts is becoming ever more important and more challenging. In order to selectively apply deep packet inspection (DPI) one has to isolate in real time high risk network activities within a huge number of monitored network flows. To help address this problem, we propose an iterative methodology for a simultaneous assessment of risk scores for both hosts and network flows. The proposed approach measures the risk scores of hosts and flows in an interdependent manner; thus, the risk score of a flow influences the risk score of its source and destination hosts, and also the risk score of a host is evaluated by taking into account the risk scores of flows initiated by or terminated at the host. Our experimental results show that such an approach not only effective in detecting high risk hosts and flows but, when deployed in high throughput networks, is also more efficient than PageRank based algorithms. |
URL | https://ieeexplore.ieee.org/document/6838250 |
DOI | 10.1109/NOMS.2014.6838250 |
Citation Key | 6838250 |