Visible to the public Provenance-aware security risk analysis for hosts and network flows

TitleProvenance-aware security risk analysis for hosts and network flows
Publication TypeConference Paper
Year of Publication2014
AuthorsRezvani, M., Ignjatovic, A., Bertino, E., Jha, S.
Conference NameNetwork Operations and Management Symposium (NOMS), 2014 IEEE
Date PublishedMay
KeywordsComputational modeling, computer network security, deep packet inspection, Educational institutions, high risk hosts, high risk network flows, Iterative methods, Monitoring, Ports (Computers), provenance aware security risk analysis, risk analysis, risk management, risk score, security
Abstract

Detection of high risk network flows and high risk hosts is becoming ever more important and more challenging. In order to selectively apply deep packet inspection (DPI) one has to isolate in real time high risk network activities within a huge number of monitored network flows. To help address this problem, we propose an iterative methodology for a simultaneous assessment of risk scores for both hosts and network flows. The proposed approach measures the risk scores of hosts and flows in an interdependent manner; thus, the risk score of a flow influences the risk score of its source and destination hosts, and also the risk score of a host is evaluated by taking into account the risk scores of flows initiated by or terminated at the host. Our experimental results show that such an approach not only effective in detecting high risk hosts and flows but, when deployed in high throughput networks, is also more efficient than PageRank based algorithms.

URLhttps://ieeexplore.ieee.org/document/6838250
DOI10.1109/NOMS.2014.6838250
Citation Key6838250