Entropy-Based Security Analytics: Measurements from a Critical Information System
Title | Entropy-Based Security Analytics: Measurements from a Critical Information System |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Cinque, M., Corte, R. D., Pecchia, A. |
Conference Name | 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) |
Keywords | Air traffic control, composability, critical information system, data analytics framework, data mining, Databases, entropy-based security analytics, Event logging, Filtering, Human Behavior, human factors, Information systems, Intrusion detection, log analytics, Metrics, Operating systems, pubcrawl, real-world air traffic control information system, Runtime, Scalability, security, security of data, text analytics |
Abstract | Critical information systems strongly rely on event logging techniques to collect data, such as housekeeping/error events, execution traces and dumps of variables, into unstructured text logs. Event logs are the primary source to gain actionable intelligence from production systems. In spite of the recognized importance, system/application logs remain quite underutilized in security analytics when compared to conventional and structured data sources, such as audit traces, network flows and intrusion detection logs. This paper proposes a method to measure the occurrence of interesting activity (i.e., entries that should be followed up by analysts) within textual and heterogeneous runtime log streams. We use an entropy-based approach, which makes no assumptions on the structure of underlying log entries. Measurements have been done in a real-world Air Traffic Control information system through a data analytics framework. Experiments suggest that our entropy-based method represents a valuable complement to security analytics solutions. |
URL | http://ieeexplore.ieee.org/document/8023138/ |
DOI | 10.1109/DSN.2017.39 |
Citation Key | cinque_entropy-based_2017 |
- Information systems
- text analytics
- security of data
- security
- Scalability
- Runtime
- real-world air traffic control information system
- pubcrawl
- operating systems
- Metrics
- log analytics
- Intrusion Detection
- air traffic control
- Human Factors
- Human behavior
- Filtering
- Event logging
- entropy-based security analytics
- Databases
- Data mining
- data analytics framework
- critical information system
- composability