Visible to the public Entropy-Based Security Analytics: Measurements from a Critical Information System

TitleEntropy-Based Security Analytics: Measurements from a Critical Information System
Publication TypeConference Paper
Year of Publication2017
AuthorsCinque, M., Corte, R. D., Pecchia, A.
Conference Name2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
KeywordsAir traffic control, composability, critical information system, data analytics framework, data mining, Databases, entropy-based security analytics, Event logging, Filtering, Human Behavior, human factors, Information systems, Intrusion detection, log analytics, Metrics, Operating systems, pubcrawl, real-world air traffic control information system, Runtime, Scalability, security, security of data, text analytics
Abstract

Critical information systems strongly rely on event logging techniques to collect data, such as housekeeping/error events, execution traces and dumps of variables, into unstructured text logs. Event logs are the primary source to gain actionable intelligence from production systems. In spite of the recognized importance, system/application logs remain quite underutilized in security analytics when compared to conventional and structured data sources, such as audit traces, network flows and intrusion detection logs. This paper proposes a method to measure the occurrence of interesting activity (i.e., entries that should be followed up by analysts) within textual and heterogeneous runtime log streams. We use an entropy-based approach, which makes no assumptions on the structure of underlying log entries. Measurements have been done in a real-world Air Traffic Control information system through a data analytics framework. Experiments suggest that our entropy-based method represents a valuable complement to security analytics solutions.

URLhttp://ieeexplore.ieee.org/document/8023138/
DOI10.1109/DSN.2017.39
Citation Keycinque_entropy-based_2017