Title | Rapid prototyping of flow-based detection methods using complex event processing |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Velan, Petr, Husák, Martin, Tovarňák, Daniel |
Conference Name | NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium |
Keywords | brute force attacks, CEP, Collaboration, complex event processing, computer network security, Databases, detection method, Engines, EPL, ESPER, Event Processing Language, flow-based detection methods, Force, human factors, IP networks, Monitoring, multistage HTTP brute force attack detection, network attacks, network flows, Network security, policy-based governance, pubcrawl, security, SQL, SQL-like syntax, transport protocols, Uniform resource locators |
Abstract | Detection of network attacks is the first step to network security. Many different methods for attack detection were proposed in the past. However, descriptions of these methods are often not complete and it is difficult to verify that the actual implementation matches the description. In this demo paper, we propose to use Complex Event Processing (CEP) for developing detection methods based on network flows. By writing the detection methods in an Event Processing Language (EPL), we can address the above-mentioned problems. The SQL-like syntax of most EPLs is easily readable so the detection method is self-documented. Moreover, it is directly executable in the CEP system, which eliminates inconsistencies between documentation and implementation. The demo will show a running example of a multi-stage HTTP brute force attack detection using Esper and its EPL. |
DOI | 10.1109/NOMS.2018.8406121 |
Citation Key | velan_rapid_2018 |