Inbook,

A Toolset for Intrusion and Insider Threat Detection

, , , , and .
page 3--31. Springer International Publishing, Cham, (2017)
DOI: 10.1007/978-3-319-59439-2_1

Abstract

Company data are a valuable asset and must be protected against unauthorized access and manipulation. In this contribution, we report on our ongoing work that aims to support IT security experts with identifying novel or obfuscated attacks in company networks, irrespective of their origin inside or outside the company network. A new toolset for anomaly based network intrusion detection is proposed. This toolset uses flow-based data which can be easily retrieved by central network components. We study the challenges of analysing flow-based data streams using data mining algorithms and build an appropriate approach step by step. In contrast to previous work, we collect flow-based data for each host over a certain time window, include the knowledge of domain experts and analyse the data from three different views. We argue that incorporating expert knowledge and previous flows allow us to create more meaningful attributes for subsequent analysis methods. This way, we try to detect novel attacks while simultaneously limiting the number of false positives.

Tags

Users

  • @markus0412
  • @hotho
  • @baywiss1
  • @dmir

Comments and Reviews