An efficient and scalable intrusion detection system on logs of distributed applications

  • David Lanoë
  • , Michel Hurfin
  • , Eric Totel
  • , Carlos Maziero

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Although security issues are now addressed during the development process of distributed applications, an attack may still affect the provided services or allow access to confidential data. To detect intrusions, we consider an anomaly detection mechanism which relies on a model of the monitored application’s normal behavior. During a model construction phase, the application is run multiple times to observe some of its correct behaviors. Each gathered trace enables the identification of significant events and their causality relationships, without requiring the existence of a global clock. The constructed model is dual: an automaton plus a list of likely invariants. The redundancy between the two sub-models decreases when generalization techniques are applied on the automaton. Solutions already proposed suffer from scalability issues. In particular, the time needed to build the model is important and its size impacts the duration of the detection phase. The proposed solutions address these problems, while keeping a good accuracy during the detection phase, in terms of false positive and false negative rates. To evaluate them, a real distributed application and several attacks against the service are considered.

Original languageEnglish
Title of host publicationICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings
EditorsGurpreet Dhillon, Fredrik Karlsson, Karin Hedström, André Zúquete
PublisherSpringer New York LLC
Pages49-63
Number of pages15
ISBN (Print)9783030223113
DOIs
Publication statusPublished - 1 Jan 2019
Externally publishedYes
Event34th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2019 - Lisbon, Portugal
Duration: 25 Jun 201927 Jun 2019

Publication series

NameIFIP Advances in Information and Communication Technology
Volume562
ISSN (Print)1868-4238
ISSN (Electronic)1868-422X

Conference

Conference34th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2019
Country/TerritoryPortugal
CityLisbon
Period25/06/1927/06/19

Keywords

  • Anomaly detection
  • Distributed application
  • Models

Fingerprint

Dive into the research topics of 'An efficient and scalable intrusion detection system on logs of distributed applications'. Together they form a unique fingerprint.

Cite this