Advances in Cyber Security Analytics and Decision Systems by Shishir K. Shandilya & Neal Wagner & Atulya K. Nagar
Author:Shishir K. Shandilya & Neal Wagner & Atulya K. Nagar
Language: eng
Format: epub
ISBN: 9783030193539
Publisher: Springer International Publishing
2 The Peculiarities of Event Correlation and Security Assessment
The event correlation allows one to detect security incidents, as well as the chains of security events that led to these incidents. In the chapter we consider the correlation process as a whole, and such its key stages as normalization, aggregation, and directly correlation (other stages, namely, filtering, anonymization and prioritization are out of scope of this chapter), as well as the main methods of data correlation and security data sources.
Existing security management systems usually implement a rule-oriented approach to event processing. The disadvantages of using this approach consist in its complexity and large time costs required to determine the rules manually. In addition, the effectiveness of correlation, when applying this approach, directly depends on the qualification of administrator, who determines the rules.
The data mining is preferable for the efficient security management because it allows correlating unconditional events with minimal manual settings. The approach proposed in the chapter is based on a syntactic and semantic analysis of security events and information. It is designed to implement the process of adaptive data correlation in large-scale heterogeneous uncertain infrastructures.
The uncertainty of an infrastructure is determined by the absence of any previously known information about its architecture, the type of its elements, their characteristics and relationships.
The large scale of the infrastructure is determined by the conditionally unlimited number of information sources and their types. The key feature of the approach is definition of various relationships between the properties of events within the automated adaptation of the correlation process. The result of analysis of the obtained relationships is a type and structural definition of the analyzed infrastructure, or its approximation, including detection of the most stable connections between its elements. In the chapter, we describe the model of uncertain infrastructure and the techniques of correlation of security events and information.
The security assessment task is related to identification, analysis and evaluation of the security risks. The chapter describes our approach to the security assessment based on the Bayesian attack graphs (that represent all possible attack paths in the system and their probabilities) and open security data representation standards, including common platform enumeration standard, common vulnerabilities and exposures standard, and common vulnerability scoring system (CVSS).
We outline advantages and disadvantages of this approach and explain the reasons and advantages of the transition to the approach based on the security data mining. In particular, in the risk analysis scope, the risks should be quantified. This task is divided into the task of calculating impact in case of successful attacks, and the task of calculating the probability of successful attacks.
To calculate possible impact, first of all, it is necessary to determine the assets of information system and calculate their criticality. These tasks are often solved manually by the experts. The manual determination of the infrastructure of information system and its primary and secondary assets is complicated, especially if the infrastructure is constantly changing. Therefore, for its automation, we suggest using the correlation and data mining methods described in the chapter, including
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8317)
Azure Data and AI Architect Handbook by Olivier Mertens & Breght Van Baelen(6901)
Building Statistical Models in Python by Huy Hoang Nguyen & Paul N Adams & Stuart J Miller(6876)
Serverless Machine Learning with Amazon Redshift ML by Debu Panda & Phil Bates & Bhanu Pittampally & Sumeet Joshi(6758)
Data Wrangling on AWS by Navnit Shukla | Sankar M | Sam Palani(6545)
Driving Data Quality with Data Contracts by Andrew Jones(6504)
Machine Learning Model Serving Patterns and Best Practices by Md Johirul Islam(6243)
Learning SQL by Alan Beaulieu(6012)
Weapons of Math Destruction by Cathy O'Neil(5805)
Big Data Analysis with Python by Ivan Marin(5445)
Data Engineering with dbt by Roberto Zagni(4452)
Solidity Programming Essentials by Ritesh Modi(4097)
Time Series Analysis with Python Cookbook by Tarek A. Atwan(3959)
Pandas Cookbook by Theodore Petrou(3664)
Blockchain Basics by Daniel Drescher(3312)
Hands-On Machine Learning for Algorithmic Trading by Stefan Jansen(2919)
Feature Store for Machine Learning by Jayanth Kumar M J(2824)
Learn T-SQL Querying by Pam Lahoud & Pedro Lopes(2809)
Mastering Python for Finance by Unknown(2753)
