/
Application of the Complex Event Processing system for anomaly detection and network monitoring Application of the Complex Event Processing system for anomaly detection and network monitoring

Application of the Complex Event Processing system for anomaly detection and network monitoring - PowerPoint Presentation

smith
smith . @smith
Follow
77 views
Uploaded On 2023-12-30

Application of the Complex Event Processing system for anomaly detection and network monitoring - PPT Presentation

Marek Pawłowski Gerard Frankowski Marcin Jerzak Maciej Miłostan Tomasz Nowak Poznań Supercomputing and Networking Center Agenda Introduction System Architecture ID: 1036202

analysis system architecture blocks system analysis blocks architecture anomaly 114 petri clustering network networksgraph learningneural bas attacks agendaintroduction netsmachine

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Application of the Complex Event Process..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

1. Application of the Complex Event Processing system for anomaly detection and network monitoringMarek Pawłowski, Gerard Frankowski, Marcin Jerzak, Maciej Miłostan, Tomasz NowakPoznań Supercomputing and Networking Center

2. AgendaIntroduction System Architecture Blocks of Analysis (BAs)Petri netsMachine learningNeural networksGraph Clustering algorithmsStatistical anomaly detectionWSO22

3. PSNCOperator of Polish NREN – PIONIER and POZMAN networksParticipant of EU-level and national R&D ProjectsR&D activities together with science, education, administration and businessMain areas of interest:New Generation NetworksNew data processing architecturesAdvanced applicationsIoT servicesSecurity of networks and systems3

4. The SECOR ProjectSECOR – Sensor Data Correlation Engine for Attack Detection and Support of the Decision ProcessApplied Research Programme (PBS) of the National Centre for Research and Development (NCBiR)December 2012 – May 2015The Consortium:Military Communication Institute (WIŁ)Poznań Supercomputing and Networking CenterITTI Sp. z o.o.4

5. AgendaIntroduction System Architecture Blocks of Analysis (BAs)Petri netsMachine learningNeural networksGraph Clustering algorithmsStatistical anomaly detectionWSO25

6. System Architecture (1) 6

7. System Architecture (2) 7

8. System Architecture (3)Blocks of Analysis (BAs) BA1: behavioral analysis, Petri netsBA2: machine learningNeural networksGraph clustering algorithmsMachine learningBA3: statistical methods8

9. System Architecture (4) 9

10. System Architecture (5) 10

11. System Architecture (6) 11

12. AgendaIntroduction System Architecture Blocks of Analysis (BAs)Petri netsMachine learningNeural networksGraph Clustering algorithmsStatistical anomaly detectionWSO212

13. Blocks of Analysis – Ontology and Petri nets13Detects: malwareWhich attacks are detected: malware Sensors: Process Monitor (Sysinternals)[system file activity, system registry, process and services activity, network communication]Data: Process Index, Time of Day, Process Name, PID, Operation, Path, Result, Detail

14. AgendaIntroduction System Architecture Blocks of Analysis (BAs)Petri netsMachine learningNeural networksGraph Clustering algorithmsStatistical anomaly detectionWSO214

15. Blocks of Analysis – Machine learning15Detects: anomaly/attacks in network trafficWhich attacks are detected: SQL Injection, XSS, attacks on application layerSensors: SNORT, TCPDump, NGREP, ICD, PHP-IDS, GreenSQL, SCALPData: Transport layer (WWW services connections)Application layer (HTTP protocol)Application layer logs (data in the filesystem) 

16. AgendaIntroduction System Architecture Blocks of Analysis (BAs)Petri netsMachine learningNeural networksGraph Clustering algorithmsStatistical anomaly detectionWSO216

17. Blocks of Analysis – Neural networks (1)17Detects: anomaly/attacks on operating systemWhich attacks are detected: changed code in memory, incorrect activity of replaced binariesSensors: straceData: syscall (system calls)

18. Blocks of Analysis – Neural networks (2)System callsAltered code in memory even if the binaries on disk are left intact Networks trained on genuine binaries 18

19. Blocks of Analysis – Neural networks (3)19

20. AgendaIntroduction System Architecture Blocks of Analysis (BAs)Petri netsMachine learningNeural networksGraph Clustering algorithmsStatistical anomaly detectionWSO220

21. Blocks of Analysis – Graph Clustering algorithms21Detects: malware, network anomaly/attacksWhich attacks are detected: network attacksSensors: network device, system daemons, ntdump, flow-toolData: NetFlow

22. Network flows (NetFlows) – collecting data for graph based modelNetFlow/IPFIX processing general schema22

23. Network flows (NetFlows) – graph representations23

24. Examples of simplified NetFlow graphsDARPA setsHTTP and SSHSMTP24

25. 25Querying the GraphDB – exampleIdentification of services listening on high ports and their clients Cypher query:MATCH (ip:IPclust)-->(s:IPnode)--> (f:Flow {current:true})<--(d:IPnode)WHERE d.port >1024 RETURN DISTINCT ip.ip,d.ip;s.Ip (source IP)d.Ip (dest. IP)172.16.114.168194.27.251.21172.16.114.168197.182.91.233172.16.114.168195.115.218.108172.16.114.50194.27.251.21172.16.114.50197.218.177.69172.16.114.50195.115.218.108172.16.114.50196.37.75.158172.16.114.50195.73.151.50172.16.114.50197.182.91.233172.16.114.50199.174.194.16Table with information only about the host initiating the connection

26. AgendaIntroduction System Architecture Blocks of Analysis (BAs)Petri netsMachine learningNeural networksGraph Clustering algorithmsStatistical anomaly detectionWSO226

27. Blocks of Analysis – Statistical anomaly detection27Detects: network anomalies/attacks, malwareWhich attacks are detected: viruses, action scanners, malware (botnets)Sensors: network device, softflowd, nfcapd Data: src(dst), address(port), flows length, packets, bytes, in(out)-degree

28. AgendaIntroduction System Architecture Blocks of Analysis (BAs)Petri netsMachine learningNeural networksGraph Clustering algorithmsStatistical anomaly detectionWSO228

29. WSO2 (1)The user application is based on the WSO2 systemComprehensive tool for the analysis of event streamsContains useful built-in components, some of which we use in SECOR):CEP systemHigh performance engine to analyze events streaming (Esper or Siddhi) Events monitoring systemWeb-based management applicationConvenient integration with other systems (RESTful HTTP, JMS, SOAP, files and e-mail messages sent as JSON, XML or text messages) 29

30. WSO2 (2)Siddhi Query Language examples:30

31. Questions?Contact information of Security Team in PSNC:marek.pawlowski@man.poznan.pl (Marek Pawłowski)security@man.poznan.plhttp://security.psnc.pl/en 31

32. This work was partially supported by Applied Research Programme (PBS) of the National Centre for Research and Development (NCBiR) funds allocated for the Research Project number PBS1/A3/14/2012 (SECOR).