Anomaly Management using Complex Event Processing. Bastian Hoßbach and Bernhard Seeger



Similar documents
How To Create An Integrated Visualization For A Network Security System (For A Free Download)

Intrusion Detection for Mobile Ad Hoc Networks

CLOUD BASED SEMANTIC EVENT PROCESSING FOR

Building Heavy Load Messaging System

USING COMPLEX EVENT PROCESSING TO MANAGE PATTERNS IN DISTRIBUTION NETWORKS

How To Prevent Hacker Attacks With Network Behavior Analysis

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

SIMATIC IT Value Added Services. Siemens AG All Rights Reserved.

Accelerating Hadoop MapReduce Using an In-Memory Data Grid

Taxonomy of Intrusion Detection System

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION

Enterprise Energy Management with JouleX and Cisco EnergyWise

Middleware support for the Internet of Things

High End Information Security Services

Software as a Service (SaaS) Testing Challenges- An Indepth

CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS

Huawei Network Edge Security Solution

Intrusion Detection Systems

Complex, true real-time analytics on massive, changing datasets.

Supply Chain Optimization for Logistics Service Providers. White Paper

Test Data Management Best Practice

Complex Event Processing (CEP) Why and How. Richard Hallgren BUGS

Applying SDN to Network Management Problems. Nick Feamster University of Maryland

Case Study: Real-time Analytics With Druid. Salil Kalia, Tech Lead, TO THE NEW Digital

The Devils Behind Web Application Vulnerabilities

Smart cyber security for smart cities

Solution Overview. Vitria Technology s Cyber Security Solution

The Power of Risk, Compliance & Security Management in SAP S/4HANA

Security Model for Multi-Tier Web Application by Using Double Guard

A B S T R A C T. Index Terms: DoubleGuard; database server; intruder; web server I INTRODUCTION

WHITE PAPER ON. Operational Analytics. HTC Global Services Inc. Do not copy or distribute.

Emerging Geospatial Trends The Convergence of Technologies. Jim Steiner Vice President, Product Management

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

Complexity and Scalability in Semantic Graph Analysis Semantic Days 2013

THE DEVELOPER GUIDE TO BUILDING STREAMING DATA APPLICATIONS

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Prevention, Detection, Mitigation

Tagetik Extends Customer Value with SQL Server 2012

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation

Network Based Intrusion Detection Using Honey pot Deception

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

TIBCO Cyber Security Platform. Atif Chaughtai

Real-time Big Data Analytics with Storm

Towards a Thriving Data Economy: Open Data, Big Data, and Data Ecosystems

How To Handle Big Data With A Data Scientist

Complete Protection against Evolving DDoS Threats

IBM Security IBM Corporation IBM Corporation

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Open Source DBMS CUBRID 2008 & Community Activities. Byung Joo Chung bjchung@cubrid.com

Cisco Network Foundation Protection Overview

High Performance Data Management Use of Standards in Commercial Product Development

JOB DESCRIPTION DEPARTMENT: JOB TITLE: Senior Data Analyst JOB GRADE: JOB CODE : REPORTS TO: Senior Manager : Supply Chain Centre

How To Prevent An Sql Injection Attack

Internet of Things. Opportunity Challenges Solutions

Business Intelligence meets Big Data: An Overview on Security and Privacy

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus

How to make BIG DATA work for you. Faster results with Microsoft SQL Server PDW

Practical Intrusion Analysis

Cybersecurity Delivering Confidence in the Cyber Domain

IBM Cognos Enterprise: Powerful and scalable business intelligence and performance management

SURVEY OF INTRUSION DETECTION SYSTEM

Big Data-Anwendungsbeispiele aus Industrie und Forschung

Information Security Threats and Strategies. Ted Ericson Product Marketing - ASI

SANS Top 20 Critical Controls for Effective Cyber Defense

Network Security Deployment (NSD)

Introduction. Chapter 1

Anatomy of Cyber Threats, Vulnerabilities, and Attacks

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

White paper. Keys to SAP application acceleration: advances in delivery systems.

An Active Packet can be classified as

STREAM ANALYTIX. Industry s only Multi-Engine Streaming Analytics Platform

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Smarter Transportation Management

Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies

Getting Ahead of Malware

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

National Initiative for Cybersecurity Education

OPEN MODERN DATA ARCHITECTURE FOR FINANCIAL SERVICES RISK MANAGEMENT

Headstrong: SAP Solution Helps Streamline and Accelerate Financial Services Application Development

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Server Consolidation with SQL Server 2008

Hillstone Intelligent Next Generation Firewall

Transcription:

Anomaly Management using Complex Processing Bastian Hoßbach and Bernhard Seeger Int l Conference on Extending Database Technology Genoa, Italy March 19, 2013

Agenda Introduction Enhanced complex event processing Conclusion Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 1

Why Complex Processing? Impact Situation of Interest! Time Reaction Costs Options Benefit In order to be able to react on situations of interest (SOI) optimally, continuous monitoring in (near) real-time is necessary Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 2

State of the Art: Static Complex Processing Static event processing agents () support: Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 3

State of the Art: Static Complex Processing Static event processing agents () support: Signature-based monitoring Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 3

State of the Art: Static Complex Processing Static event processing agents () support: Signature-based monitoring Anomaly-based monitoring Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 3

Motivation What if there are billions of SOI? What if there are unknown SOI? What if there are context-sensitive SOI? Signatures do not work Anomaly management is needed! Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 4

Motivation: Patient Monitoring Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 5

Motivation: Logistics Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 6

Motivation: Cyber Defense Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 7

Flexible, Dynamic and Reactive CEP Infrastructures Input Matchmaker D Model D D D Simulator Output Matchmaker Action Framework Dynamic event processing agents (D) support: Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 8

Flexible, Dynamic and Reactive CEP Infrastructures Input Matchmaker D Model D D D Simulator Output Matchmaker Action Framework Dynamic event processing agents (D) support: Signature-based monitoring Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 8

Flexible, Dynamic and Reactive CEP Infrastructures Input Matchmaker D Model D D D Simulator Output Matchmaker Action Framework Dynamic event processing agents (D) support: Signature-based monitoring Anomaly-based monitoring Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 8

Matchmakers Input Matchmaker Output Matchmaker Flexible routing and transformation of events / independence Changes of event sources do not require adjustments of /sink independence Changes of do not require adjustments of event sinks Inter- independence Changes of do not require adjustments of the other Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 9

Input Matchmaker Output Matchmaker High-performance database to record and index events Optimized for fast writes and scalability Efficient support of temporal queries On-demand secondary indexes Fast garbage collection and compression of tenured events Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 10

Model Input Matchmaker Model Output Matchmaker Management of models that describe normal behavior of monitored objects with respect to a certain context Models are selected, created and maintained on the basis of historical data from the event store Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 11

Dynamic Input Matchmaker D Model D D D Output Matchmaker Models are used to create and maintain dynamic (D) that search for abnormalities in live event streams All detected anomalies are classified as potential situations of interest and forwarded to the output Because of fast and unpredictable context switches and updates of models, D have to be able to be updated fast Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 12

Simulator Input Matchmaker D Model D D D Simulator Output Matchmaker Isolated execution environment for testing, debugging and evaluating D as well as models Real data is taken from the event store What-if analyses and continuous evaluations incrementally increase quality of D Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 13

Action Framework Input Matchmaker D Model D D D Simulator Output Matchmaker Action Framework Current CEP infrastructures are not reactive Detected situations of interest are just reported Reactive CEP infrastructures need an action framework that allows to create actions and to define how they are triggered Provenance becomes very important Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 14

Conclusion State of the art CEP technology has multiple shortcomings Not applicable in some important application domains Many existing CEP-based monitoring systems can not develop their full potential CEP technology has to be improved and extended Flexibility Matchmakers Dynamics Dynamic Reactivity Action Framework Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 15

Ongoing Work We are working on the outlined dynamic CEP infrastructure Target use-case: IT-security Detection of SQL injections Detection of intruders in post-exploitation phase Other active research projects are related to dynamic CEP Active CEP Semantic CEP Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 16

Thanks Dieter Gawlick for great discussions BMBF for funding ACCEPT Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 17