Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security

被引:5
|
作者
Wurzenberger, Markus [1 ]
Hoeld, Georg [1 ]
Landauer, Max [1 ]
Skopik, Florian [1 ]
机构
[1] AIT Austrian Inst Technol, Giefinggasse 4, A-1210 Vienna, Austria
关键词
Log analysis; Anomaly detection; Intrusion detection; INTRUSION DETECTION SYSTEM; ADVANCED PERSISTENT THREATS; PREDICTION;
D O I
10.1016/j.cose.2023.103631
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Log lines consist of static parts that characterize their structure and enable assignment of event types, and event parameters, i.e., variable parts that provide specific information on system processes, such as host and user names, IP addresses, and file operations. Many detection approaches only focus on anomalous event type occurrences, i.e., they parse log lines to derive unique event identifiers and subsequently detect anomalies in event sequences or event count vectors, but neglect variable parts of log lines entirely during analysis. This is especially problematic, when monitoring strongly structured log data that contains only a small number of distinct event types, for example, logs that consist of strict key value pairs, i.e., parameters that occur consistently throughout all log lines, such as it is case in access and audit logs. Thus, novel approaches are required, which focus on analysis of log lines' variable parts. In this paper, we propose the variable type detector (VTD), a novel unsupervised approach that autonomously analyzes variable log line parts to enable anomaly detection. It assigns data types to each variable, which also include probability distributions for discrete and continuous variables. The VTD raises an alarm if a variable's data type changes. Furthermore, it implements a robust indicator function that reduces false positives by tracking the data type history of each variable and reports only significant data type changes. Additionally, an event indicator enables event-based anomaly detection by taking into account the data types of all variables of a single event type. The evaluation conducted on open-source log data, demonstrates the effectiveness of the VTD compared to conventional anomaly detection approaches, such as time series analysis and PCA. Consequently, the VTD acts as a solution that extends the intrusion detection capabilities of security information and event management (SIEM) and integrates with modern concepts of endpoint detection and response (EDR) and extended detection and responses (XDR), while simultaneously serving as an asset for process monitoring that supports user and entity behavior analytics (UEBA).
引用
收藏
页数:14
相关论文
共 50 条
  • [1] An anomaly detection framework for cyber-security data
    Evangelou, Marina
    Adams, Niall M.
    COMPUTERS & SECURITY, 2020, 97
  • [2] Iterative Selection of Categorical Variables for Log Data Anomaly Detection
    Landauer, Max
    Hoeld, Georg
    Wurzenberger, Markus
    Skopik, Florian
    Rauber, Andreas
    COMPUTER SECURITY - ESORICS 2021, PT I, 2021, 12972 : 757 - 777
  • [3] General purpose data streaming platform for log analysis, anomaly detection and security protection
    Amori, Francesco
    Antonelli, Stefano
    Ciaschini, Vincenzo
    Falabella, Antonio
    Fattibene, Enrico
    Fornari, Federico
    Lattanzio, Daniele
    Michelotto, Diego
    Morganti, Lucia
    26TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS, CHEP 2023, 2024, 295
  • [4] Anomaly Detection and Root Cause Analysis on Log Data
    Pasha, Daem
    Shah, Ali Hussain
    Zadeh, Esmaeil Habib
    Konur, Savas
    ARTIFICIAL INTELLIGENCE XXXIX, AI 2022, 2022, 13652 : 333 - 339
  • [5] Anomaly Detection for Web Log Data Analysis: A Review
    Siwach, Meena
    Mann, Suman
    JOURNAL OF ALGEBRAIC STATISTICS, 2022, 13 (01) : 129 - 148
  • [6] Integrated Anomaly Detection for Cyber Security of the Substations
    Hong, Junho
    Liu, Chen-Ching
    Govindarasu, Manimaran
    IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (04) : 1643 - 1653
  • [7] Integrated Anomaly Detection for Cyber Security of the Substations
    Hong, Junho
    Liu, Chen-Ching
    Govindarasu, Manimaran
    2014 IEEE PES GENERAL MEETING - CONFERENCE & EXPOSITION, 2014,
  • [8] Log Analysis of Cyber Security Training Exercises
    Abbott, Robert G.
    McClain, Jonathan
    Anderson, Benjamin
    Nauer, Kevin
    Silva, Austin
    Forsythe, Chris
    6TH INTERNATIONAL CONFERENCE ON APPLIED HUMAN FACTORS AND ERGONOMICS (AHFE 2015) AND THE AFFILIATED CONFERENCES, AHFE 2015, 2015, 3 : 5088 - 5094
  • [9] Human Interface for Cyber Security Anomaly Detection Systems
    Vollmer, Denis Todd
    Manic, Milos
    HSI: 2009 2ND CONFERENCE ON HUMAN SYSTEM INTERACTIONS, 2009, : 651 - 656
  • [10] Statistical anomaly detection via httpd data analysis
    Naiman, DQ
    COMPUTATIONAL STATISTICS & DATA ANALYSIS, 2004, 45 (01) : 51 - 67