Network event classification for security of IT infrastructure

被引:0
|
作者
Arora, Deepali [1 ]
Agathoklis, Panajotis [1 ]
Loftier, Alex [2 ]
机构
[1] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC, Canada
[2] TELUS Commun Inc, CSO, Vancouver, BC, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
IoT; Machine Learning; Event Classification; Classification; Clustering;
D O I
10.1109/WAINA.2018.00085
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The number of devices connected over the Internet are expected to grow tremendously over the next few years. Maintaining secure communications between these network-enabled devices would be a major challenge. By carefully examining the events generated by these devices it is expected to gain some insights into their behavior and identifying if a device has been compromised. One of the major challenges in classifying the events generated by these devices is the inconsistencies in the data formats of these events and the separators between them. The approach presented in this paper is based on identifying and grouping similar events generated by these devices using an Agglomerative Hierarchical Clustering technique. To deal with the inconsistencies of formats and delimiters, some data pre-processing was used. The methodology proposed in this study was successful in identifying events stored in fifteen data files tested for analysis. The results indicate that the combination of text processing techniques in conjunction with machine learning based unsupervised learning offers promising alternatives in separating events generated by the network-enabled devices and, thus, facilitating a better understanding of their behavior and identifying potential security breaches.
引用
收藏
页码:187 / 192
页数:6
相关论文
共 50 条
  • [1] Security in the Network Infrastructure
    不详
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2007, 124 (06): : A22 - A23
  • [2] Network Security Infrastructure Management
    Rojanakul, Kittichote
    Liang, Hu
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2009, : 412 - 415
  • [3] Resilient infrastructure for network security
    Williamson, MM
    COMPLEXITY, 2003, 9 (02) : 34 - 40
  • [4] The deployment of security information and event management in cloud infrastructure
    Holik, Filip
    Horalek, Josef
    Neradova, Sona
    Zitta, Stanislav
    Marik, Ondrej
    2015 25TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA), 2015, : 399 - 404
  • [5] Security information and event management in the cloud computing infrastructure
    Pavlik, Jakub
    Komarek, Ales
    Sobeslav, Vladimir
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS (CINTI), 2014, : 209 - 214
  • [6] DEPLOYMENT AND UPDATE OF A NETWORK'S SECURITY INFRASTRUCTURE
    Gelvez Garcia, Nancy Yaneth
    Florez Viancha, Miguel Andres
    Angulo Morales, Victor Daniel
    REDES DE INGENIERIA-ROMPIENDO LAS BARRERAS DEL CONOCIMIENTO, 2011, 2 (02): : 21 - 31
  • [7] A Survey on the Application of FPGAs for Network Infrastructure Security
    Chen, Hao
    Chen, Yu
    Summerville, Douglas H.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04): : 541 - 561
  • [8] G-CAS: Greedy Algorithm-Based Security Event Correlation System for Critical Infrastructure Network
    Lu, Peng
    Hu, Teng
    Wang, Hao
    Zhang, Ruobin
    Wu, Guo
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [9] An enhanced network intrusion detection system for malicious crawler detection and security event correlations in ubiquitous banking infrastructure
    Eswaran, Sivaraman
    Rani, Vakula
    Daniel, D.
    Ramakrishnan, Jayabrabu
    Selvakumar, Sadhana
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2022, 18 (01) : 59 - 78
  • [10] Neural network classification of aviation personnel as an element of the information and control space for the security of a transport infrastructure object
    Elisov, L. N.
    Ovchenkov, N., I
    Gorbachenko, V., I
    Abramov, I. A.
    II INTERNATIONAL SCIENTIFIC CONFERENCE ON APPLIED PHYSICS, INFORMATION TECHNOLOGIES AND ENGINEERING 25, PTS 1-5, 2020, 1679