Network event classification for security of IT infrastructure

被引:0
|
作者
Arora, Deepali [1 ]
Agathoklis, Panajotis [1 ]
Loftier, Alex [2 ]
机构
[1] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC, Canada
[2] TELUS Commun Inc, CSO, Vancouver, BC, Canada
来源
2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA) | 2018年
基金
加拿大自然科学与工程研究理事会;
关键词
IoT; Machine Learning; Event Classification; Classification; Clustering;
D O I
10.1109/WAINA.2018.00085
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The number of devices connected over the Internet are expected to grow tremendously over the next few years. Maintaining secure communications between these network-enabled devices would be a major challenge. By carefully examining the events generated by these devices it is expected to gain some insights into their behavior and identifying if a device has been compromised. One of the major challenges in classifying the events generated by these devices is the inconsistencies in the data formats of these events and the separators between them. The approach presented in this paper is based on identifying and grouping similar events generated by these devices using an Agglomerative Hierarchical Clustering technique. To deal with the inconsistencies of formats and delimiters, some data pre-processing was used. The methodology proposed in this study was successful in identifying events stored in fifteen data files tested for analysis. The results indicate that the combination of text processing techniques in conjunction with machine learning based unsupervised learning offers promising alternatives in separating events generated by the network-enabled devices and, thus, facilitating a better understanding of their behavior and identifying potential security breaches.
引用
收藏
页码:187 / 192
页数:6
相关论文
共 50 条
  • [21] Building security-aware applications on Celestial network security management infrastructure
    Xu, C
    Gong, FM
    Baldin, I
    Han, L
    Qin, XZ
    IC'2000: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, 2000, : 219 - 225
  • [22] IoT Event Classification Based on Network Traffic
    Charyyev, Batyr
    Gunes, Mehmet Hadi
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 854 - 859
  • [23] Event Extraction and Classification by Neural Network Model
    Ceesay, Bamfa
    Hou, Wen-Juan
    TRENDS IN APPLIED KNOWLEDGE-BASED SYSTEMS AND DATA SCIENCE, 2016, 9799 : 229 - 241
  • [24] State Based Network Isolation for Critical Infrastructure Systems Security
    Conklin, Wm. Arthur
    2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2015, : 2280 - 2287
  • [25] Analysis and Recommendations for Network and Communication Security for Mission Critical Infrastructure
    Roy, Sudipto
    Nene, Manisha J.
    2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,
  • [26] SECURITY OF INFRASTRUCTURE MODE OF IEEE 802.11 WIRELESS NETWORK STANDARD
    Skendzic, Aleksandar
    ZBORNIK VELEUCILISTA U RIJECI-JOURNAL OF THE POLYTECHNICS OF RIJEKA, 2014, 2 (01): : 163 - 175
  • [27] Design of sensor network for the security infrastructure of electric power system
    Huang, Qi
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 903 - 906
  • [28] Network-Centric Violence, Critical Infrastructure and the Urbanization of Security
    Coward, Martin
    SECURITY DIALOGUE, 2009, 40 (4-5) : 399 - 418
  • [29] Smart seismic network for shallow subsurface imaging and infrastructure security
    Valero, Maria
    Li, Fangyu
    Song, WenZhan
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2019, 31 (01) : 10 - 23
  • [30] Usable Security Management for Network Access Rules of Critical Infrastructure
    Yun, Jeong-Han
    Choi, Seungoh
    Kim, Woonyon
    Kang, Hwasun
    Kim, Sung-Woo
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017), 2017, 10292 : 432 - 447