Presentation | 2004/2/26 Modeling Techniques about Statistical Theory of Attack Events Keisuke TAKEMORI, Yutaka MIYAKE, Toshiaki TANAKA, Iwao SASASE, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Recently, many security threats affect network systems. Security operation centers (SOC) are established against cyber-terrorisms, which monitor network traffics by using intrusion detection systems (IDS). Anomaly events caused by worms and viruses are identified by the SOC operators. But subjective alarms are not reliable enough. In this research, we collect plenty number of IDS logs and propose modeling techniques about attack events. We consider three attack parameters, event counts, event arrival ratio and event vast length, which indicate anomaly issues. Experimental results with some audit data show that the event counts can be modeled into Poisson distribution, arrival ratio and event length can be modeled into Exponential distribution. The SOC reports will be more reliable by the modeling techniques. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Cyber-terrorism / IDS Log / Anomaly Detection / Attack Traffic |
Paper # | NS2003-286,IN2003-241 |
Date of Issue |
Conference Information | |
Committee | NS |
---|---|
Conference Date | 2004/2/26(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Network Systems(NS) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Modeling Techniques about Statistical Theory of Attack Events |
Sub Title (in English) | |
Keyword(1) | Cyber-terrorism |
Keyword(2) | IDS Log |
Keyword(3) | Anomaly Detection |
Keyword(4) | Attack Traffic |
1st Author's Name | Keisuke TAKEMORI |
1st Author's Affiliation | Dept. of Info.& Computer Science, Keio University:KDDI R&D Laboratories Inc.() |
2nd Author's Name | Yutaka MIYAKE |
2nd Author's Affiliation | KDDI R&D Laboratories Inc. |
3rd Author's Name | Toshiaki TANAKA |
3rd Author's Affiliation | KDDI R&D Laboratories Inc. |
4th Author's Name | Iwao SASASE |
4th Author's Affiliation | Dept. of Info.& Computer Science, Keio University |
Date | 2004/2/26 |
Paper # | NS2003-286,IN2003-241 |
Volume (vol) | vol.103 |
Number (no) | 689 |
Page | pp.pp.- |
#Pages | 4 |
Date of Issue |