Rapid Prototyping of Flow-Based Detection Methods Using Complex Event Processing

Warning

This publication doesn't include Faculty of Economics and Administration. It includes Institute of Computer Science. Official publication website can be found on muni.cz.
Authors

VELAN Petr HUSÁK Martin TOVARŇÁK Daniel

Year of publication 2018
Type Article in Proceedings
Conference NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium
MU Faculty or unit

Institute of Computer Science

Citation
Web https://ieeexplore.ieee.org/document/8406121
Doi http://dx.doi.org/10.1109/NOMS.2018.8406121
Keywords Databases;Engines;Force;IP networks;Monitoring;Security;Uniform resource locators
Attached files
Description Detection of network attacks is the first step to network security. Many different methods for attack detection were proposed in the past. However, descriptions of these methods are often not complete and it is difficult to verify that the actual implementation matches the description. In this demo paper, we propose to use Complex Event Processing (CEP) for developing detection methods based on network flows. By writing the detection methods in an Event Processing Language (EPL), we can address the above-mentioned problems. The SQL-like syntax of most EPLs is easily readable so the detection method is self-documented. Moreover, it is directly executable in the CEP system, which eliminates inconsistencies between documentation and implementation. The demo will show a running example of a multi-stage HTTP brute force attack detection using Esper and its EPL.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.