Rapid Prototyping of Flow-Based Detection Methods Using Complex Event Processing

Varování

Publikace nespadá pod Ekonomicko-správní fakultu, ale pod Ústav výpočetní techniky. Oficiální stránka publikace je na webu muni.cz.
Autoři

VELAN Petr HUSÁK Martin TOVARŇÁK Daniel

Rok publikování 2018
Druh Článek ve sborníku
Konference NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium
Fakulta / Pracoviště MU

Ústav výpočetní techniky

Citace
www https://ieeexplore.ieee.org/document/8406121
Doi http://dx.doi.org/10.1109/NOMS.2018.8406121
Klíčová slova Databases;Engines;Force;IP networks;Monitoring;Security;Uniform resource locators
Přiložené soubory
Popis Detection of network attacks is the first step to network security. Many different methods for attack detection were proposed in the past. However, descriptions of these methods are often not complete and it is difficult to verify that the actual implementation matches the description. In this demo paper, we propose to use Complex Event Processing (CEP) for developing detection methods based on network flows. By writing the detection methods in an Event Processing Language (EPL), we can address the above-mentioned problems. The SQL-like syntax of most EPLs is easily readable so the detection method is self-documented. Moreover, it is directly executable in the CEP system, which eliminates inconsistencies between documentation and implementation. The demo will show a running example of a multi-stage HTTP brute force attack detection using Esper and its EPL.
Související projekty:

Používáte starou verzi internetového prohlížeče. Doporučujeme aktualizovat Váš prohlížeč na nejnovější verzi.