Rapid Prototyping of Flow-Based Detection Methods Using Complex Event Processing
Authors | |
---|---|
Year of publication | 2018 |
Type | Article in Proceedings |
Conference | NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium |
MU Faculty or unit | |
Citation | |
Web | https://ieeexplore.ieee.org/document/8406121 |
Doi | http://dx.doi.org/10.1109/NOMS.2018.8406121 |
Keywords | Databases;Engines;Force;IP networks;Monitoring;Security;Uniform resource locators |
Attached files | |
Description | Detection of network attacks is the first step to network security. Many different methods for attack detection were proposed in the past. However, descriptions of these methods are often not complete and it is difficult to verify that the actual implementation matches the description. In this demo paper, we propose to use Complex Event Processing (CEP) for developing detection methods based on network flows. By writing the detection methods in an Event Processing Language (EPL), we can address the above-mentioned problems. The SQL-like syntax of most EPLs is easily readable so the detection method is self-documented. Moreover, it is directly executable in the CEP system, which eliminates inconsistencies between documentation and implementation. The demo will show a running example of a multi-stage HTTP brute force attack detection using Esper and its EPL. |
Related projects: |