Rapid Prototyping of Flow-Based Detection Methods Using Complex Event Processing
Autoři | |
---|---|
Rok publikování | 2018 |
Druh | Článek ve sborníku |
Konference | NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium |
Fakulta / Pracoviště MU | |
Citace | |
www | https://ieeexplore.ieee.org/document/8406121 |
Doi | http://dx.doi.org/10.1109/NOMS.2018.8406121 |
Klíčová slova | Databases;Engines;Force;IP networks;Monitoring;Security;Uniform resource locators |
Přiložené soubory | |
Popis | Detection of network attacks is the first step to network security. Many different methods for attack detection were proposed in the past. However, descriptions of these methods are often not complete and it is difficult to verify that the actual implementation matches the description. In this demo paper, we propose to use Complex Event Processing (CEP) for developing detection methods based on network flows. By writing the detection methods in an Event Processing Language (EPL), we can address the above-mentioned problems. The SQL-like syntax of most EPLs is easily readable so the detection method is self-documented. Moreover, it is directly executable in the CEP system, which eliminates inconsistencies between documentation and implementation. The demo will show a running example of a multi-stage HTTP brute force attack detection using Esper and its EPL. |
Související projekty: |