skip to main content
10.1145/2602087.2602111acmotherconferencesArticle/Chapter ViewAbstractPublication PagescisrcConference Proceedingsconference-collections
research-article

Predicting and detecting emerging cyberattack patterns using StreamWorks

Published:08 April 2014Publication History

ABSTRACT

The number and sophistication of cyberattacks on industries and governments have dramatically grown in recent years. To counter this movement, new advanced tools and techniques are needed to detect cyberattacks in their early stages such that defensive actions may be taken to avert or mitigate potential damage. From a cybersecurity analysis perspective, detecting cyberattacks may be cast as a problem of identifying patterns in computer network traffic. Logically and intuitively, these patterns may take on the form of a directed graph that conveys how an attack or intrusion propagates through the computers of a network.

We are researching and developing graph-centric approaches and algorithms for dynamic cyberattack detection and packaging them into a streaming network analysis framework we call StreamWorks. With StreamWorks, a scientist or analyst may detect and identify precursor events and patterns as they emerge in complex networks. This analysis framework is intended to be used in a dynamic environment where network data is streamed in and is appended to a large-scale dynamic graph. Specific graphical query patterns are decomposed and collected into a graph query library. The individual decomposed subpatterns in the library are continuously and efficiently matched against the dynamic graph as it evolves to identify and detect early, partial subgraph patterns.

References

  1. W. Fan, J. Li, J. Luo, Z. Tan, X. Wang, and Y. Wu, "Incremental Graph Pattern Matching," Proc. 2011 ACM SIGMOD International Conference on Management of Data, ACM Press, 2011, pp. 925--936. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. Chen and C. Wang, "Continuous Subgraph Pattern Search Over Certain and Uncertain Graph Streams," IEEE Trans. on Know. and Data Eng., vol. 22, no. 8, 2010, pp. 1093--1109. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Godiyal, M. Garland, and J. C. Hart, "Enhancing Network Traffic Visualization by Graph Pattern Analysis," 2010, https://agora.cs.illinois.edu/download/attachments/18744303/netflowpatterngraphs.pdf.Google ScholarGoogle Scholar
  4. S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, and D. Zerkle, "GrIDS a Graph Based Intrusion Detection System for Large Networks," Proc. 19th National Information Systems Security Conference, 1996, pp. 1--10.Google ScholarGoogle Scholar
  5. S. Ganguly, M. Garofalakis, R. Rastogi, and K. Sabnani, "Streaming Algorithms for Robust, Real-Time Detection of DDoS Attacks," Proc. 27th International Conference on Distributed Computing Systems, IEEE Press, 2007, pp. 1--4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Venkataraman, D. Song, Phillip B. Gibbons, and A. Blum, "New Streaming Algorithms for Fast Detection of Superspreaders," Proc. 12th ISOC Symposium on Network and Distributed System Security Symposium (SNDSS), IEEE Press, 2005, pp. 21--30.Google ScholarGoogle Scholar
  7. Gephi, an Open Source Graph Visualization and Manipulation Software, http://www.gephi.org/.Google ScholarGoogle Scholar

Index Terms

  1. Predicting and detecting emerging cyberattack patterns using StreamWorks

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                CISR '14: Proceedings of the 9th Annual Cyber and Information Security Research Conference
                April 2014
                134 pages
                ISBN:9781450328128
                DOI:10.1145/2602087

                Copyright © 2014 Owner/Author

                Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 8 April 2014

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                CISR '14 Paper Acceptance Rate32of50submissions,64%Overall Acceptance Rate69of136submissions,51%
              • Article Metrics

                • Downloads (Last 12 months)16
                • Downloads (Last 6 weeks)9

                Other Metrics

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader