Making Flow-Based Security Detection Parallel

Abstract : Flow based monitoring is currently a standard approach suitable for large networks of ISP size. The main advantage of flow processing is a smaller amount of data due to aggregation. There are many reasons (such as huge volume of transferred data, attacks represented by many flow records) to develop scalable systems that can process flow data in parallel. This paper deals with splitting a stream of flow data in order to perform parallel anomaly detection on distributed computational nodes. Flow data distribution is focused not only on uniformity but mainly on successful detection. The results of an experimental analysis show that the proposed approach does not break important semantic relations between individual flow records and therefore it preserves detection results. All experiments were performed using real data traces from Czech National Education and Research Network.
Complete list of metadatas

Cited literature [13 references]  Display  Hide  Download

https://hal.inria.fr/hal-01806062
Contributor : Hal Ifip <>
Submitted on : Friday, June 1, 2018 - 4:01:15 PM
Last modification on : Friday, June 1, 2018 - 4:03:04 PM
Long-term archiving on: Sunday, September 2, 2018 - 4:41:48 PM

File

 Restricted access
To satisfy the distribution rights of the publisher, the document is embargoed until : 2020-01-01

Please log in to resquest access to the document

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Marek Švepeš, Tomáš Čejka. Making Flow-Based Security Detection Parallel. 11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.3-15, ⟨10.1007/978-3-319-60774-0_1⟩. ⟨hal-01806062⟩

Share

Metrics

Record views

58