skip to main content
10.1145/2602087.2602111acmotherconferencesArticle/Chapter ViewAbstractPublication PagescisrcConference Proceedingsconference-collections
research-article

Predicting and detecting emerging cyberattack patterns using StreamWorks

Published: 08 April 2014 Publication History

Abstract

The number and sophistication of cyberattacks on industries and governments have dramatically grown in recent years. To counter this movement, new advanced tools and techniques are needed to detect cyberattacks in their early stages such that defensive actions may be taken to avert or mitigate potential damage. From a cybersecurity analysis perspective, detecting cyberattacks may be cast as a problem of identifying patterns in computer network traffic. Logically and intuitively, these patterns may take on the form of a directed graph that conveys how an attack or intrusion propagates through the computers of a network.
We are researching and developing graph-centric approaches and algorithms for dynamic cyberattack detection and packaging them into a streaming network analysis framework we call StreamWorks. With StreamWorks, a scientist or analyst may detect and identify precursor events and patterns as they emerge in complex networks. This analysis framework is intended to be used in a dynamic environment where network data is streamed in and is appended to a large-scale dynamic graph. Specific graphical query patterns are decomposed and collected into a graph query library. The individual decomposed subpatterns in the library are continuously and efficiently matched against the dynamic graph as it evolves to identify and detect early, partial subgraph patterns.

References

[1]
W. Fan, J. Li, J. Luo, Z. Tan, X. Wang, and Y. Wu, "Incremental Graph Pattern Matching," Proc. 2011 ACM SIGMOD International Conference on Management of Data, ACM Press, 2011, pp. 925--936.
[2]
L. Chen and C. Wang, "Continuous Subgraph Pattern Search Over Certain and Uncertain Graph Streams," IEEE Trans. on Know. and Data Eng., vol. 22, no. 8, 2010, pp. 1093--1109.
[3]
A. Godiyal, M. Garland, and J. C. Hart, "Enhancing Network Traffic Visualization by Graph Pattern Analysis," 2010, https://agora.cs.illinois.edu/download/attachments/18744303/netflowpatterngraphs.pdf.
[4]
S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, and D. Zerkle, "GrIDS a Graph Based Intrusion Detection System for Large Networks," Proc. 19th National Information Systems Security Conference, 1996, pp. 1--10.
[5]
S. Ganguly, M. Garofalakis, R. Rastogi, and K. Sabnani, "Streaming Algorithms for Robust, Real-Time Detection of DDoS Attacks," Proc. 27th International Conference on Distributed Computing Systems, IEEE Press, 2007, pp. 1--4.
[6]
S. Venkataraman, D. Song, Phillip B. Gibbons, and A. Blum, "New Streaming Algorithms for Fast Detection of Superspreaders," Proc. 12th ISOC Symposium on Network and Distributed System Security Symposium (SNDSS), IEEE Press, 2005, pp. 21--30.
[7]
Gephi, an Open Source Graph Visualization and Manipulation Software, http://www.gephi.org/.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CISR '14: Proceedings of the 9th Annual Cyber and Information Security Research Conference
April 2014
134 pages
ISBN:9781450328128
DOI:10.1145/2602087
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

  • Los Alamos National Labs: Los Alamos National Labs
  • CEDS: DOE Cybersecurity for Energy Delivery Systems
  • Sandia National Labs: Sandia National Laboratories
  • DOE: Department of Energy
  • Oak Ridge National Laboratory
  • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
  • BERKELEYLAB: Lawrence National Berkeley Laboratory
  • CSL: DOE Cyber Sciences Laboratory
  • Argonne Natl Lab: Argonne National Lab
  • Pacific Northwest National Laboratory
  • TTP: DHS Transition to Practice
  • Nevada National Security Site: Nevada National Security Site

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 April 2014

Check for updates

Author Tags

  1. cyberattack detection
  2. dynamic networks
  3. emerging subgraph patterns
  4. subgraph join tree
  5. subgraph pattern matching

Qualifiers

  • Research-article

Funding Sources

Conference

CISR' '14
Sponsor:
  • Los Alamos National Labs
  • CEDS
  • Sandia National Labs
  • DOE
  • Lawrence Livermore National Lab.
  • BERKELEYLAB
  • CSL
  • Argonne Natl Lab
  • TTP
  • Nevada National Security Site

Acceptance Rates

CISR '14 Paper Acceptance Rate 32 of 50 submissions, 64%;
Overall Acceptance Rate 69 of 136 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media