Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks

T. Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William K. Robertson, A. Juels, E. Kirda
{"title":"Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks","authors":"T. Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William K. Robertson, A. Juels, E. Kirda","doi":"10.1145/2523649.2523670","DOIUrl":null,"url":null,"abstract":"As more and more Internet-based attacks arise, organizations are responding by deploying an assortment of security products that generate situational intelligence in the form of logs. These logs often contain high volumes of interesting and useful information about activities in the network, and are among the first data sources that information security specialists consult when they suspect that an attack has taken place. However, security products often come from a patchwork of vendors, and are inconsistently installed and administered. They generate logs whose formats differ widely and that are often incomplete, mutually contradictory, and very large in volume. Hence, although this collected information is useful, it is often dirty. We present a novel system, Beehive, that attacks the problem of automatically mining and extracting knowledge from the dirty log data produced by a wide variety of security products in a large enterprise. We improve on signature-based approaches to detecting security incidents and instead identify suspicious host behaviors that Beehive reports as potential security incidents. These incidents can then be further analyzed by incident response teams to determine whether a policy violation or attack has occurred. We have evaluated Beehive on the log data collected in a large enterprise, EMC, over a period of two weeks. We compare the incidents identified by Beehive against enterprise Security Operations Center reports, antivirus software alerts, and feedback from enterprise security specialists. We show that Beehive is able to identify malicious events and policy violations which would otherwise go undetected.","PeriodicalId":127404,"journal":{"name":"Proceedings of the 29th Annual Computer Security Applications Conference","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"260","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 29th Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2523649.2523670","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 260

Abstract

As more and more Internet-based attacks arise, organizations are responding by deploying an assortment of security products that generate situational intelligence in the form of logs. These logs often contain high volumes of interesting and useful information about activities in the network, and are among the first data sources that information security specialists consult when they suspect that an attack has taken place. However, security products often come from a patchwork of vendors, and are inconsistently installed and administered. They generate logs whose formats differ widely and that are often incomplete, mutually contradictory, and very large in volume. Hence, although this collected information is useful, it is often dirty. We present a novel system, Beehive, that attacks the problem of automatically mining and extracting knowledge from the dirty log data produced by a wide variety of security products in a large enterprise. We improve on signature-based approaches to detecting security incidents and instead identify suspicious host behaviors that Beehive reports as potential security incidents. These incidents can then be further analyzed by incident response teams to determine whether a policy violation or attack has occurred. We have evaluated Beehive on the log data collected in a large enterprise, EMC, over a period of two weeks. We compare the incidents identified by Beehive against enterprise Security Operations Center reports, antivirus software alerts, and feedback from enterprise security specialists. We show that Beehive is able to identify malicious events and policy violations which would otherwise go undetected.
Beehive:大规模日志分析,用于检测企业网络中的可疑活动
随着越来越多的基于internet的攻击出现,组织通过部署各种安全产品来响应,这些产品以日志的形式生成态势情报。这些日志通常包含大量关于网络活动的有趣和有用的信息,并且是信息安全专家在怀疑发生攻击时首先咨询的数据源之一。但是,安全产品通常来自多个供应商,并且安装和管理不一致。它们生成的日志格式差异很大,而且往往是不完整的、相互矛盾的,而且容量非常大。因此,尽管收集到的信息是有用的,但它通常是不干净的。我们提出了一个新颖的系统Beehive,它解决了大型企业中各种安全产品产生的脏日志数据中自动挖掘和提取知识的问题。我们改进了基于签名的方法来检测安全事件,而不是识别Beehive报告为潜在安全事件的可疑主机行为。然后,事件响应团队可以进一步分析这些事件,以确定是否发生了策略违反或攻击。我们在一家大型企业EMC收集的日志数据上对Beehive进行了两周的评估。我们将Beehive识别的事件与企业安全运营中心报告、防病毒软件警报和企业安全专家的反馈进行比较。我们证明Beehive能够识别恶意事件和违反政策的行为,否则这些行为将无法被发现。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信