Critical information systems strongly rely on event logging techniques to collect data, such as housekeeping/error events, execution traces and dumps of variables, into unstructured text logs. Event logs are the primary source to gain actionable intelligence from production systems. In spite of the recognized importance, system/application logs remain quite underutilized in security analytics when compared to conventional and structured data sources, such as audit traces, network flows and intrusion detection logs. This paper proposes a method to measure the occurrence of interesting activity (i.e., entries that should be followed up by analysts) within textual and heterogeneous runtime log streams. We use an entropy-based approach, which makes no assumptions on the structure of underlying log entries. Measurements have been done in a real-world Air Traffic Control information system through a data analytics framework. Experiments suggest that our entropy-based method represents a valuable complement to security analytics solutions.

Entropy-Based Security Analytics: Measurements from a Critical Information System / Cinque, Marcello; Corte, Raffaele Della; Pecchia, Antonio. - (2017), pp. 379-390. (Intervento presentato al convegno 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017 tenutosi a usa nel 2017) [10.1109/DSN.2017.39].

Entropy-Based Security Analytics: Measurements from a Critical Information System

Cinque, Marcello
;
Corte, Raffaele Della
;
Pecchia, Antonio
2017

Abstract

Critical information systems strongly rely on event logging techniques to collect data, such as housekeeping/error events, execution traces and dumps of variables, into unstructured text logs. Event logs are the primary source to gain actionable intelligence from production systems. In spite of the recognized importance, system/application logs remain quite underutilized in security analytics when compared to conventional and structured data sources, such as audit traces, network flows and intrusion detection logs. This paper proposes a method to measure the occurrence of interesting activity (i.e., entries that should be followed up by analysts) within textual and heterogeneous runtime log streams. We use an entropy-based approach, which makes no assumptions on the structure of underlying log entries. Measurements have been done in a real-world Air Traffic Control information system through a data analytics framework. Experiments suggest that our entropy-based method represents a valuable complement to security analytics solutions.
2017
9781538605417
Entropy-Based Security Analytics: Measurements from a Critical Information System / Cinque, Marcello; Corte, Raffaele Della; Pecchia, Antonio. - (2017), pp. 379-390. (Intervento presentato al convegno 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017 tenutosi a usa nel 2017) [10.1109/DSN.2017.39].
File in questo prodotto:
File Dimensione Formato  
Entropy-Based_Security_Analytics_Measurements_from_a_Critical_Information_System.pdf

solo utenti autorizzati

Tipologia: Versione Editoriale (PDF)
Licenza: Copyright dell'editore
Dimensione 2.05 MB
Formato Adobe PDF
2.05 MB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11588/699466
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 14
  • ???jsp.display-item.citation.isi??? 10
social impact