Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Monitoring for Network Protocols and Applications

Similar presentations


Presentation on theme: "Security Monitoring for Network Protocols and Applications"— Presentation transcript:

1 Security Monitoring for Network Protocols and Applications
Vinh Hoa LA Ɨ Prof. Ana CAVALLI Ɨ Ƭ PhD Student Supervisor Ɨ Telecom SudParis, IMT Ƭ Montimage France 11/21/2018

2 Context Cyber-security: emerging topic Network/System/Application
Cyber attacks/crime: growing in both volume and sophistication Two directions: Secure Design Security Testing Network/System/Application Security Monitoring Heterogeneous (Signature-based + Anomaly-based) approach Novel advanced techniques: Statistical Learning Machine Learning Nearly 1 million new malware threats released every day Total cost of cyber-crime in recent three years 11/21/2018 TAROT 2016

3 Security Monitoring Framework
Framework Overview: Signature-based approach Anomaly-based approach Network Data Capture Data Processing (Attribute Extraction, Dimension Reduction) Learning/Training Phase Conclusion Traffic Trace Logs Misbehavior signature Normal behaviors System Dimension Reduction: RP (random projection), PCA (principal component analysis), DM (diffusion map) LDA (linear discriminant analysis), canonical correlation analysis, discrete cosine transform, Monitoring/Detection Phase Correlation Application MMT-based framework 11/21/2018 TAROT 2016

4 Case studies Traditional TCP/IP networks:
LAN monitoring: ARP spoofing still alive. WAN/Internet Monitoring: HTTP User-Agent field case study. 6LoWPAN-based IoT monitoring: Misbehavior node detection algorithm based on Statistical Learning. Information Theory (Entropy)-based routing anomaly detection. Machine Learning-based anomaly detection. System and Application Monitoring SQL injection detection and tolerance. Android malware detection. Machine Learning: Supervised: Neural Network, SVM, Decision Tree Unsupervised: Association rule learning, K-Means 11/21/2018 TAROT 2016

5 Open Issues Machine Learning & Phishing/Web pop-up/Spam avoidance
How can the solution be distributed? Distributed Agents/ Probes How to distribute the agents? (agent-based modeling, geographical information data, e.g., GAMA) Static  Mobile ? 11/21/2018 TAROT 2016

6 Thank you! 11/21/2018


Download ppt "Security Monitoring for Network Protocols and Applications"

Similar presentations


Ads by Google