Download presentation
Presentation is loading. Please wait.
Published byJody Armstrong Modified over 6 years ago
1
Security Monitoring for Network Protocols and Applications
Vinh Hoa LA Ɨ Prof. Ana CAVALLI Ɨ Ƭ PhD Student Supervisor Ɨ Telecom SudParis, IMT Ƭ Montimage France 11/21/2018
2
Context Cyber-security: emerging topic Network/System/Application
Cyber attacks/crime: growing in both volume and sophistication Two directions: Secure Design Security Testing Network/System/Application Security Monitoring Heterogeneous (Signature-based + Anomaly-based) approach Novel advanced techniques: Statistical Learning Machine Learning Nearly 1 million new malware threats released every day Total cost of cyber-crime in recent three years 11/21/2018 TAROT 2016
3
Security Monitoring Framework
Framework Overview: Signature-based approach Anomaly-based approach Network Data Capture Data Processing (Attribute Extraction, Dimension Reduction) Learning/Training Phase Conclusion Traffic Trace Logs … Misbehavior signature Normal behaviors System Dimension Reduction: RP (random projection), PCA (principal component analysis), DM (diffusion map) LDA (linear discriminant analysis), canonical correlation analysis, discrete cosine transform, Monitoring/Detection Phase Correlation Application MMT-based framework 11/21/2018 TAROT 2016
4
Case studies Traditional TCP/IP networks:
LAN monitoring: ARP spoofing still alive. WAN/Internet Monitoring: HTTP User-Agent field case study. 6LoWPAN-based IoT monitoring: Misbehavior node detection algorithm based on Statistical Learning. Information Theory (Entropy)-based routing anomaly detection. Machine Learning-based anomaly detection. System and Application Monitoring SQL injection detection and tolerance. Android malware detection. Machine Learning: Supervised: Neural Network, SVM, Decision Tree Unsupervised: Association rule learning, K-Means 11/21/2018 TAROT 2016
5
Open Issues Machine Learning & Phishing/Web pop-up/Spam avoidance
How can the solution be distributed? Distributed Agents/ Probes How to distribute the agents? (agent-based modeling, geographical information data, e.g., GAMA) Static Mobile ? 11/21/2018 TAROT 2016
6
Thank you! 11/21/2018
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.