The advent of massive and highly heterogeneous information systems poses major challenges to professionals responsible for IT security. The huge amount of monitoring data currently being generated means that no human being or group of human beings can cope with their analysis. Furthermore, fully automated tools still lack the ability to track the associated events in a fine-grained and reliable way. Here, we propose the HuMa framework for detailed and reliable analysis of large amounts of data for security purposes. HuMa uses a multi-analysis approach to study complex security events in a large set of logs. It is organized around three layers: the event layer, the context and attack pattern layer, and the assessment layer. We describe the framework components and the set of complementary algorithms for security assessment. We also provide an evaluation of the contribution of the context and attack pattern layer to security investigation.
CITATION STYLE
Navarro, J., Legrand, V., Lagraa, S., François, J., Lahmadi, A., De Santis, G., … Parrend, P. (2018). HuMa: A multi-layer framework for threat analysis in a heterogeneous log environment. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10723 LNCS, pp. 144–159). Springer Verlag. https://doi.org/10.1007/978-3-319-75650-9_10
Mendeley helps you to discover research relevant for your work.