Analysis of security data from a large computing organization

Aashis Sharma,Z. Kalbarczyk,James Barlow,R. Iyer
DOI: https://doi.org/10.1109/DSN.2011.5958263
2011-06-27
Abstract:This paper presents an in-depth study of the forensic data on security incidents that have occurred over a period of 5 years at the National Center for Supercomputing Applications at the University of Illinois. The proposed methodology combines automated analysis of data from security monitors and system logs with human expertise to extract and process relevant data in order to: (i) determine the progression of an attack, (ii) establish incident categories and characterize their severity, (iii) associate alerts with incidents, and (iv) identify incidents missed by the monitoring tools and examine the reasons for the escapes. The analysis conducted provides the basis for incident modeling and design of new techniques for security monitoring.
What problem does this paper attempt to address?