Operational Security Log Analytics for Enterprise Breach Detection.

Zhou Li,Alina Oprea
DOI: https://doi.org/10.1109/secdev.2016.015
2016-01-01
Abstract:Enterprises today are facing an increasing number of criminal threats ranging from financially motivated and opportunistic malware to more advanced targeted attacks organized by nation-state actors. To protect against these threats, enterprises deploy a number of perimeter defenses, including traditional controls (anti-virus software, intrusion detection systems, firewalls) and more advanced techniques (web proxies or deep packet inspection products). Organizations collect and store the log data generated by these security controls, but this data is most of the time used for forensic investigation once an attack has been discovered by an external mechanism. In this paper, we describe a security log analytics framework for proactive breach detection, which we have tested on three applications. We summarize the algorithms and detection results from our previous work ([13, 20, 21]). Compared to other research in this area, our framework analyzes multiple sources of security logs, performs large-scale analysis, and is continuously refined from feedback given by security experts. Our techniques have been successfully used in operational setting in a large organization and are currently integrated in a real-time behavior analytics product.
What problem does this paper attempt to address?