Real-Time Analysis of Non-stationary and Complex Network Related Data for Injection Attempts Detection

The growing use of cloud services, increased number of users, novel mobile operating systems and changes in network infrastructures that connect devices create novel challenges for cyber security. In order to counter arising threats, network security mech

  • PDF / 214,261 Bytes
  • 8 Pages / 439.37 x 666.142 pts Page_size
  • 46 Downloads / 164 Views

DOWNLOAD

REPORT


bstract The growing use of cloud services, increased number of users, novel mobile operating systems and changes in network infrastructures that connect devices create novel challenges for cyber security. In order to counter arising threats, network security mechanisms and protection schemes also evolve and use sophisticated sensors and methods. The drawback is that the more sensors (probes) are applied and the more information they acquire, the volume of data to process grows significantly. In this paper, we present real-time network data analysis mechanism. We also show the results for SQL Injection Attacks detection.

1 Rationale Recently there is an increasing number of security incidents reported all over the world. The national CERTs (e.g. CERT Poland [1]) report that number of attacks in 2011 has increased significantly when compared to 2010. In annual reports they explain that most of network events submitted by automated feeds concern bot nets, spam, malicious URLs and Brute Force attacks. The increased number of incidents is strongly related to the fact that recently there is also an increasing number of mobile devices users that form the population of connect-from-anywhere terminals that regularly test the traditional boundaries of network security. Also the so called BYOD (bring your own device [2, 3]) movement exposes the traditional security of many enterprises to novel and emerging threats. Many of nowadays malwares like ZITMO (Zeus In The Mobile) M. Choras´ ITTI Ltd., Poznan´, Poland M. Choras´ (&)  R. Kozik Institute of Telecommunications, UT&LS Bydgoszcz, Bydgoszcz, Poland e-mail: [email protected]

V. Snášel et al. (eds.), Soft Computing in Industrial Applications, Advances in Intelligent Systems and Computing 223, DOI: 10.1007/978-3-319-00930-8_23,  Springer International Publishing Switzerland 2014

257

258

M. Choras´ and R. Kozik

do not aim at mobile device itself anymore but on gathering the information about the users and gaining the access to remote services like bank web services. This significantly expands cyber space network security perimeter. There is also a significant number of reported incidents that are connected with huge widespread adoption of social media. Today, users are provide the content driving the growth at the same. This trend has a significant impact on accelerated spread of different kinds of malwares and viruses. As reported by SophosLabs [2] the number of malware pieces they have analyzed has been doubled since 2010. Also as more and more cloud services and SaaS have been adapted by small and medium enterprises a big challenge for network security arises, since crucial for companies data started to be stored, maintained and transported by third party infrastructure where traditional points of inspection cannot be deployed. According to CISCO 2011 report [3] this trend is connected with the criminals that see the potential to get more return on their investment with cloud attacks, since they only need to hack one to hack them all. Other well known problems like