Computer Science ›› 2016, Vol. 43 ›› Issue (10): 19-26.doi: 10.11896/j.issn.1002-137X.2016.10.003

Previous Articles     Next Articles

Review of Collaborative Detection of Threat in Big Data

ZHANG Jian-ge, GUO Yuan-bo, MA Jun and CHEN Yue   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Some malicious and illegal persons take advantage of direct or indirect methods to attack some person,organization and nation,so that they suffer from different degrees of threats.The type of information is various,volume of data is large and it needs to be processed at high speed.Therefore,we firstly analyzed five typical collaborative detection models which are Esper model,Hadoop model,Agilis model,Storm model and Spark model.Moreover,we made comparison of them and expatiated the network environment for different models.Then,we analyzed common attack methodsin the network which are DDoS attack,MITM attack and APT attack,and explained detection models for these attacks.Finally,we provided the deployment scheme of collaborative detection of architecture model for threats.The scheme includes two components which are sending component and receiving processing component.Then we pointed out that the architecture of different models can be deployed according to practical requirements.Especially,we provided the deployment scheme of architecture model in peer to peer network,ranked security domain network,and hierarchical structure network.

Key words: Threat,Collaborative detection,Attack,Architecture model,Big data

[1] Global Fraud Report-Annual Edition 2011-2012,Kroll [EB/OL].http://www.krollconsulting.com/fraud-report/2011-12/press-only
[2] In the Crossfire:Critical Infrastructure in the Age of Cyber War [J/OL].http://www.mcafee.com/us/resources/reports/rp-in-crossfire-critical-infrastructure-cyber-war.pdf
[3] Giuseppe Antonio Di Luna.A Collaborative Processing System for Cyber Attacks Detection and Crime Monitoring [D].Rome:Sapienza University,2010
[4] EsperTech:Event Series Intelligence [EB/OL].http://www.espertech.com
[5] Apache Software Foundation.Welcome to ApacheTM Hadoop? [EB/OL].http://hadoop.apache.org
[6] Aniello L,Baldoni R,Chockler G,et al.Agilis:An Internet-Scale Distributed Event Processing System for Collaborative Detection of Cyber Attacks [R].MIDLAB Technical Report,2011
[7] Storm.Distributed and fault-tolerant realtime computation [EB/OL].http://storm-project.net
[8] Spark.Lightning-fast cluster computing [EB/OL].http://spark.apache.org
[9] Beyer K,Ercegovac V,Gemulla R,et al.JAQL:A scripting language for large scale semistructured data analysis [J].Procee-dings of the VLDB Endowment,2011,4(12):1272-1283
[10] Hunt P,Konar M,Junqueira F P,et al.Zookeeper:Wait-free co-ordination for internet-scale systems [C]∥Usenix Annual Technical Conference.Berkeley,CA:Usenix,2010
[11] Dittrich D.The DoS Project’s “trinoo” distributed denial ofservice attack tool [EB/OL].https://staff.washington.edu/dittrich/misc/trinoo.analysis
[12] Dietrich S,Long N,Dittrich D.Analyzing Distributed Denial of Service tools:the Shaft Case [C]∥Proceedings of the 14th Systems Administration Conference(LISA 2000).New Orleans,LA,USA,2000:329-339
[13] Dittrich D.The Tribe Flood Network Distributed Denial ofService attack tool [EB/OL].https://staff.washington.edu/dittrich/misc/tfn.analysis
[14] Barlow J.TFN2K-an analysis [EB/OL].http://packetstormsecurity.com/distributed/TFN2k_Analysis-1.3.txt
[15] Dittrich D,Weaver G,Dietrich S,et al.The _mstream_ Distributed Denial of Service attack tool [EB/OL].ttps://staff.washington.edu/dittrich/misc/mstream.analysis.txt
[16] WANem-Wide Area Network Emulator [EB/OL].http://sou-rceforge.net/projects/wanem/files/WANem/
[17] ITOC research:CDX datasets.http://www.itoc.usma.edu/research/dataset/index.html
[18] LBNL/ICSI enterprise tracing project.http://www.icir.org/enterprise-tracing/download.html
[19] 2000 DARPA intrusion detection scenario specific data sets.http://www.ll.mit.edu/ideval/data/2000data.html
[20] Aniello L,Luna G A D,Lodi G,et al.Collaborative Inter-domain Stealthy Port Scan Detection Using Esper Complex Event Processing [C]∥Roberto Baldoni,Gregory Chockler.Collaborative Financial Infrastructure Protection.Springer,2012:139-156
[21] Aniello L,Baldoni R,Chockler G,et al.Distributed Attack Detection Using Agilis [C]∥Roberto Baldoni,Gregory Chockler.Collaborative Financial Infrastructure Protection.Springer,2012:157-174
[22] Lodi G,Aniello L,Luna G A D,et al.An event-based platform for collaborative threats detection and monitoring [J].Information Systems,2014,39:175-195

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!