HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation

Network-wide intrusion detection through statistical analysis of event logs : an interaction-centric approach

Abstract : Event logs are structured records of all kinds of activities taking place in a computer network. In particular, malicious actions taken by intruders are likely to leave a trace in the logs, making this data source useful for security monitoring and intrusion detection. However, the considerable volume of real-world event logs makes them difficult to analyze. This limitation has motivated a fair amount of research on malicious behavior detection through statistical methods. This thesis addresses some of the challenges that currently hinder the use of this approach in realistic settings. First of all, building an abstract representation of the data is nontrivial: event logs are complex and multi-faceted, making it difficult to capture all the relevant information they contain in a simple mathematical object. We take an interaction-centric approach to event log representation, motivated by the intuition that malicious events can often be seen as unexpected interactions between entities (users, hosts, etc.). While this representation preserves critical information, it also makes statistical modelling difficult. We thus build an ad hoc model and design a suitable inference procedure, using elements of latent space modelling, Bayesian filtering and multi-task learning.Another key challenge in event log analysis is that benign events account for a vast majority of the data, including a lot of unusual albeit legitimate events. Detecting individually anomalous events is thus not enough, and we also deal with spotting clusters of potentially malicious events. To that end, we leverage the concept of event graph and recast event-wise anomaly scores as a noisy graph-structured signal. This allows us to use graph signal processing tools to improve anomaly scores provided by statistical models.Finally, we propose scalable methods for anomalous cluster detection in node-valued signals defined over large graphs.
Complete list of metadata

Contributor : Abes Star :  Contact
Submitted on : Monday, November 29, 2021 - 3:09:15 PM
Last modification on : Thursday, December 2, 2021 - 3:45:24 AM


Version validated by the jury (STAR)


  • HAL Id : tel-03455127, version 1



Corentin Larroche. Network-wide intrusion detection through statistical analysis of event logs : an interaction-centric approach. Applications [stat.AP]. Institut Polytechnique de Paris, 2021. English. ⟨NNT : 2021IPPAT041⟩. ⟨tel-03455127⟩



Record views


Files downloads