skip to main content
10.1145/2523649.2523670acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks

Published:09 December 2013Publication History

ABSTRACT

As more and more Internet-based attacks arise, organizations are responding by deploying an assortment of security products that generate situational intelligence in the form of logs. These logs often contain high volumes of interesting and useful information about activities in the network, and are among the first data sources that information security specialists consult when they suspect that an attack has taken place. However, security products often come from a patchwork of vendors, and are inconsistently installed and administered. They generate logs whose formats differ widely and that are often incomplete, mutually contradictory, and very large in volume. Hence, although this collected information is useful, it is often dirty.

We present a novel system, Beehive, that attacks the problem of automatically mining and extracting knowledge from the dirty log data produced by a wide variety of security products in a large enterprise. We improve on signature-based approaches to detecting security incidents and instead identify suspicious host behaviors that Beehive reports as potential security incidents. These incidents can then be further analyzed by incident response teams to determine whether a policy violation or attack has occurred. We have evaluated Beehive on the log data collected in a large enterprise, EMC, over a period of two weeks. We compare the incidents identified by Beehive against enterprise Security Operations Center reports, antivirus software alerts, and feedback from enterprise security specialists. We show that Beehive is able to identify malicious events and policy violations which would otherwise go undetected.

References

  1. OSSEC -- Open Source Security. http://www.ossec.net.Google ScholarGoogle Scholar
  2. Snort. http://www.snort.org.Google ScholarGoogle Scholar
  3. The Bro Network Security Monitor. http://www.bro.org/.Google ScholarGoogle Scholar
  4. M. Abu Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A Multifaceted Approach to Understanding the Botnet Phenomenon. In IMC, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster. Building a Dynamic Reputation System for DNS. In USENIX Security, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Antonakakis, R. Perdisci, W. Lee, N. Vasiloglou, II, and D. Dagon. Detecting Malware Domains at the Upper DNS Hierarchy. In USENIX Security, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. Abu-Nimeh, W. Lee, and D. Dagon. From Throw-away Traffic to Bots: Detecting the Rise of DGA-based Malware. In USENIX Security, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. L. Bilge, D. Balzarotti, W. Robertson, E. Kirda, and C. Kruegel. Disclosure: Detecting Botnet Command and Control Servers Through Large-scale NetFlow Analysis. In ACSAC, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. Bilge, E. Kirda, K. Christopher, and M. Balduzzi. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. In NDSS, 2011.Google ScholarGoogle Scholar
  10. J. R. Binkley and S. Singh. An Algorithm for Anomaly-based Botnet Detection. In USENIX SRUTI, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Brauckhoff, X. Dimitropoulos, A. Wagner, and K. Salamatian. Anomaly Extraction in Backbone Networks Using Association Rules. In IMC, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. J. Chapple, N. Chawla, and A. Striegel. Authentication Anomaly Detection: A Case Study on a Virtual Private Network. In ACM MineNet, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H. Choi, H. Lee, H. Lee, and H. Kim. Botnet Detection by Monitoring Group Activities in DNS Traffic. In IEEE CIT, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. E. Cooke, F. Jahanian, and D. McPherson. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. In USENIX SRUTI, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho. Extracting Hidden Anomalies Using Sketch and non Gaussian Multiresolution Statistical Detection Procedures. In ACM SIGCOMM LSAD, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. François, S. Wang, R. State, and T. Engel. BotTrack: Tracking Botnets Using NetFlow and PageRank. In IFIP TC 6 Networking Conf., 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. F. C. Freiling, T. Holz, and G. Wicherski. Botnet Tracking: Exploring a Root-cause Methodology to Prevent Distributed Denial-of-service Attacks. In ESORICS, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering Analysis of Network Traffic for Protocol-and Structure-independent Botnet Detection. In USENIX Security, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. BotHunter: Detecting Malware Infection Through IDS-driven Dialog Correlation. In USENIX Security, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. G. Gu, J. Zhang, and W. Lee. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. In NDSS, 2008.Google ScholarGoogle Scholar
  21. T. Holz, C. Gorecki, K. Rieck, and F. C. Freiling. Measuring and Detecting Fast-Flux Service Networks. In NDSS, 2008.Google ScholarGoogle Scholar
  22. J. P. John, A. Moshchuk, S. D. Gribble, and A. Krishnamurthy. Studying Spamming Botnets Using Botlab. In USENIX NSDI, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. I. T. Jolliffe. Principal Component Analysis. Springer-Verlag, 1986.Google ScholarGoogle ScholarCross RefCross Ref
  24. A. Karasaridis, B. Rexroad, and D. Hoeflin. Wide-scale Botnet Detection and Characterization. In USENIX HotBots, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. L. Kaufman and P. J. Rousseeuw. Finding Groups in Data. An Introduction to Cluster Analysis. Wiley, 1990.Google ScholarGoogle Scholar
  26. J. Levine, R. LaBella, H. Owen, D. Contis, and B. Culver. The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks. In IEEE IAW, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  27. C. Livadas, R. Walsh, D. Lapsley, and W. Strayer. Using Machine Learning Techniques to Identify Botnet Traffic. In IEEE LCN, 2006.Google ScholarGoogle Scholar
  28. J. Ma, L. K. Saul, S. Savage, and G. M. Voelker. Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs. In ACM SIGKDD KDD, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. J. Nazario and T. Holz. As the Net Churns: Fast-flux Botnet Observations. In MALWARE, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  30. E. Passerini, R. Paleari, L. Martignoni, and D. Bruschi. FluXOR: Detecting and Monitoring Fast-Flux Service Networks. In DIMVA, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. R. Perdisci, I. Corona, D. Dagon, and W. Lee. Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces. In ACSAC, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. A. Ramachandran and N. Feamster. Understanding the Network-level Behavior of Spammers. In ACM SIGCOMM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. A. Sperotto, R. Sadre, and A. Pras. Anomaly Characterization in Flow-Based Traffic Time Series. In IEEE IPOM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your Botnet is My Botnet: Analysis of a Botnet Takeover. In ACM CCS, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. W. Strayer, R. Walsh, C. Livadas, and D. Lapsley. Detecting Botnets with Tight Command and Control. In IEEE LCN, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  36. R. Villamarín-Salomón and J. C. Brustoloni. Bayesian Bot Detection Based on DNS Traffic Similarity. In ACM SAC, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. A. Wagner and B. Plattner. Entropy Based Worm and Anomaly Detection in Fast IP Networks. In IEEE WETICE, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. S. Yadav, A. K. K. Reddy, A. N. Reddy, and S. Ranjan. Detecting Algorithmically Generated Malicious Domain Names. In IMC, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. S. Yadav and A. N. Reddy. Winning With DNS Failures: Strategies for Faster Botnet Detection. In SECURECOMM, 2011.Google ScholarGoogle Scholar
  40. T.-F. Yen and M. K. Reiter. Traffic Aggregation for Malware Detection. In DIMVA, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. J. Zhang, R. Berthier, W. Rhee, M. Bailey, P. Pal, F. Jahanian, and W. H. Sanders. Safeguarding Academic Accounts and Resources with the University Credential Abuse Auditing System. In DSN, 2012.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ACSAC '13: Proceedings of the 29th Annual Computer Security Applications Conference
          December 2013
          374 pages
          ISBN:9781450320153
          DOI:10.1145/2523649

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 9 December 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate104of497submissions,21%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader