The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence
A Security Operations Center (SOC) can be defined as an organized and highly skilled team that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity incidents of an organization. The fundamental aspects of an effective SOC is related to the ability to examine and ana...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2018-11-01
|
Series: | Big Data and Cognitive Computing |
Subjects: | |
Online Access: | https://www.mdpi.com/2504-2289/2/4/35 |
id |
doaj-e3175726ae8044ba91178dae3c426a38 |
---|---|
record_format |
Article |
spelling |
doaj-e3175726ae8044ba91178dae3c426a382020-11-25T00:56:45ZengMDPI AGBig Data and Cognitive Computing2504-22892018-11-01243510.3390/bdcc2040035bdcc2040035The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity IntelligenceKonstantinos Demertzis0Panayiotis Kikiras1Nikos Tziritas2Salvador Llopis Sanchez3Lazaros Iliadis4Department of Civil Engineering, School of Engineering, Democritus University of Thrace, Xanthi 67100, GreeceDepartment of Computer Science, School of Science, University of Thessaly, Lamia 35131, GreeceResearch Center for Cloud Computing, Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518000, ChinaCommunications Department, Universitat Politecnica de Valencia, Valencia 46022, SpainDepartment of Civil Engineering, School of Engineering, Democritus University of Thrace, Xanthi 67100, GreeceA Security Operations Center (SOC) can be defined as an organized and highly skilled team that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity incidents of an organization. The fundamental aspects of an effective SOC is related to the ability to examine and analyze the vast number of data flows and to correlate several other types of events from a cybersecurity perception. The supervision and categorization of network flow is an essential process not only for the scheduling, management, and regulation of the network’s services, but also for attacks identification and for the consequent forensics’ investigations. A serious potential disadvantage of the traditional software solutions used today for computer network monitoring, and specifically for the instances of effective categorization of the encrypted or obfuscated network flow, which enforces the rebuilding of messages packets in sophisticated underlying protocols, is the requirements of computational resources. In addition, an additional significant inability of these software packages is they create high false positive rates because they are deprived of accurate predicting mechanisms. For all the reasons above, in most cases, the traditional software fails completely to recognize unidentified vulnerabilities and zero-day exploitations. This paper proposes a novel intelligence driven Network Flow Forensics Framework (NF3) which uses low utilization of computing power and resources, for the Next Generation Cognitive Computing SOC (NGC2SOC) that rely solely on advanced fully automated intelligence methods. It is an effective and accurate Ensemble Machine Learning forensics tool to Network Traffic Analysis, Demystification of Malware Traffic and Encrypted Traffic Identification.https://www.mdpi.com/2504-2289/2/4/35network flow forensicsSecurity Operations Centernetwork traffic analysistraffic identificationdemystification of malware trafficensemble machine learning |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Konstantinos Demertzis Panayiotis Kikiras Nikos Tziritas Salvador Llopis Sanchez Lazaros Iliadis |
spellingShingle |
Konstantinos Demertzis Panayiotis Kikiras Nikos Tziritas Salvador Llopis Sanchez Lazaros Iliadis The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence Big Data and Cognitive Computing network flow forensics Security Operations Center network traffic analysis traffic identification demystification of malware traffic ensemble machine learning |
author_facet |
Konstantinos Demertzis Panayiotis Kikiras Nikos Tziritas Salvador Llopis Sanchez Lazaros Iliadis |
author_sort |
Konstantinos Demertzis |
title |
The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence |
title_short |
The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence |
title_full |
The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence |
title_fullStr |
The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence |
title_full_unstemmed |
The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence |
title_sort |
next generation cognitive security operations center: network flow forensics using cybersecurity intelligence |
publisher |
MDPI AG |
series |
Big Data and Cognitive Computing |
issn |
2504-2289 |
publishDate |
2018-11-01 |
description |
A Security Operations Center (SOC) can be defined as an organized and highly skilled team that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity incidents of an organization. The fundamental aspects of an effective SOC is related to the ability to examine and analyze the vast number of data flows and to correlate several other types of events from a cybersecurity perception. The supervision and categorization of network flow is an essential process not only for the scheduling, management, and regulation of the network’s services, but also for attacks identification and for the consequent forensics’ investigations. A serious potential disadvantage of the traditional software solutions used today for computer network monitoring, and specifically for the instances of effective categorization of the encrypted or obfuscated network flow, which enforces the rebuilding of messages packets in sophisticated underlying protocols, is the requirements of computational resources. In addition, an additional significant inability of these software packages is they create high false positive rates because they are deprived of accurate predicting mechanisms. For all the reasons above, in most cases, the traditional software fails completely to recognize unidentified vulnerabilities and zero-day exploitations. This paper proposes a novel intelligence driven Network Flow Forensics Framework (NF3) which uses low utilization of computing power and resources, for the Next Generation Cognitive Computing SOC (NGC2SOC) that rely solely on advanced fully automated intelligence methods. It is an effective and accurate Ensemble Machine Learning forensics tool to Network Traffic Analysis, Demystification of Malware Traffic and Encrypted Traffic Identification. |
topic |
network flow forensics Security Operations Center network traffic analysis traffic identification demystification of malware traffic ensemble machine learning |
url |
https://www.mdpi.com/2504-2289/2/4/35 |
work_keys_str_mv |
AT konstantinosdemertzis thenextgenerationcognitivesecurityoperationscenternetworkflowforensicsusingcybersecurityintelligence AT panayiotiskikiras thenextgenerationcognitivesecurityoperationscenternetworkflowforensicsusingcybersecurityintelligence AT nikostziritas thenextgenerationcognitivesecurityoperationscenternetworkflowforensicsusingcybersecurityintelligence AT salvadorllopissanchez thenextgenerationcognitivesecurityoperationscenternetworkflowforensicsusingcybersecurityintelligence AT lazarosiliadis thenextgenerationcognitivesecurityoperationscenternetworkflowforensicsusingcybersecurityintelligence AT konstantinosdemertzis nextgenerationcognitivesecurityoperationscenternetworkflowforensicsusingcybersecurityintelligence AT panayiotiskikiras nextgenerationcognitivesecurityoperationscenternetworkflowforensicsusingcybersecurityintelligence AT nikostziritas nextgenerationcognitivesecurityoperationscenternetworkflowforensicsusingcybersecurityintelligence AT salvadorllopissanchez nextgenerationcognitivesecurityoperationscenternetworkflowforensicsusingcybersecurityintelligence AT lazarosiliadis nextgenerationcognitivesecurityoperationscenternetworkflowforensicsusingcybersecurityintelligence |
_version_ |
1725225626792624128 |