Document Type
Article
Publication Date
7-2012
Abstract
Military and defense organizations rely upon the security of data stored in, and communicated through, their cyber infrastructure to fulfill their mission objectives. It is essential to identify threats to the cyber infrastructure in a timely manner, so that mission risks can be recognized and mitigated. Centralized event logging and correlation is a proven method for identifying threats to cyber resources. However, centralized event logging is inflexible and does not scale well, because it consumes excessive network bandwidth and imposes significant storage and processing requirements on the central event log server. In this paper, we present a flexible, distributed event correlation system designed to overcome these limitations by distributing the event correlation workload across the network of event-producing systems. To demonstrate the utility of the methodology, we model and simulate centralized, decentralized, and hybrid log analysis environments over three accountability levels and compare their performance in terms of detection capability, network bandwidth utilization, database query efficiency, and configurability. The results show that when compared to centralized event correlation, dynamically configured distributed event correlation provides increased flexibility, a significant reduction in network traffic in low and medium accountability environments, and a decrease in database query execution time in the high-accountability case.
DOI
10.1177/1548512911399303
Source Publication
Journal of Defense Modeling and Simulation
Recommended Citation
Grimaila, M. R., Myers, J., Mills, R. F., & Peterson, G. L. (2012). Design and Analysis of a Dynamically Configured Log-based Distributed Security Event Detection Methodology. Journal of Defense Modeling and Simulation, 9(3), 219–241. https://doi.org/10.1177/1548512911399303
Included in
Computer Sciences Commons, Other Operations Research, Systems Engineering and Industrial Engineering Commons
Comments
© 2011 The Society for Modeling and Simulation International. (The article was published online ahead of inclusion in an issue of JDMS).
AFIT Scholar furnishes the draft version of this article. The published version of record appears in The Journal of Defense Modeling and Simulation and is available by subscription through the DOI link in the citation below.