The growing demand for processing and storage capabilities has led to the deployment of high-performance computing infrastructures. Users log into the computing infrastructure remotely, by providing their credentials (e.g., username and password), through the public network and using well-established authentication protocols, e.g., SSH. However, user credentials can be stolen and an attacker (using a stolen credential) can masquerade as the legitimate user and penetrate the system as an insider. This paper deals with security incidents initiated by using stolen credentials and occurred during the last three years at the National Center for Supercomputing Applications (NCSA) at the University of Illinois. We analyze the key characteristics of the security data produced by the monitoring tools during the incidents and use a Bayesian network approach to correlate (i) data provided by different security tools (e.g., IDS and Net Flows) and (ii) information related to the users' profiles to identify compromised users, i.e., the users whose credentials have been stolen. The technique is validated with the real incident data. The experimental results demonstrate that the proposed approach is effective in detecting compromised users, while allows eliminating around 80% of false positives (i.e., not compromised user being declared compromised).

Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach / Pecchia, Antonio; Aashish, Sharma; Zbigniew, Kalbarczyk; Cotroneo, Domenico; Ravishankar K., Iyer. - STAMPA. - Proceedings of the 30th:(2011), pp. 127-135. (Intervento presentato al convegno IEEE International Symposium on Reliable Distributed Systems (SRDS 11) tenutosi a Madrid, Spagna nel 4-7 ottobre 2011) [10.1109/SRDS.2011.24].

Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach

PECCHIA, ANTONIO;COTRONEO, DOMENICO;
2011

Abstract

The growing demand for processing and storage capabilities has led to the deployment of high-performance computing infrastructures. Users log into the computing infrastructure remotely, by providing their credentials (e.g., username and password), through the public network and using well-established authentication protocols, e.g., SSH. However, user credentials can be stolen and an attacker (using a stolen credential) can masquerade as the legitimate user and penetrate the system as an insider. This paper deals with security incidents initiated by using stolen credentials and occurred during the last three years at the National Center for Supercomputing Applications (NCSA) at the University of Illinois. We analyze the key characteristics of the security data produced by the monitoring tools during the incidents and use a Bayesian network approach to correlate (i) data provided by different security tools (e.g., IDS and Net Flows) and (ii) information related to the users' profiles to identify compromised users, i.e., the users whose credentials have been stolen. The technique is validated with the real incident data. The experimental results demonstrate that the proposed approach is effective in detecting compromised users, while allows eliminating around 80% of false positives (i.e., not compromised user being declared compromised).
2011
9780769544502
Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach / Pecchia, Antonio; Aashish, Sharma; Zbigniew, Kalbarczyk; Cotroneo, Domenico; Ravishankar K., Iyer. - STAMPA. - Proceedings of the 30th:(2011), pp. 127-135. (Intervento presentato al convegno IEEE International Symposium on Reliable Distributed Systems (SRDS 11) tenutosi a Madrid, Spagna nel 4-7 ottobre 2011) [10.1109/SRDS.2011.24].
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11588/400483
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 22
  • ???jsp.display-item.citation.isi??? 16
social impact