Full Program »
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks
We present a novel system called Beehive that attacks the problem of automatically mining and extracting knowledge from the dirty log data produced by a wide variety of security products in a large enterprise. We improve on signature- based approaches to detecting security incidents and instead achieve behavioral detection of suspicious host activities that Beehive reports as potential security incidents. These incidents can then be further analyzed by incident response teams to determine whether a policy violation or attack has occurred. We have evaluated Beehive on the log data collected in a large enterprise, AnonymizedCompany, over a period of two weeks. We compare the incidents identified by Beehive against enterprise Security Operations Center reports, antivirus software alerts, and feedback received from enterprise security specialists. We show that Beehive is able to identify malicious events and policy violations within the enterprise network which would otherwise go undetected.
Author(s):
Ting-Fang Yen
RSA Laboratories
United States
Alina Oprea
RSA Laboratories
United States
Kaan Onarlioglu
Northeastern University
United States
Todd Leetham
EMC Corporation
United States
William Robertson
Northeastern University
United States
Ari Juels
RSA Laboratories
United States
Engin Kirda
Northeastern University
United States