Customized access log classifier for cybersecurity incident detection

Clasificador de logs de acceso para detección de incidentes de ciberseguridad

Pérez del Castillo, Miguel - Rial, Gastón - Sotelo, Rafael - Gurméndez, Máximo
Detalles Bibliográficos
2020
Filtrado
Respuesta de ciberseguridad
CLF
Aprendizaje automático
Filtering
Cybersecurity response
CLF
Cachine learning
Español
Universidad de Montevideo
REDUM
http://revistas.um.edu.uy/index.php/ingenieria/article/view/602
Acceso abierto
Atribución 4.0 Internacional
Resumen:
Sumario:The number of attacks on government websites has escalated in the last years. In order to assist in the detection process conducted by cybersecurity analysts, this document suggests implementing machine learning techniques over web server access logs. The overall objective is to optimize the detection time using a customized classifier which selects traces corresponding to anomalous activity. Specifically, web server combined log format (CLF) access logs coded as real vectors are an input to a weighted K-NN nearest neighbors’ model. The methodology was tested on datasets and premises provided by the CERTuy (National Cybersecurity Event Response Team) and the SOC (Security Operations Center). According to evaluations 82% of cybersecurity offenses have been detected, 80% of normal behavior has been filtered and the reduction time has been reduced from 13 hours to 15 minutes.