Large-Scale Threat Traffic Analysis and IDS Development using Software
Kyuil Kim1, Chanjin Park2, Wonhyuk Lee3, Seunghae Kim4, Woojin Seok5

1Kyuil Kim, Senior Researcher, Advanced Center, Korea Institute of Science Technology Information, Daehangno, Yuseong, Daejeon, Korea.

2Chanjin Park, Senior Researcher, Advanced Center, Korea Institute of Science Technology Information, Daehangno, Yuseong, Daejeon, Korea.

3Wonhyuk Lee, Senior Researcher, Advanced Center, Korea Institute of Science Technology Information, Daehangno, Yuseong, Daejeon, Korea.

4Seunghae Kim, Senior Researcher, Advanced Center, Korea Institute of Science Technology Information, Daehangno, Yuseong, Daejeon, Korea.

5Woojin Seok, Senior Researcher, Advanced Center, Korea Institute of Science Technology Information, Daehangno, Yuseong, Daejeon, Korea.

Manuscript received on 01 January 2019 | Revised Manuscript received on 06 January 2019 | Manuscript Published on 07 April 2019 | PP: 346-350 | Volume-8 Issue- 3C January 2019 | Retrieval Number: C10760183C19/2019©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Today, modern society is constantly changing with the development of innovations. This development is the leading to the fourth industrial revolution in the fields of AI, cloud and Big data. However, a hyper-connected society is vulnerable to cyber-attacks. However, existing countermeasures have not kept in pace with the rapid development in cyber threats. It is necessary to determine critical and dangerous elements in massive data. This requires new networking technology that can malicious traffic. Methods/Statistical analysis: To address the aforementioned issues, we developed Bro-IDS, which can monitor large-scale traffic for cyber threats. Bro-IDS is an intrusion detection system based on open source software. Bro-IDS also can create network traffic for various logs and be used for traffic measurement or forensic purposes. We perform experiments to analyze large-scale threats in real-time using the ELK Stack (Elastic search, Log stash, Kibana) to validate Bro-IDS. Findings: We performed a cyber threat analysis based using our security monitoring system from July 25th to August 5th 2018 on KREONET. During this period, all connections generated approximately 610 million logs and the total payload collected was approximately 300GB.First, weird logs and notice logs were generated. Weird logs are generated when abnormal traffic is routed through the network and notice logs are generated when anomalous signals, such as those from cyber-attacks, are generated. Regarding weird logs, split routing occurred 58 million and occupied approximately 33% of the total .An average of approximately 500 events per day accounted for Notice logs and they occupied 93.5% of the total of Notice log and address scan attacks for 57,116 logs. These cyber-attacks were used to determine specific IP addresses in the target network. Regarding protocols, TCP was used most often, accounting for 79.2% of the total, followed by UDP at 18.6% and ICMP at 2.1%. Regarding ports, port 443 accounted for 68% of the total, followed by port 25, 587, 2191, and 23.In terms of attacks, most attempts were made from South Korea, followed by Europe and the US. Improvements/Applications: We implemented Bro-IDS, a system for real-time detection and analysis of cyber threats on large-networks using the ELK stack. The results indicate that the proposed model has scalable security and can guarantee throughput corresponding to the bandwidth in a high-speed network environment.

Keywords: IDS, Cyber-Attacks, Big Data, Security, KREONET.
Scope of the Article: Building and Environmental Acoustics