Intrusion Detection Evaluation

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

1 New Trends and Challenges in Computer Network Security Ravi Sandhu Executive Director and Endowed Professor September 2010
1 Authentication with Passwords Prof. Ravi Sandhu Executive Director and Endowed Chair February 1, © Ravi.
1 Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu Executive Director and Endowed Professor December 2010.
Defense Questions # of correlated attacks: under-estimated or over-estimated? Conservative estimation –Average across all the three dataset? Dataset w/
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
1 Privacy and Access Control: How are These Two Concepts Related? Prof. Ravi Sandhu Executive Director and Endowed Chair SACMAT Panel June 3, 2015
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
1 Cyber Security Grand Challenges and Prognosis Prof. Ravi Sandhu Executive Director and Endowed Chair
1. Introduction Generally Intrusion Detection Systems (IDSs), as special-purpose devices to detect network anomalies and attacks, are using two approaches.
1 Big Data Applications in Cloud and Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Professor UTSA COB Symposium on Big Data, Big Challenges.
1 Virtualization Prof. Ravi Sandhu Executive Director and Endowed Chair February 7, © Ravi Sandhu World-Leading.
1 The Quest for Single-Sign On Prof. Ravi Sandhu Executive Director and Endowed Chair February 8, © Ravi Sandhu.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
1 Figure 10-4: Intrusion Detection Systems (IDSs) IDSs  Event logging in log files  Analysis of log file data  Alarms Too many false positives (false.
Ensemble Learning for Low-level Hardware-supported Malware Detection
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 Understanding Which New Threats Operators Can Expect To Face Within The Next Two To Five Years To Improve The On- Going Management Of Security Systems.
1 Secure Cloud Computing: A Research Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair Texas Fresh Air Big Data and Data Analytics Conference.
Executive Director and Endowed Chair
Executive Director and Endowed Chair
Institute for Cyber Security
Symmetric Cryptography
Executive Director and Endowed Chair
What can Technologists learn from the History of the Internet?
Security and Privacy in the Networked World
An Access Control Perspective on the Science of Security
Discretionary Access Control (DAC)
Executive Director and Endowed Chair
Introduction to Cyber Security
Introduction and Basic Concepts
Cryptography Basics and Symmetric Cryptography
Authentication by Passwords
Role-Based Access Control (RBAC)
Identity and Access Control in the
Executive Director and Endowed Chair
Executive Director and Endowed Chair
Internet Security Threat Status
Executive Director and Endowed Chair
Cyber Security Research: Applied and Basic Combined*
On the Value of Access Control Models
Challenge-Response Authentication
ABAC Panel Prof. Ravi Sandhu Executive Director and Endowed Chair
Asymmetric Cryptography
Executive Director and Endowed Chair
Attribute-Based Access Control (ABAC)
Cyber Security Research: Applied and Basic Combined*
Security and Privacy in the Age of the Internet of Things:
Intersection of Data, Policy and Privacy
Authentication and Authorization Federation
Executive Director and Endowed Chair
Intrusion Detection Evaluation
Cyber Security and Privacy: An Optimist’s Perspective
Identity and Access Control in the
Big Data and Privacy Panel Prof. Ravi Sandhu
Executive Director and Endowed Chair
Institute for Cyber Security Overview
Challenge-Response Authentication
Topics discussed in this section:
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Attribute-Based Access Control (ABAC)
Access Control Evolution and Prospects
World-Leading Research with Real-World Impact!
Lecture 6: Feature matching
Access Control Evolution and Prospects
Presentation transcript:

Intrusion Detection Evaluation CS 5323 Intrusion Detection Evaluation Prof. Ravi Sandhu Executive Director and Endowed Chair Lecture 15 ravi.utsa@gmail.com www.profsandhu.com Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. © Ravi Sandhu World-Leading Research with Real-World Impact!

IDS Categorization World-Leading Research with Real-World Impact! Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. Table 1 © Ravi Sandhu World-Leading Research with Real-World Impact! 2

IDS Categorization World-Leading Research with Real-World Impact! Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. Table 1 © Ravi Sandhu World-Leading Research with Real-World Impact! 3

Design Space Workloads Metrics Measurement methodology © Ravi Sandhu World-Leading Research with Real-World Impact! 4

Workloads World-Leading Research with Real-World Impact! © Ravi Sandhu Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. Figure 1 © Ravi Sandhu World-Leading Research with Real-World Impact! 5

Workloads World-Leading Research with Real-World Impact! Table III and IV Table II Figure 2 Publicly available traces DARPA 98, 99, 00 KDD 99 (derivative) Symantec onsite testing Table V Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. Figure 1 © Ravi Sandhu World-Leading Research with Real-World Impact! 6

Vulnerability and Attack Injection Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. Figure 2 © Ravi Sandhu World-Leading Research with Real-World Impact! 7

Honeypots World-Leading Research with Real-World Impact! © Ravi Sandhu Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. Figure 3 © Ravi Sandhu World-Leading Research with Real-World Impact! 8

Metrics World-Leading Research with Real-World Impact! Not discussed in lecture Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. Figure 4 © Ravi Sandhu World-Leading Research with Real-World Impact! 9

Metrics: Basic World-Leading Research with Real-World Impact! Dependent on base rate Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. Figure 4 © Ravi Sandhu World-Leading Research with Real-World Impact! 10

Receiver Operating Curve (ROC) https://en.wikipedia.org/wiki/Receiver_operating_characteristic © Ravi Sandhu World-Leading Research with Real-World Impact! 11

Zero Reference Curve (ZRC) https://en.wikipedia.org/wiki/Receiver_operating_characteristic © Ravi Sandhu World-Leading Research with Real-World Impact! 12

ROC Limitations Intrusion detection is not a binary yes/no problem Unit of measurement is ambiguous Flow versus packet Does not account for base rate P(I) © Ravi Sandhu World-Leading Research with Real-World Impact! 13

Receiver Operating Curve (ROC) Assumed ROC: fixes 1 point, 0.7 Detection rate, 0.00001 False alarm rate Others are reported results from literature All anomaly detectors are in Fig 2 Axelsson, Stefan. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security (TISSEC) 3, no. 3 (2000): 186-205. Figures 2 and 3 © Ravi Sandhu World-Leading Research with Real-World Impact! 14

Intrusion Detection Effectiveness Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. © Ravi Sandhu World-Leading Research with Real-World Impact! 15

Intrusion Detection Effectiveness ZRC Compare area under ROC curve Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. © Ravi Sandhu World-Leading Research with Real-World Impact! 16

Intrusion Detection Effectiveness Assumes Base rate, P(I) = 0.1 ZRC Compare area under ROC curve TFP: max acceptable false positive rate Compare area difference between PPVZRC and PPVIDS up to TFP Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. © Ravi Sandhu World-Leading Research with Real-World Impact! 17

Metrics: Cost-Based These p1 p2 p3 are different, apply to false alert filter Cα: cost of false positive Cβ: cost of false negative C = Cβ/Cα p1 = P(A) p2 = P(I|A) p3 = P(I|¬A) Cexp = Min(CβB,(1-α)(1-B)) + Min(C(1-β)B,α(1-B)) Crec = CβB + α(1-B) Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. Figure 6 © Ravi Sandhu World-Leading Research with Real-World Impact! 18

Metrics: Cost-Based Assumptions: B = 0.1 C = 10 α, β same for base IDS and its false alarm filter Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. © Ravi Sandhu World-Leading Research with Real-World Impact! 19

Measurement Methodology Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. © Ravi Sandhu World-Leading Research with Real-World Impact! 20

Case Study: Snort True positive rate = 2/8 = 0.25 Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. © Ravi Sandhu World-Leading Research with Real-World Impact! 21

Case Study: Snort World-Leading Research with Real-World Impact! Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. © Ravi Sandhu World-Leading Research with Real-World Impact! 22

Case Study: Snort World-Leading Research with Real-World Impact! Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. © Ravi Sandhu World-Leading Research with Real-World Impact! 23

Measurement Methodology Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A. and Payne, B.D., 2015. Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR), 48(1), p.12. © Ravi Sandhu World-Leading Research with Real-World Impact! 24

Future Directions High speed IDSs IDSs for virtualized environments (e.g., cloud) IDSs for detecting APTs (advanced persistent threats) IDSs for detecting zero day attacks © Ravi Sandhu World-Leading Research with Real-World Impact! 25