Application of Bayesian Network in Computer Networks Raza H. Abedi.

Slides:



Advertisements
Similar presentations
Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
Advertisements

Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection Nelcileno Araújo Ruy de Oliveira Ed’Wilson Tavares Ferreira Valtemir Nascimento.
Introduction to Wireless Sensor Networks
Improvement on LEACH Protocol of Wireless Sensor Network
1. AGENDA History. WHAT’S AN IDS? Security and Roles Types of Violations. Types of Detection Types of IDS. IDS issues. Application.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Copyright 2002, Center for Secure Information Systems 1 Panel: Role of Data Mining in Cyber Threat Analysis Professor Sushil Jajodia Center for Secure.
Wireless Sensor Network Security Anuj Nagar CS 590.
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
Department Of Computer Engineering
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Supervised By: Mohammad F. Tolba Mohammad S. Abdel-Wahab.
1. Introduction Generally Intrusion Detection Systems (IDSs), as special-purpose devices to detect network anomalies and attacks, are using two approaches.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Effect of Intrusion Detection on Reliability Jin-Hee Cho, Member, IEEE, Ing-Ray Chen, Member, IEEE, and Phu-Gui Feng IEEE TRANSACTIONS ON RELIABILITY,
Chirag N. Modi and Prof. Dhiren R. Patel NIT Surat, India Ph. D Colloquium, CSI-2011 Signature Apriori based Network.
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Privacy Issues in Vehicular Ad Hoc Networks.
GrIDS -- A Graph Based Intrusion Detection System For Large Networks Paper by S. Staniford-Chen et. al.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
Layered Approach using Conditional Random Fields For Intrusion Detection.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
EAACK—A Secure Intrusion-Detection System for MANETs
A Review by Raghu Rangan WPI CS525 September 19, 2012 An Early Warning System Based on Reputation for Energy Control Systems.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Client: The Boeing Company Contact: Mr. Nick Multari Adviser: Dr. Thomas Daniels Group 6 Steven BromleyJacob Gionet Jon McKeeBrandon Reher.
1 A Network Security Monitor Paper By: Heberlein et. al. Presentation By: Eric Hawkins.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Security System for KOREN/APII-Testbed
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
A Blackboard-Based Learning Intrusion Detection System: A New Approach
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
DIVYA K 1RN09IS016 RNSIT1. Cloud computing provides a framework for supporting end users easily through internet. One of the security issues is how to.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
SIEM Rotem Mesika System security engineering
Presented by Edith Ngai MPhil Term 3 Presentation
Trust-based Service Composition and Binding with Multiple Objective Optimization in Service- Oriented Mobile Ad Hoc Networks Yating Wang†, Ing-Ray Chen†,
Giannis F. Marias, Vassileios Tsetsos,
Introduction to Wireless Sensor Networks
Student: Mallesham Dasari Faculty Advisor: Dr. Maggie Cheng
Presentation transcript:

Application of Bayesian Network in Computer Networks Raza H. Abedi

Misuse-Based Intrusion Detection Using Bayesian Networks Introduction – NIDS – Snort – Bayesian System for Intrusion Detection (Basset) – Misuse Based – Anomaly Based – Misuse base system is studied in this paper – Goal is to provide better detection capabilities and less chances of false alarms

Problem Identification The possibility that a fingerprint might be matched with a legitimate packet will always be there Since some fingerprints contain detailed description, so there might be a possibility that if some hacker change only the port number than the malicious packet will be treated as a legitimate packet. Snort treat each event individually, it cannot analyze any link between certain flows of packet. Some attack scenario involves three different phases, reconnaissance, actual attack and post attack activity

Problem Identification It is not possible to gather information about any computer which is an intended target of the attack. Insignificant alarm could be raised without an actual threat There is no learning capability in the system, since all rules are human-made so there is no way that the program could modify them in any way

Solution

A Probabilistic Approach for Network Intrusion Detection Introduction – The aim is to propose a probabilistic approach for detecting intrusions by using Bayesian Network – Three variation of BN (Naïve BN, Learned BN and Handcrafted BN) were evaluated from which the optimal BN was obtained – Three categories of attack were considered (DoS, Probing, Remote to Local and User to Root) – The data set consists of around half million records, Records are split in to 80% and 20%, for training and testing phase

Problem Definition To select after evaluation, which type of BN is the most optimal one in our scenario 80% of the data is first utilized in structure building and the remaining 20% were used to obtain classification accuracies of BNs

Proposed IDS Architecture

Solution

Results Category Naïve BNLearned BNHandcrafted BN Normal DoS Probe R2L U2R

A Bayesian Network Based Trust Model for Improving Collaboration in Mobile Ad hoc Networks Introduction – Mobile Ad hoc Network – Model evaluates trust in a server with direct experience and recommendations from other nodes in MANET – A BN based trust model is proposed and evaluated through simulation that the model is optimal in selecting best server among a set of eligible servers

Problem Identification Mobile ad hoc network consist of a number of nodes communicating with each other without any central control or hierarchy It is impossible to ascertain which node is a malicious one or the legitimate one A trust must be established before a node starts communicating with any of the available servers.

Solution

Result

BNWSN: Bayesian Network Trust Model for Wireless Sensor Model Introduction – Wireless Sensor Networks (WSN) – Communication Trust – Data Trust – The research work and simulation consider both communication trust and data trust in model – “The subjective probability by which node A depends on node B to fulfill its promises in performing an action and at the same time being reliable in reporting its sensed data”

Problem Definition Trust management in WSNs are predominately based on routing messages Trust model based on communication only is unreliable and misleading There is no evaluation of sensed data in the trust model (data trust) How much trust is enough Which components should be included to decide on trust, called (data trust)

Solution

Multiplication of Beta and Normal Distribution

Results