Network Traffic Anomaly Detection Based on Packet Bytes Matthew V. Mahoney Florida Institute of Technology

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
Learning Rules from System Call Arguments and Sequences for Anomaly Detection Gaurav Tandon and Philip Chan Department of Computer Sciences Florida Institute.
Guide to Network Defense and Countermeasures Second Edition
1 Reading Log Files. 2 Segment Format
Anomaly Detection Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
Firewalls and Intrusion Detection Systems
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
IT Security Doug Brown Jeff Bollinger. What is security? P.H.P. People Have Problems Security is the mitigation and remediation of human error in information.
TCP/IP Network and Firewall. IP Packet Protocol  1 ICMP packet  6 TCP packet  17 UDP packet.
Statistical based IDS background introduction. Statistical IDS background Why do we do this project Attack introduction IDS architecture Data description.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Intrusion Detection CS-480b Dick Steflik. Hacking Attempts IP Address Scans scan the range of addresses looking for hosts (ping scan) Port Scans scan.
Report on statistical Intrusion Detection systems By Ganesh Godavari.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Intrusion Detection/Prevention Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality,
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection - Arun Hodigere. Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
A Machine Learning Approach to Detecting Attacks by Identifying Anomalies in Network Traffic A Dissertation by Matthew V. Mahoney Major Advisor: Philip.
IDS Mike O’Connor Eric Tallman Matt Yasiejko. Overview IDS defined IDS defined What it does What it does Sample logs Sample logs Why we need it Why we.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Polytechnic University Introduction 1 Intrusion Detection Systems Examples of IDSs in real life r Car alarms r Fire detectors r House alarms r Surveillance.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
FIREWALL Mạng máy tính nâng cao-V1.
TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS.
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
Network Security Denial of Service Attacks Dina Katabi nms.csail.mit.edu/~dina.
Chapter 6: Packet Filtering
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Port Scanning 0x470~0x480 Presenter SangDuk Seo 1.
Carleton University School of Computer Science Detecting Intra-enterprise Scanning Worms based on Address Resolution David Whyte, Paul van Oorschot, Evangelos.
Intrusion Detection and Prevention. Objectives ● Purpose of IDS's ● Function of IDS's in a secure network design ● Install and use an IDS ● Customize.
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection Matthew V. Mahoney and Philip K. Chan.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection Matt Mahoney Feb. 18, 2003.
Learning Rules for Anomaly Detection of Hostile Network Traffic Matthew V. Mahoney and Philip K. Chan Florida Institute of Technology.
Beginning Network Security Monitor and control flow into and out of the LAN Ingress Egress Only let in the good guys Only let out the corp. business.
Linux Networking and Security
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
Boundary Detection in Tokenizing Network Application Payload for Anomaly Detection Rachna Vargiya and Philip Chan Department of Computer Sciences Florida.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-1 Lesson 10 Attack Guards, Intrusion Detection, and Shunning.
Firewalls Fighting Spyware, Viruses, and Malware Ch 5.
Machine Learning for Network Anomaly Detection Matt Mahoney.
Network Intrusion Detection System (NIDS)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
IDS Intrusion Detection Systems
Snort – IDS / IPS.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Principles of Computer Security
* Essential Network Security Book Slides.
Intrusion Detection Systems (IDS)
CORE Security Technologies
Intrusion Detection Systems
Intrusion Detection system
Statistical based IDS background introduction
Session 20 INST 346 Technologies, Infrastructure and Architecture
Intrusion Detection Systems
TCP Connection Management
Presentation transcript:

Network Traffic Anomaly Detection Based on Packet Bytes Matthew V. Mahoney Florida Institute of Technology

Limitations of Intrusion Detection Host based (audit logs, virus checkers) –Cannot be trusted after a compromise Network signature detection (SNORT, Bro) –Cannot detect novel attacks –Alarm floods (network traffic is bursty) Address/port anomaly detection (ADAM, SPADE, eBayes) –Cannot detect attacks on public servers (web, mail, DNS)

Problem Statement Detect (not prevent) attacks in network traffic Train on attack-free traffic only Model of normal traffic IDS Training – no attacks Test data with attacksAlarms

Approach Model client protocols via inbound traffic –9 protocols: IP, TCP, HTTP, SMTP … –Beginning of request only (~ 2% of traffic) Test each packet independently Unusual bytes = hostile (sometimes) –Values seen but not often or recently –Values never seen in training (higher score)

Attributes: 48 IP Packet Bytes HdrTOSLen ID DFFrag TTLTCPChk Src Dst SP DP80 Seq Ack Hdr..AP.Win Chk Urg GET/HT

Probability of Previously Seen Values Frequency model: P(X) ≈ f x = n x /n = 7/10 Time based model: P(X) ~ 1/t x = 1/4 Hybrid model: P(X) ~ f x /t x = 7/40 Anomaly score of X ~ 1/P(X) ~ t x /f x ≈ 5.7 Example: XXXXXXXOOO

Probability of Novel Values Frequency model: P(not X, O) ≈ r/n = 2/10 –r = Number of observed values = 2 Time model: P(not X, O) ~ 1/t = 1/3 –t = Time since last novel value = 3 Hybrid model: P ~ r/nt = 2/30 Anomaly score = 1/P = tn/r = 15 Example: XXXXXXXOOO

1999 DARPA IDS Evaluation 7 days training data with no attacks 2 weeks test data with 177 visible attacks SunOSSolarisLinuxWinNT IDS Victims Internet (simulated) Attacks

Injecting Real Background Traffic Collected on a university departmental web server SunOSSolarisLinuxWinNT IDS Internet (simulated and real) Attacks Real web server

Evaluation Criteria Must identify target address Must identify time within 60 seconds Anomaly score threshold to allow 10 false alarms per day (100 total) Evaluated by percent of visible attacks detected –Evidence of attack in sniffer traffic –Other systems may use audit logs, BSM, etc.

Percent of Attacks Detected

Detection/False Alarm Tradeoff Simulated Traffic Mixed Real Traffic False alarms per day Percent Detected

Example Detections AttackAnomalyCause Satan – probe tests for many common vulnerabilities Unused dest. port 46 User behavior Dosnuke – Netbios TCP urgent data crashes Windows TCP urgent flag Bug in victim Sendmail – Mail server buffer overflow gives root shell Lowercase SMTP “mail” Bug in attack Portsweep (nmap) – Port scan with TCP FIN packets FIN without ACK flag Evasion

Summary Many novel attacks can be detected by a single abnormal inbound client packet Adaptive, no rule programming needed Hybrid model prevents alarm bursts Efficient –I/O bound – CPU is seconds per day –Memory < 1 MB

Limitations and Future Work False alarms (unusual ≠ hostile) Better diagnostics (help the user dispose of alarms) Model other attributes (reassembled TCP, network state, event rates) Integrate with host and signature systems Test in live environment

Thank You