Anomaly Detection Steven M. Bellovin https://www.cs.columbia.edu/~smb Matsuzaki ‘maz’ Yoshinobu 1.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

REFLEX INTRUSION PREVENTION SYSTEM.. OVERVIEW The Reflex Interceptor appliance is an enterprise- level Network Intrusion Prevention System. It is designed.
Greg Williams CS691 Summer Honeycomb  Introduction  Preceding Work  Important Points  Analysis  Future Work.
1 Reading Log Files. 2 Segment Format
Intrusion Detection CS461/ECE422 Spring Reading Material Chapter 8 of the text.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Behavior Intrusion Detection: Enhanced Hakan Evecek Rodolfo Ortiz Hakan Evecek Rodolfo Ortiz.
Intrusion Detection Systems and Practices
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Statistical based IDS background introduction. Statistical IDS background Why do we do this project Attack introduction IDS architecture Data description.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
Computer Security Fundamentals by Chuck Easttom Chapter 9: Computer Security Software.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Day 19. Security Tools Firewalls –Host Based –Network based IDS/IPS –Host Based –Network based –Signature based detection –Anomaly based detection Anti.
APA of Isfahan University of Technology In the name of God.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
1 Guide to Network Defense and Countermeasures Chapter 2.
Network Flow-Based Anomaly Detection of DDoS Attacks Vassilis Chatzigiannakis National Technical University of Athens, Greece TNC.
IIT Indore © Neminah Hubballi
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Signature Based and Anomaly Based Network Intrusion Detection
TCP/IP Yang Wang Professor: M.ANVARI.
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
CINBAD CERN/HP ProCurve Joint Project on Networking 26 May 2009 Ryszard Erazm Jurga - CERN Milosz Marian Hulboj - CERN.
Open-Eye Georgios Androulidakis National Technical University of Athens.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Firewalls Check incoming and outgoing TCP/IP messages Try to roughly identify abnormal traffic Regulate Inbound and Outbound connections - Make your machine.
Intrusion Detection System
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
Machine Learning for Network Anomaly Detection Matt Mahoney.
Role Of Network IDS in Network Perimeter Defense.
Design Lines for a Long Term Competitive IDS Erwan Lemonnier KTH-IT / Defcom.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
Some Great Open Source Intrusion Detection Systems (IDSs)
Common System Exploits Tom Chothia Computer Security, Lecture 17.
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-401)
Intrusion Prevention Systems
Network hardening Chapter 14.
Statistical based IDS background introduction
Intrusion Detection Systems
Presentation transcript:

Anomaly Detection Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1

Why Anomaly Detection? Signatures defend against known attacks – You need a separate signature for each one – By definition, there are no signatures for things that don’t exist Anomaly detectors look for unusual activity: things that normally don’t happen Implication: must first know what is normal – “Normal” is different for every organization 2

What’s An Anomaly? NormalInfected 3

Examples massive incoming traffic - periodic security update or DoS  unusual outbound traffic - video chat, flood attack  or information theft  unusual protocol communication - new application or compromised host  4

General Process Establish a baseline of normal activity – Sample activity from times when you’re not under attack Train your detectors on this baseline set Continually match current behavior against the baseline Investigate “significant” deviations 5

CV5: “Correlate Violations of Volume, Velocity, Values, Vertices” Correlate is obvious Violations implies some "normal" model is violated Volume and Velocity are standard metrics of expected flow behavior (think highways) Values pertain to any content analysis, packet heads, datagrams, bodies, URL, PHP variable argument values, etc. Vertices pertains to graphic theoretic constructs, connectivity between entities, IP addresses, MAC addresses, ports, etc. 6

Establishing a Baseline Different strategies for different uses and kinds of attacks – What does your traffic flow normally look like? – What applications do users run? – What is the byte value distribution of certain file types? Word documents infected with shell code will have more bytes that look like x86 machine code Different groups will have different normal behavior 7

One Way to Define Normal (Mathematically) find clusters. Points outside the clusters are abnormal. 8

Limitations It’s hard to define “normal” – Was your training data really attack-free? – What if legitimate patterns change? New employees? New versions of applications? Relatively high false positive rate Can miss subtle attacks Must run anomaly detectors on many different activities 9

Advantages Can detect minor variants of existing attacks (a serious issue in the anti-virus world) Can detect 0-day attacks No need to constantly update signature database Probably the wave of the future in intrusion detection 10

Example: Netflow router can export traffic flow information (incoming interface, packet headers) to a collector – useful to analyze traffic 11 netflow export netflow collector

Example: Mail Logs Look at the mail logs every day – Is someone sending significantly more mail than they normally do? – Is someone sending to many more recipients than normal? – Is the size of someone’s mail messages larger than normal? – Anomalies can be benign: recently, someone ed me a 9 MB, 1600 page PDF, with many scanned images—and it was perfectly legitimate 12

Example: Host Monitoring Monitor system calls – What system calls does an application normally make? – What sequences of system calls does it normally make? Works before encryption or after decryption But—attackers can look for and disable a host- based IDS 13