Report on Intrusion Detection and Data Fusion By Ganesh Godavari.

Slides:



Advertisements
Similar presentations
C6 Databases.
Advertisements

Data Mining Sangeeta Devadiga CS 157B, Spring 2007.
Database – Part 3 Dr. V.T. Raja Oregon State University External References/Sources: Data Warehousing – Mr. Sakthi Angappamudali.
The State of Security Management By Jim Reavis January 2003.
Managing Data Resources
Civil and Environmental Engineering Carnegie Mellon University Sensors & Knowledge Discovery (a.k.a. Data Mining) H. Scott Matthews April 14, 2003.
Week 9 Data Mining System (Knowledge Data Discovery)
© Prentice Hall1 DATA MINING TECHNIQUES Introductory and Advanced Topics Eamonn Keogh (some slides adapted from) Margaret Dunham Dr. M.H.Dunham, Data Mining,
Advanced Topics COMP163: Database Management Systems University of the Pacific December 9, 2008.
Database – Part 2b Dr. V.T. Raja Oregon State University External References/Sources: Data Warehousing – Sakthi Angappamudali at Standard Insurance; BI.
University of Minnesota
Data Mining By Archana Ketkar.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Report on statistical Intrusion Detection systems By Ganesh Godavari.
seminar on Intrusion detection system
Data Mining – Intro.
Managing Data Resources. File Organization Terms and Concepts Bit: Smallest unit of data; binary digit (0,1) Byte: Group of bits that represents a single.
Computer Science Universiteit Maastricht Institute for Knowledge and Agent Technology Data mining and the knowledge discovery process Summer Course 2005.
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
1. Introduction Generally Intrusion Detection Systems (IDSs), as special-purpose devices to detect network anomalies and attacks, are using two approaches.
Dr. Awad Khalil Computer Science Department AUC
Technology Applicability for Prediction & Recognition of Piracy Efforts NATO ASI September 2011 Salamanca, Spain.
Kansas State University Department of Computing and Information Sciences CIS 830: Advanced Topics in Artificial Intelligence From Data Mining To Knowledge.
Data Mining Chun-Hung Chou
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Alert Correlation for Extracting Attack Strategies Authors: B. Zhu and A. A. Ghorbani Source: IJNS review paper Reporter: Chun-Ta Li ( 李俊達 )
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
Next-Generation IDS: A CEP Use Case in 10 Minutes 3rd Draft – November 8, nd Event Processing Symposium Redwood Shores, California Tim Bass, CISSP.
Chapter 6: Foundations of Business Intelligence - Databases and Information Management Dr. Andrew P. Ciganek, Ph.D.
Data Mining CS157B Fall 04 Professor Lee By Yanhua Xue.
Chapter 1 Introduction to Data Mining
Introduction to Data Mining Group Members: Karim C. El-Khazen Pascal Suria Lin Gui Philsou Lee Xiaoting Niu.
WELNS 670: Wellness Research Design Chapter 5: Planning Your Research Design.
Data Mining Chapter 1 Introduction -- Basic Data Mining Tasks -- Related Concepts -- Data Mining Techniques.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
Data Mining – Intro. Course Overview Spatial Databases Temporal and Spatio-Temporal Databases Multimedia Databases Data Mining.
Understanding the Human Network Martin Kruger LCDR Jodie Gooby November 2008.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Data Mining BY JEMINI ISLAM. Data Mining Outline: What is data mining? Why use data mining? How does data mining work The process of data mining Tools.
Managing Data Resources. File Organization Terms and Concepts Bit: Smallest unit of data; binary digit (0,1) Byte: Group of bits that represents a single.
National Council of Teachers of Mathematics Principles and Standards for grades pre-K-2.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
Data Mining and Decision Support
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
Chapter Two Copyright © 2006 McGraw-Hill/Irwin The Marketing Research Process.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Managing Data Resources File Organization and databases for business information systems.
Visual Analytics for Cyber Defense Decision-Making Anita D’Amico, Ph.D. Secure Decisions division of Applied Visions, Inc.
Profiling: What is it? Notes and reflections on profiling and how it could be used in process mining.
Data Mining – Intro.
DATA MINING © Prentice Hall.
School of Computer Science & Engineering
Security Methods and Practice CET4884
Wireless Sensor Network Architectures
Datamining : Refers to extracting or mining knowledge from large amounts of data Applications : Market Analysis Fraud Detection Customer Retention Production.
Data Warehouse.
Sangeeta Devadiga CS 157B, Spring 2007
MANAGING DATA RESOURCES
Data Warehousing and Data Mining
CVE.
Data Mining: Introduction
Data Warehousing Data Mining Privacy
SECURITY AS NON-FUNCTIONAL REQUIREMENT IN SOFTWARE ENGINEERING
Presentation transcript:

Report on Intrusion Detection and Data Fusion By Ganesh Godavari

Outline of the talk Intrusion Detection Data fusion Motivation Traditional models

Intrusion Detection & Data Fusion Intrusion Detection System –Protect availability and provide confidentiality and integrity of critical information infrastructures Data Fusion : task of data processing aiming at making decisions on the basis of distributed data sources specifying an object Data sources –Different physical nature Electromagnetic signals, sensor data… –Different accuracy Reliability?

Motivation & challenges Threat analysis –Known & unknown Pattern templates, traffic analysis, statistical-anomaly detection and state based detection Provide Reliability –Reduce false alarms, increase user confidence

Characteristics of IDS based on Waltz model Detection performance –Detection characteristics like false alarm rate, detection probabilities and ranges for an intrusion characteristic Spatial/temporal resolution –Ability to distinguish between two or more intrusions in space and time Spatial coverage –Span of coverage or field of view of the sensor Detection and Tracking modes –Mode of operation of the sensor i.e. staring or scanning; single or multiple target tracking Target Revisit Rate –Rate at which an intrusion is revisited by the sensor to perform measurements Measurement Accuracy –Statistical probability that the measurement or observation is accurate Measurement dimensionality –Number or measure of variables between target categories

Contd.. Hard Vs. Soft Data Reporting –Status of the sensor reports – can a decision be made without correlation or does the sensor require confirmation Detection/Tracking Reporting –Characteristic of the sensor to report individual events or maintain a time-sequence of the events or events

Hierarchy of IDS Data Fusion Inferences Threat Analysis Situation Assessment Behavior of Intruder Identity of Intruder Rate of Intrusion Existence of intrusion High Medium Low Types of Inference Level of Inference

Data fusion and OODA model Decision support systems and data fusion system need to be tightly coupled Decision support system must –Observe Collection of data from sensors, network sniffers, system log files –Orient Data mining concepts of learning unknown characteristics. –Decide Refinement of knowledge into threat knowledge and determination of appropriate counter measures –Act Automated and human responses to threat/vulnerability

OODA mapping Three levels of abstraction –Data Measurement and observations –Information Data placed in context, indexed and organized. –Knowledge/intelligence Information explained and understood

Intrusion Detection Data Fusion This ID model is based on deductive process used to detect previously known patterns in many sources of data Alignment to a common frame of reference Calibration and filtering Observation identifiers, time of observation, and description Data is correlated in time Data is assigned weighted Metrics based on relative importance Situational knowledge used for Analyzing objects and groups against existing Intrusion detection templates to provide assessment Correlation between level 3 threat assessment and security Policy and objectives determine the implications of current Situation base. The whole process is refined via level 4 resource Management based on situational awareness

notes Situational data is collected from sniffers and other ID sensors with primitive observation identifiers, time of observation and descriptions. This raw data requires calibration or filtering known as level0 refinement. All the three measurements must be aligned to a common frame of reference. This alignment is known as level1 object refinement. Here data is correlated in time and data is assigned weighted metrics based in relative importance. Observation may be associated and paired and placed in context in an information base. Situation refinement provides situational knowledge and awareness. Situational knowledge is used to analyze objects and aggregated groups against existing intrusion detection templates to provide assessment of the current situation and suggest or identify future threat attacks. Correlation between level3 threat assessment and security policy and objectives determine the implications of the current situation base. The entire process is refined via level 4 resource management based on situational awareness.

Technical terms !! Data mining/knowledge discovery : search for hidden patterns based on previously undetected intrusions to help develop new detection templates Data fusion Vs data mining –Inference method and temporal perspective

Intrusion detection data mining

notes Raw data from relevant network management and intrusion detection systems are collected and indexed in the data warehouse. Major Technical issue is how to reconcile the raw data from many different formats and inconsistent data definitions.

Process involved in intrusion detection data mining Data cleansing –check to insure the collected data is in correct ranges and limits – evaluate overall consistency of the data – ensure hierarchical relationship exists Data selection and transformation –Initial sets that will be used for data mining are selected Data mining –Performed on selected data sets in either manual or automated modes

Data mining operations characterized by waltz Clustering –Data is segmented into subsets that share common properties Association –Analysis of both the cause and effect and structure relationship between data sets Statistical Analysis –Determine the likelihood of characteristics and association in selected data sets Rule Abduction –Development of IF-THEN-ELSE rules that describe associations, structures and test rules Link or tree abduction –Performed to discover relationships between data sets and interesting connecting pattern properties Deviation Analysis –Locate and analyze deviations from normal statistical behavior Neural Abduction –Process of training artificial neural networks to match data, extract node weights and structure (similar to abducted rule sets)

Intrusion detection data mining contd.. Discovery modeling –Information is mined into new ID knowledge –Development of refined models to predict future events based on historical data Visualization –human process of pattern recognition

Questions ?

References Intrusion detection systems and multi sensor data fusion: creating cyber situational Awareness by Tim Bass Communications of the ACM (2000)