Design of an Intrusion Response System using Evolutionary Computation Rohit Parti.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

2 Introduction A central issue in supporting interoperability is achieving type compatibility. Type compatibility allows (a) entities developed by various.
Formal Methods for Intrusion Detection Presented by Brian Kellogg CSE 914: Formal Methods for Software Development Michigan State University December 11.
Impact Analysis of Cheating in Application Level Multicast s 1090176 Masayuki Higuchi.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Best-First Search: Agendas
Access Control Chapter 3 Part 5 Pages 248 to 252.
A Game-theoretic Approach to the Design of Self-Protection and Self-Healing Mechanisms in Autonomic Computing Systems Birendra Mishra Anderson School of.
CSA 223 network and web security Chapter one
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
 Firewalls and Application Level Gateways (ALGs)  Usually configured to protect from at least two types of attack ▪ Control sites which local users.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 24 Network Management: SNMP.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Distributed Intrusion Detection Systems (dIDS) 2/10 CIS 610.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
Lesson 6. Refinement of the Operator Model This page describes formally how we refine Figure 2.5 into a more detailed model so that we can connect it.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Background Notification services in LAN Provides Notification Selection Notification Delivery Done on a centralized server (hence not scalable) Challenge.
Intrusion Detection System Marmagna Desai [ 520 Presentation]
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to SysAid.
Domain Name Services And IP Addressing. Domain Name Services Domain name is a way to identify and locate computers connected to the Internet. No two organizations.
Patch Management Module 13. Module You Are Here VMware vSphere 4.1: Install, Configure, Manage – Revision A Operations vSphere Environment Introduction.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
Function: Definition A function is a correspondence from a first set, called the domain, to a second set, called the range, such that each element in the.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Network Topologies.
1 Chapter Overview Creating Sites and Subnets Configuring Intersite Replication Troubleshooting Active Directory Replication.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Network and Active Directory Performance Monitoring and Troubleshooting NETW4008 Lecture 8.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Using Windows Firewall and Windows Defender
Enforcing Concurrent Logon Policies with UserLock.
© 2010 VMware Inc. All rights reserved Patch Management Module 13.
Current Network Schema Router Internet Switch PC.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
CSI-E Computer Security Investigator – Enterprise.
A Web Crawler Design for Data Mining
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Data Communications and Networking CSCS 311 Lecture 2 Amjad Hussain Zahid.
SDN based Network Security Monitoring in Dynamic Cloud Networks Xiuzhen CHEN School of Information Security Engineering Shanghai Jiao Tong University,
Module 4: Planning, Optimizing, and Troubleshooting DHCP
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
C HAPTER 9 Supporting TCP/IP, DNS using Windows XP.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Evaluating Network Security with Two-Layer Attack Graphs Anming Xie Zhuhua Cai Cong Tang Jianbin Hu Zhong Chen ACSAC (Dec., 2009) 2010/6/151.
Hands-On Threat Modeling with Trike v1. Generating Threats.
Number Systems Revision of conversations What is a register Addition Complementation.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Cryptography and Network Security Sixth Edition by William Stallings.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
DeepDive Model Dongfang Xu Ph.D student, School of Information, University of Arizona Dec 13, 2015.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
1 Configuring Sites Configuring Site Settings Configuring Inter-Site Replication Troubleshooting Replication Maintaining Server Settings.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Research Direction Introduction Advisor : Frank, Y.S. Lin Presented by Yu Pu Wu.
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung 2011/11/22.
Understanding PopulationsSection 2 An Organism’s Niche A niche is the unique position occupied by a species, both in terms of its physical use of its habitat.
Network security Vlasov Illia
Allocation of Support Department Costs, Common Costs, and Revenues
Patch Management Module 13.
Correlation & Regression
Presentation transcript:

Design of an Intrusion Response System using Evolutionary Computation Rohit Parti

Agenda  Motivation  Automated Intrusion Response  Challenges  Response Model  Individuals Representation  EC Mechanism  Evaluation Function  Preliminary Results

Motivation  The number of computer attacks are increasing  Attacks are getting more sophisticated  Speed of Attacks are increasing

Motivation  Need for Computer Security –Intrusion Prevention –Intrusion Detection –Intrusion Response  Need for Automated Intrusion Response

Automated Intrusion Response  Need for Automated Response –Earlier Response Systems: Notification System and Manual Response Systems –System administrators can neither keep up with the pace that and IDS is delivering alerts, nor can they react within adequate time limits –Delay between detection of a possible intrusion and response to that intrusion –Research by Cohen shows that If delay is 10 hours, intruder has 80% success If delay is 20 hours, intruder has 95% success If delay is 30 hours, intruder has 100% success

Challenges in Automating Response  Countermeasures may only defend against attack, but can also have negative impact on legitimate users. –Possibility of response causing more damage than actual attack  Intrusion Detection Systems (IDS) are not perfect and can generate False Alarms. –This has an impact on response as uncertainty is generated in formulating a response.

Response Model  Focus is on choosing a response action from among alternatives that have the least negative impact on the whole system  Basic elements of the model –Resources (services provided by hosts) –System Users (users of the network) –Network Topology (the underlying communication architecture) –Firewall Rules  Entities: Resources and System Users together

Dependency  It is a relation between two entities. –One entity needs a service from another to be fully operational  Two types –Direct (represents dependency of an entity on a service) –Indirect (formed due to network topology and firewall rules)  Indirect dependencies are a precondition to fulfilling direct dependencies

Dependency Tree  Describes the relationship of an entity with other entities  Leaf Node: Describes an entity that does not depend on other entities  COMBINE Node: Describes an entity that needs access to more than one service  CHOICE Node: Describes an entity which needs access to at least one of a set of identical services

Capability  The capability c(r) of an entity ‘r’: – is a value ranging from 0.0 to 1.0 and – describes in how far the entity ‘r’ can perform its work given the current network configuration  If all the resources the entity ‘r’ uses are available, then c(r)=1.0  If a particular service the entity ‘r’ uses is unavailable, the value of c(r) decreases (as will be shown)

Capability Calculation  c(left) and c(right): denotes the capability of the left and right link of a node.  c: denotes the capability of any intermediate node  Leaf Node: –if entity provides service, capability is set to 1.0 –if entity does not provide service, capability is set to 0.0  COMBINE Node: c=(c(left)+c(right))/2  CHOICE Node: c=Max(c(left),c(right))

Example User ‘A’ (entity) uses the DNS server, the NFS server, and one of the two domain name servers DNS1 and DNS2 to accomplish all his tasks When the NFS server is unavailable

Dependency Degree  Describes in how far the operation of an entity is affected if the resource, which it depends on is no longer available –Example: user mainly surfs the internet High dependency on availability of DNS and HTTP server (say we set dependency degree to 100 %) Not very much on NFS server (say we set dependency degree to 75 %)  Changes to capability calculation –c(left)=c(left)*dependency degree –c(right)=c(right)*dependency degree

Evaluating the Network State  In a network many entities depend on other entities in the network  We create dependency trees for every such entity  Final State of Network: Average of all capability values of all dependency trees created over all entities  Handling cyclic dependencies: An unavailable service can affect the availability of other services –Create another dependency tree for the depending service

Individual Representation  Individual represents a response action –A set of operations that are performed when an intrusion is detected  A response actions is represented as a binary string of bits –Each bit is associated with an operation on a host that provides service  If a response action indicated an operation to be performed and the operation is already in effect, it is ignored –Example: If a response action indicates that a particular firewall rule be installed (removed), and that rule is already installed (not installed), the response action ignores the rule

EC Mechanism

Response History Agent (RHA)  Stores information about the attack and the response to that attack  Attack Information: Stored as “reports” generated by IDS  Response Information: Stored as a binary string that represents the response action  Partial Population: Created by selecting responses from RHA that have “similar intrusive patterns” (if many of the variables within the report are same)  As new attacks are generated, attack-response pair is added to the RHA  If exact similar attack had previously occurred we have the option to generate the response that was previously generated

Evaluation Function  Add the response action (defined by the individual) temporarily to the model  Determine total capability of network  For a mild attack, and a severe response, associate a penalty to the fitness –Mild attack: determined from IDS report  For a severe attack, and a mild response, associate a penalty to the fitness

Preliminary Results

Questions or Comments?

A Simpler Approach

Happy Thanksgiving!!! Thank You!!!