Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.

Slides:



Advertisements
Similar presentations
Applications of one-class classification
Advertisements

Data Mining Classification: Alternative Techniques
Data Mining and Intrusion Detection
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
CS 590M Fall 2001: Security Issues in Data Mining Lecture 3: Classification.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
1 Intrusion Detection CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 4, 2004.
Unsupervised Intrusion Detection Using Clustering Approach Muhammet Kabukçu Sefa Kılıç Ferhat Kutlu Teoman Toraman 1/29.
Copyright 2002, Center for Secure Information Systems 1 Panel: Role of Data Mining in Cyber Threat Analysis Professor Sushil Jajodia Center for Secure.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
ML ALGORITHMS. Algorithm Types Classification (supervised) Given -> A set of classified examples “instances” Produce -> A way of classifying new examples.
seminar on Intrusion detection system
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Oracle Data Mining Ying Zhang. Agenda Data Mining Data Mining Algorithms Oracle DM Demo.
Chapter 5 Data mining : A Closer Look.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection Systems: A Survey and Taxonomy A presentation by Emily Fetchko.
Introduction to Data Mining Engineering Group in ACL.
Data Mining By Andrie Suherman. Agenda Introduction Major Elements Steps/ Processes Tools used for data mining Advantages and Disadvantages.
LLNL-PRES This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344.
By : Anas Assiri.  Introduction  fraud detection  Immune system  Artificial immune system (AIS)  AISFD  Clonal selection.
Overview of Distributed Data Mining Xiaoling Wang March 11, 2003.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Distributed Network Intrusion Detection An Immunological Approach Steven Hofmeyr Stephanie Forrest Patrik D’haeseleer Dept. of Computer Science University.
1. Introduction Generally Intrusion Detection Systems (IDSs), as special-purpose devices to detect network anomalies and attacks, are using two approaches.
Data Mining for Intrusion Detection: A Critical Review Klaus Julisch From: Applications of data Mining in Computer Security (Eds. D. Barabara and S. Jajodia)
Chirag N. Modi and Prof. Dhiren R. Patel NIT Surat, India Ph. D Colloquium, CSI-2011 Signature Apriori based Network.
CHAPTER 12 ADVANCED INTELLIGENT SYSTEMS © 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang.
CS490D: Introduction to Data Mining Prof. Chris Clifton April 14, 2004 Fraud and Misuse Detection.
Where Are the Nuggets in System Audit Data? Wenke Lee College of Computing Georgia Institute of Technology.
Data Mining Chun-Hung Chou
Alert Correlation for Extracting Attack Strategies Authors: B. Zhu and A. A. Ghorbani Source: IJNS review paper Reporter: Chun-Ta Li ( 李俊達 )
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Copyright R. Weber Machine Learning, Data Mining ISYS370 Dr. R. Weber.
Intrusion Detection Adam Ashenfelter Nicholas J. Tyrrell.
Network Intrusion Detection Using Random Forests Jiong Zhang Mohammad Zulkernine School of Computing Queen's University Kingston, Ontario, Canada.
IIT Indore © Neminah Hubballi
Intrusion Detection Techniques for Mobile Wireless Networks Zhang, Lee, Yi-An Huang Presented by: Alex Singh and Nabil Taha.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
A Data Mining Approach for Building Cost-Sensitive and Light Intrusion Detection Models PI Meeting - July, 2000 North Carolina State University Columbia.
Data Mining Approaches for Intrusion Detection Wenke Lee and Salvatore J. Stolfo Computer Science Department Columbia University.
Introduction to machine learning and data mining 1 iCSC2014, Juan López González, University of Oviedo Introduction to machine learning Juan López González.
Data Mining: Classification & Predication Hosam Al-Samarraie, PhD. Centre for Instructional Technology & Multimedia Universiti Sains Malaysia.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
An Overview of Intrusion Detection Using Soft Computing Archana Sapkota Palden Lama CS591 Fall 2009.
© 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang 12-1 Chapter 12 Advanced Intelligent Systems.
Data Mining Anomaly/Outlier Detection Lecture Notes for Chapter 10 Introduction to Data Mining by Tan, Steinbach, Kumar © Tan,Steinbach, Kumar Introduction.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
Cryptography and Network Security Sixth Edition by William Stallings.
Chapter 20 Classification and Estimation Classification – Feature selection Good feature have four characteristics: –Discrimination. Features.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Anomaly Detection.
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
Data Mining and Decision Support
PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao.
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
Anomaly Detection. Network Intrusion Detection Techniques. Ştefan-Iulian Handra Dept. of Computer Science Polytechnic University of Timișoara June 2010.
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors : Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser.
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Network Management Lecture 13. MACHINE LEARNING TECHNIQUES 2 Dr. Atiq Ahmed Université de Balouchistan.
Some Great Open Source Intrusion Detection Systems (IDSs)
DATA MINING and VISUALIZATION Instructor: Dr. Matthew Iklé, Adams State University Remote Instructor: Dr. Hong Liu, Embry-Riddle Aeronautical University.
CSE 4705 Artificial Intelligence
Machine Learning for Computer Security
A survey of network anomaly detection techniques
Modeling IDS using hybrid intelligent systems
Presentation transcript:

Intrusion Detection Jie Lin

Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion Detection

What is the Intrusion Detection Intrusions are the activities that violate the security policy of system. Intrusion Detection is the process used to identify intrusions.

Types of Intrusion Detection System(1) Based on the sources of the audit information used by each IDS, the IDSs may be classified into – Host-base IDSs – Distributed IDSs – Network-based IDSs

Host-based IDSs – Get audit data from host audit trails. – Detect attacks against a single host Distributed IDSs – Gather audit data from multiple host and possibly the network that connects the hosts – Detect attacks involving multiple hosts Network-Based IDSs – Use network traffic as the audit data source, relieving the burden on the hosts that usually provide normal computing services – Detect attacks from network. Types of Intrusion Detection System(2)

Intrusion Detection Techniques Misuse detection – Catch the intrusions in terms of the characteristics of known attacks or system vulnerabilities. Anomaly detection – Detect any action that significantly deviates from the normal behavior.

Misuse Detection Based on known attack actions. Feature extract from known intrusions Integrate the Human knowledge. The rules are pre-defined Disadvantage: – Cannot detect novel or unknown attacks

Misuse Detection Methods & System MethodSystem Rule-based LanguagesRUSSEL,P-BEST State Transition AnalysisSTAT family(STAT,USTAT,NS TAT,NetSTAT) Colored Petri AutomataIDIOT Expert SystemIDES,NIDX,P- BEST,ISOA Case Based reasoningAutiGUARD

Anomaly Detection Based on the normal behavior of a subject. Sometime assume the training audit data does not include intrusion data. Any action that significantly deviates from the normal behavior is considered intrusion.

Anomaly Detection Methods & System MethodSystem Statistical methodIDES, NIDES, EMERALD Machine Learning techniques Time-Based inductive Machine Instance Based Learning Neural Network … Data mining approachesJAM, MADAM ID

Anomaly Detection Disadvantages Based on audit data collected over a period of normal operation. – When a noise(intrusion) data in the training data, it will make a mis-classification. How to decide the features to be used. The features are usually decided by domain experts. It may be not completely.

Misuse Detection vs. Anomaly Detection AdvantageDisadvantage Misuse Detection Accurately and generate much fewer false alarm Cannot detect novel or unknown attacks Anomaly Detection Is able to detect unknown attacks based on audit High false-alarm and limited by training data.

The Frame for Intrusion Detection

Intrusion Detection Approaches 1. Define and extract the features of behavior in system 2. Define and extract the Rules of Intrusion 3. Apply the rules to detect the intrusion Training Audit Data FeaturesRules Audit Data Pattern matching or Classification

Thinking about The Intrusion Detection System Intrusion Detection system is a pattern discover and pattern recognition system. The Pattern (Rule) is the most important part in the Intrusion Detection System – Pattern(Rule) Expression – Pattern(Rule) Discover – Pattern Matching & Pattern Recognition.

Rule Discover Method Expert System Measure Based method – Statistical method – Information-Theoretic Measures – Outlier analysis Discovery Association Rules Classification Cluster

Pattern Matching & Pattern Recognition Methods Pattern Matching State Transition & Automata Analysis Case Based reasoning Expert System Measure Based method – Statistical method – Information-Theoretic Measures – Outlier analysis Association Pattern Machine Learning method

Intrusion Detection Techniques

Pattern Matching Measure Based method Data Mining method Machine Learning Method

Pattern Matching KMP-Multiple patterns matching Algorithm – Using keyword tree to search – Building failure link to guarantee linear time searching Shift-And(Or) pattern matching Algorithm – A classical approximate pattern matching algorithm Karp-Rabin fingerprint method – Using the Modular arithmetic and Remainder theorem to match pattern … (Such as regular expression pattern matching)

Measure Based Method Statistical Methods & Information-Theoretic Measures Define a set of measures to measure different aspects of a subject of behavior. (Define Pattern) Generate an overall measure to reflect the abnormality of the behavior. For example: – statistic T 2 = M 1 2 +M 2 2 +…+M n 2 – weighted intrusion score = Σ M i *W i – Entropy: H(X|Y)= Σ Σ P(X|Y) (-log(P(X|Y))) Define the threshold for the overall measure

Association Pattern Discover Goal is to derive multi-feature (attribute) correlations from a set of records. An expression of an association pattern: The Pattern Discover Algorithm: 1. Apriori Algorithm 2. FP(frequent pattern)-Tree

Association Pattern Example

Association Pattern Detecting Statistics Approaches – Constructing temporal statistical features from discovered pattern. – Using measure-based method to detect intrusion Pattern Matching – Nobody discuss this idea.

Machine Learning Method Time-Based Inductive Machine – Like Bayes Network, use the probability and a direct graph to predict the next event Instance Based Learning – Define a distance to measure the similarity between feature vectors Neural Network …

Classification This is supervised learning. The class will be predetermined in training phase. Define the character of classes in training phase. A common approach in pattern recognition system

Clustering This is unsupervised learning. There are not predetermined classes in data. Given a set of measurement, the aim is that establishes the class or group in the data. It will output the character of each class or group. In the detection phase, this method will get more time cost (O(n 2 )). I suggest this method only use in pattern discover phase

Ideas for improving Intrusion Detection

Idea 1: Association Pattern Detecting Using the pattern matching algorithm to match the pattern in sequent data for detecting intrusion. No necessary to construct the measure. But its time cost is depend on the number of association patterns. It possible constructs a pattern tree to improve the pattern matching time cost to linear time

Idea 2: Discover Pattern from Rules The exist rules are the knowledge from experts knowledge or other system. The different methods will measure different aspects of intrusions. Combine these rules may find other new patterns of unknown attack. For example: – Snort has a set of rule which come from different people. The rules may have different aspects of intrusions. – We can use the data mining or machine learning method to discover the pattern from these rule.

Reference Lee, W., & Stolfo, S.J. (2000). A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security, 3 (4) (pp ). Jian Pei,Data Mining for Intrusion Detection:Techniques,Applications and Systems, Proceedings of the 20th International Conference on Data Engineering (ICDE 04) Peng Ning and Sushil Jajodia,Intrusion Detection Techniques. From Snort---The open source intrusion detection system. (2002). Retrieved February 13, 2003, from

Thank you!