Machine Learning in Intrusion Detection Systems (IDS)

Slides:



Advertisements
Similar presentations
Flytrap: A Proposed Network-Based Strategy for Dynamically Managing Security.
Advertisements

An Introduction to Artificial Intelligence. Introduction Getting machines to “think”. Imitation game and the Turing test. Chinese room test. Key processes.
EXPERT SYSTEMS apply rules to solve a problem. –The system uses IF statements and user answers to questions in order to reason just like a human does.
Biologically Inspired AI (mostly GAs). Some Examples of Biologically Inspired Computation Neural networks Evolutionary computation (e.g., genetic algorithms)
4-1 Management Information Systems for the Information Age Copyright 2002 The McGraw-Hill Companies, Inc. All rights reserved Chapter 4 Decision Support.
The Decision-Making Process IT Brainpower
Machine Learning CPSC 315 – Programming Studio Spring 2009 Project 2, Lecture 5.
1 Chapter 10 Introduction to Machine Learning. 2 Chapter 10 Contents (1) l Training l Rote Learning l Concept Learning l Hypotheses l General to Specific.
SESSION 10 MANAGING KNOWLEDGE FOR THE DIGITAL FIRM.
Unsupervised Intrusion Detection Using Clustering Approach Muhammet Kabukçu Sefa Kılıç Ferhat Kutlu Teoman Toraman 1/29.
Genetic Algorithms and Their Applications John Paxton Montana State University August 14, 2003.
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 7: Expert Systems and Artificial Intelligence Decision Support.
Behavior- Based Approaches Behavior- Based Approaches.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in Unstructured P2P Networks Distributed Systems Research Seminar on Mikko Vapa, research student.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
By : Anas Assiri.  Introduction  fraud detection  Immune system  Artificial immune system (AIS)  AISFD  Clonal selection.
Classifiers, Part 3 Week 1, Video 5 Classification  There is something you want to predict (“the label”)  The thing you want to predict is categorical.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
CHAPTER 12 ADVANCED INTELLIGENT SYSTEMS © 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang.
Data Mining Chun-Hung Chou
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Chapter 8 Prediction Algorithms for Smart Environments
Information Fusion in Continuous Assurance Johan Perols University of San Diego Uday Murthy University of South Florida UWCISA Symposium October 2, 2009.
IIT Indore © Neminah Hubballi
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
Security Evaluation of Pattern Classifiers under Attack.
Four Types of Decisions (p p.130) Structured vs. Nonstructured(Examples?) –Structured: Follow rules and criteria. The right answer exists. No “feel”
11 C H A P T E R Artificial Intelligence and Expert Systems.
Ensemble of ensemble of tree and neural network Louis Duclos-Gosselin.
Study on Genetic Network Programming (GNP) with Learning and Evolution Hirasawa laboratory, Artificial Intelligence section Information architecture field.
Lecture 8: 24/5/1435 Genetic Algorithms Lecturer/ Kawther Abas 363CS – Artificial Intelligence.
RECENT DEVELOPMENTS OF INDUCTION MOTOR DRIVES FAULT DIAGNOSIS USING AI TECHNIQUES 1 Oly Paz.
An Overview of Intrusion Detection Using Soft Computing Archana Sapkota Palden Lama CS591 Fall 2009.
Data storage management and user profiling with AI methods W. Funika, F.Szura, J.Kitowski KUKDM 2015, Zakopane.
MURI: Integrated Fusion, Performance Prediction, and Sensor Management for Automatic Target Exploitation 1 Dynamic Sensor Resource Management for ATE MURI.
1 Machine Learning 1.Where does machine learning fit in computer science? 2.What is machine learning? 3.Where can machine learning be applied? 4.Should.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
GTRI_B-1 ArtificiaI Intelligence Methods for Detection and Handling of Software Behavior Anomalies Chris Simpkins Georgia Tech Research Institute
Data Mining In contrast to the traditional (reactive) DSS tools, the data mining premise is proactive. Data mining tools automatically search the data.
AN INTELLIGENT AGENT is a software entity that senses its environment and then carries out some operations on behalf of a user, with a certain degree of.
© 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang 12-1 Chapter 12 Advanced Intelligent Systems.
Chapter 4 Decision Support System & Artificial Intelligence.
1 Chapter 10 Introduction to Machine Learning. 2 Chapter 10 Contents (1) l Training l Rote Learning l Concept Learning l Hypotheses l General to Specific.
Artificial Intelligence Center,
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
A Blackboard-Based Learning Intrusion Detection System: A New Approach
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 4 Decision Support and.
Organic Evolution and Problem Solving Je-Gun Joung.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
IEEE AI - BASED POWER SYSTEM TRANSIENT SECURITY ASSESSMENT Dr. Hossam Talaat Dept. of Electrical Power & Machines Faculty of Engineering - Ain Shams.
Il-Ahn Cheong Linux Security Research Center Chonnam National University, Korea.
Automating Cyber- Defense Management By: Zach Archer COSC 316.
Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –
An Evolutionary Algorithm for Neural Network Learning using Direct Encoding Paul Batchis Department of Computer Science Rutgers University.
Decision Support and Business Intelligence Systems (9 th Ed., Prentice Hall) Chapter 12: Artificial Intelligence and Expert Systems.
George Yauneridge.  Machine learning basics  Types of learning algorithms  Genetic algorithm basics  Applications and the future of genetic algorithms.
Introduction to Machine Learning, its potential usage in network area,
Decision Trees (suggested time: 30 min)
TECHNOLOGY GUIDE FOUR Intelligent Systems.
RESEARCH APPROACH.
Chapter 11: Learning Introduction
Evaluating a Real-time Anomaly-based IDS
First work in AI 1943 The name “Artificial Intelligence” coined 1956
Network Intrusion Detection Using GA
MANAGING KNOWLEDGE FOR THE DIGITAL FIRM
Chapter 12 Advanced Intelligent Systems
Overview of Machine Learning
Intrusion Detection system
From Data to Action Thanos Gentimis
Presentation transcript:

Machine Learning in Intrusion Detection Systems (IDS)

2 papers:  Artificial Intelligence & Intrusion Detection: Current & Future Directions [AIID] –J. Frank  Applying Genetic Programming to Intrusion Detection [GP] –M. Crosbie, G. Spafford

AIID  What is intrusion detection?  What are the issues in Intrusion Detection? –Data collection –Data reduction –Behavior Classification –Reporting –Response

AIID  AI methods are used to help solve some issues  For data classification: –Classifier systems Neural Network Decision Tree Feature Selection

AIID  Data Reduction –Data Filtering –Feature Selection –Data Clustering

AIID  Behavior Classification –Expert Systems –Anomaly Detection –Rule-Based Induction

AIID  An experiment using Feature Selection –Info. about network connections using a Network Security Monitor

AIID  3 Search algorithms used: –Backward Sequential Search (BSS) –Beam Search (BS) –Random Generation Plus Sequential Selection (RS)

AIID  Algorithm performance

AIID  Error Rate Performance (All) [I, W, T, PS, PD, DS] [T, PD, DS] Best

AIID  Error Rate Performance (SMTP) [W, T, PS, PD, DS] Best

AIID  Error Rate Performance (Login) Best [W, T, PS, PD] [T, PD, DS] RGSS

AIID  Error Rate Performance (Shell) [W, PS, PD, DS] BS & BSS Best [W, T, PS, DS] RS

GP (Applying Genetic Programming to Intrusion Detection)  An IDS that exploits the learning power of Genetic Programming  Two types of security tools : –Pro-active –Reactive : IDS falls in this catergory

GP  Components in an IDS –Anomaly May indicate a possible intrusion –So how do we know for sure? Expert-system Rule-set = model Metrics Comparing metrics & model  But … If a new intrusion scenario arises modifying the IDS is complicated

GP  A finer-grained approach IDS gets split into multiple Autonomous Agents

GP

 Using GP for learning –Instead of a monolithic static “knowledge base” –The GP paradigm allows evolution of agents that could be placed in a system to monitor audit data –GP programs are in a simple meta-language Have primitives that access audit data fields and manipulate them

GP  Internal agent architecture

GP  Learning by feedback  What do the agents monitor? –Inter-packet timing metrics: Total # of socket connections, average time between socket connections, minimum time between socket connections, maximum time between socket connections, destination port, source port –Potential intrusions looked for: Port flooding, port-walking, probing, password cracking

GP  Δ = | outcome – suspicion |  Penalty = Δ * ranking /100  Fitness = (100 – Δ) - penalty

GP  Multiple types: –Time (long int), port (int), boolean, suspicion (int)  Problems with multiple types  ADF solution to type safety –ADF: Automatically Defined Function –To monitor network timing: avg_interconn_time, min_interconn_time, max_interconn_time –For port monitoing: src_port, dest_port –For privileged port checking: is_priv_dest_port, is_priv_src_port

GP  Experimental results:

That’s it !!!

Too old a research idea … did not find any current researches in the same field