Intrusion Detection Adam Ashenfelter Nicholas J. Tyrrell.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
1 Intrusion Detection CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 4, 2004.
Copyright 2002, Center for Secure Information Systems 1 Panel: Role of Data Mining in Cyber Threat Analysis Professor Sushil Jajodia Center for Secure.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
A survey of commercial tools for intrusion detection 1. Introduction 2. Systems analyzed 3. Methodology 4. Results 5. Conclusions Cao er Kai. INSA lab.
seminar on Intrusion detection system
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Intrusion Detection Systems: A Survey and Taxonomy A presentation by Emily Fetchko.
Building Survivable Systems based on Intrusion Detection and Damage Containment Paper by: T. Bowen Presented by: Tiyseer Al Homaiyd 1.
Computer Account Hijacking Detection Using a Neural Network Nick Pongratz Math 340.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Distributed Network Intrusion Detection An Immunological Approach Steven Hofmeyr Stephanie Forrest Patrik D’haeseleer Dept. of Computer Science University.
Data Mining for Intrusion Detection: A Critical Review Klaus Julisch From: Applications of data Mining in Computer Security (Eds. D. Barabara and S. Jajodia)
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
CS490D: Introduction to Data Mining Prof. Chris Clifton April 14, 2004 Fraud and Misuse Detection.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
Network Intrusion Detection Using Random Forests Jiong Zhang Mohammad Zulkernine School of Computing Queen's University Kingston, Ontario, Canada.
IIT Indore © Neminah Hubballi
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Intrusion Control. CSCE Farkas2 Readings Lecture Notes Pfleeger: Chapter 7.5.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Name:Neha Madgaonkar Roll no:  What are intruders?  Types  Behavior  Techniques.
Kittiphan Techakittiroj (25/10/58 12:06 น. 25/10/58 12:06 น. 25/10/58 12:06 น.) Intrusion Detection System Kittiphan Techakittiroj
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
7.5 Intrusion Detection Systems Network Security / G.Steffen1.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Intrusion Detection State of the Art/Practice Anita Jones University of Virginia.
1 A Network Security Monitor Paper By: Heberlein et. al. Presentation By: Eric Hawkins.
Cryptography and Network Security Sixth Edition by William Stallings.
Chapter 9 Intruders.
1 Intrusion Detection “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking resources.”
Intrusion Detection System
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
Intrusion and intrusion detection Published online 27 July 2001 by John McHugh, © Springer-Verlag 2001 Presented by Po-yuan Peng.
PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao.
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors : Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Some Great Open Source Intrusion Detection Systems (IDSs)
Lesson 8 Intrusion Detection Systems
Application Intrusion Detection
Chapter 9 Intruders.
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Ch.22 INTRUSION DETECTION
NETWORKS Fall 2010.
Intrusion Control.
Intrusion Detection Systems
Evaluating a Real-time Anomaly-based IDS
NET 412 Network Security protocols
Chapter 9 Intruders.
Intrusion Detection Systems
Intrusion.
Intrusion Detection Systems
Presentation transcript:

Intrusion Detection Adam Ashenfelter Nicholas J. Tyrrell

What Is Intrusion Detection A network burglar alarm Passively monitors the system for suspect behavior Sources for monitored data –Audit trails (logs of user commands) –System calls –Network traffic

Examples of Suspect Behavior System use outside of normal time Abnormal frequency of use Abnormal volume of data referenced Abnormal patterns of reference to programs or data

Some Possible Intrusions External Penetrator –An attacker who has gained access to a computer of which he is not a legitimate user Masquerader –An attacker who has gained the gained access to a valid user’s account Misfeasor –A legitimate user who abuses his privileges to violate system security policies

Types of Intrusion Detection Policy based detection –Detects using a predefined rule base Anomaly detection –Collects statistics, generating profiles for normal/abnormal behavior

Policy Based Detection Pros –Good against known attacks –“False alarms” can be kept low –Normally less computationally expensive Cons –Very susceptible to novel or unusual attacks –Writing the rules can be very tedious –If the rules become known to an attacker, they can be avoided

Anomaly Detection Pros –Robust against new types of attacks –Can learn by example, no need to write rules by hand Cons –Might give “false alarms” for unusual but valid behavior –Computationally expensive; sometimes requiring off-line algorithms –Might learn to accept dangerous behavior as normal over time

Some Current and Previous Intrusion Detection Systems NIDES NADIR NSM

NIDES Evolved from IDES over the early 1990’s Uses both rule based and anomaly detection

NIDES Pros –Highly Modularized –Real or non-real time detection –Low false positive rate (false alarms) Cons –Susceptible to Tampering Direct attack on Nides –Reverse Engineering Attacker could avoid rules used by Nides’ policy detection

NADIR Automated system for detecting network intrusion and misuse Developed at Los Alamos National Laboratory Served 9000 computers including 6 Cray- class computers Uses rules at system wide level and also creates statistical profiles for each user

NADIR Continued Pros –Highly Interactive –Error Detection –System Management –User Education Cons –High number of false positives –Needs better anomaly detection –Not real time detection

NSM Prototype deployed at UC Davis during 1980’s First System to use Network data directly Layered approach to data collection Uses both policy and anomaly detection

NSM Continued Pros –Audit data instantly available –Impervious to direct attack –Low impact on system resources Cons –Attacks made on hosts without accessing the network are undetectable –Cryptography could be the death of NSM

Some Current Research Areas Data Mining –Using data mining techniques to better find consistent and useful patterns from logged data to use as rules Machine Learning –Using machine learning methods, such as neural networks, to try and build better anomaly detection (fewer false alarms)

Biliography Axelsson, S. (1999) Research in Intrusion-Detection Systems: A Survey Ghosh, A. Schwartzbard, A., Schatz, M. Learning Program Behavior Profiles for Intrusion Dection Ryan, J., Lin, M., Miikkulainen, R. (1998) Intrusion Detection with Neural Networks In Advances in Neural Information Processing Systems 10 Lane, T., Brodley, C (1997). An Application of Machine Learning to Anomaly Detection Lee, W., Stolfo, S. Data Mining Approaches for Intrusion Detection