HMM Profiles for Network Traffic Classification Charles Wright, Fabian Monrose and Gerald Masson Johns Hopkins University Information Security Institute.

Slides:



Advertisements
Similar presentations
1 VLDB 2006, Seoul Mapping a Moving Landscape by Mining Mountains of Logs Automated Generation of a Dependency Model for HUG’s Clinical System Mirko Steinle,
Advertisements

Hidden Markov Model in Biological Sequence Analysis – Part 2
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Data Mining Methodology 1. Why have a Methodology  Don’t want to learn things that aren’t true May not represent any underlying reality ○ Spurious correlation.
Predicting Tor Path Compromise by Exit Port IEEE WIDA 2009December 16, 2009 Kevin Bauer, Dirk Grunwald, and Douglas Sicker University of Colorado Client.
Decision Trees for Server Flow Authentication James P. Early and Carla E. Brodley Purdue University West Lafayette, IN 47907
Profile Hidden Markov Models Bioinformatics Fall-2004 Dr Webb Miller and Dr Claude Depamphilis Dhiraj Joshi Department of Computer Science and Engineering.
1 Profile Hidden Markov Models For Protein Structure Prediction Colin Cherry
1 Network Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
An Empirical Study of Real Audio Traffic A. Mena and J. Heidemann USC/Information Sciences Institute In Proceedings of IEEE Infocom Tel-Aviv, Israel March.
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis Presented by Yang Gao 11/2/2011 Charles V. Wright MIT Lincoln Laboratory Scott.
Models and Security Requirements for IDS. Overview The system and attack model Security requirements for IDS –Sensitivity –Detection Analysis methodology.
 Firewalls and Application Level Gateways (ALGs)  Usually configured to protect from at least two types of attack ▪ Control sites which local users.
Secure Shell – SSH Tam Ngo Steve Licking cs265. Overview Introduction Brief History and Background of SSH Differences between SSH-1 and SSH- 2 Brief Overview.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
HMM-BASED PATTERN DETECTION. Outline  Markov Process  Hidden Markov Models Elements Basic Problems Evaluation Optimization Training Implementation 2-D.
Hidden Markov Model 11/28/07. Bayes Rule The posterior distribution Select k with the largest posterior distribution. Minimizes the average misclassification.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
1 Internet Protocols and Network Performance Issues Carey Williamson iCORE Professor Department of Computer Science University of Calgary.
Analysis of Privacy Jim McCann & Daniel Kuo EECS 598.
Network Traffic Measurement and Modeling CSCI 780, Fall 2005.
Efficient Estimation of Emission Probabilities in profile HMM By Virpi Ahola et al Reviewed By Alok Datar.
Copyright © 2005 Department of Computer Science CPSC 641 Winter Network Traffic Measurement A focus of networking research for 20+ years Collect.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Algorithms for variable length Markov chain modeling Author: Gill Bejerano Presented by Xiangbin Qiu.
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
Application Layer. Applications A program or group of programs designed for end users. A program or group of programs designed for end users. Software.
Network Simulation Internet Technologies and Applications.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Key-Stroke Timing and Timing Attack on SSH Yonit Shabtai and Michael Lustig supervisor: Yoram Yihyie Technion - Israel Institute of Technology Computer.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Signatures As Threats to Privacy Brian Neil Levine Assistant Professor Dept. of Computer Science UMass Amherst.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Masquerade Detection Mark Stamp 1Masquerade Detection.
Isolated-Word Speech Recognition Using Hidden Markov Models
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
TCP/IP Yang Wang Professor: M.ANVARI.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Hidden Markov Models for Sequence Analysis 4
Bayesian networks Classification, segmentation, time series prediction and more. Website: Twitter:
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
Who Is Peeping at Your Passwords at Starbucks? To Catch an Evil Twin Access Point DSN 2010 Yimin Song, Texas A&M University Chao Yang, Texas A&M University.
Linux Networking and Security
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
1 Measuring Congestion Responsiveness of Windows Streaming Media James Nichols Advisors: Prof. Mark Claypool Prof. Bob Kinicki Reader: Prof. David Finkel.
Performance Analysis of Real Traffic Carried with Encrypted Cover Flows Nabil Schear David M. Nicol University of Illinois at Urbana-Champaign Department.
PGM 2003/04 Tirgul 2 Hidden Markov Models. Introduction Hidden Markov Models (HMM) are one of the most common form of probabilistic graphical models,
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
Botnets Usman Jafarey Including slides from The Zombie Roundup by Cooke, Jahanian, McPherson of the University of Michigan.
Measurement in the Internet Measurement in the Internet Paul Barford University of Wisconsin - Madison Spring, 2001.
Reading TCP/IP Protocol. Training target: Read the following reading materials and use the reading skills mentioned in the passages above. You may also.
Presentation for CDA6938 Network Security, Spring 2006 Timing Analysis of Keystrokes and Timing Attacks on SSH Authors: Dawn Xiaodong Song, David Wagner,
Role Of Network IDS in Network Perimeter Defense.
1 Internet Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
A Classification for Access Control List To Speed Up Packet-Filtering Firewall CHEN FAN, LONG TAN, RAWAD FELIMBAN and ABDELSHAKOUR ABUZNEID Department.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Module 4 Remote Login.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Timing Analysis of Keystrokes and Timing Attacks on SSH
Hidden Markov Models Part 2: Algorithms
Anupam Das , Nikita Borisov
Timing Analysis of Keystrokes And Timing Attacks on SSH
Statistical based IDS background introduction
Presentation transcript:

HMM Profiles for Network Traffic Classification Charles Wright, Fabian Monrose and Gerald Masson Johns Hopkins University Information Security Institute Baltimore, MD 21218

Overview Problem Description Background – Intrusion Detection – HMM Profiles Models Experiments Results Future Directions

Problem Description Given a packet trace, what protocol(s) generated it? – using only time & size Why: – backdoors – bad users ● everything runs on port 80 ● SSH tunnels – identify new, unknown traffic

The Power of Size and Timing Data Identifying stepping-stone hosts – Zhang and Paxson, USENIX Security 2000 Identifying web pages in encrypted traffic – Q. Sun, et al., Oakland 2002 Recovering passwords from SSH sessions – D. Song, et al., USENIX Security 2001

Can We Do More? Existing work is application-specific – Let's try to move down one layer in the protocol stack Existing work consists mostly of attacks – Can we use this defensively?

Immediate Goals Modeling – Construct packet-level models for common application protocols, using very little per-packet data. – This is new Classification – Given a TCP connection, what protocol generated it?

Other Applications ? Profiling application processes using system calls – data has the necessary structure Profiling users with shell commands – ???

Overview Problem Description Background – Intrusion Detection – HMM Profiles Models Experiments Results Future Directions

Background: Intrusion Detection Biology: – S. Forrest, et al., Oakland 1996, CACM '97 Sequence Alignment: – S. Coull, et al., ACSAC 03 Decision Trees: – Early, et al., ACSAC 03 – classifier only, no model HMM methods: Ye, Lane, DuMouchel – fully-connected, no use of structure

Background: HMM Profiles Described by Krogh et al. and Eddy et al. in the bioinformatics literature, for multiple sequence alignment. Compares favorably to other methods Great when you have lots of data – Doesn't require all pairwise alignments Good for regular data with frequent small irregularities – Lots of Inserts and Deletes

HMM Profiles Left-right Hidden Markov Models built around a central chain of “Match” states These states capture the essential behavior we're interested in

HMM Profiles “Insert” states represent unusual data in an otherwise usual sequence

HMM Profiles “Delete” states allow some usual data to be omitted

HMM Profiles Visually, we have a column of states for each position in the chain

Modification: Two Match States Replace each Match state with two states: – One for packets from the Client – One for those from the Server

Why Two Match States? Intuition – interactivity: lots of cross-talk – data transfer: most packets go the same direction Measurements back this up – ACF for lag 1 shows correlation between successive packets Our choice represents a compromise between parsimony and precision

Interpreting the Models Match States typical – Represent typical packets from Client to Server, or Server to Client Insert States duplicate – Represent duplicate packets and retransmissions Delete States lost – Represent packets lost in the network, or dropped by the sensor

A Caveat This technique relies on predictable structure and patterns in the protocol traces Most application protocols have such structure – it's defined in their RFC's Some interactive protocols don't – For example: Telnet, SSH – This is a problem

Overview Problem Description Background – Intrusion Detection – HMM Profiles Modeling Experiments Results Future Directions

Modeling We build two models for network sessions, using only a single feature in each: – Packet size – Packet interarrival time These features are still intact after encryption

Special Considerations: Packet Sizes Problem: – We only have unencrypted data – Some modes of encryption (block ciphers) will mask the packet's true size Solution: binning – We round the cleartext packet sizes up to the next whole multiple of the block size.

Special Considerations: Packet Interarrival Times Problem: Interarrival times take on a wide range of values – And their distribution is heavy-tailed Problem: The network creates jitter in interarrival times

Special Considerations: Interarrival Times So it's harder to model this data – discrete models need a huge alphabet – discrete models could be confused by jitter Continuous models might be more appropriate – But they're harder to work with

Special Considerations: Interarrival Times Solution: use log(time) instead of time – Now we can bin the data and build a discrete- density HMM – This also masks some of the jitter – Use different sample rates to get larger or smaller bins

Building Models Initial model – Manually constructed, “hard-coded” – number of columns = average length of the sessions in the training set – all packets are equally likely, in all positions in the session

Building Models Train the initial model on a sample of the traces – Re-estimate HMM parameters using the Baum- Welch algorithm (EM) – Typically 2 or 3 iterations are enough

Overview Problem Description Background – Intrusion Detection – HMM Profiles Modeling Experiments Results Future Directions

Classification Many ways to choose a model for a sequence: – Maximize log p(sequence | model) ● used in the paper – Maximize log p(Viterbi path) ● provides a better alternative ● results not discussed here – Lots of other possibilities

Experimental Setup tcpdump data from MITLL Intrusion Detection Evaluation – a week of traces – 1-2 thousand examples of most protocols Data from the Internet link at GMU – 10 hours of traces – tens of thousands of examples for most

Experiments First, we try to classify just a few protocols – FTP, Telnet, HTTP, SMTP Comparison with earlier work – Early, et al. There's an error in the paper: – Early, et al. uses 5 protocols, not 4 – apologies to the authors

Experiments Examine a more realistic mix of 9 protocols: – non-interactive traffic: HTTP, HTTPS, SMTP (2 directions), FTP (control and data) – interactive traffic: Telnet, SSH, AOL Instant Messenger – Initially, some appear difficult to characterize: SSH, FTP control, AIM

Overview Problem Description Background – Intrusion Detection – HMM Profiles Modeling Experiments Results Future Directions

MITLL: Size Model Results

MITLL: Timing Model Results

MITLL Results: discussion Within 5% of Early, et al. results – except for Telnet – difficulty with different protocols However, this dataset is not realistic – based on LAN traffic – low data rate – small number of hosts involved

GMU: Size Model Results

GMU: Timing Model Results

GMU Results: discussion AIM is less interactive than we'd thought FTP control is interesting – judging by size, it's confused with SMTP – judging by timing, it's confused with SSH Increasing precision doesn't always improve overall performance – But it does tend to reduce the most frequent errors

Why Size Matters Most packet sizes are not dependent on ever-changing network conditions – we will see some duplicates, retransmissions, and omissions Interarrival times depend on the state at every router in the packets' paths – this is true for every pair of packets in the sequence

Overview Problem Description Background – Intrusion Detection – HMM Profiles Modeling Experiments Results Future Directions

Simple Improvements Modeling – model surgery – simulated annealing Model Selection Better Classifier(s)

Improving the Classifier Use the Viterbi Path's probability – already implemented – no real drawbacks Looking at other schemes – average transition or emission probabilities – information gain: IG = H(model) – H(model | sequence)

Future Directions Unsupervised Learning: Model-Based Clustering – will be useful for analyzing the SSH data Two-variable Models – use both size AND time – work in progress now – The Curse of Dimensionality

Conclusions Validates work by Early, et al. and Coull, et al. Demonstrates the necessity of testing on real data The HMM profile technique shows promise – Although naïve in implementation, we still achieve results comparable to prior work – Can classify wide-area traffic There are areas for improvement