1 Utilizing fuzzy logic and trend analysis for effective intrusion detection Author: Martin Botha and Rossouw von Solms Source: Computers & Security Vol.

Slides:



Advertisements
Similar presentations
AI – CS364 Fuzzy Logic Fuzzy Logic 3 03 rd October 2006 Dr Bogdan L. Vrusias
Advertisements

Fuzzy Logic and its Application to Web Caching
Fuzzy Inference and Defuzzification
Learning Objectives LO5 Document an accounting system to identify key controls and weaknesses in order to assess control risk. LO6 Write key control tests.
Approximate Reasoning 1 Expert Systems Dr. Samy Abu Nasser.
Intrusion Detection Systems and Practices
Learning Classifier Systems to Intrusion Detection Monu Bambroo 12/01/03.
Fuzzy Medical Image Segmentation
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
WELCOME TO THE WORLD OF FUZZY SYSTEMS. DEFINITION Fuzzy logic is a superset of conventional (Boolean) logic that has been extended to handle the concept.
Ming-Feng Yeh General Fuzzy Systems A fuzzy system is a static nonlinear mapping between its inputs and outputs (i.e., it is not a dynamic system).
Introduction to Fuzzy Logic Control
Introduction to Rule-Based Systems, Expert Systems, Fuzzy Systems Introduction to Rule-Based Systems, Expert Systems, Fuzzy Systems (sections 2.7, 2.8,
Lecture 11 Intrusion Detection (cont)
ROUGH SET THEORY AND FUZZY LOGIC BASED WAREHOUSING OF HETEROGENEOUS CLINICAL DATABASES Yiwen Fan.
Computer Crime and Information Technology Security
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Detecting Network Violation Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming.
IIT Indore © Neminah Hubballi
Load Balancing in Distributed Computing Systems Using Fuzzy Expert Systems Author Dept. Comput. Eng., Alexandria Inst. of Technol. Content Type Conferences.
Fuzzy Rules 1965 paper: “Fuzzy Sets” (Lotfi Zadeh) Apply natural language terms to a formal system of mathematical logic
Grant Pannell. Intrusion Detection Systems  Attempt to detect unauthorized activity  CIA – Confidentiality, Integrity, Availability  Commonly network-based.
MTH 104 Calculus and Analytical Geometry Lecture No. 2.
CSC-682 Cryptography & Computer Security Sound and Precise Analysis of Web Applications for Injection Vulnerabilities Pompi Rotaru Based on an article.
An Overview of Intrusion Detection Using Soft Computing Archana Sapkota Palden Lama CS591 Fall 2009.
Fuzzy Network Profiling for Intrusion Detection Dickerson, J.E.; Dickerson, J.A. Fuzzy Information Processing Society, NAFIPS. 19th International.
Fuzzy Expert Systems. 2 Motivation On vagueness “Everything is vague to a degree you do not realise until you have tried to make it precise.” Bertrand.
KAIST Internet Security Lab. CS710 Behavioral Detection of Malware on Mobile Handsets MobiSys 2008, Abhijit Bose et al 이 승 민.
Fuzzy Inference (Expert) System
Kittiphan Techakittiroj (25/10/58 12:06 น. 25/10/58 12:06 น. 25/10/58 12:06 น.) Intrusion Detection System Kittiphan Techakittiroj
Mobile Robot Navigation Using Fuzzy logic Controller
Ming-Feng Yeh Fuzzy Control The primary goal of control engineering is to distill and apply knowledge about how to control a process so that the.
Neural-Network-Based Fuzzy Logical Control and Decision System 主講人 虞台文.
1 Methodology for monitoring supply chain performance: a fuzzy logic approach Source : Logistics Information Management Volume 15 . Number 4 . 2002 . pp.
Fuzzy Systems Michael J. Watts
Date : 2013/03/18 Author : Jeffrey Pound, Alexander K. Hudek, Ihab F. Ilyas, Grant Weddell Source : CIKM’12 Speaker : Er-Gang Liu Advisor : Prof. Jia-Ling.
Fuzzy Inference Systems. Fuzzy inference (reasoning) is the actual process of mapping from a given input to an output using fuzzy logic. The process involves.
Protein motif extraction with neuro-fuzzy optimization Bill C. H. Chang and Author : Bill C. H. Chang and Saman K. Halgamuge Saman K. Halgamuge Adviser.
PART 9 Fuzzy Systems 1. Fuzzy controllers 2. Fuzzy systems and NNs 3. Fuzzy neural networks 4. Fuzzy Automata 5. Fuzzy dynamic systems FUZZY SETS AND FUZZY.
Fuzzy systems. Calculate the degree of matching Fuzzy inference engine Defuzzification module Fuzzy rule base General scheme of a fuzzy system.
Fuzzy Inference Systems
2004 謝俊瑋 NTU, CSIE, CMLab 1 A Rule-Based Video Annotation System Andres Dorado, Janko Calic, and Ebroul Izquierdo, Senior Member, IEEE.
A Fuzzy-Based Dynamic Channel Borrowing Scheme for Wireless Cellular Networks Yao-Tien Wang; Vehicular Technology Conference, VTC Spring. The.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
International Conference on Fuzzy Systems and Knowledge Discovery, p.p ,July 2011.
Universal fuzzy system representation with XML Authors : Chris Tseng, Wafa Khamisy, Toan Vu Source : Computer Standards & Interfaces, Volume 28, Issue.
1 Lecture 4 The Fuzzy Controller design. 2 By a fuzzy logic controller (FLC) we mean a control law that is described by a knowledge-based system consisting.
Advanced Science and Technology Letters Vol.28 (EEC 2013), pp Fuzzy Technique for Color Quality Transformation.
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors : Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser.
Chapter 10 FUZZY CONTROL Chi-Yuan Yeh.
Introduction of Fuzzy Inference Systems By Kuentai Chen.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Fuzzy Relations( 關係 ), Fuzzy Graphs( 圖 形 ), and Fuzzy Arithmetic( 運算 ) Chapter 4.
Dinner for Two. Fuzzify Inputs Apply Fuzzy Operator.
VIDYA PRATISHTHAN’S COLLEGE OF ENGINEERING, BARAMATI.
Visualization in Process Mining
Invitation to Computer Science 6th Edition
Fuzzy Systems Michael J. Watts
An Intelligent Approach for Nuclear Security Measures on Nuclear Materials: Demands and Needs Authors: A.Z.M. Salahuddin, Altab Hossain, R. A. Khan, M.S.
Artificial Intelligence
Il-Kyoung Kwon1, Sang-Yong Lee2
SCDC Sciences & Culture Development Center CEIT-2016
Fuzzy logic Introduction 3 Fuzzy Inference Aleksandar Rakić
Fuzzy Control Tutorial
Dr. Unnikrishnan P.C. Professor, EEE
Intrusion Detection Systems (IDS)
Firewalls and Security
Dr. Unnikrishnan P.C. Professor, EEE
Fuzzy Inference Systems
Fuzzy Logic KH Wong Fuzzy Logic v.9a.
Presentation transcript:

1 Utilizing fuzzy logic and trend analysis for effective intrusion detection Author: Martin Botha and Rossouw von Solms Source: Computers & Security Vol 22, No 5, pp , 2003 Speaker: Su-Ping Chen Date: 2006/1/3

2 Outline Overview of current Intrusion Detection Systems and fuzzy logic The fuzzy methodology HIDS Conclusion Comments

3 Overview of current Intrusion Detection Systems and fuzzy logic Current Intrusion Detection System are based on two major intrusion detection approaches namely, misuse and anomaly intrusion detection. Immunology approach for Intrusion detection Systems. The first shortcoming of current anomaly intrusion detection system is lack of precise data. The simple approach will gather precise data from the firewall and operating system audit logs as well as the various user profiles.

4 Overview of current Intrusion Detection Systems and fuzzy logic A simple Intrusion Detection approach.

5 Overview of current Intrusion Detection Systems and fuzzy logic The second shortcoming of current anomaly intrusion detection system is no precise method. The object of the strategy is to compare the generic intrusion phases to the actions of a user or intruder. These graphs will then be compared using pattern recognition techniques. Template and user action graph.

6 The fuzzy methodology Fuzzy logic provides a comprehensive approach that can be used to construct the user action graph and template. The approach is based on four steps. The four steps are: 1. Fuzzification step 2. Inference step 3. Composition step 4. Defuzzification step

7 The fuzzy methodology Fuzzification step The object of this step is to define input variables as well as input membership functions for each input variable.

8 The fuzzy methodology Fuzzification step The information gained from the input variables represents real-world values and must be converted to truth-values For input variable 2 (Illegal firewall access) one can define the following membership expression for this input: Illegal firewall access (x) = {0,if number of attempts < %,if number of attempts = %,if number of attempts = 4 1,if number of attempts > 4}

9 The fuzzy methodology Fuzzification step Membership function for Illegal Firewall Access Input.

10 The fuzzy methodology Fuzzification step The fuzzy set for the membership expression for illegal firewall access is as follows: A (Illegal firewall access) = 0/2U0.33/3U0.66/4U1/5

11 The fuzzy methodology Inference step The purpose of the inference process is to categorize each input variable according to standard fuzzy values. Such as; low, medium or high. A (Illegal firewall access) = 0/0U0.33/2.75U0.66/5.5U1/8.34U0.66/11.09U0.33/13.84U0/16.67

12 The fuzzy methodology Inference step The fuzzy rules for illegal firewall access input variable are as follows: Rule 1: If the user types his/her password incorrectly zero to two times, then the contribution of this input should be zero. Rule 2: If the user types his/her password incorrectly three times, then the contribution of this input should be low. Rule 3: If the user types his/her password incorrectly four times, then the contribution of this input should be medium. Rule 4: If the user types his/her password incorrectly five or more times, then the contribution of this input should be high.

13 The fuzzy methodology Composition step During the composition step, all 11-input membership functions will be combined.

14 The fuzzy methodology Defuzzification step This step will explain how this geometrical graph can be used to map the user’s/intruder’s actions onto the six generic intrusion phases. The mapping strategy consists of three phases, namely: 1. Construction of template graph 2. Construction of user action graph 3. Mapping the two graphs

15 The fuzzy methodology Defuzzification step (Construction of template graph) The template represents an intruder’s typical actions when progressing through all six phases of the generic intrusion phases. The various output membership functions can mathematically be maximized and combined by employing the following expression: μ ∪ (x) = μ1(x) Λμ2(x) Λ.. Λμj(x) x ∈ X ∴ μ ∪ (Template) = 0/0 ∪ 1/8.34 ∪ 1/16.6 ∪ 1/25.02 ∪ 1/33.33 ∪ 1/41.67 ∪ 1/50.51 ∪ 1/58.35 ∪ 1/66.69 ∪ 1/75.03 ∪ 1/83.37 ∪ 1/91.71 ∪ 0/100

16 The fuzzy methodology Defuzzification step (Construction of the user action graph) The user action graph can be constructed by reading the various audit logs and user profiles.

17 The fuzzy methodology Defuzzification step (Mapping the two graphs) The mapping strategy can be conducted by employing the defuzzification step of the fuzzy logic process. The centre of gravity (COG) represents a numerical categorization of the total area of the graph.

18 The fuzzy methodology Defuzzification step (Mapping the two graphs) The mapping process

19 HIDS A working prototype called Hybrid Intrusion Detection System. HIDS is a software suite written in Visual Basic and Visual C programming languages. The prototype allows for two types of testing and real- time testing.

20 Conclusion A novice fuzzy methodology that will identify the different levels of an intrusion attack has been proposed in this paper. The model will identify the intrusion attack, by reading audit log files and user profiles on the operating system and then by constructing the user graphs according to the information. The methodology will also construct a typical intrusion graph (template graph) and it will then map the user graph onto this template graph.

21 Conclusion If the two graphs match, the methodology will then alert the security officer that someone is carrying out an intrusion attack. If not, the methodology will then compute which phase the intruder reached. Fuzzy logic will be used in both the mapping and phase determining processes.

22 Comments