Adaptive Data Visualization <><><><><> Packet Information Collection and Transformation for Network Intrusion Detection and Prevention Richard A. Aló,

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

The Most Analytical and Comprehensive Defense Network in a Box.
IDPS (Intrusion Detection & Prevention System )
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention with Snort Dr. Jim Chen, Victor Tsao, Barry Williams, Tokunbo Olojo, John Smet,
Snort: A Network Intrusion Detection Software Matt Gustafson Becky Smith CS691 Semester Project Spring 2003.
IDS/IPS Definition and Classification
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
Two main requirements: 1. Implementation Inspection policies (scheduling algorithms) that will extand the current AutoSched software : Taking to account.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Neural Technology and Fuzzy Systems in Network Security Project Progress 2 Group 2: Omar Ehtisham Anwar Aneela Laeeq
Evaluation of MineSet 3.0 By Rajesh Rathinasabapathi S Peer Mohamed Raja Guided By Dr. Li Yang.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
A survey of commercial tools for intrusion detection 1. Introduction 2. Systems analyzed 3. Methodology 4. Results 5. Conclusions Cao er Kai. INSA lab.
Report on statistical Intrusion Detection systems By Ganesh Godavari.
Neural Technology and Fuzzy Systems in Network Security Project Progress Group 2: Omar Ehtisham Anwar Aneela Laeeq
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Design and Implementation of SIP-aware DDoS Attack Detection System.
Lecture 11 Intrusion Detection (cont)
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
1 Enabling Secure Internet Access with ISA Server.
Installing Samba Vicki Insixiengmay Jonathan Krieger.
USENIX LISA ‘99 Conference © Copyright 1999, Martin Roesch Snort - Lightweight Intrusion Detection for Networks Martin Roesch.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
1. Introduction Generally Intrusion Detection Systems (IDSs), as special-purpose devices to detect network anomalies and attacks, are using two approaches.
11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
Chirag N. Modi and Prof. Dhiren R. Patel NIT Surat, India Ph. D Colloquium, CSI-2011 Signature Apriori based Network.
Kansas State University Department of Computing and Information Sciences CIS 830: Advanced Topics in Artificial Intelligence From Data Mining To Knowledge.
Penetration Testing Security Analysis and Advanced Tools: Snort.
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS: Technical Seminar Presentation by MANOJ KUMAR GANTAYAT.
Zhonghua Qu and Ovidiu Daescu December 24, 2009 University of Texas at Dallas.
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
IIT Indore © Neminah Hubballi
Intrusion Detection: Snort. Basics: History Snort was developed in 1998 by Martin Roesch. It was intended to be an open-source technology, and remains.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Snort: Jason Booth – Intrusion Detection System. Overview Snort / Drawbacks IDS - Theory IDS – Test Practical IDS Setup Scripts Oink-Master Snort-MySql.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
CHAPTER FOUR COMPUTER SOFTWARE.
Introduction to Interactive Media Interactive Media Tools: Software.
INTERNATIONAL NETWORKS At Indiana University Hans Addleman TransPAC Engineer, International Networks University Information Technology Services Indiana.
SNORT Feed the Pig Vicki Insixiengmay Jon Krieger.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Cs490ns - cotter1 Snort Intrusion Detection System
Client: The Boeing Company Contact: Mr. Nick Multari Adviser: Dr. Thomas Daniels Group 6 Steven BromleyJacob Gionet Jon McKeeBrandon Reher.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Snort Intrusion Detection. What is Snort Packet Analysis Tool Most widely deployed NIDS Initial release by Marty Roesch in 1998 Current version
Intrusion Intrusion Detection Systems with Snort Hailun Yan 564-project.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Network Security Major Problems Network Security Major Problems Why Firewall? Why Firewall? Problems with Firewalls Problems with Firewalls What is.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
An Introduction Student Name: Riaz Ahmad Program: MSIT( ) Subject: Data warehouse & Data Mining.
Security System for KOREN/APII-Testbed
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
1 Chapter 8: DHCP in IP Configuration Designs Designs That Include DHCP Essential DHCP Design Concepts Configuration Protection in DHCP Designs DHCP Design.
1 Mining Images of Material Nanostructure Data Aparna S. Varde, Jianyu Liang, Elke A. Rundensteiner and Richard D. Sisson Jr. ICDCIT December 2006 Bhubaneswar,
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Snort – IDS / IPS.
Proventia Network Intrusion Prevention System
Waikato Environment for Knowledge Analysis
NETWORK SECURITY LAB Lab 9. IDS and IPS.
DDoS Attack Detection under SDN Context
Intrusion Detection Systems (IDS)
Presentation transcript:

Adaptive Data Visualization <><><><><> Packet Information Collection and Transformation for Network Intrusion Detection and Prevention Richard A. Aló, Ali Berrached, Mohsen Beheshti, Ping Chen, Jack Han, Francois Modave Center for Computational Sciences and Advanced Distributed Simulation University of Houston-Downtown

Problem: Adaptive Data Visualization Visualization- graphical presentation of a data set, with goal of helping and providing viewer with a qualitative understanding of information contents in a natural and direct way.

What a visualization system should do : convert forward = f (213, 108, 30, 1704, 17, 2, 44, 140, 477, -108, 0.0)

What a viewer should be allowed to do : convert backward

What a viewer should be allowed to do REALLY : find knowledge

Graphical elements  point  line  polyline  glyph  2-D or 3-D surface  3-D solid  image  text

Element properties  color/intensity  location  style/texture/shade/light  size(no perspective view)  angle  relative position/motion

What is the problem exactly  Basic requirement - find a f(…) satisfying: – Different data values should be represented differently in display, the more different, the more different in display  Computation constraints: – Performance: line is better than curve – Memory usage  Data constraints: – Infant stage,domain knowledge,universal theory unlikely – Display high dimensional data in 3D world or 2D screen  Human beings constraints: – not efficient, slow processing – Ambiguous – User-depended, area-depended – Eye limits

Non-uniform data distribution Need cluster the data set first

Non-uniform knowledge/information distribution – Water temperature: change from 40C to 41C and change from 99C to 100C are different – Change of water temperature from 40C to 41C and change of patient body temperature from 40C to 41C are different Need integrate domain knowledge by interaction with users

Adaptive Data Visualization System Properties  Interactive and adaptive  Correctness  Maximizing

Interactive and Adaptive Visualization System Domain knowledge integration achieved by  choosing proper association function  transformation functions during visualization process. Interactive/ Provide mechanism for views to adjust or change transformation functions during visualization process. Interaction allows user to guide visualization system step by step to display/ clarify what is of interest.

Correctness  If possible: visualization system should show different dimensions of a data set differently through different visual objects or visual properties (visual elements) of the same visual objects.  The more different the values are, the more differently they should be rendered.  The more different the information represented by data values are, the more differently they should be rendered.

Maximizing To optimize the rendering quality, the maximal range of visual objects/elements should be used.

Adaptive Data Visualization Algorithm Load the dataset Find clusters for each individual dimension Perform association and transformation according to “Maxmizing” rule Render data Viewer changes transformation Viewer changes association Viewer wants to change association step? Viewer wants to change transformation step? No Yes

Future Work  More applications

Packet Information Collection and Transformation for Network Intrusion Detection and Prevention  Introduction  The SNORT System  The SNORT Setup  The See5 System  Data Transformation  Information Fusion Framework for Intrusion Detection  Conclusion and Future Work

Introduction  Network Intrusion Detection System (IDS)  Network Intrusion Prevention System (IPS)  Suspicious network activities – misuse – anomaly

Intrusion Detection Process  Network Intrusion Detection System (IDS)  Network Intrusion Prevention System (IPS)  Suspicious network activities – misuse – anomaly

CSRL Fusion System  Data Collection: Capture packet data in network traffic by using the tool SNORT  Data Preprocess: Transform data into the suitable input format that are required by See5  Pattern Detection: Apply See5 to induce intrusion detection rules, a set of alert rules for recognizing malicious activities  Response: Integrate the detection rules into a firewall to prevent potential attacks

SNORT System  Network sniffer developed by Martin Roesch in 1998  Logs packets in a database  SNORT database – four tables to record information of network packets using the following protocols, icp, udp, icmp, and ip – two other tables acid_event to consolidate all the logs of alerts opt to hold the optional data that can be part of the TCP/IP protocol.

SNORT Setup  Database: MySql  Two Systems setup – Working system Two servers for cross platform and data fusion –Linux server –Windows server WAN – Testing system Testing SNORT rules and transforming data LAN

SNORT Rule Type ruletype nonalert { type alert output database: log, mysql, user=snort password=password dbname=snortTest host=localhost }

SEE5 System  A machine learning and data mining system for Windows, evolved from C4.5  Generate a decision tree  Two input files –.names – attributes and characteristics such as data type, range, etc. –.data – the raw data set

System Framework

Essential Attacks Collected from Two Sensors per Day

Essential Attacks Collected from Two Sensors per Hour

Conclusion  CSRL Project on progress  Four components of IDS and IPS – Data Collection -- finished – Data Preprocessing -- finished – Pattern Detection -- on going – Response-- Future