Charles Elkan 1999 Conference on Knowledge Discovery and Data Mining

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems. Tecniche di Sicurezza dei Sistemi2 Intrusion Detection Systems Presently there is much interest in systems, which can detect.
Advertisements

Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection Nelcileno Araújo Ruy de Oliveira Ed’Wilson Tavares Ferreira Valtemir Nascimento.
Testing IDS. Overview Introduction Measurable IDS characteristics Challenges of IDS testing Measuring IDS performances Test data sets 2/108.
Network Traffic Anomaly Detection Based on Packet Bytes Matthew V. Mahoney Florida Institute of Technology
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
Decision Trees for Server Flow Authentication James P. Early and Carla E. Brodley Purdue University West Lafayette, IN 47907
TRANSPORT LAYER  Session multiplexing  Segmentation  Flow control (TCP)  Connection-oriented (TCP)  Reliability (TCP)
Application of Stacked Generalization to a Protein Localization Prediction Task Melissa K. Carroll, M.S. and Sung-Hyuk Cha, Ph.D. Pace University, School.
Packet Anomaly Intrusion Detection PAID Constantine Manikopoulos and Zheng Zhang New Jersey Center for Wireless Networking and Security (NJWINS) at NJIT.
Multiple Criteria for Evaluating Land Cover Classification Algorithms Summary of a paper by R.S. DeFries and Jonathan Cheung-Wai Chan April, 2000 Remote.
Testing IDS. 2/106 Testing IDS Despite the enormous investment in IDS technology, no comprehensive and scientifically rigorous methodology is available.
Machine Learning Group University College Dublin 4.30 Machine Learning Pádraig Cunningham.
Learning Classifier Systems to Intrusion Detection Monu Bambroo 12/01/03.
Unsupervised Intrusion Detection Using Clustering Approach Muhammet Kabukçu Sefa Kılıç Ferhat Kutlu Teoman Toraman 1/29.
Vipin Kumar, AHPCRC, University of Minnesota
Three kinds of learning
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Machine Learning as Applied to Intrusion Detection By Christine Fossaceca.
Statistical Learning: Pattern Classification, Prediction, and Control Peter Bartlett August 2002, UC Berkeley CIS.
Boosting Main idea: train classifiers (e.g. decision trees) in a sequence. a new classifier should focus on those cases which were incorrectly classified.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
Using Argus Audit Trails to Enhance IDS Analysis Jed Haile Nitro Data Systems
Basic Elements of Attacks and Their Detection. Contents Elements of TCP/IP addressing Layers in Internet communication Phases of an attack 2/46.
Data Mining for Intrusion Detection: A Critical Review Klaus Julisch From: Applications of data Mining in Computer Security (Eds. D. Barabara and S. Jajodia)
Where Are the Nuggets in System Audit Data? Wenke Lee College of Computing Georgia Institute of Technology.
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
Using Bayesian Networks for Detecting Network Anomalies Lane Thames ECE 8833 Intelligent Systems.
Intrusion Detection Using Neural Networks and Support Vector Machine
Copyright R. Weber Machine Learning, Data Mining ISYS370 Dr. R. Weber.
Comp101 Lecture ‘Internet’ abstract 1 What is the Internet? The US military wanted a network that was robust under enemy attack. US academics wanted a.
Network Intrusion Detection Using Random Forests Jiong Zhang Mohammad Zulkernine School of Computing Queen's University Kingston, Ontario, Canada.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang, and.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
1 Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Benchmark H. Güneş Kayacık Nur Zincir-Heywood Malcolm I. Heywood.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection Matt Mahoney Feb. 18, 2003.
An Overview of Intrusion Detection Using Soft Computing Archana Sapkota Palden Lama CS591 Fall 2009.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
Learning Rules for Anomaly Detection of Hostile Network Traffic Matthew V. Mahoney and Philip K. Chan Florida Institute of Technology.
Implementation of Machine Learning and Chaos Combination for Improving Attack Detection Accuracy on Intrusion Detection System (IDS) Bisyron Wahyudi Kalamullah.
ICNSC 2007Slide 1 A Novel Soft Computing Model Using Adaptive Neuro-Fuzzy Inference System for Intrusion Detection Authors: A. Nadjaran Toosi;
Ensemble Learning Spring 2009 Ben-Gurion University of the Negev.
1 Pattern Recognition Pattern recognition is: 1. A research area in which patterns in data are found, recognized, discovered, …whatever. 2. A catchall.
Boundary Detection in Tokenizing Network Application Payload for Anomaly Detection Rachna Vargiya and Philip Chan Department of Computer Sciences Florida.
Sniffer, tcpdump, Ethereal, ntop
1Ellen L. Walker Category Recognition Associating information extracted from images with categories (classes) of objects Requires prior knowledge about.
EC week Review. Rules of Engagement Teams selected by instructor Host will read the entire questions. Only after, a team may “buzz” by raise of.
Hybrid Intelligent Systems for Detecting Network Anomalies Lane Thames ECE 8833 Intelligent Systems.
Consensus Extraction from Heterogeneous Detectors to Improve Performance over Network Traffic Anomaly Detection Jing Gao 1, Wei Fan 2, Deepak Turaga 2,
Intrusion Detection Wenke Lee Computer Science Department Columbia University.
Hands-On Ethical Hacking and Network Defense
1 January 24, 2016Data Mining: Concepts and Techniques 1 Data Mining: Concepts and Techniques — Chapter 7 — Classification Ensemble Learning.
Machine Learning in Practice Lecture 10 Carolyn Penstein Rosé Language Technologies Institute/ Human-Computer Interaction Institute.
Machine Learning for Network Anomaly Detection Matt Mahoney.
Networks Problem Set 3 Due Nov 10 Bonus Date Nov 9
CYBERCRIME and Avoidance Techniques
NOVEL APPROACH FOR NETWORK INTRUSION DETECTION
or call for office visit,
Networks Problem Set 3 Due Oct 29 Bonus Date Oct 26
Chapter 4: Access Control Lists (ACLs)
Alexandros Savvopoulos csdp1107
Intrusion Detection with Neural Networks my awesome graphic ↑
Lecture 3: Secure Network Architecture
CSCI N317 Computation for Scientific Applications Unit Weka
Modeling IDS using hybrid intelligent systems
ECE – Lecture 1 Introduction.
Presentation transcript:

KDD Cup ’99: Classifier Learning Predictive Model for Intrusion Detection Charles Elkan 1999 Conference on Knowledge Discovery and Data Mining Presented by Chris Clifton

KDD Cup Overview Held Annually in conjunction with Knowledge Discovery and Data Mining Conference (now ACM-sponsored) Challenge problem(s) released well before conference Goal is to give best solution to problem Relatively informal “contest” Gives “standard” test for comparing techniques Winner announced at KDD conference Lots of recognition to winner

Classifier Learning for Intrusion Detection One of two KDD’99 challenge problems Other was a knowledge discovery problem Goal is to learn a classifier to define TCP/IP connections as intrusion/okay Data: Collection of features describing TCP connection Class: Non-attack or type of attack Scoring: Cost per Test Sample Wrong answers penalized based on type of “wrong”

Data: TCP “connection” information Dataset developed for 1998 DARPA Intrusion Detection Evaluation Program Nine weeks of raw TCP dump data from simulated USAF LAN Simulated attacks to give positive examples Processed into 5 million training “connections”, 2 million test Some “attributes” derived from raw data Twenty-four attack types in training data, four classes: DOS: denial-of-service, e.g. syn flood; R2L: unauthorized access from a remote machine, e.g. guessing password; U2R:  unauthorized access to local superuser (root) privileges, e.g., various ``buffer overflow'' attacks; probing: surveillance and other probing, e.g., port scanning. Test set includes fourteen attack types not found in training set

Basic features of individual TCP connections feature name description  type duration  length (number of seconds) of the connection  continuous protocol_type  type of the protocol, e.g. tcp, udp, etc.  discrete service  network service on the destination, e.g., http, telnet, etc.  src_bytes  number of data bytes from source to destination  dst_bytes  number of data bytes from destination to source  flag  normal or error status of the connection  discrete  land  1 if connection is from/to the same host/port; 0 otherwise  wrong_fragment  number of ``wrong'' fragments  urgent  number of urgent packets 

Content features within a connection suggested by domain knowledge feature name description  type hot  number of ``hot'' indicators continuous num_failed_logins  number of failed login attempts  logged_in  1 if successfully logged in; 0 otherwise  discrete num_compromised  number of ``compromised'' conditions  root_shell  1 if root shell is obtained; 0 otherwise  su_attempted  1 if ``su root'' command attempted; 0 otherwise  num_root  number of ``root'' accesses  num_file_creations  number of file creation operations  num_shells  number of shell prompts  num_access_files  number of operations on access control files  num_outbound_cmds number of outbound commands in an ftp session  is_hot_login  1 if the login belongs to the ``hot'' list; 0 otherwise  is_guest_login  1 if the login is a ``guest''login; 0 otherwise 

Traffic features computed using a two-second time window feature name description  type count  number of connections to the same host as the current connection in the past two seconds  continuous Note: The following  features refer to these same-host connections. serror_rate  % of connections that have ``SYN'' errors  rerror_rate  % of connections that have ``REJ'' errors  same_srv_rate  % of connections to the same service  diff_srv_rate  % of connections to different services  srv_count  number of connections to the same service as the current connection in the past two seconds  Note: The following features refer to these same-service connections. srv_serror_rate  srv_rerror_rate  srv_diff_host_rate  % of connections to different host

Scoring Each prediction gets a score: Row is correct answer Column is prediction made Score is average over all predictions normal probe DOS U2R R2L 1 2 3 4

Results Twenty-four entries, scores: 0.2331 0.2356 0.2367 0.2411 0.2414 0.2443 0.2474 0.2479 0.2523 0.2530 0.2531 0.2545 0.2552 0.2575 0.2588 0.2644 0.2684 0.2952 0.3344 0.3767 0.3854 0.3899 0.5053 0.9414 1-Nearest Neighbor scored 0.2523

Winning Method: Bagged Boosting Submitted by Bernhard Pfahringer, ML Group, Austrian Research Institute for AI 50 samples from the original 5 million odd examples set Contrary to standard bagging the sampling was slightly biased: all of the examples of the two smallest classes U2R and R2L 4000 PROBE, 80000 NORMAL, and 400000 DOS examples duplicate entries in the original data set removed Ten C5 decision trees induced from each sample used both C5's error-cost and boosting options. Final predictions computed from 50 single predictions of each training sample by minimizing “conditional risk” minimizes sum of error-costs times class-probabilities Took approximately 1 day of 200MHz 2 processor Sparc to train

Confusion Matrix (Breakdown of score)

Analysis of winning entry Result comparable to 1-NN except on “rare” classes Training sample of winner biased to rare classes Does this give us a general principle? Misses badly for some attack categories True for 1-NN as well Problem with feature set?

Second and Third places (Probably not statistically significant) Itzhak Levin, LLSoft, Inc.: Kernel Miner Link broken? Vladimir Miheev, Alexei Vopilov, and Ivan Shabalin, MP13, Moscow, Russia Verbal rules constructed by an expert First echelon of voting decision trees Second echelon of voting decision trees Steps sequentially Branch to the next step occurs whenever the current one has failed to recognize the connection Trees constructed using their own (previously developed) tree learning algorithm