MURI Research on Computer Security V.S. Subrahmanian Lab for Computational Cultural Dynamics Computer Science Dept. & UMIACS University of Maryland

Slides:



Advertisements
Similar presentations
Google News Personalization: Scalable Online Collaborative Filtering
Advertisements

Suleyman Cetintas 1, Monica Rogati 2, Luo Si 1, Yi Fang 1 Identifying Similar People in Professional Social Networks with Discriminative Probabilistic.
Cyber-Security: Some Thoughts
Digital Library Service – An overview Introduction System Architecture Components and their functionalities Experimental Results.
1 Evaluation Rong Jin. 2 Evaluation  Evaluation is key to building effective and efficient search engines usually carried out in controlled experiments.
Ranking of security controlling strategies driven by quantitative threat analysis. Tavolo 2: "Big data security evaluation" UNIFI-CNR Nicola Nostro, Andrea.
Service Discrimination and Audit File Reduction for Effective Intrusion Detection by Fernando Godínez (ITESM) In collaboration with Dieter Hutter (DFKI)
Insider Access Behavior Team May 06 Brandon Reher Jake Gionet Steven Bromley Jon McKee Advisor Client Dr. Tom DanielsThe Boeing Company Contact Dr. Nick.
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
Computer Monitoring System for EE Faculty By Yaroslav Ross And Denis Zakrevsky Supervisor: Viktor Kulikov.
Small-world Overlay P2P Network
Content Based Image Clustering and Image Retrieval Using Multiple Instance Learning Using Multiple Instance Learning Xin Chen Advisor: Chengcui Zhang Department.
Integrating Bayesian Networks and Simpson’s Paradox in Data Mining Alex Freitas University of Kent Ken McGarry University of Sunderland.
2-5 : Normal Distribution
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
1 Learning to Detect Objects in Images via a Sparse, Part-Based Representation S. Agarwal, A. Awan and D. Roth IEEE Transactions on Pattern Analysis and.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
ODISSEA Mehdi Kharrazi Kulesh Shanmugasundaram Security Issues.
1 BotGraph: Large Scale Spamming Botnet Detection Yao Zhao EECS Department Northwestern University.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Software Engineering for Safety : A Roadmap Presentation by: Manu D Vij CS 599 Software Engineering for Embedded Systems.
Homework 2 In the docs folder of your Berkeley DB, have a careful look at documentation on how to configure BDB in main memory. In the docs folder of your.
Design of an Intrusion Response System using Evolutionary Computation Rohit Parti.
Algorithm: For all e E t, define X e = {w e if e G t, 1 - w e otherwise}. Measure likelihood of substructure S by. Flag S as anomalous if, where is an.
Building Survivable Systems based on Intrusion Detection and Damage Containment Paper by: T. Bowen Presented by: Tiyseer Al Homaiyd 1.
COVERTNESS CENTRALITY IN NETWORKS Michael Ovelgönne UMIACS University of Maryland 1 Chanhyun Kang, Anshul Sawant Computer Science Dept.
Systematic Analysis of Interactome: A New Trend in Bioinformatics KOCSEA Technical Symposium 2010 Young-Rae Cho, Ph.D. Assistant Professor Department of.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
1. Introduction Generally Intrusion Detection Systems (IDSs), as special-purpose devices to detect network anomalies and attacks, are using two approaches.
Introduction to Parallel Programming MapReduce Except where otherwise noted all portions of this work are Copyright (c) 2007 Google and are licensed under.
Introduction The large amount of traffic nowadays in Internet comes from social video streams. Internet Service Providers can significantly enhance local.
(C) 2009 J. M. Garrido1 Object Oriented Simulation with Java.
Streaming Predictions of User Behavior in Real- Time Ethan DereszynskiEthan Dereszynski (Webtrends) Eric ButlerEric Butler (Cedexis) OSCON 2014.
Scalable and Efficient Data Streaming Algorithms for Detecting Common Content in Internet Traffic Minho Sung Networking & Telecommunications Group College.
Collusion-Resistance Misbehaving User Detection Schemes Speaker: Jing-Kai Lou 2015/10/131.
Computer Security: Principles and Practice
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
ARO-MURI on Cyber-Situation Awareness Review Meeting Phoenix AZ, 2013
Presenter: Shanshan Lu 03/04/2010
Sensor Task Manager (STM) V.S. Subrahmanian University of Maryland Joint work with: F. Ozcan, IBM Almaden T.J. Rogers, University of Maryland.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
A Mission-Centric Framework for Cyber Situational Awareness Assessing the Risk Associated with Zero-day Vulnerabilities: Automated Methods for Efficient.
Evaluation of Recommender Systems Joonseok Lee Georgia Institute of Technology 2011/04/12 1.
Slides for “Data Mining” by I. H. Witten and E. Frank.
Cryptography and Network Security Sixth Edition by William Stallings.
Indexing Correlated Probabilistic Databases Bhargav Kanagal, Amol Deshpande University of Maryland, College Park, USA SIGMOD Presented.
Tracking Malicious Regions of the IP Address Space Dynamically.
Contribution and Proposed Solution Sequence-Based Features Collective Classification with Reports Results of Classification Using Reports Collective Spammer.
18 February 2003Mathias Creutz 1 T Seminar: Discovery of frequent episodes in event sequences Heikki Mannila, Hannu Toivonen, and A. Inkeri Verkamo.
Students: Aiman Md Uslim, Jin Bai, Sam Yellin, Laolu Peters Professors: Dr. Yung-Hsiang Lu CAM 2 Continuous Analysis of Many CAMeras The Problem Currently.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Network Partition –Finding modules of the network. Graph Clustering –Partition graphs according to the connectivity. –Nodes within a cluster is highly.
An Adaptive User Profile for Filtering News Based on a User Interest Hierarchy Sarabdeep Singh, Michael Shepherd, Jack Duffy and Carolyn Watters Web Information.
Anomaly Detection Carolina Ruiz Department of Computer Science WPI Slides based on Chapter 10 of “Introduction to Data Mining” textbook by Tan, Steinbach,
Some Great Open Source Intrusion Detection Systems (IDSs)
Hierarchical Agglomerative Clustering on graphs
Internet Indirection Infrastructure (i3)
Finding Near-Duplicate Web Pages: A Large-Scale Evaluation of Algorithms By Monika Henzinger Presented.
Edge Weight Prediction in Weighted Signed Networks
Significance analysis of microarrays (SAM)
Jinhong Jung, Woojung Jin, Lee Sael, U Kang, ICDM ‘16
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Automatic Segmentation of Data Sequences
Pei Lee, ICDE 2014, Chicago, IL, USA
Outline System architecture Current work Experiments Next Steps
Discovery of Significant Usage Patterns from Clickstream Data
Presentation transcript:

MURI Research on Computer Security V.S. Subrahmanian Lab for Computational Cultural Dynamics Computer Science Dept. & UMIACS University of Maryland 1MURI Review, Nov 2014

Key Contributions Parallel architecture for detection of unexplained activities (PADUA). [Molinaro, Moscato, Picariello, Pugliese, Rullo, Subrahmanian] Automatic identification of bad actors (trolls) on signed social networks (e.g. Slashdot) [Kumar, Spezzano, Subrahmanian] 2MURI Review, Nov 2014

3 ARO-MURI on Cyber-Situation Awareness Identifying Behavioral Patterns in a Scalable Way V.S. Subrahmanian, University of Maryland Tel. (301) , Objectives To detect known and unexplained threat patterns in a highly scalable manner as vast amounts of observations are made. DoD Benefit: To identify on-going attacks while they occur so that appropriate counter-measures can be taken before attackers cause serious damage. Scientific/Technical Approach - Develop stochastic temporal automata for expressing high level activities in terms of low level primitives. -Develop index structures and parallel algorithms to identify highly probable instances of an activity -Develop parallel algorithms to identify activities in an observation that are not well explained by known activities. -Developed algorithms to identify bad behaviors in Slashdot and signed social networks - Develop prototype system implementing the above and test/validate approach. Accomplishments Can automatically detect unexplained activities in a observation streams > 335K+ observations per second. Demonstrated the ability to identify unexplained behavior in observation streams with precision over 90% and recall over 80%. Demonstrated high accuracy in identifying bad actors in social media Challenges Automatic learning of activity models. To scale the ability to detect unexplained activities to 1M observations/second.. MURI Review, Nov 20143

Probabilistic Penalty Graph 4MURI Review, Nov 2014

Probabilistic Penalty Graph 5 Event “Central DB Server Access” occurs with 10% probability after “Post Firewall Access”. There is a 0.4 degradation factor for every bit of noise that occurs between these two events are observed. MURI Review, Nov 2014 Prob of transitioning from “PostFirewall Access” to “CentralDBServerAccess” Penalty assessed for any intervening observations b/w these 2 states

Activity Instance Observation sequence (OS) Set of time stamped events. Occurrence of an activity (OS) is a pair (L*,I*) s.t. – L* is a contiguous sequence [shown below] – I* is a subsequence of it [shown via shaded boxes below] – Edges in an activity must connect consecutive events in the subsequence [yellow edge] – Starts at a start node [ l 1 below] – Ends at an end node [ l 9 below] 6MURI Review, Nov 2014

Score of Occurrence Score of this occurrence is calculated as: (  l1,l5 *  l1,l5 3 )*(  l5,l6 *  l5,l6 0 )*(  l6,l9 *  l6,l9 2 )  l1,l5 is the probability of transition from state l1 to l5.  l1,l5 is the penalty for each noise `` noise’’ item between l1 and l5. As more noise occurs, the score of the occurrence goes down in a manner specified by . 7MURI Review, Nov 2014 (  l1,l5 *  l1,l5 3 ) (  l6,l9 *  l6,l9 2 ) (  l5,l6 *  l5,l6 0 )

Example: Score of Occurrence 8MURI Review, Nov 2014

Unexplained Situation A sequence (L u,I u ) satisfying: – L u is a contiguous sequence – I u is a subsequence of it – Edges in an activity must connect consecutive events in the subsequence – Starts at a start node – Last action is not an end node – No occurrence (L u *,Iu*) s.t. L u is a prefix of L u * and I u is a prefix of I u * – No other pair (L’,U’) s.t. L u is a prefix of L’, I u is a prefix of I’ and (L’,U’) satisfies all the above conditions. –  -unexplained situation is one with score  or more: 9MURI Review, Nov 2014

Example: Unexplained Situation 10MURI Review, Nov 2014

Unexplained Situation A log is  -unexplained iff its unexplained-ness score is  or more. Log on previous slide is 0.03-unexplained meaning its chance of being consistent with the activity is below 3%. Developed algorithms to learn degradation values from a training set. Developed algorithms to – Merge a set P of PPGs into one super-graph and – index the set P of PPGs that we wish to monitor. In this talk, we instead focus on parallelizing discovery of  -unexplained activities on a compute cluster 11MURI Review, Nov 2014

Partitioning Super-PPGs 12MURI Review, Nov 2014

Parallel Algorithm Given a cluster with (K+1) nodes, PADUA splits the super-graph into K sub-graphs according to one of the previous splitting methods. 1 compute node is used as a master, others are slaves. When a new observation is made, the master node hands this off to the appropriate slave node managing the observed action. At any time, the master node can update the list of  - unexplained sequences. Ran experiments to assess efficacy of different splitting methods. 13MURI Review, Nov 2014

Experimental Setting Two full days of network traffic (1.215M log tuples) from Univ of Naples 350 PPGs defined corresponding to 722 SNORT rules Accuracy measured as follows: – detect instances of PPGs in the traffic – Then leave some out – See how well our algorithm finds them 14MURI Review, Nov 2014

Accuracy Results 15 Best accuracy occurs when  = But highest F-measure occurs when  = Run-times for the entire 2 days of traffic were on the order of just over 3 seconds. MURI Review, Nov 2014

Experimental Setting 16MURI Review, Nov 2014 tEPP gives the best results in terms of run-time (y-axis in milliseconds)

Key Contributions Parallel architecture for detection of unexplained activities (PADUA). [Molinaro, Moscato, Picariello, Pugliese, Rullo, Subrahmanian] Automatic identification of bad actors (trolls) on signed social networks (e.g. Slashdot) [Kumar, Spezzano, Subrahmanian] 17MURI Review, Nov 2014

Trolling The Problem Trolls deliberately make offensive or provocative online postings with the aim of upsetting someone or receiving an angry response. Being annoying on the web, just because you can. How can we automatically identify trolls? Solution Remove the “hay” from the “haystack”, i.e. remove irrelevant edges from the network, to bring out interactions involving at least one malicious user. Then find the “needle” in the reduced “haystack”. MURI Review, Nov

Trolling on Twitter and Wikipedia 19MURI Review, Nov 2014 Source: http : // http : //i.imgur.com/I3Gv7.jpg

Signed Social Network 20MURI Review, Nov 2014 Slashdot technology-related news website. contains threaded discussions among users. Comments labeled by administrators +1 if they are normal, interesting, etc. or -1 if they are unhelpful/uninteresting.

Users ranking: Centrality Measures 21MURI Review, Nov 2014

Users ranking: Centrality Measures 22MURI Review, Nov 2014

Requirements of a good ranking measure: Axioms 23MURI Review, Nov 2014 Only SSR and SEC conditionally satisfy all the axioms

Requirements of a good ranking measure: Attack Models 24MURI Review, Nov 2014 No centrality measure protects against all the attack models

TIA: Troll Identification Algorithm 25MURI Review, Nov 2014

Decluttering Operations 26MURI Review, Nov 2014 Given a centrality measure C, we mark as benign, users with a positive centrality score. Those with a negative centrality score are marked malignant.

TIA Example 27MURI Review, Nov 2014 DOPs considered: a)remove positive edges pair b)remove negative edges pair d) remove negative edge in positive-negative edges pairs

TIA Example 28MURI Review, Nov 2014 DOPs considered: a)remove positive edges pair b)remove negative edges pair d) remove negative edge in positive-negative edges pairs

TIA Example 29MURI Review, Nov 2014 DOPs considered: a)remove positive edges pair b)remove negative edges pair d) remove negative edge in positive-negative edges pairs

Experiments 30MURI Review, Nov 2014 Table comparing Average Precision (in %) using TIA algorithm on Slashdot network (Original + Best 2 columns only) Table showing Average Precision averaged over 50 different versions for 95% randomly selected nodes from the Slashdot network.

Experiments 31MURI Review, Nov 2014 Table comparing Average Precision (in %) using TIA algorithm on Slashdot network (Original + Best 2 columns only) Table showing Average Precision averaged over 50 different versions for 95% randomly selected nodes from the Slashdot network. Average precision of random ranking is 0.001%

Contact Information V.S. Subrahmanian Dept. of Computer Science & UMIACS University of Maryland College Park, MD Tel: Web: 32MURI Review, Nov 2014