Artificial Intelligence Center,

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection Nelcileno Araújo Ruy de Oliveira Ed’Wilson Tavares Ferreira Valtemir Nascimento.
1 Advances in Network Security Case Study: Intrusion Detection Max Lakshtanov Comp 529T 7-10.
A Game-theoretic Approach to the Design of Self-Protection and Self-Healing Mechanisms in Autonomic Computing Systems Birendra Mishra Anderson School of.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
IDS/IPS Definition and Classification
A Survey and Comparison of Overlay Multicast Ching-Feng Li.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
Fault, Configuration, Performance Management
Learning Classifier Systems to Intrusion Detection Monu Bambroo 12/01/03.
Neural Technology and Fuzzy Systems in Network Security Project Progress 2 Group 2: Omar Ehtisham Anwar Aneela Laeeq
Security Considerations in Adaptive Middleware Security and Mobile Agents Ajanta – Mobile Agent’s research project papers (
A survey of commercial tools for intrusion detection 1. Introduction 2. Systems analyzed 3. Methodology 4. Results 5. Conclusions Cao er Kai. INSA lab.
CS 1 – Introduction to Computer Science Introduction to the wonderful world of Dr. T Dr. Daniel Tauritz.
Neural Technology and Fuzzy Systems in Network Security Project Progress Group 2: Omar Ehtisham Anwar Aneela Laeeq
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Distributed System Concepts and Architectures Summary By Srujana Gorge.
Lecture 11 Intrusion Detection (cont)
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEM
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Distributed Network Intrusion Detection An Immunological Approach Steven Hofmeyr Stephanie Forrest Patrik D’haeseleer Dept. of Computer Science University.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 4 Analytics, Decision Support, and Artificial Intelligence:
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Smart Grid Technologies Damon Dougherty – Industry Manager.
Machine Learning in Intrusion Detection Systems (IDS)
Intrusion Detection Adam Ashenfelter Nicholas J. Tyrrell.
Network Intrusion Detection Using Random Forests Jiong Zhang Mohammad Zulkernine School of Computing Queen's University Kingston, Ontario, Canada.
IIT Indore © Neminah Hubballi
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
Next-Generation IDS: A CEP Use Case in 10 Minutes 3rd Draft – November 8, nd Event Processing Symposium Redwood Shores, California Tim Bass, CISSP.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
RECENT DEVELOPMENTS OF INDUCTION MOTOR DRIVES FAULT DIAGNOSIS USING AI TECHNIQUES 1 Oly Paz.
An Overview of Intrusion Detection Using Soft Computing Archana Sapkota Palden Lama CS591 Fall 2009.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Intrusion Control. CSCE Farkas2 Readings Lecture Notes Pfleeger: Chapter 7.5.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
GTRI_B-1 ArtificiaI Intelligence Methods for Detection and Handling of Software Behavior Anomalies Chris Simpkins Georgia Tech Research Institute
Issues Autonomic operation (fault tolerance) Minimize interference to applications Hardware support for new operating systems Resource management (global.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
7.5 Intrusion Detection Systems Network Security / G.Steffen1.
THE VISION OF AUTONOMIC COMPUTING. WHAT IS AUTONOMIC COMPUTING ? “ Autonomic Computing refers to computing infrastructure that adapts (automatically)
Automatic Detection of Emerging Threats to Computer Networks Andre McDonald.
R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.
Cryptography and Network Security Sixth Edition by William Stallings.
1 Flexible, High-Speed Intrusion Detection Using Bro Vern Paxson Computational Research Division Lawrence Berkeley National Laboratory and ICSI Center.
Safe’n’Sec IT security solutions for enterprises of any size.
A Blackboard-Based Learning Intrusion Detection System: A New Approach
Anomaly Detection. Network Intrusion Detection Techniques. Ştefan-Iulian Handra Dept. of Computer Science Polytechnic University of Timișoara June 2010.
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors : Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser.
Control-Theoretic Approaches for Dynamic Information Assurance George Vachtsevanos Georgia Tech Working Meeting U. C. Berkeley February 5, 2003.
Network Management Lecture 13. MACHINE LEARNING TECHNIQUES 2 Dr. Atiq Ahmed Université de Balouchistan.
Some Great Open Source Intrusion Detection Systems (IDSs)
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
(A CORPORATE NETWORK APPROACH)
Intrusion Control.
TECHNOLOGY GUIDE FOUR Intelligent Systems.
Evaluating a Real-time Anomaly-based IDS
Intrusion Detection Systems (IDS)
Intrusion Prevention Systems
Intrusion Detection Systems
Intrusion Detection with Neural Networks my awesome graphic ↑
Intrusion Detection system
Self-Managed Systems: an Architectural Challenge
Detection Detect the breach and protect the data. By,
Presentation transcript:

Artificial Intelligence Center, Mayukh Dass Artificial Intelligence Center, University of Georgia Athens,Georgia, U.S.A.

Contents What is Intrusion Detection? How it is affecting the society? What are the present techniques used? What is new in LIDS? Why should we use autonomous agents? What are the components of LIDS? Is LIDS working? What is left to do in future?

Intrusion Detection Problem of identifying unauthorized users. Protect the system from being compromised. 2 categories: Misuse Detection. Anomaly Detection. Revenue loss in 2002 = $455,848,000 (CSI/FBI Computer Crime and Security Survey, 2002.)

Invaders of the civilization

Altruistic side of hacking

Next-generation hackers

Intrusions provide jobs

Intrusion Detection Techniques Rule-based. Data Mining. Artificial Neural Network. Genetic Algorithm. Statistical Methods. Agent framework: Autonomous Agents. Intelligent Agent. Mobile Agents. Mapping Human Immunization

Commercial Intrusion Detection Systems they are rule based. high maintenance cost. not very reliable. large number of false positive alerts. not very flexible. non-scalable (snort : for “average” system). high overall cost. Example : Snort, SHADOW, and so on..

Reliable Network Security System. What??

Features of LIDS: Learning Intrusion Detection System. Reliable. Flexible. Behavior based. Blackboard-based architecture. controlled by autonomous agents. Learning and adapting capability. Low maintenance cost. Uses building blocks of computational intelligence as intrusion analyzer. Low rate of false positive alarm.

Why should we use Autonomous Agents for detecting Intrusion in the network ? Runs continually. Fault tolerant. Resist subversion (monitor itself) Minimal overhead Configurable Adaptable Scalable Graceful degradation of service Dynamic reconfiguration.

Autonomous Agents Network Reader Initial Analyzer Initial Alert Agent System data Reader Attack Classifier (GA-based filter) ANN Analyzer Teaching Agent Report Generator

GENERATED REPORTS

Future Directions Complete building the learning agent of LIDS. Test LIDS in a more complex environment. Add new functionalities like visual representation of the reports. Try to increase the speed and optimization of the processes.

Acknowledgement Dr. J. Cannady Dr. D. Potter. Dr. D. Nute. Dr R. McClendon