EE515/IS523: Security 101: Think Like an Adversary Evading Anomarly Detection through Variance Injection Attacks on PCA Benjamin I.P. Rubinstein, Blaine.

Slides:



Advertisements
Similar presentations
Applications of one-class classification
Advertisements

Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan Department of Computer Science Florida State University.
Principal Component Analysis Based on L1-Norm Maximization Nojun Kwak IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008.
Efficient Constraint Monitoring Using Adaptive Thresholds Srinivas Kashyap, IBM T. J. Watson Research Center Jeyashankar Ramamirtham, Netcore Solutions.
Detectability of Traffic Anomalies in Two Adjacent Networks Augustin Soule, Haakon Ringberg, Fernando Silveira, Jennifer Rexford, Christophe Diot.
Principal Component Analysis (PCA) for Clustering Gene Expression Data K. Y. Yeung and W. L. Ruzzo.
Linear Obfuscation to Combat Symbolic Execution Zhi Wang 1, Jiang Ming 2, Chunfu Jia 1 and Debin Gao 3 1 Nankai University 2 Pennsylvania State University.
Worm Origin Identification Using Random Moonwalks Yinglian Xie, V. Sekar, D. A. Maltz, M. K. Reiter, Hui Zhang 2005 IEEE Symposium on Security and Privacy.
Sensitivity of PCA for Traffic Anomaly Detection Evaluating the robustness of current best practices Haakon Ringberg 1, Augustin Soule 2, Jennifer Rexford.
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection Xudong Zhao, Shilin Wang, Shenghong Li and Jianhua Li Shanghai Jiao.
Polymorphic blending attacks Prahlad Fogla et al USENIX 2006 Presented By Himanshu Pagey.
1 Communication-Efficient Online Detection of Network-Wide Anomalies Ling Huang* XuanLong Nguyen* Minos Garofalakis § Joe Hellerstein* Michael Jordan*
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Probabilistic Aggregation in Distributed Networks Ling Huang, Ben Zhao, Anthony Joseph and John Kubiatowicz {hling, ravenben, adj,
Principal Component Analysis
Motion Detection And Analysis Michael Knowles Tuesday 13 th January 2004.
1 In-Network PCA and Anomaly Detection Ling Huang* XuanLong Nguyen* Minos Garofalakis § Michael Jordan* Anthony Joseph* Nina Taft § *UC Berkeley § Intel.
Multi-Scale Analysis for Network Traffic Prediction and Anomaly Detection Ling Huang Joint work with Anthony Joseph and Nina Taft January, 2005.
1 Toward Sophisticated Detection With Distributed Triggers Ling Huang* Minos Garofalakis § Joe Hellerstein* Anthony Joseph* Nina Taft § *UC Berkeley §
1 Deriving Private Information from Randomized Data Zhengli Huang Wenliang (Kevin) Du Biao Chen Syracuse University.
1 When Does Randomization Fail to Protect Privacy? Wenliang (Kevin) Du Department of EECS, Syracuse University.
EL 933 Final Project Presentation Combining Filtering and Statistical Methods for Anomaly Detection Augustin Soule Kav´e SalamatianNina Taft.
Laurent Itti: CS599 – Computational Architectures in Biological Vision, USC Lecture 7: Coding and Representation 1 Computational Architectures in.
Network Anomography Yin Zhang, Zihui Ge, Albert Greenberg, Matthew Roughan Internet Measurement Conference 2005 Berkeley, CA, USA Presented by Huizhong.
A Signal Analysis of Network Traffic Anomalies Paul Barford, Jeffrey Kline, David Plonka, and Amos Ron.
Fast and Robust Worm Detection Algorithm Tian Bu Aiyou Chen Scott Vander Wiel Thomas Woo bearhsu.
Object Recognition by Parts Object recognition started with line segments. - Roberts recognized objects from line segments and junctions. - This led to.
Principal Component Analysis (PCA) for Clustering Gene Expression Data K. Y. Yeung and W. L. Ruzzo.
Package Transportation Scheduling Albert Lee Robert Z. Lee.
Distributed Network Intrusion Detection An Immunological Approach Steven Hofmeyr Stephanie Forrest Patrik D’haeseleer Dept. of Computer Science University.
Anomaly detection Problem motivation Machine Learning.
1 The Good, The Bad and the Ugly: Network Performance in Malicious Environment Udi Ben-Porat ETH Zurich, Switzerland Anat Bremler-Barr IDC Herzliya, Israel.
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
U NIVERSITY OF M ASSACHUSETTS A MHERST Department of Computer Science 2011 Predicting Solar Generation from Weather Forecasts Using Machine Learning Navin.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
Man vs. Machine: Adversarial Detection of Malicious Crowdsourcing Workers Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao, UC Santa Barbara, Usenix Security.
May 9, 2005 Andrew C. Gallagher1 CRV2005 Using Vanishing Points to Correct Camera Rotation Andrew C. Gallagher Eastman Kodak Company
DoWitcher: Effective Worm Detection and Containment in the Internet Core S. Ranjan et. al in INFOCOM 2007 Presented by: Sailesh Kumar.
Algorithms for Wireless Sensor Networks Marcela Boboila, George Iordache Computer Science Department Stony Brook University.
Network Anomography Yin Zhang – University of Texas at Austin Zihui Ge and Albert Greenberg – AT&T Labs Matthew Roughan – University of Adelaide IMC 2005.
Using Support Vector Machines to Enhance the Performance of Bayesian Face Recognition IEEE Transaction on Information Forensics and Security Zhifeng Li,
1 Distributed Detection of Network-Wide Traffic Anomalies Ling Huang* XuanLong Nguyen* Minos Garofalakis § Joe Hellerstein* Michael Jordan* Anthony Joseph*
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Gap-filling and Fault-detection for the life under your feet dataset.
High-integrity Sensor Networks Mani Srivastava UCLA.
Mining Anomalies in Network-Wide Flow Data Anukool Lakhina with Mark Crovella and Christophe Diot NANOG35, Oct 23-25, 2005.
Learning to Detect Events with Markov-Modulated Poisson Processes Ihler, Hutchins and Smyth (2007)
Mining Anomalies Using Traffic Feature Distributions Anukool Lakhina Mark Crovella Christophe Diot in ACM SIGCOMM 2005 Presented by: Sailesh Kumar.
ASTUTE: Detecting a Different Class of Traffic Anomalies Fernando Silveira 1,2, Christophe Diot 1, Nina Taft 3, Ramesh Govindan 4 1 Technicolor 2 UPMC.
© 2002 IBM Corporation IBM Research 1 Policy Transformation Techniques in Policy- based System Management Mandis Beigi, Seraphin Calo and Dinesh Verma.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Model Based Event Detection in Sensor Networks Jayant Gupchup, Andreas Terzis, Randal Burns, Alex Szalay.
Sensitivity of PCA for Traffic Anomaly Detection Evaluating the robustness of current best practices Haakon Ringberg 1, Augustin Soule 2, Jennifer Rexford.
Network Anomography Yin Zhang Joint work with Zihui Ge, Albert Greenberg, Matthew Roughan Internet Measurement.
Network Anomaly Detection Using Autonomous System Flow Aggregates Thienne Johnson 1,2 and Loukas Lazos 1 1 Department of Electrical and Computer Engineering.
LDA (Linear Discriminant Analysis) ShaLi. Limitation of PCA The direction of maximum variance is not always good for classification.
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
Communication-Efficient Online Detection of Network-Wide Anomalies Ling Huang* XuanLong Nguyen* Minos Garofalakis § Joe Hellerstein* Michael Jordan* Anthony.
1 C.A.L. Bailer-Jones. Machine Learning. Data exploration and dimensionality reduction Machine learning, pattern recognition and statistical data modelling.
Data Transformation: Normalization
ANOMALY DETECTION FRAMEWORK FOR BIG DATA
QRS Detection Linda Henriksson 1.
Outlier Processing via L1-Principal Subspaces
Exploiting Machine Learning to Subvert Your Spam Filter
Motion Detection And Analysis
Roland Kwitt & Tobias Strohmeier
Security Monitoring for Network Protocols and Applications
RHMD: Evasion-Resilient Hardware Malware Detectors
Modeling IDS using hybrid intelligent systems
Presentation transcript:

EE515/IS523: Security 101: Think Like an Adversary Evading Anomarly Detection through Variance Injection Attacks on PCA Benjamin I.P. Rubinstein, Blaine Nelson, Anthony D. Joseph, Shing-hon Lau, NinaTaft, J. D. Tygar RAID 2008 Presented by: Dong-Jae Shin

EE515/IS523: Security 101: Think Like an Adversary Outline Background Machine Learning PCA (Principal Component Analysis) Related Work Motivation Main Idea Evaluation Conclusion Future work 2

EE515/IS523: Security 101: Think Like an Adversary Machine Learning Machine learning (ML) Design and develop algorithms by machine using patterns or predictions Benefits Adaptability Scalable Statistical decision-making 3 1. Background

EE515/IS523: Security 101: Think Like an Adversary Deriving principal vectors Deriving the principal vector which captures the maximum variance Find next component PCA (Principal Component Analysis) Orthogonal transformation to reduce dimension Most data patterns are captured by the several principal vectors 4 1. Background PCA Data preservation (not perfectly)

EE515/IS523: Security 101: Think Like an Adversary PCA (Principal Component Analysis) PCA Example 5 1. Background Original coordinates PCA New coordinates Projection to 1 st basis (maximum variance) Projection to 2 nd basis (next maximum variance) Maximum variance means good preservation of information Dimension reduction using important bases > More preserved data

EE515/IS523: Security 101: Think Like an Adversary Diagnosing Network-Wide Traffic Anomalies, SIGCOMM 2004 Goal Diagnosing network-wide anomalies Problem Detecting anomalies are difficult because of large amount of high- dimensional and noisy data 6 2. Related Work Src.Dest.Data DDos ? Src.Dest.Data Mail Attack Normal Data Anomaly A pattern in the data that does not conform to the expected behavior

EE515/IS523: Security 101: Think Like an Adversary Diagnosing Network-Wide Traffic Anomalies, SIGCOMM 2004 Example of Link Traffic 7 2. Related Work OD flow Origin-Destination flow between PoPs Too much complexity to monitor every links Network anomaly i start b end

EE515/IS523: Security 101: Think Like an Adversary Diagnosing Network-Wide Traffic Anomalies, SIGCOMM 2004 Solution Separate normal & anomalous traffic using Volume Anomaly with PCA Information : Volume Anomaly  Simple measure Method : PCA  Simplify vectors 8 Measure Volume Anomaly 2. Related Work Volume Anomaly A sudden positive(+) or negative(-) change in an Origin-Destination flow PoP Node of backbone network Detecting using PCA PCA Anomalous Normal Measured Volume anomaly

EE515/IS523: Security 101: Think Like an Adversary Diagnosing Network-Wide Traffic Anomalies, SIGCOMM Traffic vector Residual 2. Related Work Result Comparison between traffic vector of all links and residual vector  Heuristic method can be subverted  Easy to detect, identify, quantify traffic anomalies : Projection vector using PCA Anomaly Detected

EE515/IS523: Security 101: Think Like an Adversary Vulnerabilities of PCA PCA-based Detection can be easily poisoned when only using single compromised PoP System uses only Volume Anomaly Machine learning techniques can be deceived in learning phase Adversary can put poisoned data in learning phase to deceive the system Motivation Poisoned Data

EE515/IS523: Security 101: Think Like an Adversary Chaff Chaff? Original mean : Disturbing equipment for radar countermeasure This paper : Disturbing data against anomaly detection Motivation

EE515/IS523: Security 101: Think Like an Adversary Attack Method Chaff Half normal chaff Zero-mean Gaussian distribution Scaled Bernoulli chaff Bernoulli random variables Add-Constant-If-Big Add constant if traffic exceeds a threshold Add-More-If-Bigger Adds more chaff if traffic exceeds a threshold Boiling Frog Attacks Slowly increasing (θ) the chaffs Main Idea Various spoiled traffic to deceive machine learning based decision process. False negative rate ↑ θ : Attack parameter c t : Chaff traffic

EE515/IS523: Security 101: Think Like an Adversary What they want Detecting is based on rapid change of residual Chaff and Boiling frog attack makes The normal traffic big The residual traffic of anomaly small Evaluation

EE515/IS523: Security 101: Think Like an Adversary Environments System Abilene’s backbone network with 12 PoPs 15 bi-directional inter-PoP links Sampling 2016 measurements per week 5 minute intervals Evaluation Abilene’s backbone network

EE515/IS523: Security 101: Think Like an Adversary Evaluation Attacks with chaffs and its FNR Evaluation Chaffs (18% Total traffic) using Add- More-If-Bigger method record over 50% of FNR FNR False Negative Rate Rate of evading X-axis : How many chaffs to PoP Y-axis : False Negative Rate

EE515/IS523: Security 101: Think Like an Adversary Evaluation Attacks with Boiling Frog and Add-More-If-Bigger Evaluation Growth rate : Multiplied factor of θ Boiling Frog method is effective on even small growth rates X-axis : Attack duration (weeks) Y-axis : False Negative Rate

EE515/IS523: Security 101: Think Like an Adversary Evaluation Attack Rejection Rate for Boling Frog Attacks Evaluation Rate : Multiplied factor of θ Boiling Frog method effectively poison PCA-based system X-axis : Attack duration (weeks) Y-axis : Chaff rejection rate

EE515/IS523: Security 101: Think Like an Adversary Conclusion & Future Work Conclusion PCA-based anomaly detectors can be compromised by simple data poisoning strategies Chaffs Boiling frog attacks Increase the chance of evading DDoS attacks detections by sixfold Future Work Counter-measure based on Robust formulations of PCA Poisoning strategies for increasing PCA’s false positive rate Conclusion & Future Work 50% of success with 18% of adding traffic, 5% traffic increase

EE515/IS523: Security 101: Think Like an Adversary References B. I. P. Rubinstein et. al., “Evading anomaly detection through variance injection attacks on PCA B. I. P. Rubinstein et. al. “Compromising PCA-based anomaly detectors for network-wide traffic” Lakhina, et. al., “Diagnosing network-wide traffic anomalies” 19