Machine Learning for Network Anomaly Detection Matt Mahoney.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Network Traffic Anomaly Detection Based on Packet Bytes Matthew V. Mahoney Florida Institute of Technology
1 Reading Log Files. 2 Segment Format
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
Intrusion Detection - Arun Hodigere. Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from.
Basic Elements of Attacks and Their Detection. Contents Elements of TCP/IP addressing Layers in Internet communication Phases of an attack 2/46.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
CS 350 Chapter-6. A brief history of TCP/IP 1983 TCP/IP came to ARPAnet ARPAnet and MILNET dissolved in 1990 BSD UNIX.
A Machine Learning Approach to Detecting Attacks by Identifying Anomalies in Network Traffic A Dissertation by Matthew V. Mahoney Major Advisor: Philip.
ITIS 6167/8167: Network Security Weichao Wang. 2 Contents ICMP protocol and attacks UDP protocol and attacks TCP protocol and attacks.
Network Administration
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Chapter 6: Packet Filtering
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
Intrusion Detection and Prevention. Objectives ● Purpose of IDS's ● Function of IDS's in a secure network design ● Install and use an IDS ● Customize.
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection Matthew V. Mahoney and Philip K. Chan.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 Guide to Network Defense and Countermeasures Chapter 9.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection Matt Mahoney Feb. 18, 2003.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
Learning Rules for Anomaly Detection of Hostile Network Traffic Matthew V. Mahoney and Philip K. Chan Florida Institute of Technology.
Internet Protocol Formats. IP (V4) Packet byte 0 byte1 byte 2 byte 3 data... – up to 65 K including heading info Version IHL Serv. Type Total Length Identifcation.
1 Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
1 Figure 3-13: Internet Protocol (IP) IP Addresses and Security  IP address spoofing: Sending a message with a false IP address (Figure 3-17)  Gives.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-1 Lesson 10 Attack Guards, Intrusion Detection, and Shunning.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Network Intrusion Detection System (NIDS)
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified
Chapter 3 TCP and IP 1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Internet.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Snort – IDS / IPS.
The Transport Layer Implementation Services Functions Protocols
Chapter 3 TCP and IP Chapter 3 TCP and IP.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
A quick intro to networking
or call for office visit, or call Kathy Cheek,
or call for office visit,
Domain 4 – Communication and Network Security
Internet Protocol Formats
TCP/IP Internetworking
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Principles of Computer Security
TCP/IP Internetworking
Overview of Networking & Operating System Security
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Internet Control Message Protocol (ICMP)
ITIS 6167/8167: Network Security
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Firewalls Purpose of a Firewall Characteristic of a firewall
Transport Protocols An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Internet Protocol Formats
46 to 1500 bytes TYPE CODE CHECKSUM IDENTIFIER SEQUENCE NUMBER OPTIONAL DATA ICMP Echo message.
Protocol Application TCP/IP Layer Model
MESSAGE ACCESS AGENT: POP AND IMAP
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Presentation transcript:

Machine Learning for Network Anomaly Detection Matt Mahoney

Network Anomaly Detection Network – Monitors traffic to protect connected hosts Anomaly – Models normal behavior to detect novel attacks (some false alarms) Detection – Was there an attack?

Host Based Methods Virus Scanners File System Integrity Checkers (Tripwire, DERBI) Audit Logs System Call Monitoring – Self/Nonself (Forrest)

Network Based Methods Firewalls Signature Detection (SNORT, Bro) Anomaly Detection (eBayes, NIDES, ADAM, SPADE)

User Modeling Source address – unauthorized users of authenticated services (telnet, ssh, pop3, imap) Destination address – IP scans Destination port – port scans

Frequency Based Models Used by SPADE, ADAM, NIDES, eBayes, etc. Anomaly score = 1/P(event) Event probabilities estimated by counting

Attacks on Public Services PHF – exploits a CGI script bug on older Apache web servers GET /cgi-bin/phf?Qalias=x%0a/usr /bin/ypcat%20passwd

Buffer Overflows 1988 Morris Worm – fingerd 2003 SQL Sapphire Worm char buf[100]; gets(buf); bufstackExploit code Return Address 0100

TCP/IP Denial of Service Attacks Teardrop – overlapping IP fragments Ping of Death – IP fragments reassemble to > 64K Dosnuke – urgent data in NetBIOS packet Land – identical source and destination addresses

Protocol Modeling Attacks exploit bugs Bugs are most common in the least tested code Most testing occurs after delivery Therefore unusual data is more likely to be hostile

Protocol Models PHAD, NETAD – Packet Headers (Ethernet, IP, TCP, UDP, ICMP) ALAD, LERAD – Client TCP application payloads (HTTP, SMTP, FTP, …)

Time Based Models Training and test phases Values never seen in training are suspicious Score = t/p = tn/r where –t = time since last anomaly –n = number of training examples –r = number of allowed values –p = r/n = fraction of values that are novel

Example tn/r Training: n/r = 10/2 Testing: –0: no score –1: no score –2: tn/r = 6 x 10/2 = 30 –2: tn/r = 1 x 10/2 = 5 –3: tn/r = 1 x 10/2 = 5

PHAD – Fixed Rules 34 packet header fields –Ethernet (address, protocol) –IP (TOS, TTL, fragmentation, addresses) –TCP (options, flags, port numbers) –UDP (port numbers, checksum) –ICMP (type, code, checksum) Global model

LERAD – Learns conditional Rules Models inbound client TCP (addresses, ports, flags, 8 words in payload) Learns conditional rules If port = 80 then word1 = GET, POST (n/r = 10000/2)

LERAD Rule Learning If word1 = GET then port = 80 (n/r = 2/1) word1 = GET, HELO (n/r = 3/2) If address = Marx then port = 80, 25 (n/r = 2/2) AddressPortWord1Word2 Hume80GET/ Marx80GET/index.html Marx25HELOPascal

LERAD Rule Learning Randomly pick rules based on matching attributes Select nonoverlapping rules with high n/r on a sample Train on full training set (new n/r) Discard rules that discover novel values in last 10% of training (known false alarms)

DARPA/Lincoln Labs Evaluation 1 week of attack-free training data 2 weeks with 201 attacks SunOSSolarisLinuxNT Router Internet Sniffer Attacks

Attacks out of 201 Detected at 10 False Alarms per Day

Problems with Synthetic Traffic Attributes are too predictable: TTL, TOS, TCP options, TCP window size, HTTP, SMTP command formatting Too few sources: Client addresses, HTTP user agents, ssh versions Too “clean”: no checksum errors, fragmentation, garbage data in reserved fields, malformed commands

Real Traffic is Less Predictable r (Number of values) Time Synthetic Real

Mixed Traffic: Fewer Detections, but More are Legitimate

Project Status Philip K. Chan – Project Leader Gaurav Tandon – Applying LERAD to system call arguments Rachna Vargiya – Application payload tokenization Mohammad Arshad – Network traffic outlier analysis by clustering

Further Reading Learning Nonstationary Models of Normal Network Traffic for Detecting Novel Attacks by Matthew V. Mahoney and Philip K. Chan, Proc. KDD.Learning Nonstationary Models of Normal Network Traffic for Detecting Novel Attacks Network Traffic Anomaly Detection Based on Packet Bytes by Matthew V. Mahoney, Proc. ACM-SAC.Network Traffic Anomaly Detection Based on Packet Bytes