PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Intrusion Detection/Prevention Systems Charles Poff Bearing Point.
Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
Detecting suspicious behaviors. BBAC currently examines data streams of HTTP requests and TCP traffic within a distributed stream processing framework.
Reporter: Jing Chiu Advisor: Yuh-Jye Lee /7/181Data Mining & Machine Learning Lab.
IDS In Depth Search: Ideas, Descriptions, and Solutions Presentation by Marshall Washburn November 30 th, 2010 CPSC 420/620 w/ Dr. Grossman.
TransAD: A Content Based Anomaly Detector Sharath Hiremagalore Advisor: Dr. Angelos Stavrou October 23, 2013.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
By Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel --James O’Reilly presenting.
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Intrusion Detection Systems and Practices
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Intrusion Detection/Prevention Systems. Objectives and Deliverable Understand the concept of IDS/IPS and the two major categorizations: by features/models,
Unsupervised Intrusion Detection Using Clustering Approach Muhammet Kabukçu Sefa Kılıç Ferhat Kutlu Teoman Toraman 1/29.
Neural Technology and Fuzzy Systems in Network Security Project Progress 2 Group 2: Omar Ehtisham Anwar Aneela Laeeq
Copyright 2002, Center for Secure Information Systems 1 Panel: Role of Data Mining in Cyber Threat Analysis Professor Sushil Jajodia Center for Secure.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Leveraging User Interactions for In-Depth Testing of Web Applications Sean McAllister, Engin Kirda, and Christopher Kruegel RAID ’08 1 Seoyeon Kang November.
Big Data Analytics and Challenge Presented by Saurabh Rastogi Asst. Prof. in Maharaja Agrasen Institute of Technology B.Tech(IT), M.Tech(IT)
Intrusion Detection/Prevention Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality,
seminar on Intrusion detection system
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Department Of Computer Engineering
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Data Mining By Andrie Suherman. Agenda Introduction Major Elements Steps/ Processes Tools used for data mining Advantages and Disadvantages.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
Distributed Network Intrusion Detection An Immunological Approach Steven Hofmeyr Stephanie Forrest Patrik D’haeseleer Dept. of Computer Science University.
1 © Goharian & Grossman 2003 Introduction to Data Mining (CS 422) Fall 2010.
Intrusion Detection/Prevention Systems. Objectives and Deliverable Understand the concept of IDS/IPS and the two major categorizations: by features/models,
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Alert Correlation for Extracting Attack Strategies Authors: B. Zhu and A. A. Ghorbani Source: IJNS review paper Reporter: Chun-Ta Li ( 李俊達 )
Chapter 9: Cooperation in Intrusion Detection Networks Authors: Carol Fung and Raouf Boutaba Editors: M. S. Obaidat and S. Misra Jon Wiley & Sons publishing.
Intrusion Detection Adam Ashenfelter Nicholas J. Tyrrell.
Network Intrusion Detection Using Random Forests Jiong Zhang Mohammad Zulkernine School of Computing Queen's University Kingston, Ontario, Canada.
IIT Indore © Neminah Hubballi
11 Automatic Discovery of Botnet Communities on Large-Scale Communication Networks Wei Lu, Mahbod Tavallaee and Ali A. Ghorbani - in ACM Symposium on InformAtion,
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
Second Line Intrusion Detection Using Personalization DISA Sponsored GWU-CS.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection/Prevention Systems. Objectives and Deliverable Understand the concept of IDS/IPS and the two major categorizations: by features/models,
Intrusion Detection System
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Network Intrusion Detection System (NIDS)
A Blackboard-Based Learning Intrusion Detection System: A New Approach
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
DOWeR Detecting Outliers in Web Service Requests Master’s Presentation of Christian Blass.
Some Great Open Source Intrusion Detection Systems (IDSs)
Intrusion Detection using Deep Neural Networks
Module: Software Engineering of Web Applications
Chapter 7: Identifying Advanced Attacks
Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel
Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Systems By: david Rodriguez.
Detecting Targeted Attacks Using Shadow Honeypots
Intrusion Detection Systems
Presentation transcript:

PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao

Reference  Damiano Bolzoni, Sandro Etalle and Pieter Hartel. Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. RAID"09,2010

Outline  Introduction to Intrusion Detection  PANACEA:AUTOMATIC ATTACK CLASSIFICATION  Experiment  Summary

Intrusion Detection  Primary assumption: user and program activities can be monitored and modeled  An Intrusion Detection System is an important part of the Security Management system for computers and networks.

Approaches to IDS TechniqueMisuse(signature) BasedAnomaly Based Concept  Model well-known attacks  use these known patterns to identify intrusion.  Are trained using normal behavior of the system  Try to flag the deviation from normal pattern as intrusion Pros and Cons  Specific to attacks can not extend to unknown intrusion patterns ( False Negatives)  Usual changes due to traffic etc may lead higher number of false alarms

IT’S A HARD LIFE IN THE REAL WORLD FOR AN ANOMALY-BASED IDS…  Training sets are not “clean by default”  Threshed values must be manually set  Alerts must be manually classified lack of usability → nobody will deploy such an IDS

WHY ALERT CLASSIFICATION SHOULD BE AUTOMATED?  Use alert correlation/verification and attack trees techniques  so far, only available for signature-based IDSs  Automatic countermeasures activated based on attack classification/impact  block the source IP in case of a buffer overflow  Reduce the required user knowledge and workload less knowledge and workload → less $$$

PANACEA AUTOMATIC ATTACK CLASSIFICATION  Idea:  attacks in the same class share some common content  Goals:  effective 75% of correct classifications, with no human intervention  flexible allow both automatic and manual alert classification in training mode allow pre-and user-defined attack classes allow users to tweak the alert classification model

PANACEA

ALERT INFORMATION EXTRACTOR  Uses a Bloom filter to store occurrences of n-grams  data are sparse, few collisions  can handle N-grams (N >> 3)  Stores thousands of alerts, for “batch training”

ATTACK CLASSIFICATION ENGINE  Two different classification algorithms  non-incremental learning, more accurate than incremental ones  process 3000 alerts in less than 40s  Support Vector Machine (SVM)  black box, users have a few “tweak” points  RIPPER  generates human-readable rules

RIPPER  Examples of output RIPPER rules:  IF bf[i] = 1 AND... AND bf[k] = 1 THEN class = cross- site scripting  IF bf[l] = 1 AND... AND bf[n] = 1 THEN class = sql injection

AUTOMATIC MODE -DATASET A  Snort alerts  pre-defined alert classes (10)  alerts generated by Nessus and a proprietary VA tool  no manual classification  cross-folding validation

MANUAL MODE-DATASET B  Snort web alertsalerts generated by Nessus, Nikto and Milw0rm attacks  attacks are manually classified (WASC taxonomy)  cross-folding validation

MANUAL MODE -DATASET C  Training set: Dataset B  Testing set: 100 anomaly-based alerts  alerts have been captured in the wild by our POSEIDON (analyzes packet payloads) and Sphinx (analyzes web requests)

SUMMARY  SVM performs better than RIPPER on a class with few samples (~50)  RIPPER performs better than SVM on a class with a sufficient number of samples (~70)  SVM performs better than RIPPER on a class with a high intra-class diversity and when attack payloads have not been observed during training