Download presentation
Presentation is loading. Please wait.
1
1 A Queuing Formulation of Intrusion Detection with Active and Passive Responses Wei T. Yue, Metin Cakanyildirim, Young U. Ryu Department of Information Systems and Operations Management School of Management The University of Texas at Dallas Richardson, Texas 75083-0688, USA
2
2 Introduction Traditional IDS response tends to be passive – “passive response” Secondary investigation required because IDS is still imperfect Secondary investigation may not occur instantaneously These days, IDS can be set up to respond to events automatically – “active response”
3
3 Introduction Active response – dropping connection, reconfiguring networking devices (firewalls, routers), additional intelligence mining (honeypots) We only consider terminating connection
4
4 Introduction In the intrusion detection process, IDS configuration decision and the alarm investigation decision are related Alarm investigation resource would affect the delays in response in both active and passive response If multiple alarm types involved, which alarm to investigate is an issue
5
5 Research Goals Finding the corresponding configuration and investigation decision for the active and passive response approach Determine the “switching” policy on intrusion response
6
6 Problem Description Passive response potential damage cost - resulting from alarmed events not investigated immediately low false alarm costs since alarmed events are not disrupted
7
7 Problem Description Active response It could prevent attack damage because the events are terminated immediately higher false alarm costs contingent on the performance of the IDS
8
8 Problem Description - Active response: false alarm cost is related to delay - Passive response: damage cost is related to delay
9
9 Problem Description Undetected, or non-alarmed intrusive events are assumed to be the same for the two response approach Given the parameter values, the decisions involved with the active and passive response approaches are different
10
10 IDS Quality: ROC curve A representation of IDS quality – detection rates ((P F )) and false alarm rate (P F ) IDS quality can be determined experimentally – MIT Lincoln Lab (Lippman et al 2000a 200b), Columbia IDS group (Lee and Stolfo, 2000), etc
11
11 IDS Quality: ROC curve
12
12 A Queuing Model of Intrusion Detection Benign and intrusive event arrivals – Independent Poisson process with rate B and I N – number of investigator µ - investigation rate E(W(P F,N)) =1/{N µ-P F B - (P F ) I }
13
13 A Queuing Model of Intrusion Detection: Active Response
14
14 A Queuing Model of Intrusion Detection: Passive Response
15
15 A Queuing Model of Intrusion Detection We rewrite the N in terms of slack service rate S S = N-P F B -(P F ) I
16
16 Linear Piecewise ROC
17
17 Optimal Configuration and Investigation
18
18 Hybrid Response
19
19 Hybrid Response
20
20 Derive optimal intrusion detection decisions with linear piecewise function Extend the study with other types of ROC functions Include multiple types of alarm Conclusion
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.