OFFLINE NETWORK INTRUSION DETECTION: MINING TCPDUMP DATA TO IDENTIFY SUSPICIOUS ACTIVITY KRISTIN R. NAUTA AND FRANK LIEBLE.
|
|
|
- Joan Beasley
- 10 years ago
- Views:
Transcription
1 OFFLINE NETWORK INTRUSION DETECTION: MINING TCPDUMP DATA TO IDENTIFY SUSPICIOUS ACTIVITY KRISTIN R. NAUTA AND FRANK LIEBLE Abstract With the boom in electronic commerce and the increasing global interconnectedness of computer systems, infrastructure protection has quickly become the next big problem after Year 2000 preparedness. Public and private sector organizations have a created a multi-billion dollar market demand for tools to protect themselves against cyber attacks. System administrators are scrambling to find in-line and off-line solutions for detecting network vulnerabilities, and to understand the behavior of network resource consumers. This paper will provide an introduction to the intricacies of reconciling TCPDUMP packet flow data in an effort to construct IP conversation behavior profiles. The resulting behavior profiles are warehoused for reporting and trend analysis. The behavioral data is mined to identify potential suspicious or intrusive network activity. Finally, by applying the patterns discovered through mining to the randomly timed samples of TCP packet flow data, systems administrators can monitor behavior exception reports for infrastructure vulnerabilities. OVERVIEW OF OFFLINE INTRUSION DETECTION With the boom in electronic commerce and the increasing global interconnectedness of computer systems, infrastructure protection has quickly become the next big problem after Year 2000 preparedness. Public and private sector organizations have a created a multi-billion dollar market demand for tools to protect themselves against cyber attacks. These organizations hope to protect the consumer information found in transaction systems; employee data stored in newly implemented ERP systems; and intellectual property stored in their internal knowledge bases, data warehouses, and decision support systems. It is estimated that a full 80% of an organizations intellectual assets are in digital form. Table 1 displays the Gartner Group s suggested information security hierarchy. Level 6 Validation Information Security Hierarchy Level 5 Auditing, Monitoring, Investigating Level 4 Information Security Technologies and Products Level 3 Information Security Awareness and Training Level 2 Information Security Architecture and Processes Level 1 Information Security Policy and Standards Table 1: Information Assurance Hierarchy, Gartner Group 1
2 Often, network security violations originate within the network itself, coming from disgruntled or otherwise ill-motivated employees; or from external individuals who have gained access to internal accounts. Their behaviors may involve disruption of services; or the theft or destruction of important files. The fear of gaining a bad reputation through public exposure often prevents attacked organizations from revealing attacks. Thus, although it is difficult to track the losses associated with intrusive acts, system administrators are scrambling to find in-line and off-line solutions for detecting network vulnerabilities, and to understand the behavior of network resource consumers. There are two types of software solutions available to aid in this quest: Intrusion detection systems collect information from various vantage points within a computer system or network, and analyze that information for symptoms of system breaches. Vulnerability systems check the network and hosts for configuration problems that could give rise to security vulnerabilities. This paper will discuss implementing an off-line network intrusion detection system to periodically analyze or audit batches of TCP/IP network log data. Further we will discuss how to apply an initial analysis to data collected in future periods so that systems administrators can use exception reports to identify suspected intrusions. It is important to note that no software can monitor all network traffic because the data processing becomes prohibitive. By including network intrusion detection into the comprehensive security infrastructure, system administrators can provide the organization with a more secure computing environment. USING SAS SOFTWARE FOR OFFLINE INTRUSION DETECTION To solve the complex issues involved in turning TCP/IP network transactions into data suitable for warehousing, mining, and exception reporting we utilized a synergistic combination of products, namely SAS Enterprise Miner and SAS IT Service Vision to attack the problem. The SAS Enterprise Miner package can be used to analyze incoming TCP/IP traffic data, analyze the data for unauthorized activities and notify system administrators of identified threats. SAS Enterprise Miner includes the Base SAS software package along with its 4 th generation data manipulation language which can be used to re-construct TCP/IP conversations in whole, and to create data content features relevant to the behavior of non-normal network activity. Once the appropriate data structure is created, SAS Enterprise Miner provides a full suite of supervised and unsupervised data mining algorithms, which can be used to formulate intrusion detection models. In the initial stages of intrusion detection system implementation the status of current network activity is often unknown making unsupervised models required to provide the categorization of conversations as normal or non-normal. Non-normal categorization can be specific, i.e., denial of service, port scanning probes, and super user access. SAS Enterprise Miner includes tools to visualize data and model results. These models can be applied in a near real time scenario against incoming TCP/IP data to detect unauthorized activity. 2
3 In addition, SAS IT Service Vision will allow administrators to build a read-only, analytical data warehouse, which will be used as the foundation for managing large quantities of incoming TCP/IP traffic data. This data warehouse, known as the performance database (PDB), will provide the ability store data into five levels, Detail - cleansed, transformed data in a non-aggregated format, and Day, Week, Month, and Year - detail data summarized into specific descriptive statistics by different time intervals for long term historical reporting and analysis. Once the TCP/IP traffic data is loaded into a PDB it can accessed using any of the SAS Software tools. SAS IT Service Vision can be used to identify and monitor simple relationships in the TCP/IP network logs. With SAS Enterprise Miner, complex multivariate models can be created to profile intrusive behaviors. DATA COLLECTION AND ENHANCEMENT TCP/IP traffic data is generated using a data collection application, which is referred to as a collector. A collector can be a "home grown" application or purchased from one of many network performance vendors available in the market. When network data is generated it is stored in files commonly known as network data logs. These data logs can be represented in a wide variety of formats, i.e. ASCII, binary, RDBMS tables which can pose as a problem in reporting and analysis. Also pre-processing of the network data within the logs is usually required so that the data can be standardized. This will ensure that the data is processed correctly and that there are no discrepancies in the representation of the data. PERFORMANCE DATA WAREHOUSE Due to the sheer volume of data a methodology needs to be implemented to organize and manage the network data. The performance data warehouse (PDB) provides the ability to filter and store the TCP/IP data into a multilevel repository utilizing three major principals: 1) Data Filtering - defining what performance metrics are to be kept in the PDB. This will allow for the loading of useful data in the PDB and discard unwanted performance metrics, 2) Data Aging - defining how long performance data are to be kept in the PDB before it is deleted or archived. This will manage the size of the PDB and manage data dormancy, and 3) Data Aggregation - defining summary statistics the detail data will be reduced by, i.e., mean, maximum, minimum. This will allow for easier reporting by reducing machine cycles and run time. With these three principals large amounts of TCP/IP traffic data can be managed and organized for reporting and analysis. Once the traffic data has been cleansed, loaded, and reduced into a PDB it can be used for a wide variety of reporting and analysis. For example, exception reporting, once data mining determines the unauthorized activities and threats within the TCP/IP data they can be fed back into the PDB as exception rules. These exception rules can be applied against the PDB s detail and/or summarized data allowing for the ability to identify intrusions over a wider span of time. 3
4 DATA MINING Data mining strategies fall into two broad categories: supervised learning and unsupervised learning. Supervised learning methods are deployed when there exists a field or variable (target) with known values and about which predictions will be made by using the values of other fields or variables (inputs). Unsupervised learning methods tend to be deployed on data for which there does not exist a field or variable (target) with known values, while fields or variables do exist for other fields or variables (inputs). Unsupervised learning methods while more frequently used in cases where a target field does not exist, can be deployed on data for which a target field exists. Table 2 breaks down data mining techniques by modeling objective and supervised/unsupervised distinctions. Modeling Objective Supervised Unsupervised Prediction Regression and Logistic regression Neural Networks Decision Trees Not feasible Classification Exploration Affinity Note targets can be binary, interval, nominal, or ordinal. Decision Trees Neural Networks Discriminant Analysis Note targets can be binary, nominal, or ordinal. Decision Trees Note targets can be binary, nominal, or ordinal. Clustering (K-means, etc) Neural Networks Kohonen Networks Self Organizing Maps Principal Components Clustering (K-means, etc) Associations Sequences Factor Analysis Table 2: Modeling Objectives and Data Mining Techniques Table 1 displays four modeling objectives: prediction; classification; exploration; and affinity. Prediction algorithms determine models or rules to predict continuous or discrete target values given input data. For example, a prediction problem could attempt to predict the value of the S&P 500 Index given some input data (e.g. economic crash in Asia, trade balances, etc.). Classification algorithms determine models to predict discrete values given input data. A classification problem might involve trying to determine if transactions represents anomalous behavior based on some indicators (if the purchase was made at a pawn shop, amount of purchase, type of purchase, etc.). Exploration uncovers dimensionality in input data. Trying to uncover groups of similar customers based on spending habits for a large, targeted mailing is an exploration problem. Affinity analysis determines which events are likely to occur in conjunction with one another. Retailers use affinity analysis to analyze product purchase combinations in grocery stores. Both supervised and unsupervised learning methods are useful for classification purposes. In a particular business problem involving anomaly detection, the objective may be to establish a classification scheme for anomalies. Regression, decision trees, neural networks and clustering can all address this problem. Decision trees and neural networks build classification rules and other mechanisms for detecting anomalies. Clustering would indicate what types of groupings (based on a number of inputs) in a given population are more at risk for exhibiting anomalies, with the grouping membership of a transaction classifying if a transaction were at greater risk of being anomalous. 4
5 CASE STUDY: TCPDUMP HEADER DATA In this case study we used data provided on the Internet at Raw TCPDUMP data was collected under a simulated network environment. The network simulated a baseline environment without intrusions and four types of intrusions. Each simulation was approximately 10 minutes of real time. The intrusion simulations were: IP Spoofing - With IP spoofing an intruder attempts to busy out the system by creating numerous half open connections, often within a small period of time. Rlogin - The RLOGIN attack is characterized by a high rate of connections from one node to another, often within a small period of time. In this attack, the intruder is attempting to gain access to the system. Network Scanning - Network scans are used to determine vulnerable ports. The attack is often characterized by accessing a high number of ports on limited set of addresses. Network Hopping - Network hopping is used to cover the trail of an intruder on your network, making it more difficult to pinpoint the original vulnerability that allowed access to the systems. A hopping attack appears as a chain of subsequent logins to various networked machines. The goal of the analysis is to create descriptive information from the raw TCPDUMP header files, then to mine the data in order to determine likely intrusive TCP/IP connections. Data Collection and Enhancement The raw data consisted of packet level transmission data including source and destination IP address and ports; flags, acknowledgements and packet sequence numbers; and window, buffer and optional information. Table 3 displays the full TCPDUMP header data layout. Data analysts often recognize the fact that 80% to 90% of their works is really data preparation. With the intrusion simulation data, this was certainly the case. Upon inspection of the data, you find that no single record represents a complete conversation between two IP addresses. In fact, each record is only a portion of the conversation: the source sending information to the destination, or vice versa. In order to create useful inputs for data mining, we must first determine which records are part of the same conversation. After the conversation reconciliation, we can compute meaningful variables such as the number of connections made to a one or more destination IP addresses within a two-second time window. For data mining then, the data preparation goals is to establish the final state of a conversation; then to understand the behavior of each source IP address on the network in relation to destination IP addresses and destination ports. Steps in the data processing are discussed in the remainder of this section. 5
6 ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ7KHÃ6$6Ã6\VWHPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ &217(176Ã352&('85( 'DWDÃ6HWÃ1DPHÃ:25.1(7ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ2EVHUYDWLRQVÃÃÃÃÃÃÃÃÃ 0HPEHUÃ7\SHÃÃÃ'$7$ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ9DULDEOHVÃÃÃÃÃÃÃÃÃÃÃÃ (QJLQHÃÃÃÃÃÃÃÃ9ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ,QGH[HVÃÃÃÃÃÃÃÃÃÃÃÃÃÃ &UHDWHGÃÃÃÃÃÃÃÃ0RQGD\Ã$XJXVWÃÃÃÃÃÃÃÃÃÃÃÃ2EVHUYDWLRQÃ/HQJWKÃÃÃ /DVWÃ0RGLILHGÃÃ0RQGD\Ã$XJXVWÃÃÃÃÃÃÃÃÃÃÃÃ'HOHWHGÃ2EVHUYDWLRQVÃ 3URWHFWLRQÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ&RPSUHVVHGÃÃÃÃÃÃÃÃÃÃÃ12 'DWDÃ6HWÃ7\SHÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ6RUWHGÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ12 (QJLQH+RVWÃ'HSHQGHQWÃ,QIRUPDWLRQ ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ'DWDÃ6HWÃ3DJHÃ6L]HÃÃÃÃÃÃÃ ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ1XPEHUÃRIÃ'DWDÃ6HWÃ3DJHVÃ ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ)LOHÃ)RUPDWÃÃÃÃÃÃÃÃÃÃÃÃÃÃ ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ)LUVWÃ'DWDÃ3DJHÃÃÃÃÃÃÃÃÃÃ ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ0D[Ã2EVÃSHUÃ3DJHÃÃÃÃÃÃÃÃÃ ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ2EVÃLQÃ)LUVWÃ'DWDÃ3DJHÃÃÃ $OSKDEHWLFÃ/LVWÃRIÃ9DULDEOHVÃDQGÃ$WWULEXWHV ÃÆÃ9DULDEOHÃ7\SHÃ/HQÃ3RVÃ)RUPDWÃÃÃÃÃÃÃ,QIRUPDWÃ/DEHO ÃÃ$&.ÃÃÃÃÃÃ1XPÃÃÃÃÃÃÃ%(67ÃÃÃÃ Ã%(67ÃÃ5HWXUQÃ6HTXHQFHÃ1XPEHUÃ)URPÃ2WKHU Ã%8)ÃÃÃÃÃÃ1XPÃÃÃÃÃÃÃ%(67ÃÃÃÃÃÃ%(67ÃÃ5HFHLYHÃ%XIIHUÃ6SDFHÃ$YDLODEOH Ã&219ÃÃÃÃ&KDUÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ,QLWLDWRUÃ&RQYHUVDWLRQÃ6LJQDWXUH Ã&219ÃÃÃÃ&KDUÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ5HVSRQGHUÃ&RQYHUVDWLRQÃ6LJQDWXUH Ã'$7(7,0(Ã1XPÃÃÃÃÃÃ'$7(7,0(ÃÃÃÃÃÃÃÃÃÃ'DWHWLPHÃ6WDPS ÃÃ'(67B$''Ã&KDUÃÃÃÃÃÃÇÃÃÃÃÃÃÃÃÃÃÇÃÃÃÃÃÃ'HVWLQDWLRQÃ$GGUHVV ÃÃ'(67B325Ã&KDUÃÃÃÃÃÃÇÃÃÃÃÃÃÃÃÃÃÇÃÃÃÃÃÃ'HVWLQDWLRQÃ3RUW Ã',3$''5ÃÃ&KDUÃÃÃÃÇÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ'HVWLQDWLRQÃ$GGUHVVÃDQGÃ3RUW Ã'37<3(ÃÃÃ&KDUÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ'HVWLQDWLRQÃ3RUWÃ*URXS Ã'7<3(ÃÃÃÃ&KDUÃÃÃÃÃÇÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ6LPXODWLRQÃ'DWDÃ7\SH ÃÃ)/$*ÃÃÃÃÃ&KDUÃÃÃÃÃÃÇÃÃÃÃÃÃÃÃÃÃÇÃÃÃÃÃÃ)ODJ Ã23ÃÃÃÃÃÃÃ&KDUÃÃÃÃÃÇÃÃÃÃÃÃÃÃÃÇÃÃÃÃÃ2SWLRQDOÃ,QIRUPDWLRQ Ã32577<3(Ã&KDUÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ'HVWLQDWLRQÃ3RUWÃ'HVFULSWLRQ ÃÃ6(4ÃÃÃÃÃ1XPÃÃÃÃÃÃÃ%(67ÃÃÃÃÃÃ%(67ÃÃ3DFNHWÃ6HTXHQFHÃ1XPEHU ÃÃ6(4ÃÃÃÃÃ1XPÃÃÃÃÃÃÃ%(67ÃÃÃÃÃÃ%(67ÃÃ5HWXUQÃ6HTXHQFHÃ1XPEHU Ã6,3$''5ÃÃ&KDUÃÃÃÃÇÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ6RXUFHÃ$GGUHVVÃDQGÃ3RUW ÃÃ65&B$''5Ã&KDUÃÃÃÃÃÃÃÇÃÃÃÃÃÃÃÃÃÃÇÃÃÃÃÃÃ6RXUFHÃ$GGUHVV ÃÃ65&B3257Ã&KDUÃÃÃÃÃÃÇÃÃÃÃÃÃÃÃÃÃÇÃÃÃÃÃÃ6RXUFHÃ3RUW ÃÃ7,0(ÃÃÃÃÃ1XPÃÃÃÃÃÃÃÃ7,0(ÃÃÃÃÃ%(67ÃÃ7LPH Ã8/(1ÃÃÃÃÃ1XPÃÃÃÃÃÃÃ%(67ÃÃÃÃÃÃ%(67ÃÃ8'3Ã3DFNHWÃ/HQJWK Ã:,1ÃÃÃÃÃÃ1XPÃÃÃÃÃÃÃ%(67ÃÃÃÃÃÃ%(67ÃÃ5HFHLYHÃ%XIIHUÃ6SDFHÃ$YDLODEOH Table 3: TCPDUMP Header data layout The first step in data preparation is to group all records from a single source IP to destination IP using a unique indicator. The basic SAS data processing language was used for this step. This creates the conversation group field. 6
7 Next, we used the packet flags and acknowledgements to determine the current status of a connection. For example, is the connection currently being opened, is already opened, is being closed, is completely closed. Once the records are grouped from the preceding step, the data is sorted by conversation grouping and time of connection. We then retain the flag across each record, compare with the current flag, and determine the connection state. We applied simple logic such as, if a conversation has three records with a SYN flag, then assume a conversation is opened. This step could be improved by refining the logic to determine conversation status. This creates the final state field. To get information on what action the user was attempting, we mapped the destination ports to specific user actions. The destination port determines the function the user is trying to access, while the source port is assigned randomly. Most network administrators use a common set of port mappings. By transforming port numbers into action types, we can determine basic information about what a user was attempting. For this case study, we created high level groupings of the port types as login, , system status check, SNMP, date, who, chat, and other. This creates the destination port type filed. In order to consider automated versus manual input stream, we needed to determine the amount time elapsed between connections to different destination IP addresses from a single IP source address, and to different destination ports on a single destination IP address from a single IP Source address. We then created indicators for elapsed time within specific ranges. For example we indicated if the elapsed time was less than 5 seconds, between 5 and 30 seconds, greater than 30 seconds, or undeterminable. This creates the time difference to destination address and time difference to destination port fields. Exploring Conversation Data for Simple Relationships TCP/IP traffic data that has been cleansed, loaded, and reduced in the PDB can be exploited using data warehousing performance and exception reporting tools. This provides the system administrator ability report on simple relationships between the data. For example, we generated a performance report showing the top 10 destination addresses. This allowed for the investigation of any abnormalities within the data that could be potential intrusions, Figure 1. Figure 1: Performance Report As for exception reporting we utilized exception rules derived from the data-mining tool to identify unauthorized activities and threats within the TCP/IP traffic data. These rules were defined to the data dictionary of the PDB, which were used in exception reports to discover data intrusions over a wider span 7
8 of time. For example, the destination address times for connections less then 5 seconds, less then 30 seconds, greater then 30 seconds, and unknown. By applying the exception rules to the TCP/IP traffic data stored in the PDB an exception report was generated, Figure 2. We can clearly identify that for this specified period time 5422 connections are less than 5 seconds. This would alert the administrator to investigate this potential anomaly further. Figure 2: Exception Report Mining Behavior Data for Complex Relationships For data mining, we wanted to create a single record for each source IP address describing its behavior on the network. We summarized the final states, number of destination IP addresses, and time differences to destination address fields by the source IP address. This provides, for each source IP address, counts of the number of times each final state occurred, to how many IP addresses were connections made, and counts of the time difference groupings. We also summarized the destination port types and time differences to destination ports by the combined source and destination IP addresses. This provides, for each unique IP source to destination IP connection, the number of times each specific action was attempted, and the number of times port hits occurred within the specified intervals. To create a single analysis file, we merged the two summary files by source IP address. This results in one file containing the behavior of each source IP with respect to the various destination IP addresses and ports for the given time period. The resulting file layout is displayed in Table 4. 8
9 ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ7KHÃ6$6Ã6\VWHPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ &217(176Ã352&('85( 'DWDÃ6HWÃ1DPHÃ,1758'(50,1($//ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ2EVHUYDWLRQVÃÃÃÃÃÃÃÃÃ 0HPEHUÃ7\SHÃÃÃ'$7$ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ9DULDEOHVÃÃÃÃÃÃÃÃÃÃÃÃ (QJLQHÃÃÃÃÃÃÃÃ9ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ,QGH[HVÃÃÃÃÃÃÃÃÃÃÃÃÃÃ &UHDWHGÃÃÃÃÃÃÃÃ:HGQHVGD\Ã0DUFKÃÃÃÃÃÃÃÃÃ2EVHUYDWLRQÃ/HQJWKÃÃÃ /DVWÃ0RGLILHGÃÃ:HGQHVGD\Ã0DUFKÃÃÃÃÃÃÃÃÃ'HOHWHGÃ2EVHUYDWLRQVÃ 3URWHFWLRQÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ&RPSUHVVHGÃÃÃÃÃÃÃÃÃÃÃ12 'DWDÃ6HWÃ7\SHÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ6RUWHGÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ12 ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ(QJLQH+RVWÃ'HSHQGHQWÃ,QIRUPDWLRQ ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ'DWDÃ6HWÃ3DJHÃ6L]HÃÃÃÃÃÃÃ ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ1XPEHUÃRIÃ'DWDÃ6HWÃ3DJHVÃ ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ)LOHÃ)RUPDWÃÃÃÃÃÃÃÃÃÃÃÃÃÃ ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ)LUVWÃ'DWDÃ3DJHÃÃÃÃÃÃÃÃÃÃ ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ0D[Ã2EVÃSHUÃ3DJHÃÃÃÃÃÃÃÃÃ ÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ2EVÃLQÃ)LUVWÃ'DWDÃ3DJHÃÃÃ $OSKDEHWLFÃ/LVWÃRIÃ9DULDEOHVÃDQGÃ$WWULEXWHV ÃÃÃÆÃ9DULDEOHÃ7\SHÃ/HQÃ3RVÃ)RUPDWÃ,QIRUPDWÃ/DEHO ÃÃÃ&/26('ÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ)LQDOÃ6WDWHVÃ&ORVHG ÃÃÃ'$7$:$6ÃÃ&KDUÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ2ULJLQÃRIÃ,QWUXVLRQÃ'DWD ÃÃÃÃ'$7(ÃÃÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ'DWHÃ3RUWÃ5HTXHVWV ÃÃÃ'16ÃÃÃÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ)LQDOÃ6WDWHVÃ'16 ÃÃÃÃ)73ÃÃÃÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ)73Ã3RUWÃ5HTXHVWV ÃÃÃÃ*15/ÃÃÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ*HQHUDOÃ3RUWÃ5HTXHVWV ÃÃÃ*7'$ÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ7LPHVÃ%HWZÃ'HVWÃ$GGUÃ*7ÃÃ6HF ÃÃÃ*7'3ÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ7LPHVÃ%HWZÃ'HVWÃ3RUWÃ*7ÃÃ6HF ÃÃÃ/('$ÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ7LPHVÃ%HWZÃ'HVWÃ$GGUÃ/(ÃÃ6HF ÃÃÃ/('3ÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ7LPHVÃ%HWZÃ'HVWÃ3RUWÃ/(ÃÃ6HF ÃÃÃ/('$ÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ7LPHVÃ%HWZÃ'HVWÃ$GGUÃ/(ÃÃ6HF ÃÃÃ/('3ÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ7LPHVÃ%HWZÃ'HVWÃ3RUWÃ/(ÃÃ6HF ÃÃÃÃ/2*ÃÃÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ/RJLQÃÃ3RUWÃ5HTXHVWV ÃÃÃÃ/2*ÃÃÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ/RJLQÃÃ3RUWÃ5HTXHVWV ÃÃÃÃ0$,/ÃÃÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ0DLOÃ3RUWÃ5HTXHVWV ÃÃÃ1'$''5ÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ'HVWÃ$GGUÃIURPÃ6UFÃ$GGU ÃÃÃÃ1'3257ÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ'HVWÃ3RUWVÃIRUÃ6$ '$ ÃÃÃ1(:ÃÃÃÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ)LQDOÃ6WDWHVÃ1HZ ÃÃÃ16$''5ÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ6UFÃ$GGUÃLIÃWKLVÃZDVÃ'HVWÃ$GGU ÃÃÃ23(1('ÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ)LQDOÃ6WDWHVÃ2SHQHG ÃÃÃÃ65&B$''5Ã&KDUÃÃÃÃÃÇÃÃÃÃÇÃÃÃÃÃÃ6RXUFHÃ$GGUHVV ÃÃÃÃ65&B'(67Ã&KDUÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃ6RXUFHÃ$GGUHVV 'HVWLQDWLRQÃ$GGUHVV ÃÃÃ81.'$ÃÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ7LPHVÃ%HWZÃ'HVWÃ$GGUÃ8QNQRZQ ÃÃÃ81.'3ÃÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ7LPHVÃ%HWZÃ'HVWÃ3RUWÃ8QNQRZQ ÃÃÃ:+2ÃÃÃÃÃÃ1XPÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÃÆÃ:KRÃ3RUWÃ5HTXHVWV Table 4: TCPDUMP Data Prepared for Mining 9
10 Mining the Data Figure 3: Intrusion Detection Analysis Flow We used SAS Enterprise Miner to look for intrusive patterns in the data. Enterprise Miner provides a drag and drop interface for creating analysis paths through a data stream. Because we have no information on the data indicating when specific intrusions were simulated, we used the unsupervised data mining technique of clustering. To assist in understanding the clustering results, we initially request only 5 clusters. Later we increased this to 10 clusters to more separation that better correlates to specific intrusion types. The clustering algorithm used a least squares criterion to determine cluster membership. Results from this analysis follow. Figure 4 displays the cluster statistics graphically, while Figure 5 displays the same information in tabular format. The height and color of the cluster 1 slices indicates that this cluster contains a very large portion of the data; yet the data are rather compact in the multidimensional space. Because we would expect the most of the conversations on a given network to be normal network activity, cluster 1 is probably identifying normal conversations. Other clusters pick up anomalies in the data. We need to investigate the data patterns associated with each cluster in order understand how the clusters relate to specific intrusions types. Figure 4: Graphical Cluster Statistics 10
11 Figure 5: Tabular Cluster Statistics Cluster 4 appears to be the second largest grouping of data points; and to have large variability in the multidimensional space. Cluster 5 is rather small, both in membership and radius. Clusters 2 and 3 are also relatively small. In fact cluster 3 has only 2 observations. We need to determine if these two small clusters are really identifying intrusions, or are just picking up outliers in the data. Figure 6: Cluster Proximities Figure 6 displays the clusters on the principal component axes of the multi-dimensional space we analyzed. Each cluster mean is surrounded by a circle indicating the cluster radius. From this graphic it is obvious that the observations in clusters 1 and 5 have similar raw data (network behaviors); and the same is true for clusters 2, 3 and 4. To associate the cluster values with specific intrusion types, we need to explore the data further. When we manipulated the data for mining, we created groups of variables that inherently make sense to evaluate together. For example, we counted the number of different connection final states for each source IP address. These final states counts were represented as unique independent variables in our analysis. To understand which clusters may represent RLOGIN attacks, we need to compare the average number of LOGIN attempts versus other port related activities, across the clusters. 11
12 Figures 7 through 11 display profile plots of the appropriate groups of variables. Figure displays the profile plot for port types by cluster. In figure 7 we see that cluster 3 as a high number of login attempts relative to other clusters, implying that this cluster could be segmenting out RLOGIN attacks. The observation that there are a large number of general ports for clusters 3 and 5 is probably no interesting. However we may need to break the general port category into other more meaningful groupings to find interesting relationships in the data. Figure 7: Port Types Profile Plot Figure 8 displays the profile plot for numbers of destination addresses, destination ports, and source ports. In this plot, the high number of addresses associated with clusters 2, 3, and 4 is not necessarily interesting; and cluster 1 again seems to be picking up normal, light network activity. However the activity of cluster 5 is very interesting. Cluster 5 shows very few addresses connecting to a relatively high number of ports. This behavior is indicative of network hopping. Figure 8: Address and Ports Profile Plot The profile plot for the final conversation states is displayed in figure 9. This plots reveals that clusters 3 and 4 each have high number of connections left open, and large numbers of connections not fully established (NEW) which could indicate IP Spoofing Activity. 12
13 Figure 9: Final State Profile Plot Finally, figure 10 and 11 display the profile plots for the number of destinations addresses and ports accessed within specific time duration. Again clusters 3 and 4 have a large number of addresses and ports being accessed in less that 5 seconds, as does cluster 5. Figure 10: Destination Address Profile Plot Figure 11: Destination Port Profile Plot 13
14 Table 5 pulls together the interpretations from all the profile plots and indicates the cluster size. We used this chart to help relate clusters to intrusion types. Table 5: Relating Clusters to Intrusion Types Cluster 3 has only two IP conversations in it, and for each the source and destination IP addresses are the same. Based on the activity displayed we suspect this cluster is finding the server for each simulation file. However, we would then expect to see 5 observations in the cluster - one for each simulation. To isolate this activity, we added a new variable to the data to indicate same source and destination addresses and reran the analysis. These results will be discussed later. In an effort to understand the remaining segment, cluster 2, we used visualization software included with Enterprise Miner. Figures 12 and 13 display scatter plots of the variable combinations used for the profile plots earlier. The points in the plots are colored according to cluster membership. Notice that these plots reveal the same multi-dimensional spacing as figure x did, with clusters 1 and 5 being similar and clusters 2,3,and 4 being similar. Figure 12: Exploring the Clusters Interactively, Part I 14
15 Figure 13: Exploring the Clusters Interactively, Part II Using the dynamic linking capabilities of these charts, we can highlight all the observations in cluster 2. We can the extract them into their own data table for further investigation. Figure 14 displays the data for cluster 2 along with a bar chart for the source addresses present in the table. Cluster 2 is comprised of various conversations originating from source address 2 (note the IP addresses were cleansed in the raw data). Further, all the records in this cluster originated from the Hopping and IP Spoofing simulations. This cluster has found some behavior that is similar among activities in these two files. Figure 14: Isolating Cluster 2 Records As a final check on the appropriateness of our analysis, we investigated how our clusters mapped to the original data sources. If the clusters were effectively mapping to different intrusion types, we would expect to see high counts in only 1 DATWAS category, with the exception on the normal activity cluster. From figure 15 it appears that we are isolating some specific intrusions, however increasing the number of clusters could improve the results. 15
16 Figure 15: Cluster by Data Origin, 5 Clusters Figure 16 displays the cluster by data origin table after increasing the number of clusters to 10 and including a variable indicating the same source and destination addresses. Cluster 5 has become the normal activity cluster. Cluster 3 is probably detecting network scanning. Cluster 6 is probably detecting RLOGIN activity. Cluster 10 should be investigated for IP spoofing. And many of the smaller clusters should be investigated for anomalous activity. Figure 16: Cluster by Data Origin, 10 Clusters CLOSED LOOP IMPLEMENTATION Once the data mining analyst and the intrusion domain experts agree that the mining analysis is producing meaningful results, a strategy to automate the scoring of new log files should be developed. This strategy involves taking the data logged in the PDB, applying the data mining data transformations, then applying the cluster scoring algorithm to new data. Simple exception reports can then alert system administrators to new IP addresses and ports involved in potentially intrusive activity. 16
17 Building from Unsupervised to Supervised Learning To further validity of the data mining results, investigators should also build a knowledge base of investigated records. This knowledge base should include not only confirmed intrusion, but also suspected intrusions that were not proved. The knowledge base can be used to validate the cluster model by feeding the known cases into a predictive model. Should investigation show the predictive model s judgment to be erroneous, the cluster analysis would need to be revisited. The validated cluster model will continue to be applied to new data, producing cases to be investigated. In turn the knowledge base will accumulate known intrusive activity. CONCLUSIONS A combination of unsupervised data mining, data warehousing, and exception reporting allows system administrators to identify suspicious network activity, track intrusion occurrences, and automate the offline intrusion detection process. If actual intrusive events are tracked in a warehouse, the intrusion team can build predictive models that validate unsupervised results. As we move forward in this research we hope to address the following issues: Improve the logic used for determining the final conversation states. Explore methods of applying data mining models created for summarized data, to the raw transaction data. Explore how the mining results are affected by the choice of time period for data summarization and the effects of conversation censoring at beginning and end of the selected time periods. Add more descriptive variables to the mining data in an effort to achieve a fuller range of behavioral descriptors. Experiment with other clustering algorithms. REFERENCES An Introduction to Intrusion Detection and Assessment, Rebecca Bace, Intrusion Detection: Network Security Beyond the Firewall, Terry Escamilla, ISBN: Information Insecurity, Government Executive, April 1999, 12 Mistakes to Avoid for Managing Web Security, CIO Institute, [email protected] A Perspective on New and Different Threats to Information Security, Intelligent Enterprise, Feb 1999 National Infrastructure Protection Center, DARPA Intrusion Detection Evaluation, 17
18 ABOUT THE AUTHORS Kristin Nauta Manager, Government Technology Center Program Manager, Data Mining SAS Institute Inc. SAS Campus Drive Cary, NC Phone: , x4346 As manager of the Government Technology Center at SAS Institute Inc., Kristin Nauta is the federal program manager for data mining. Formerly SAS Institute s data mining program manager for Canada and the analytical products marketing manager for the US, Kristin has a BS in mathematics from Clemson University and a Masters of Statistics from North Carolina State University. Kristin has consulted in a variety of fields including pharmaceutical drug research and design, pharmaceutical NDA submissions, database marketing and customer relationship management. Frank Lieble Program Manager, IT Service Vision Government Technology Center SAS Institute Inc Summit Tower Blvd Suite 850 Orlando, FL [email protected] Phone: , x237 Frank Lieble is the program manager for the IT Service Vision solution at SAS Institute's Government Technology Center. His previous position was product manager for IT Service Vision at SAS Institute's Business Solutions Division. Frank has several years of experience in IT performance data warehousing which includes the management, reporting, and analysis of system and network performance data. He has a Bachelor of Science degree in Computer Science and a Master of Science degree in Statistical Computing from the University of Central Florida. 18
19 19
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Network-Based and Host- Based Intrusion Detection. Harley Kozushko. Graduate Seminar
Network-Based and Host- Based Intrusion Detection Graduate Seminar 1 Goal This presentation is an in-depth overview of intrusion detection. As such, the purpose of the presentation is for reference. 2
Nagarjuna College Of
Nagarjuna College Of Information Technology (Bachelor in Information Management) TRIBHUVAN UNIVERSITY Project Report on World s successful data mining and data warehousing projects Submitted By: Submitted
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become
Network Intrusion Simulation Using OPNET
Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Data Mining Applications in Higher Education
Executive report Data Mining Applications in Higher Education Jing Luan, PhD Chief Planning and Research Officer, Cabrillo College Founder, Knowledge Discovery Laboratories Table of contents Introduction..............................................................2
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
Pentaho Data Mining Last Modified on January 22, 2007
Pentaho Data Mining Copyright 2007 Pentaho Corporation. Redistribution permitted. All trademarks are the property of their respective owners. For the latest information, please visit our web site at www.pentaho.org
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Index Contents Page No. Introduction . Data Mining & Knowledge Discovery
Index Contents Page No. 1. Introduction 1 1.1 Related Research 2 1.2 Objective of Research Work 3 1.3 Why Data Mining is Important 3 1.4 Research Methodology 4 1.5 Research Hypothesis 4 1.6 Scope 5 2.
Conclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
A Frequency-Based Approach to Intrusion Detection
A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
Data Warehousing and Data Mining in Business Applications
133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business
IBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009
Top Five Data Security Trends Impacting Franchise Operators Payment System Risk September 29, 2009 Top Five Data Security Trends Agenda Data Security Environment Compromise Overview and Attack Methods
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
How Organisations Are Using Data Mining Techniques To Gain a Competitive Advantage John Spooner SAS UK
How Organisations Are Using Data Mining Techniques To Gain a Competitive Advantage John Spooner SAS UK Agenda Analytics why now? The process around data and text mining Case Studies The Value of Information
What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options
White paper What a Vulnerability Assessment Scanner Can t Tell You Leveraging Network Context to Prioritize Remediation Efforts and Identify Options november 2011 WHITE PAPER RedSeal Networks, Inc. 3965
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Database Marketing, Business Intelligence and Knowledge Discovery
Database Marketing, Business Intelligence and Knowledge Discovery Note: Using material from Tan / Steinbach / Kumar (2005) Introduction to Data Mining,, Addison Wesley; and Cios / Pedrycz / Swiniarski
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
2015 Workshops for Professors
SAS Education Grow with us Offered by the SAS Global Academic Program Supporting teaching, learning and research in higher education 2015 Workshops for Professors 1 Workshops for Professors As the market
In this presentation, you will be introduced to data mining and the relationship with meaningful use.
In this presentation, you will be introduced to data mining and the relationship with meaningful use. Data mining refers to the art and science of intelligent data analysis. It is the application of machine
Visualization methods for patent data
Visualization methods for patent data Treparel 2013 Dr. Anton Heijs (CTO & Founder) Delft, The Netherlands Introduction Treparel can provide advanced visualizations for patent data. This document describes
Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
1 of 8 3/25/2005 9:45 AM Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Intrusion Detection systems fall into two broad categories and a single new one. All categories
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators
Chapter 20: Data Analysis
Chapter 20: Data Analysis Database System Concepts, 6 th Ed. See www.db-book.com for conditions on re-use Chapter 20: Data Analysis Decision Support Systems Data Warehousing Data Mining Classification
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
not possible or was possible at a high cost for collecting the data.
Data Mining and Knowledge Discovery Generating knowledge from data Knowledge Discovery Data Mining White Paper Organizations collect a vast amount of data in the process of carrying out their day-to-day
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Running the SANS Top 5 Essential Log Reports with Activeworx Security Center
Running the SANS Top 5 Essential Log Reports with Activeworx Security Center Creating valuable information from millions of system events can be an extremely difficult and time consuming task. Particularly
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.
Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Passive Vulnerability Detection
Page 1 of 5 Passive Vulnerability Detection "Techniques to passively find network security vulnerabilities" Ron Gula [email protected] September 9, 1999 Copyright 1999 Network Security Wizards
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Gain comprehensive visibility into DDoS attacks and cyber-threats with easily accessible
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
Using Data Mining Techniques for Fraud Detection
Using Data Mining Techniques for Fraud Detection Solving Business Problems Using SAS Enterprise Miner Software A SAS Institute Best Practices Paper In conjunction with Federal Data Corporation i Table
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere
Protecting Databases from Unauthorized Activities Using Imperva SecureSphere White Paper As the primary repository for the enterprise s most valuable information, the database is perhaps the most sensitive
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
IMPROVING DATA INTEGRATION FOR DATA WAREHOUSE: A DATA MINING APPROACH
IMPROVING DATA INTEGRATION FOR DATA WAREHOUSE: A DATA MINING APPROACH Kalinka Mihaylova Kaloyanova St. Kliment Ohridski University of Sofia, Faculty of Mathematics and Informatics Sofia 1164, Bulgaria
Thanks to SECNOLOGY s wide range and easy to use technology, it doesn t take long for clients to benefit from the vast range of functionality.
The Big Data Mining Company BETTER VISILITY FOR BETTER CONTROL AND BETTER MANAGEMENT 100 Examples on customer use cases Thanks to SECNOLOGY s wide range and easy to use technology, it doesn t take long
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
Guideline on Firewall
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
Fluency With Information Technology CSE100/IMT100
Fluency With Information Technology CSE100/IMT100 ),7 Larry Snyder & Mel Oyler, Instructors Ariel Kemp, Isaac Kunen, Gerome Miklau & Sean Squires, Teaching Assistants University of Washington, Autumn 1999
Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined
Niara Security Intelligence Threat Discovery and Incident Investigation Reimagined Niara enables Compromised user discovery Malicious insider discovery Threat hunting Incident investigation Overview In
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
What is Data Mining? MS4424 Data Mining & Modelling. MS4424 Data Mining & Modelling. MS4424 Data Mining & Modelling. MS4424 Data Mining & Modelling
MS4424 Data Mining & Modelling MS4424 Data Mining & Modelling Lecturer : Dr Iris Yeung Room No : P7509 Tel No : 2788 8566 Email : [email protected] 1 Aims To introduce the basic concepts of data mining
Threat intelligence visibility the way forward. Mike Adler, Senior Product Manager Assure Threat Intelligence
Threat intelligence visibility the way forward Mike Adler, Senior Product Manager Assure Threat Intelligence The modern challenge Today, organisations worldwide need to protect themselves against a growing
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Passive Logging. Intrusion Detection System (IDS): Software that automates this process
Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion
APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION
18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK
LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
B database Security - A Case Study
WHITE PAPER: ENTERPRISE SECURITY Strengthening Database Security White Paper: Enterprise Security Strengthening Database Security Contents Introduction........................................................................4
Master of Science in Health Information Technology Degree Curriculum
Master of Science in Health Information Technology Degree Curriculum Core courses: 8 courses Total Credit from Core Courses = 24 Core Courses Course Name HRS Pre-Req Choose MIS 525 or CIS 564: 1 MIS 525
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Data Mining. SPSS Clementine 12.0. 1. Clementine Overview. Spring 2010 Instructor: Dr. Masoud Yaghini. Clementine
Data Mining SPSS 12.0 1. Overview Spring 2010 Instructor: Dr. Masoud Yaghini Introduction Types of Models Interface Projects References Outline Introduction Introduction Three of the common data mining
Flexible Web Visualization for Alert-Based Network Security Analytics
Flexible Web Visualization for Alert-Based Network Security Analytics Lihua Hao 1, Christopher G. Healey 1, Steve E. Hutchinson 2 1 North Carolina State University, 2 U.S. Army Research Laboratory [email protected]
Solutions to Trust. NEXThink V5 What is New?
Solutions to Trust NEXThink V5 What is New? HIGHLIGHTS What is New? ITSM: IT services analytics in real-time Analytics and product usability Security Analytics for all web & cloud applications Product
Intrusion Detections Systems
Intrusion Detections Systems 2009-03-04 Secure Computer Systems Poia Samoudi Asli Davor Sutic Contents Intrusion Detections Systems... 1 Contents... 2 Abstract... 2 Introduction... 3 IDS importance...
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
Digging for Gold: Business Usage for Data Mining Kim Foster, CoreTech Consulting Group, Inc., King of Prussia, PA
Digging for Gold: Business Usage for Data Mining Kim Foster, CoreTech Consulting Group, Inc., King of Prussia, PA ABSTRACT Current trends in data mining allow the business community to take advantage of
Log Management How to Develop the Right Strategy for Business and Compliance. Log Management
Log Management How to Develop the Right Strategy for Business and Compliance An Allstream / Dell SecureWorks White Paper 1 Table of contents Executive Summary 1 Current State of Log Monitoring 2 Five Steps
D. Grzetich 6/26/2013. The Problem We Face Today
Ideas on Using Asset Criticality Inference (ACI) Through Gathering and Processing of Asset Contextual Utilizing Analytical Models and Processing Rules D. Grzetich 6/26/2013 The Problem We Face Today Security
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
SAS Fraud Framework for Banking
SAS Fraud Framework for Banking Including Social Network Analysis John C. Brocklebank, Ph.D. Vice President, SAS Solutions OnDemand Advanced Analytics Lab SAS Fraud Framework for Banking Agenda Introduction
Firewalls (IPTABLES)
Firewalls (IPTABLES) Objectives Understand the technical essentials of firewalls. Realize the limitations and capabilities of firewalls. To be familiar with iptables firewall. Introduction: In the context
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Paper 064-2014. Robert Bonham, Gregory A. Smith, SAS Institute Inc., Cary NC
Paper 064-2014 Log entries, Events, Performance Measures, and SLAs: Understanding and Managing your SAS Deployment by Leveraging the SAS Environment Manager Data Mart ABSTRACT Robert Bonham, Gregory A.
Lavastorm Analytic Library Predictive and Statistical Analytics Node Pack FAQs
1.1 Introduction Lavastorm Analytic Library Predictive and Statistical Analytics Node Pack FAQs For brevity, the Lavastorm Analytics Library (LAL) Predictive and Statistical Analytics Node Pack will be
Unified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
Data Mining Techniques
15.564 Information Technology I Business Intelligence Outline Operational vs. Decision Support Systems What is Data Mining? Overview of Data Mining Techniques Overview of Data Mining Process Data Warehouses
