DETECTING NEW FORMS OF NETWORK INTRUSION USING GENETIC PROGRAMMING
|
|
|
- Duane Gilbert
- 10 years ago
- Views:
Transcription
1 Computational Intelligence, Volume 20, Number 3, 2004 DETECTING NEW FORMS OF NETWORK INTRUSION USING GENETIC PROGRAMMING WEI LU AND ISSA TRAORE Department of Electrical and Computer Engineering, University of Victoria, Victoria, B.C., Canada How to find and detect novel or unknown network attacks is one of the most important objectives in current intrusion detection systems. In this paper, a rule evolution approach based on Genetic Programming (GP) for detecting novel attacks on networks is presented and four genetic operators, namely reproduction, mutation, crossover, and dropping condition operators, are used to evolve new rules. New rules are used to detect novel or known network attacks. A training and testing dataset proposed by DARPA is used to evolve and evaluate these new rules. The proof of concept implementation shows that a rule generated by GP has a low false positive rate (FPR), a low false negative rate and a high rate of detecting unknown attacks. Moreover, the rule base composed of new rules has high detection rate with low FPR. An alternative to the DARPA evaluation approach is also investigated. Key words: genetic programming, network security, intrusion detection, anomaly detection, rule evolution, rule coverage. 1. INTRODUCTION Intrusion detection has been extensively studied since the seminal report written by Anderson (1980). Traditionally, intrusion detection techniques are divided into misuse detection and anomaly detection. Misuse detection techniques mainly focus on developing models of known attacks, which can be described by specific patterns or sequences of events and data. Anomaly detection techniques model system or users normal behaviors, and any deviation from the normal behaviors is considered as an intrusion. Misuse detection techniques have low false detection rates (FDR), but their major weakness is that novel or unknown attacks will go unnoticed until corresponding signatures are added to the database of the Intrusion Detection System (IDS). Anomaly detection techniques have the potential to detect novel attacks, but quite often they tend to have high FDR because it is very difficult to discriminate between abnormal and intrusive behavior. In this paper, we propose a rule evolution approach based on Genetic Programming (GP) (Koza 1992; Wong and Leung 2000) for detecting known or novel attacks on the network. GP extends the fundamental idea of Genetic Algorithm (GA), and evolves more complex data structures. To do so, it uses parse trees to represent initial populations, instead of chromosomes. Moreover, the GP technique can be used to evolve a population of individuals, whereas GA searches the best solution in all possible solutions. Initial rules are selected based on background knowledge from known attacks and can be represented as parse trees. GP will evolve these initial rules to generate new rules. New rules are used to detect novel or known attacks. To evolve and evaluate these new rules, we use the training and testing dataset proposed by DARPA (Lippmann 2000), which includes almost all known networkbased attacks, namely land, synflood, ping of death ( pod ), smurf, teardrop, back, neptune, ipsweep, portsweep, and UDPstorm attacks. The proof of concept implementation shows the GP-based approach can detect smurf and UDPstorm attacks, which are absent from the training dataset. The average false negative rate (FNR) for each rule is 5.04% and the average false positive rate (FPR) is 5.23%. The average rate of detecting unknown attacks for each rule is 57.14%. Moreover, we plot a receiving operator characteristic (ROC) curve of FPR and detection rate when we apply the testing dataset to evaluate our rule base. The ROC Address correspondence to Wei Lu at the Department of Electrical and Computer Engineering, University of Victoria, P.O. Box 3055 STN CSC, Victoria, B.C., Canada, V8W 3P6; [email protected] C 2004 Blackwell Publishing, 350 Main Street, Malden, MA 02148, USA, and 9600 Garsington Road, Oxford OX4 2DQ, UK.
2 476 COMPUTATIONAL INTELLIGENCE curve shows that the detection rate will be close to 100% when the (FPR) falls in the range between 1.4% and 1.8%. The rest of the paper is organized into the following modules. Section 2 presents an overview of related works. Section 3 provides background information on genetic programming. Section 4 discusses how to use GP to generate new rules for detecting known or novel attacks on network. Section 5 presents the evaluation of the new rules using DARPA testing dataset and discusses the experimental results. Section 6 highlights the shortcomings of the DARPA evaluation approach, and then proposes an alternative evaluation approach. Finally, Section 7 makes some concluding remarks. 2. RELATED WORKS Frank (1994) described and categorized several Artificial Intelligence (AI) techniques that can be used for intrusion detection; use of AI techniques for intrusion detection is categorized according to two dimensions: behavior classification and data reduction. Behavior classification assumes that intrusion can be decided by a given set of known behaviors, and data reduction is typically used to analyze the large amount of audit-log data produced, so as to reduce the amount of data handled by human experts. However, explicit knowledge of known behaviors is difficult to establish. Any mistake occurring in the process of defining patterns of known behaviors will increase false alarm rate and decrease the effectiveness of intrusion detection. Some early applications of neural networks for user behavior modeling were proposed by Fox et al. (1990). Ghosh, Wanken, and Charron (1998) later extended their idea by using back propagation algorithm for anomaly detection. They established that randomly generating anomalous input data increases the performance of anomaly detection. The biggest limitation of this method is the difficulty of choosing the input parameters. Any mistake in input data selection will increase the false alarm rate. Further, how to initialize the weights of the neural network is still an open question. Me (1992) initially proposed another application of AI to intrusion detection by using GA for misuse detection. He defined a n-dimensional hypothesis vector H, where H i = 1 if attack i was taking place according to the hypothesis, otherwise H i = 0. Thus, the aim of intrusion detection was reduced to the problem of finding the H vector that maximizes the product W H, subject to the constraint AE H i <= O i. W refers to the n-dimensional weight vector; AE refers to an attacks-events matrix; O refers to the observed n-dimensional audit trail vector. He showed that GA applied to misuse detection has a low false alarm rate. However, this approach cannot identify attacks precisely. Chittur (2002) extended this idea by using GA for anomaly detection. Random numbers were generated using GA. A threshold value was established and any certainty value exceeding this threshold value was classified as a malicious attack. The experimental result showed that GA successfully generated an accurate empirical behavior model from training data. The biggest limitation of this approach was the difficulty of establishing the threshold value, possibly leading to a high false alarm rate when used to detect novel or unknown attacks. More works on using GA for intrusion detection are described in Bridges and Vaughn (2000), Balajinath and Raghavan (2001), Gomez et al. (2002). Gomez et al. (2002) proposed a linear representation scheme for evolving fuzzy rules using the concept of complete binary tree structures. GA is used to generate genetic operators for producing useful and minimal structure modification to the fuzzy expression tree represented by chromosomes. This approach, however, required-time consuming training. Bridges and Vaughn (2000) employed GA to tune the fuzzy membership functions and select an appropriate set of features in their prototype IIDS (Intelligent IDS). Balajinath and Raghavan (2001) used GA to learn
3 NETWORK INTRUSION USING GENETIC PROGRAMMING 477 individual user behavior. Active user behavior is predicted by GA based on past observed user behavior and used to detect intrusion. In both approaches, the training process is time consuming and they can only be used to detect anomalous behaviors at the host level. Crosbie and Spafford (1995) employed GP and agent technology to detect anomalous behaviors in a system. The autonomous agents are used to detect intrusions using log data of network connections. Each autonomous agent is used to monitor a particular network parameter and autonomous agents that are predicting correctly are given higher weight value in deciding whether a session is intrusive or not. There are a number of advantages to having many small agents, instead of a single large one. However, communication among these agents is still an issue. Moreover, the training process may be time consuming if the proper primitive for each agent is not chosen. 3. OVERVIEW OF GENETIC PROGRAMMING 3.1. GP Algorithm GP is an extension of GA (Koza 1992). It is a general search method that uses analogies from natural selection and evolution. The main difference between them is the solution encoding method. GA encodes potential solutions for a specific problem as a simple population of fixed-length binary strings named chromosomes and then applies reproduction and recombination operators to these chromosomes to create new chromosomes. In contrast to GA, GP encodes multipotential solutions for specific problems as a population of programs or functions. The programs can be represented as parse trees. Usually, parse trees are composed of internal nodes and leaf nodes. Internal nodes are called primitive functions, and leaf nodes are called terminals. The terminals can be viewed as the inputs to the specific problem. They might include the independent variables and the set of constants. The primitive functions are combined with the terminals or simpler function calls to form more complex function calls. For instance, GP can be used to evolve new rules from general ones. The rules are represented as if condition 1 and condition 2... and condition N then consequence. In this case, the primitive function corresponds to AND operator and the terminals are the conditions (e.g., condition 1, condition 2,..., condition N). GP randomly generates an initial population of solutions. Then, the initial population is manipulated using various genetic operators to produce new populations. These operators include reproduction, crossover, mutation, dropping condition, etc. The whole process of evolving from one population to the next population is called a generation. A high-level description of GP algorithm can be divided into a number of sequential steps: 1. Create a random population of programs, or rules, using the symbolic expressions provided as the initial population. 2. Evaluate each program or rule by assigning a fitness value according to a predefined fitness function that can measure the capability of the rule or program to solve the problem. 3. Use reproduction operator to copy existing programs into the new generation. 4. Generate the new population with crossover, mutation, or other operators from a randomly chosen set of parents. 5. Repeat steps 2 onwards for the new population until a predefined termination criterion has been satisfied,orafixed number of generations have been completed. 6. The solution to the problem is the genetic program with the best fitness within all the generations.
4 478 COMPUTATIONAL INTELLIGENCE FIGURE 1. Example of crossover in GP Genetic Operators In GP, crossover operation is achieved firstly by reproduction of two parent trees; two crossover points are then randomly selected in the two offspring trees. Exchanging sub-trees, which are selected according to the crossover point in the parent trees, generates the final offspring trees. The obtained offspring trees are usually different from their parents in size and shape. Figure 1 describes a crossover operation between function x 2 + x + x 2x and function 2x 2, they produce two offspring functions 2x 2 + x and x 2 x. Mutation operation is also considered in GP. A single parental tree is firstly reproduced. Then a mutation point is randomly selected from the reproduction, which can be either a leaf node or a sub-tree. Finally, the leaf node or the sub-tree is replaced by a new leaf node or sub-tree generated randomly. Figure 2 describes a mutation operation on function 2x 2, the produced mutation offspring function is x 2 + 2x. A new operator named dropping condition is proposed to evolve new rules in this paper. It randomly selects one condition in the rule, and then turns it into any. That is, this particular condition is no longer considered in the rule. For example, the rule if condition 1 and condition 2 and condition 3 then consequence can be changed to if condition 1 and condition 2 and any then consequence FIGURE 2. Example of mutation in GP.
5 NETWORK INTRUSION USING GENETIC PROGRAMMING Fitness Function Fitness functions ensure that the evolution is toward optimization by calculating the fitness value for each individual in the population. The fitness value evaluates the performance of each individual in the population. We use a fitness function defined in Wong and Leung (2000) that is based on the support-confidence framework. Support is a ratio of the number of records covered by the rules to the total number of records. Confidence factor (cf ) represents the accuracy of rules, which is the confidence of the consequent to be true under the conditions. It is the ratio of the number of records matching both the consequent and the conditions to the number of records matching only the conditions. If a rule is represented as, if A then B, and the size of the training dataset is N, then cf = A and B / A ; support = A and B /N. A stands for the number of records that only satisfy condition A. B stands for the number of records that only satisfy consequent B. A and B stands for the number of records that satisfy both condition A and consequent B. A rule with a high confidence factor does not necessarily behave significantly different from the average. Thus, normalized confidence factor is defined to consider the average probability of consequent denoted prob. normalized cf = cf log (cf/prob), prob = B /N. To avoid wasting time to evolve those rules with a low support value, a strategy is defined: if support is below a user-defined minimum threshold (min support), the confidence factor of the rule should not be considered. Thus, the fitness function is defined as follows: { support if support < min support raw fitness = w 1 support + w 2 normalized cf otherwise Where the weights w 1 and w 2 are user-defined and used to control the balance between the confidence and the support during the searches. Token competition is used to increase the diversity of solutions (Leung and Yam 1992). The idea is as follows: In the natural environment, once an individual finds a good place to live, then (s)he will try to protect this environment and prevent newcomers from using it, unless the newcomers are stronger than this individual. Other weaker individuals are hence forced to search for their own place. In this way, the diversity of the population is increased. A token is allocated to each record in the training dataset. If a rule matches a record, its token will be seized by the rule. The priority of receiving the token is determined by the strength of the rules. Thus, a rule with high raw fitness score can acquire as many tokens as possible. The modified fitness is defined as follows: modified fitness = raw fitness count/ideal, where count is the number of tokens that the rule has actually seized, ideal is the total number of tokens that it can seize, which is equal to the number of records that the rule matches. 4. GENERATING NEW RULES USING GP The use of GP to detect unknown attacks is based on the belief that new rules will have better performance than initial ones based on known attacks. Better performance means the
6 480 COMPUTATIONAL INTELLIGENCE new rules obtained after evolving the initial ones using GP will not only cover known attacks, but also possibly detect the novel ones. Individual solution in a population is represented as a derivation tree that we describe using a string data structure. For example, a tree can be represented as AabAcdAceI. A means and operator; a, b, c, d, and e correspond to the conditions in the rules. I is the consequence, which means intrusion. The redundant conditions in the rule will be deleted after the evolution, and thus, AabAcdAceI can be interpreted as if a and b, and, c and d and e, then intrusion. The attribute values of a,b,c,d,e are selected from known attacks. New rules are generated in two phases. In the first step, temporary new rules are composed of new rules generated by four operators including mutation, reproduction, crossover, and dropping condition and additional rules directly generated from previous populations. Thus, the number of temporary new rules is doubled. In the second phase, one half of the temporary new rules with the highest fitness scores after token competition are retained and passed to the next generation. To assess the feasibility and efficiency of GP for intrusion detection, we have selected an initial population of 40 rules that cover a series of network-based attacks. Table 1 shows 10 instances of the initial rules; the rest of the rules are given in Appendix A. We calculate the fitness value for each rule based on the training dataset. Currently, the most widely used training and testing dataset for anomaly detection is provided by DARPA Intrusion Detection Evaluation Program (Lippmann 2000), consisting of the raw TCP dump data of 9 weeks activity in a local area network simulating a typical U.S. Air Force LAN. The training dataset is labeled as either normal or intrusive. The test dataset is similar with the training dataset. The only difference is the test dataset includes some unknown attacks not occurring in the training dataset. In our case, 10,000 network connection records provided by DARPA training dataset are used to train the rules, each connection lasting 2s. Eleven parameters defined in DARPA dataset are used to describe the attacks in the training dataset. Table 2 describes these parameters and their meaning. The rules in the initial population are evolved using mutation, crossover, and dropping condition operators. The rates of crossover, mutation, and dropping condition operations are respectively 0.6, 0.01, and for each rule. Forty offspring rules are evolved from the previous forty parent rules. Based on token competition, combining offspring rules with parent rules generates temporary new rules. One half of the temporary new rules with highest fitness scores after token competition are selected as the new rules. TABLE 1. Rules Afp AAgg Aab baba AhAg ra AatA Aaav wwwwa Aajt Initial Rules Meaning if land = 1 and wrong fragment = 0 then intrusion if wrong fragment > 1 then intrusion if protocol type = tcp and count > 3 then intrusion if srv count > 3 then intrusion if protocol type = icmp and wrong fragment > 1 then intrusion if synflood = 1.00 then intrusion if protocol type = tcp and num compromised > 1 then intrusion if protocol type = tcp and same srv rate = 1.00 then intrusion if diff srv rate > 0.33 then intrusion if count<3 and num compromised > 1 then intrusion
7 NETWORK INTRUSION USING GENETIC PROGRAMMING 481 TABLE 2. Representation of Parameters Parameters protocol type land wrong fragment synflood num compromised same srv rate diff srv rate count srv count dst host count dst host srv count Meaning Type of protocol Flag to identify whether connection is from/to the same host/port Number of wrong fragments in the connection Connections that have SYN errors Number of compromised conditions Percentage of connections to the same services Percentage of connections to the different services Number of connections from the same source host to the same destination host Number of connections from the same source service to the same destination service Number of connections from the same destination host to the same source host Number of connections from the same destination service to the same source service TABLE 3. New Rules Rules Meaning Ag if wrong fragment > 1 then intrusion Afpq if land = 1 and wrong fragment = 0 and synflood = 0 then intrusion Aav if protocol type = tcp and same srv rate = 1.00 then intrusion Ahcq if protocol type = icmp and dst host srv count > 160 and synflood = 0 then intrusion Aikq if protocol type = udp and srv count > 367 and synflood = 0 then intrusion Aat if protocol type = tcp and num compromised > 1 then intrusion At if num compromised > 1 then intrusion Ag if wrong fragment > 1 then intrusion Ajlpr if count < 412 and dst host count < 810 and wrong fragment = 0 and synflood > 1 then intrusion Ail if protocol type = udp and dst host count > 203 then intrusion The evolution will not be terminated until we have executed 5,000 runs or the fitness value for each rule is bigger than a threshold equal to Table 3 describes 10 instances of obtained new rules. To view the rest of the new rules, please refer to Appendix A. The initial and new rules are composed of attribute descriptors. Table 4 shows attribute descriptors representations and meanings. 5. EVALUATION OF NEW RULES Evaluation of intrusion detection approaches for detecting novel attacks is an important and multi-faceted problem. The training dataset we use is one day s connection records provided by DARPA, consisting of 10,000 connection records. Eight kinds of network attacks are included in the training dataset, namely land, synflood, pod, teardrop, back, neptune, ipsweep, and portsweep. The testing dataset we use is another one-day activity consisting of
8 482 COMPUTATIONAL INTELLIGENCE TABLE 4. Representation of Terminals Terminal Meaning Terminal Meaning s num compromised = 0 i protocol type = udp b count > R1 f land = 1 c srv count > R1 o land = 0 d dst host count > R1 j count < R2 k srv count < R2 q synflood = 0 p wrong fragment = 0 r synflood > 1 e dst host srv count > R1 a protocol type = tcp l dst host count < R2 h protocol type = icmp m dst host srv count < R2 u same srv rate = 0.00 t num compromised > 1 v same srv rate = 1.00 g wrong fragment > 1 w diff srv rate > R3 Note: R1, R2, and R3 are random values. 10,000 connection records. Ten kinds of network attacks are included in the testing dataset, namely smurf, UDPstorm, land, synflood, pod, teardrop, back, neptune, ipsweep, and portsweep. Smurf and UDPstorm attacks are the novel attacks which are absent from the training dataset. Detection of attacks involved in the test dataset, and not occurring in the training dataset, assesses the potential ability to detect novel attacks. We use three performance metrics to evaluate the new rules, namely FPR, false negative rate (FNR), and unknown attack detection rate (UADR). A false positive occurs when a rule classifies normal traffic as intrusive. A false negative occurs when a rule characterizes an intrusion as normal. UADR measures the capability of a new rule to detect novel attacks. For each rule, we calculate its FPR, FNR, and UADR independently. We find that every time we use GP to evolve the rules, the number of generated rules is different and thus the FPR, FNR, and UADR for each rule is also different. Therefore, to statistically evaluate the efficiency of our GP-based approach, FPR, FNR, and UADR are defined as the arithmetical average of the sum of all new rules rates FPR = average ( (FPR) rules ); FNR = average ( (FNR) rules ); UADR = average ( (UADR) rules ); For instance, consider a rule base that includes two new rules: rule1 and rule2. The FPR, FNR, and UADR of rule1 is 0.001, 0.015, and 0.56, respectively. The FPR, FNR, and UADR of rule2 is 0.002, 0.03, and 0.78, respectively. Thus, according to the definition: average FPR for each rule = ( )/2 = ; average FNR for each rule = ( )/2 = ; average UADR for each rule = ( )/2 = 0.67; Since the number of new rules is different in each run, the average FPR, FNR, and UADR for each run is also different. We execute 10,000 runs and plot the probability distribution of FPR, FNR, and UADR. Figure 3a illustrates the FPR s probability distribution and Figure 3b illustrates the log scale probability distribution. Figure 4a illustrates the FNR s probability distribution and Figure 4b illustrates the log scale probability distribution. Figure 5a illustrates the UADR s probability distribution and Figure 5b illustrates the log scale probability distribution.
9 NETWORK INTRUSION USING GENETIC PROGRAMMING 483 FIGURE 3. (a) Distributionof FPR and (b) log scaledistributionof FPR. FIGURE 4. (a) Distributionof FNR and (b) log scale distributionof FNR. The standard deviation of FPR for each rule over 10,000 runs is and the average value of FPR for each rule over 10,000 runs is The confidence interval or, margin of error is In the figure of Log Scale Distribution of FPR, we amplify the probability difference of different FPR scales, and conclude that the probability of the rules whose FPRs FIGURE 5. (a) Distributionof UADR and (b) log scale distributionof UADR.
10 484 COMPUTATIONAL INTELLIGENCE fall in a range between 0 and 0.1 is about 10 times greater than the probability of rules whose FPRs fall in other ranges, such as between 0.1 and 0.2, 0.2 and 0.3, etc. Table 5 summarizes this information. The standard deviation of FNR for each rule over 10,000 runs is and the average value of FNR for each rule over 10,000 runs is The margin of error is In the figure of Log Scale Distribution of FNR, we amplify the probability difference of different FNR scales, and conclude that the probability of the rules whose FNRs fall in a range between 0 and 0.1 is about 10 times greater than the probability of rules whose FNRs fall in other ranges, such as between 0.1 and 0.2, 0.2 and 0.3, etc. Table 6 summarizes this information. The standard deviation of UADR for each rule over 10,000 runs is and the average value of UADR for each rule over 10,000 runs is The margin of error is In the figure of Log Scale Distribution of UADR, we amplify the probability difference of different UADR scales, and conclude that the UADR for each rule in about 20% of the runs are bigger than 0.9 and rates in 70% of the runs fall in a range between 0 and 0.1. Table 7 summarizes this information. In practical evaluation, we usually use the rule base instead of single rule to test the performance of intrusion detection system based on GP. We execute 10,000 runs to evaluate the statistical performance of our system, since we get different rules every time. We use as evaluation metrics the FPR and the detection rate (DR). Generally speaking, we say that an intrusion detection approach is good if it has high detection rate with low. The probability distribution of FPR for the rule base over 10,000 runs is illustrated in Figure 6a. Figure 6b illustrates the same information for FPR between 0 and 0.1. The average value of FPR over 10,000 runs is 0.41% and the standard deviation value of FPR over 10,000 runs is The probability distribution of DR for the rule-base in 10,000 runs is illustrated in Figure 7a. Figure 7b illustrates the log scale probability distribution of DR. The average value of DR over 10,000 runs is , and the standard deviation value of DR over 10,000 runs is Figure 8 is the ROC curve plotting the and FPR the DR. The DR increases as the FPR does the same. The DR is close to 100% when the FPR is in the range between 1.4% and 1.8%. However, when the FPR is close to 0%, the DR is only about 40%. The DR falls in a broad range from 40% to 100% because the number of rules in the rule base is different for each run. When there are more rules in the rule base, we have a high DR and thus, will possibly have a low FPR. There are some other approaches used to detect intrusion using the DARPA s dataset as a testbed. For example, the ROC curve plotted by Eskin et al. (2000) is illustrated in Figure 9. Figure 9 shows that DR increases as the FPR does the same. For instance, in the first week the DR is close to 100% when the FPR falls in the range between 0.06% and 0.1%. Eskin s result is better than ours considering the ROC curve comparison. However, the curve plotted by Eskin et al. is for only one kind of attack, a ftpd attack, while our ROC curve is for 10 attacks. Our approach can detect 10 kinds of attacks when the FPR is smaller than 1.8%. The approach proposed by Eskin et al. can be used to detect only one kind of attack when its FPR is smaller than 0.1%. 6. ALTERNATIVE EVALUATION METHOD 6.1. Approach The conventional approach presented in the previous section for evaluating the potential of new rules to detect new forms of attacks consists of some attacks in the testing dataset that are absent from the training dataset, and then testing whether the new rules can detect them or not.
11 TABLE 5. Scale Distribution Over 10,000 Runs FPR Number of run 8,200 1, TABLE 6. Scale Distribution Over 10,000 Runs FNR Number of run 8,300 1, TABLE 7. Scale Distribution Over 10,000 Runs UADR Number of run 6, ,055 NETWORK INTRUSION USING GENETIC PROGRAMMING 485
12 486 COMPUTATIONAL INTELLIGENCE FIGURE 6. (a) Distributionof FPR and (b) distributionof FPR between 0 and 0.1. FIGURE 7. (a) Distributionof DR and (b) log scale of distribution of DR. There are, however, some limitations with this evaluation method. First, it does not consider the completeness of the testing dataset. Completeness refers to the extent to which the dataset represents all types of attacks. For instance, the DARPA s training dataset only contains a total of 24 attack types with an additional 14 types included in the testing dataset. FIGURE 8. ROC curve of FPR and DR.
13 NETWORK INTRUSION USING GENETIC PROGRAMMING 487 FIGURE 9. ROC curve of FPR and DR plotted by Eskin et al. (2000). Even if the rules perform well under the testing dataset, they may possibly carry errors that are not identified due to incompleteness of the testing dataset. Second, the coverage of rules by the testing dataset is not taken into account. An incomplete testing dataset may possibly lead to an inadequate coverage of rules. Consequently, some sections of rules may not be tested due to the absence of test cases. Nevertheless, collecting all types of attacks is very difficult and even if we get all possible kinds of attacks, running them all would be time consuming. A workable alternative consists of improving the completeness of the testing dataset and increasing the coverage of rules. We propose an alternative evaluation strategy that is depicted by Figure 10. First, we start by building a testing dataset that provides a complete coverage of the new rules generated using GP. We evaluate the coverage of these rules by using a tool named TRUBAC (Testing with Rule-Base Coverage), which implements a coverage analysis method developed by Barr (1995, 1997). Second, we apply the new testing dataset to the initial set of rules from which the new rules have been generated. Test cases that fail the initial rules are flagged as potential new attacks, since they are covered by the new rules but not by the initial ones. Then, we need to verify whether these potential attacks correspond to real attacks. This can be done by reproducing and analyzing corresponding behavior in real network environment. FIGURE 10. Evaluation strategy.
14 488 COMPUTATIONAL INTELLIGENCE 6.2. Coverage Analysis Using TRUBAC TRUBAC represents a rule base using a directed acyclic graph (DAG). It is based on the premise that a rule-base is also a classification system and exploits the AND/OR graph structure inherent to the rule base. The DAG contains a source node and a sink node, corresponding respectively to the working memory and the classification result. It also contains nodes for findings and classes. Findings correspond to the antecedents of rules; classes correspond to their consequents. There are also two additional types of interior nodes: subclass nodes and operator nodes. Subclass nodes correspond to intermediate hypotheses; operator nodes correspond to logical operators such as AND and OR. There are links from the source node to each finding, and from each class to the sink. The antecedent for each rule is represented as a subgraph, which is then connected to the node for the consequent. We refer interested readers to Barr (1995, 1997) for more details. As an example, let us consider the following two rules: if F1 and F2 and F3 then SC; if F4 and F5 and SC then C; The DAG representation of these two related rules is depicted by Figure 11. TRUBAC defines and implements five rule-base coverage measures (RBCMs), which can be used to guide the selection of testing dataset and give an idea of how well a testing dataset covers some rules. We describe briefly in the sequel these RBCMs. RBCM1 ensures that there is at least one test data covering one execution path to each class. RBCM2 ensures that there is at least one test data covering one execution path to each subclass, as well as each class. RBCM3 ensures that for every finding-class combination, at least one execution path, including this combination, is tested, if such path exists. RBCM4 provides test data covering at least one execution path that contains a connection from finding to class. RBCM5 ensures that some test data causes traversal of a collection of execution paths that contains every edge in the graph Generation of New Test Dataset Based on the five RBCMs, we can analyze the coverage of the new rules and select appropriate test data from the initial test dataset. However, the new rule-base possibly includes some rules uncovered by the initial test dataset. Therefore, some execution paths in the DAG FIGURE 11. Example of DAG representation.
15 NETWORK INTRUSION USING GENETIC PROGRAMMING 489 FIGURE 12. Example: DAG of new rules. may not be covered by any of the available test data. Consequently, we need to update the initial testing dataset by generating additional test data according to the uncovered execution paths. In the sequel, our example illustrates how to construct the new test dataset based on the RBCMs. Consider, for instance, the ten new rules described in Table 3. Since there is no subclass in the rule-base, corresponding DAG can be represented as shown by Figure 12, where a, c, f, g, h, i, j, k, l, p, q, r, and t are findings and I stands for intrusive behavior. Since there is no subclass, only three RBCMs are applicable in this example: RBCM1, RBCM4, and RBCM5. Based on RBCM1, we select one test data from the testing dataset, for instance, a test data covering path AND2(g)->I. Based on RCBM4, we consider two execution paths each including a connection from finding a to class I, AND1(a,t)->I and AND3(a,v)->I. From these two paths, we can provide one test data whose path covers the connections from finding a to I. In the same way, we can provide one test data whose paths cover the connections from finding b to I. Ideally, if each path corresponds to one connection, we will have 14 test data, which is a multiple of the number of classes and the number of findings. Table 8 lists all possible execution paths based on each possible connection. Since the DAG does not include any subclasses, the only difference between RBCM4 and RBCM5 is that the test cases provided by RBCM4 cover only one path for each connection while the test cases provided by RBCM5 cover all paths for each connection. Finally, we generate 21 test data which can cover all new rules in the rule-base. It is possible that some paths in the DAG may not be covered by any of the available test data. Therefore, to increase the coverage of the new rules, we must synthesize the additional test data according to corresponding path. As an example, if the path AND6(i,l)->I is not covered by any of the test data, this means if protocol type = udp and dst host count > 203 then intrusion.
16 490 COMPUTATIONAL INTELLIGENCE TABLE 8. All Possible Connections and Paths Connection finding a to class I finding c to class I finding f to class I finding g to class I finding h to class I finding i to class I finding j to class I finding k to class I finding l to class I finding p to class I finding q to class I finding r to class I finding t to class I finding v to class I Path AND1(a,t)->I; AND3(a,v)->I AND4( h,c,q)->i AND9(f,p,q)->I AND2(g)->I AND4( h,c,q)->i AND5(i,k,q)->I; AND6(i,l)->I AND8( j,l,p,r)->i AND5(i,k,q)->I AND6(i,l)->I; AND8( j,l,p,r)->i AND8( j,l,p,r)->i; AND9( f,p,q)->i AND4(h,c,q)->I; AND5(i,k,q)->I; AND9(f,p,q)->I AND8( j,l,p,r)->i AND1(a,t)->I; AND7(t)->I AND3(a,v)->I We simply need to insert manually the packet whose protocol type is UDP into the testing dataset, in order to create corresponding test case. Overall, 292 test cases are generated for the entire new rule-base involving 40 rules, 276 of which are coming from the initial test dataset and 16 are manually synthesized. Table 9 illustrates the breakdown of new test cases Identifying New Forms of Intrusions We identify new forms of potential intrusions by evaluating the initial rule-base against the new data-set generated above. Any test case that fails to be covered by the initial rule-base may be considered a potential new attack. From the 292 test cases generated previously, eight failed the initial rules. Consequently, we have eight potential new attacks, which are listed as follows: u,0,0,19,20,255,255,0.00,0,0.00,0.00 u,0,0,20,21,255,255,0.00,0,0.00,0.00 u,0,0,21,22,255,255,0.00,0,0.00,0.00 u,0,0,22,23,255,255,0.00,0,0.00,0.00 u,0,0,23,24,255,255,0.00,0,0.00,0.00 u,0,0,24,25,255,255,0.00,0,0.00,0.00 u,0,0,25,26,255,255,0.00,0,0.00,0.00 u,0,0,26,27,255,255,0.00,0,0.00,0.00 TABLE 9. Breakdown of New Test Cases Number of New Test Cases Size of Initial Covered by Uncovered by Test Dataset Initial Rule Base Initial Rule Base 10,
17 NETWORK INTRUSION USING GENETIC PROGRAMMING 491 Each test case includes 11 fields, corresponding (as specified in Table 2) respectively to protocol type, land, wrong fragment, count, srv count, dst host count, dst host srv count, synflood, num compromised, same srv rate, and diff srv rate. To verify whether a potential attack corresponds to a real attack, we simulate corresponding behaviors. More specifically, we use a packet generator to simulate corresponding packets in a real network environment, and then analyze the behavior of corresponding hosts, using for instance, a performance analyzer Attack Simulation and Results It is very difficult to accurately simulate potential attacks on a real network. The eight potential attacks considered above involve continuously sending a defined number of UDP packets from the same source host to the same destination host. Each potential attack lasts 2s. As an example, the first potential attack means that streams of 19 UDP packets are sent from the same source host to the same destination host with a period of 2s. Figure 13 depicts our experimental environment, which consists of the following components: UDP packet generator: UDPFlood.exe working under Windows NT 4.0. Source host: Sixteen workstations whose IP addresses range from to Destination/Victim host: The host provides online computer buying service. Its IP address is Settings of UDP packet generator: Destination port is set to 8,080; the maximum duration is 0s; packet sending rate is 250 packets/s. The destination host provides an online computer sale service. The simulation of each of the eight potential attacks results in a denial of service; the website becomes unavailable. The denial of service is created by a flood of UDP packets, which corresponds to an UDPStorm attack. FIGURE 13. Simulated network topology graph.
18 492 COMPUTATIONAL INTELLIGENCE 7. CONCLUSIONS In this paper, we have presented and evaluated a GP-based approach for detecting known or novel attacks on a network. The proof of concept implementation shows that new rules generated by GP have the potential capability to detect novel forms of attacks. However, the detection result is not good for some runs because the selection of crossover and mutation points in corresponding operations is random. In addition, deciding the probability of genetic operators selection is experience based. In our implementation, the probability of mutation and crossover are 0.01 and 0.6, respectively. The purpose of the work reported in this paper was mainly to assess the efficiency of GP for known or novel attacks detection. The next step in our work will consist of extending the scope of the rules involved. REFERENCES ANDERSON, J. P. 1980, Computer Security Threat Monitoring and Surveillance, Technical Report, James P. Anderson Co., Fort Washington, PA. BALAJINATH, B., and S. RAGHAVAN Intrusion detection through learning behavior model. Computer Communications, 24(12): BARR, V TRUBAC: A tool for testing expert systems with rule-base coverage measures. In Proceedings of the Thirteenth Annual Pacific Northwest Software Quality Conference. BARR, V Rule-based coverage analysis applied to test case selection. Annals of Software Engineering, 4. BRIDGES, S. M., and R. M. VAUGHN Fuzzy data mining and genetic algorithms applied to intrusion detection. In Proceedings of the Twenty-third National Information Systems Security Conference, Baltimore, MD. CHITTUR, A Model generation for an intrusion detection system using genetic algorithm. High School Honors Thesis. CROSBIE, M., and G. SPAFFORD Applying genetic programming to intrusion detection. Technical Report, FS-95-01, AAAI Fall Symposium Series. AAAI Press. ESKIN, E., and M. MILLER, Z. D. ZHONG, G. YI, W-A. LEE, and S. STOLFO Adaptive model generation for intrusion detection systems. In Workshop on Intrusion Detection and Prevention, 7th ACM Conference on Computer Security, Athens, GR. FOX, K. L., R. R. HENNING, J. H. REED, and P. R. SIMONIAN A neural network approach towards intrusion detection. In Proceedings of 13th National Computer Security Conference, pp FRANK, J Artificial intelligence and intrusion detection: Current and future directions. In Proceedings of the 17th National Computer Security Conference, pp GHOSH, A. K., J. WANKEN, and F. CHARRON Detecting anomalous and unknown intrusions against programs. In Proceedings of the 14th Annual Computer Security Applications Conference, pp GOMEZ, J., D. DASGUPTA,O.NASAROUI, and F. GONZALEZ Complete expression trees for evolving fuzzy classifiers systems with genetic algorithms and application to network intrusion detection. In Proceedings of NAFIPS-FLINT joint Conference, New Orleans, LA, pp KOZA, J. R Genetic Programming. MIT Press. LEUNG, K. S., and K. F. YAM Rule learning in expert systems using genetic algorithms: 1, Concepts. In Proceeding of the 2nd International Conference on Fuzzy Logic and Neural Networks, pp LIPPMANN, R The 1999 DARPA off-line intrusion detection evaluation. Computer Networks, 34(4): ME, L Genetic algorithms: An alternative tool for security audit trails analysis. Technical Report, Supelec, France. WONG, M. L., and K. S. LEUNG Data mining using grammar based genetic programming and applications. Kluwer Academic Publishers, Netherlands.
19 NETWORK INTRUSION USING GENETIC PROGRAMMING 493 APPENDIX TABLE A1. Initial Rules (Ctd.) Rules Meaning AfpAqA if land = 1 and wrong fragment = 0 and synflood = 0.00 then intrusion AaggqA if wrong fragment > 1 and synflood = 0.00 then intrusion Aigq if protocol type = udp and wrong fragment > 1 and synflood = 0.00 then intrusion AabrA if protocol type = tcp and count > 3 and synflood > 1 then intrusion Aarc if srv count > 3 and synflood > 1 then intrusion Ahcr if protocol type = icmp and srv count > 3 and synflood > 1 then intrusion AaaAfj if protocol type = tcp and land = 1 and count < 3 then intrusion AaAoc if protocol type = tcp and srv count > 3 and land = 0 then intrusion gaaja if protocol type = tcp and count < 3 and wrong fragment > 1 then intrusion capaa if protocol type = tcp and srv count > 3 and wrong fragment = 0 then intrusion Abc if count > 3 and srv count > 3 then intrusion AatA if protocol type = tcp and num compromised > 1 then intrusion Akvq if srv count < 3 and synflood = 0 and same srv rate = 1.00 then intrusion uagja if protocol type = tcp and same srv rate = 0.00 and wrong fragment > 1 and count < 3 then intrusion AAvA if protocol type = tcp and same srv rate = 1.00 then intrusion AAwv if protocol type = tcp and diff srv rate > 0.33 and same srv rate = 1.00 then intrusion AqsujaA if protocol type = tcp and count < 3 and synflood = 0 and num compromised = 0 and same srv rate = 0.00 then intrusion Aasf if num compromised = 0 and land = 1 then intrusion AsAg if wrong fragment > 1 and num compromised = 0 then intrusion AAAtfg if num compromised > 1 and land = 1 and wrong fragment > 1 then intrusion Aaib if protocol type = udp and count > 3 then intrusion Attt if num compromised > 1 then intrusion Avfrg if land = 1 and wrong fragment > 1 and same srv rate = 1.00 and synflood > 1 then intrusion AAAtiA if protocol type = udp and num compromised > 1 then intrusion AAAvA if same srv rate = 1.00 then intrusion cwaa if srv count > 25 and diff srv rate > 0.33 then intrusion Aaiog if protocol type = udp and land = 0 and wrong fragment > 1 then intrusion Ar if synflood > 1 then intrusion Aagg if wrong flagment > 1 then intrusion AaffA if land = 1 then intrusion
20 494 COMPUTATIONAL INTELLIGENCE TABLE A2. New Rules (Ctd.) Rules Agr Agq Agiq Aw Aagq Aqv Agu Aadr Ahmq Aicq Aha Afs Aags Av Af Afg Aflp Afq Agh Abc Aad Aijv Akr Aabo Aeh Aopt Agr Ahfg Afw Act Meaning if wrong fragment > 1 and synflood > 1 then intrusion if wrong fragment > 1 and synflood = 0 then intrusion if protocol type = udp and wrong fragment > 1 and synflood = 0 then intrusion if diff srv rate > 0.33 then intrusion if protocol type = tcp and wrong fragment > 1 and synflood = 0 then intrusion if synflood = 0 and same srv rate = 1.00 then intrusion if wrong fragment > 1 and same srv rate = 0.00 then intrusion if protocol type = tcp and dst host count > 88 and synflood > 1 then intrusion if protocol type = icmp and dst host srv count < 160 and synflood = 0 then intrusion if protocol type = udp and srv count > 367 and synflood = 0 then intrusion if protocol type = icmp and count > 160 then intrusion if land = 1 and num compromised = 0 then intrusion if protocol type = tcp and wrong fragment > 1 and num compromised = 0 then intrusion if same srv rate = 1.00 then intrusion if land = 1 then intrusion if land = 1 and wrong fragment > 1 then intrusion if land = 1 and sat host coun < 203 and wrong fragment = 0 then intrusion if land = 1 and wrong fragment = 0 then intrusion if protocol type = icmp and wrong flagment > 1 then intrusion if count > 120 and srv count > 250 then intrusion if protocol type = tcp and dst host count > 320 then intrusion if protocol type = udp and count < 10 and same srv rate = 1.00 then intrusion if srv count < 60 and synflood > 1 then intrusion if protocol type = tp and count > 450 and land = 0 then intrusion if protocol type = icmp and dst host srv count > 255 then intrusion if land = 0 and wrong fragment > 1 and num compromised > 1 then intrusion if wrong fragment > 1 and synflood > 1 then intrusion if protocol type = icmp and land = 1 and wrong fragment > 1 then intrusion if land = 1 and diff srv rate > 0.5 then intrusion if srv count > 46 and num compromised > 1 then intrusion
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi School of Computing Queen s University Kingston, Ontario,
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges [email protected] Rayford B. Vaughn [email protected] 23 rd National Information Systems Security Conference
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
USING GENETIC ALGORITHM IN NETWORK SECURITY
USING GENETIC ALGORITHM IN NETWORK SECURITY Ehab Talal Abdel-Ra'of Bader 1 & Hebah H. O. Nasereddin 2 1 Amman Arab University. 2 Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan Email:
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by
A Neural Network Based System for Intrusion Detection and Classification of Attacks
A Neural Network Based System for Intrusion Detection and Classification of Attacks Mehdi MORADI and Mohammad ZULKERNINE Abstract-- With the rapid expansion of computer networks during the past decade,
Applying Genetic Algorithm to Intrusion Detection System
Applying Genetic Algorithm to Intrusion Detection System Vrishali Yewale 1, Vimla Jethani 2, Tushar Ghorpade 3 1 Computer Science Department, Mumbai University, RAIT College of Engineering, Nerul, Navi
Using Genetic Algorithm for Network Intrusion Detection
Using Genetic Algorithm for Network Intrusion Detection Wei Li Department of Computer Science and Engineering Mississippi State University, Mississippi State, MS 39762 Email: [email protected] Abstract
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION. Abstract
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges, Associate Professor Rayford B. Vaughn, Associate Professor Department of Computer Science Mississippi State University
Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
Intrusion Detection using Artificial Neural Networks with Best Set of Features
728 The International Arab Journal of Information Technology, Vol. 12, No. 6A, 2015 Intrusion Detection using Artificial Neural Networks with Best Set of Features Kaliappan Jayakumar 1, Thiagarajan Revathi
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES Vijayalakshmi Mahanra Rao 1, Yashwant Prasad Singh 2 Multimedia University, Cyberjaya, MALAYSIA 1 [email protected]
GPSQL Miner: SQL-Grammar Genetic Programming in Data Mining
GPSQL Miner: SQL-Grammar Genetic Programming in Data Mining Celso Y. Ishida, Aurora T. R. Pozo Computer Science Department - Federal University of Paraná PO Box: 19081, Centro Politécnico - Jardim das
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Abdun Mahmood, Christopher Leckie, Parampalli Udaya Department of Computer Science and Software Engineering University of
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University
Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic
Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic Mostaque Md. Morshedur Hassan Assistant Professor, Department of Computer Science and IT, Lalit Chandra Bharali College, Guwahati,
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
Network Intrusion Detection Using an Improved Competitive Learning Neural Network John Zhong Lei and Ali Ghorbani Faculty of Computer Science University of New Brunswick Fredericton, NB, E3B 5A3, Canada
D A T A M I N I N G C L A S S I F I C A T I O N
D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.
How To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
Performance Evaluation of Intrusion Detection Systems using ANN
Performance Evaluation of Intrusion Detection Systems using ANN Khaled Ahmed Abood Omer 1, Fadwa Abdulbari Awn 2 1 Computer Science and Engineering Department, Faculty of Engineering, University of Aden,
Detection Approaches. Chapter 2. 2.1 Misuse Detection
Chapter 2 Detection Approaches The basic principle of intrusion detection is based on the assumption that intrusive activities are noticeably different from normal ones and thus are detectable [16]. Many
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Virtual Host based Intrusion Detection System for Cloud
Virtual Host based Intrusion Detection System for Cloud Manthira Moorthy S #1, Rajeswari M #2 # Department of Computer Science and Engineering, Hindustan University P.O.Box No.1, Rajiv Gandhi Salai (OMR),
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM
59 CHAPETR 3 DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 3.1. INTRODUCTION The last decade has seen many prominent DDoS attack on high profile webservers. In order to provide an effective defense against
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf, K. R. Kendall,
Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic
Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic Amit Khajuria 1, Roshan Srivastava 2 1 M. Tech Scholar, Computer Science Engineering, Lovely Professional University,
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
Adaptive Network Intrusion Detection System using a Hybrid Approach
Adaptive Network Intrusion Detection System using a Hybrid Approach R Rangadurai Karthick Department of Computer Science and Engineering IIT Madras, India [email protected] Vipul P. Hattiwale Department
Hybrid Evolution of Heterogeneous Neural Networks
Hybrid Evolution of Heterogeneous Neural Networks 01001110 01100101 01110101 01110010 01101111 01101110 01101111 01110110 01100001 00100000 01110011 01101011 01110101 01110000 01101001 01101110 01100001
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques
www.ijcsi.org 387 Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques Utkarsh Dixit 1, Shivali Gupta 2 and Om Pal 3 1 School of Computer Science, Centre
Denial of Service and Anomaly Detection
Denial of Service and Anomaly Detection Vasilios A. Siris Institute of Computer Science (ICS) FORTH, Crete, Greece [email protected] SCAMPI BoF, Zagreb, May 21 2002 Overview! What the problem is and
Modeling System Calls for Intrusion Detection with Dynamic Window Sizes
Modeling System Calls for Intrusion Detection with Dynamic Window Sizes Eleazar Eskin Computer Science Department Columbia University 5 West 2th Street, New York, NY 27 [email protected] Salvatore
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
MACHINE LEARNING & INTRUSION DETECTION: HYPE OR REALITY?
MACHINE LEARNING & INTRUSION DETECTION: 1 SUMMARY The potential use of machine learning techniques for intrusion detection is widely discussed amongst security experts. At Kudelski Security, we looked
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
Neural networks vs. decision trees for intrusion detection
Neural networks vs. decision trees for intrusion detection Yacine Bouzida Mitsubishi Electric ITE-TCL 1, allée de Beaulieu CS 186 3578, Rennes, France [email protected] Frédéric Cuppens Département
Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm
Journal of Al-Nahrain University Vol.15 (2), June, 2012, pp.161-168 Science Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm Manal F. Younis Computer Department, College
Denial-Of -Service Attack Detection Using KDD
Denial-Of -Service Attack Detection Using KDD Prof. Pankaj Salunkhe 1,Mayur Shishupal 2 1 Head of Department (Electronics & Telecommunication Engineering), YTIET, Bhivpuri [MH], India 2 Pursuing Master
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of
Network Based Intrusion Detection System using Genetic Algorithm: A Study
Network Based Intrusion Detection System using Genetic Algorithm: A Study 1 Purushottam Patil, 2 Dr. Yogesh Sharma and 3 Dr. Manali Kshirsagar 1 Research Scholar (Computer Science & Engineering), Faculty
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC
ABSTRACT CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC Mostaque Md. Morshedur Hassan LCB College, Maligaon, Guwahati, Assam, India. [email protected] Nowadays Intrusion
OFFLINE NETWORK INTRUSION DETECTION: MINING TCPDUMP DATA TO IDENTIFY SUSPICIOUS ACTIVITY KRISTIN R. NAUTA AND FRANK LIEBLE.
OFFLINE NETWORK INTRUSION DETECTION: MINING TCPDUMP DATA TO IDENTIFY SUSPICIOUS ACTIVITY KRISTIN R. NAUTA AND FRANK LIEBLE Abstract With the boom in electronic commerce and the increasing global interconnectedness
Computational intelligence in intrusion detection systems
Computational intelligence in intrusion detection systems --- An introduction to an introduction Rick Chang @ TEIL Reference The use of computational intelligence in intrusion detection systems : A review
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks
IMPROVED OFF-LINE INTRUSION DETECTION USING A GENETIC ALGORITHM
IMPROVED OFF-LINE INTRUSION DETECTION USING A GENETIC ALGORITHM Pedro A. Diaz-Gomez Ingenieria de Sistemas, Universidad El Bosque Bogota, Colombia Email: [email protected] Dean F. Hougen Robotics, Evolution,
An Application of Machine Learning to Network Intrusion Detection
An Application of Machine Learning to Network Intrusion Detection Chris Sinclair Applied Research Laboratories The University of Texas at Austin sinclair@arlututexasedu Lyn Pierce epierce@arlututexasedu
Evaluating Host-based Anomaly Detection Systems: Application of The One-class SVM Algorithm to ADFA-LD
Evaluating Host-based Anomaly Detection Systems: Application of The One-class SVM Algorithm to ADFA-LD Miao Xie, Jiankun Hu and Jill Slay School of Engineering and Information Technology University of
On A Network Forensics Model For Information Security
On A Network Forensics Model For Information Security Ren Wei School of Information, Zhongnan University of Economics and Law, Wuhan, 430064 [email protected] Abstract: The employment of a patchwork
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
A Multi-Objective Optimisation Approach to IDS Sensor Placement
A Multi-Objective Optimisation Approach to IDS Sensor Placement Hao Chen 1, John A. Clark 1, Juan E. Tapiador 1, Siraj A. Shaikh 2, Howard Chivers 2, and Philip Nobles 2 1 Department of Computer Science
Detecting Flooding Attacks Using Power Divergence
Detecting Flooding Attacks Using Power Divergence Jean Tajer IT Security for the Next Generation European Cup, Prague 17-19 February, 2012 PAGE 1 Agenda 1- Introduction 2- K-ary Sktech 3- Detection Threshold
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No., February 8 7 Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms Y.Dhanalakshmi and Dr.I. Ramesh
An Efficient Filter for Denial-of-Service Bandwidth Attacks
An Efficient Filter for Denial-of-Service Bandwidth Attacks Samuel Abdelsayed, David Glimsholt, Christopher Leckie, Simon Ryan and Samer Shami Department of Electrical and Electronic Engineering ARC Special
Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols
Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols Farooq Anjum Applied Research Telcordia. Tech Inc. Morristown NJ 796 [email protected]
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS Athira A B 1 and Vinod Pathari 2 1 Department of Computer Engineering,National Institute Of Technology Calicut, India
Data Mining for Network Intrusion Detection
Data Mining for Network Intrusion Detection S Terry Brugger UC Davis Department of Computer Science Data Mining for Network Intrusion Detection p.1/55 Overview This is important for defense in depth Much
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Intrusion Detection Systems
Intrusion Detection Systems Sokratis K. Katsikas Dept. of Digital Systems University of Piraeus [email protected] Agenda Overview of IDS Intrusion prevention using game theory Reducing false positives Clustering
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
ACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
Internet Worm Classification and Detection using Data Mining Techniques
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. 1 (May Jun. 2015), PP 76-81 www.iosrjournals.org Internet Worm Classification and Detection
Chapter 28 Denial of Service (DoS) Attack Prevention
Chapter 28 Denial of Service (DoS) Attack Prevention Introduction... 28-2 Overview of Denial of Service Attacks... 28-2 IP Options... 28-2 LAND Attack... 28-3 Ping of Death Attack... 28-4 Smurf Attack...
Estimation of the COCOMO Model Parameters Using Genetic Algorithms for NASA Software Projects
Journal of Computer Science 2 (2): 118-123, 2006 ISSN 1549-3636 2006 Science Publications Estimation of the COCOMO Model Parameters Using Genetic Algorithms for NASA Software Projects Alaa F. Sheta Computers
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
