|
|
|
- Franklin Cooper
- 10 years ago
- Views:
Transcription
1 Using Program Behavior Proæles for Intrusion Detection æ Anup K. Ghosh, Aaron Schwartzbard, & Michael Schatz Reliable Software Technologies Corporation Ridgetop Circle, è250, Sterling, VA phone: è703è , fax: è703è POC Abstract Intrusion detection and response has traditionally been performed at the network and host levels. That is, intrusion monitors will typically analyze network packet logs or host machine audit logs for signs of intrusion activity. More often than not, commercial oæ the shelf ècotsè intrusion detection tools use ëængerprints" of known intrusions to detect their presence in these audit trails. Both these approaches employed by most state-of-the-practice tools have their drawbacks. In this paper, we describe a method for program-based intrusion detection that is aimed at detecting novel attacks against systems. 1 Introduction The æeld of intrusion detection is now beginning to reach commercial success as evidenced by the plethora of commercial intrusion detection tools on the market. One contributing factor to the success of intrusion detection tools is the failure of ærewalls to prevent many security intrusions in practice. Firewalls are vulnerable to errors in conæguration, ambiguous security policies, datadriven attacks through allowed network services, and insider attacks. One of the main problems with ærewalls is not the lack ofgoodtechnology, but rather the false sense of security it engenders in organizations that erect them. Once installed, individual host security is often relaxed and successful intrusions exploit the web of trust between computers to gain increasing levels of privilege. Intrusion detection software can detect many of the intrusions that slip through or around ærewalls. Defense-in-depth is the most eæective strategy for securing systems today rather than single point solutions. While neither ærewalls nor intrusion detection software is a silver bullet solution to security, together they provide a level of defense-in-depth that by themselves neither could provide. Defense-in-depth can also be applied to intrusion detection system themselves. For example, maintaining multiple, diverse intrusion detection systems is often more eæective than employing a single intrusion detection system. Intrusion detection techniques are generally classiæed into one of two approaches: misuse detection and anomaly detection. Misuse detection methods attempt to model attacks on a system as speciæc patterns, then systematically scan the system for occurrences of these patterns æ This work is sponsored under Defense Advanced Research Projects Agency èdarpaè Contract DAAH01-98-C- R145. the views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the defense advanced research projects agency or the u.s. government. 1
2 ë4, 5, 6, 9, 12, 13ë. This process involves a speciæc encoding of previous behaviors and actions that were deemed intrusive or malicious. Anomaly detection assumes that intrusions are highly correlated to abnormal behavior exhibited by either a user or network traæc. The main advantage of anomaly detection over misuse detection approaches is that novel attacks against systems can be detected by noting abnormal behavior. As a result, anomaly detection approaches are particularly popular among researchers ë1, 9, 10, 8, 11ë. One of the key problems with commercial intrusion detection tools is that most rely on misuse detection or signature analysis to detect intrusion attempts. Because these techniques attempt to match monitored data with patterns stored in databases, attacks that do not conform with known attack patterns will not be detected. In fact, even slight variants of known attacks often escape detection using signature analysis. The approach is limited by the breadth and depth of the knowledge stored in the pattern matching database. Practical constraints on storage of attacks is one limiting factor. Even more limiting for preventing intrusions, however, is the fact that novel or unknown intrusions will not be detected. Because new vulnerabilities are found and exploited on a daily basis, the signature analysis approaches currently on the market are reactionary and behind the curve pushed by computer crackers. Desiring the ability to detect novel, unknown attacks against systems, an anomaly detection approach is employed in this research. Unlike traditional anomaly detection approaches, this research applies anomaly detection at the system process level. Rather than proæling the normal behavior of users, the approach here is to proæle the normal behavior of executing processes. Monitoring at the process level abstracts away users' idiosyncrasies such that abnormal process behavior can be detected irrespective ofindividual users' behavior. Having baselined the normal behavior of a process, deviations from the normal behavior can be used to detect attempted exploitations of the program. Other intrusion detection work has been performed on system processes ë2, 1, 3, 7ë. 2 Proæling Program Behavior In this research, we proæle a program's behavior by studying the set of system calls made by the program. One of the beneæts of performing intrusion detection at the program level over network or host-based intrusion detection is having the ability to monitor intrusive behavior at a very æne grain level of accuracy. Computer security intrusions most often occur when programs are misused. System calls are a key indicator of program misusage. Because programs are only able to manifest system privileges by making system calls, analyzing the system calls made by a program is a reasonable approach to detecting intrusions based on program behavior proæles. Several auditing facilities for a program's system calls exist on Unix systems including: Solaris's Basic Security Module èbsmè, ptrace, strace, ltrace, and Solaris èproc interface commands. For the purposes of this study, we used BSM audit data provided to us under the DARPA 1998 Intrusion Detection Evaluation program 1. The data was collected over a period of weeks in a controlled environment onaninternal Air Force Research Laboratory èafrlè network and provided to us by MIT's Lincoln Laboratory, who analyzed the results from each participant's study. The data produced by BSM is a compact binary representation of system calls made by a program to the Solaris kernel. A tool called praudit is distributed with Solaris to convert the BSM data to human readable ASCII form. Individual sessions are programmatically extracted from the praudit data and partitioned into the BSM events corresponding to a particular program. For instance, for a session labeled: 08:39:27_ _in.telnetd, 1 See for a summary of the program. 2
3 the following BSM event æles are created corresponding to the programs that make the recorded system calls: login pt_chmod sh cat mail quota tcsch in.telnetd mail.local sendmail. Thus, a set of BSM events for each program in each session is created. The contents of anyone of these æles may look like: ëpid 1387ë execve;ëpid 1387ë open;ëpid 1387ë mmap;ëpid 1387ë open; ëpid 1387ë mmap;ëpid 1387ë mmap;ëpid 1387ë munmap;ëpid 1387ë mmap; ëpid 1387ë close;ëpid 1387ë open;ëpid 1387ë mmap;ëpid 1387ë mmap;ë pid 1387ë munmap;ëpid 1387ë mmap;ëpid 1387ë close;ëpid 1387ë open; ëpid 1387ë mmap;ëpid 1387ë mmap;ëpid 1387ë munmap;ëpid 1387ë mmap; ëpid 1387ë mmap;ëpid 1387ë close;ëpid 1387ë open;ëpid 1387ë mmap;ë pid 1387ë close;ëpid 1387ë open;ëpid 1387ë mmap;ëpid 1387ë mmap;ëp id 1387ë munmap;ëpid 1387ë mmap;ëpid 1387ë close;ëpid 1387ë close; ëpid 1387ë munmap;ëpid 1387ë open;ëpid 1387ë mmap;ëpid 1387ë memcn tl;ëpid 1387ë munmap;ëpid 1387ë close;ëpid 1387ë close;ëpid 1387ë close;ëpid 1387ë close;ëpid 1387ë exit; where BSM events are semi-colon separated and the process ID of the process that creates the event is recorded. Though this æle has only a single process è1387è, it is possible for a given æle to contain multiple, interleaved processes. The session data provided by Lincoln Laboratory was labeled for training purposes such that intrusive sessions can be distinguished from normal sessions. Using these session labels, the intrusion sessions are separated from normal sessions. Because our approach is based on anomaly detection, we use only the normal sessions for training. For instance, to build a normal program behavior proæle for the program ls, we ærst combine all the æles named ëls" from all non-intrusive session directories into a single ëls" æle. A database is constructed for each program. The database is simply a table that consists of every unique N-gram of BSM events that occurred during any execution, as well as a frequency count for each N-gram. For instance, given the following snippet from a æle of BSM events, ëpid 1ë A;ëpid 1ë B;ëpid 2ë C;ëpid 1ë D;ëpid 1ë B;ëpid 2ë A; ëpid 1ë D;ëpid 1ë B;ëpid 2ë E;ëpid 2ë B;ëpid 2ë D;, and given an N-gram size of two, the following table would be created. BSM N-grams Frequency AB 1 BD 3 DB 2 CA 1 AE 1 EB 1 Table 1: Table of normal behavior proæle for a program for an N-gram size of 2. Total number of unique N-grams is six, and the total number of N-grams is nine. 3
4 The table shows the unique strings that are created from a program's BSM proæle with their associated frequency. Each table characterizes the normal behavior of the program under nonintrusive usage. Tables such as this one are built programmatically for all programs under analysis. In this study, tables for 155 diæerent UNIX programs were constructed. The tables are used by the intrusion detection algorithm to detect anomalous behavior. 3 A Simple Look Up Approach to Intrusion Detection The algorithm we use for detecting intrusions is simple but eæective. Similar to the approach of ë2ë, we look up sequences of system calls captured during online usage in the tables of normal behavior built for each program. If the sequence of BSM events captured during online usage is not found in the database, then an anomaly counter is incremented. This technique is predicated on the ability to capture the normal behavior of a program in a database. If the normal behavior of a program is not adequately captured, then the false alarm rate is likely to be high. On the other hand, if the normal behavior proæle built for a program includes intrusive behavior, then future instances of the intrusive behavior are likely to go undetected. Finally, it is important that the range of possible behavior patterns is much larger than the range of normal behavior patterns, because detection of intrusive events is only made possible when the intrusive behavior patterns are diæerent from the normal behavior patterns. The more compact the representation of normal behavior and the larger the range of possible behavior, the better detection capacity this equality matching technique will have. The ratio of normal behavior patterns to possible behavior patterns provides an indication of the detection capacity of the technique. The smaller this ratio, the better the detection capacity. Capturing system calls via the BSM provides a broad range of possible behavior. There are approximately 200 diæerent BSM events that can be recorded. The N-grams described in Section 2 represent a sequence of N consecutive BSM events. Therefore a single N-gram can have 200 N possible combinations. In practice, however, a program will normally make only about 10 to 20 diæerent system calls. Interval Unit Contained Threshold session æle ST æle window FT window N-gram WT N-gram BSM event Table 2: Using intervals of æxed sizes and thresholds to exploit temporal locality of attacks. The simple table look up approach employed here exploits temporal locality of anomalous sequences for detecting intrusions. That is, rather than averaging the number of anomalous sequences out of the total number of sequences, we employ thresholding functions in æxed-size intervals, where the æxed-size interval is much smaller than the total execution trace. A session is considered to be intrusive if it contains an anomalous execution of a program. A program is considered anomalous if a portion of its windows is anomalous. A window is considered anomalous if a portion of its N-grams is anomalous. An N-gram is considered anomalous if it cannot be found in the database corresponding to the program currently being checked. Table 2 shows the æxed-size intervals, the units they contain, and their thresholds that are used to detect anomalous behavior. When the threshold for a æxed interval such as a window of N-grams is exceeded, the whole interval is marked as anomalous. Then a thresholding function 4
5 is applied at the next level up in abstraction using the marked anomalous interval to determine if an intrusion has occurred. For instance, if a window is marked as anomalous because its threshold, WT, for anomalous N-grams is exceeded, then this window is used as part of the count for æle intervals to determine if the æle threshold FT is exceeded. Ultimately, the session threshold, ST, must be exceeded for the session to be labeled as an intrusion. The thresholds are all conægurable and the tuning of the thresholds will impact the performance of the system. 4 Results The table lookup intrusion detection algorithm was evaluated by MIT's Lincoln Laboratory under the DARPA 1998 Intrusion Detection Evaluation program. Unlabeled sessions were sent by Lincoln Labs and processed by our intrusion detection algorithm. These sessions had an unspeciæed number of attacks of the following four types: denial of service èdosè, probe, user to root èu2rè, and remote to local èr2lè. Denial of service attacks deny access to resources for legitimate users. Probing attacks collect information about a host machine that may be used to stage attacks at a later time. A user to root attack is deæned as an attack that elevates the privilege of a user with local account privileges. Remote to local attacks grant a remote user with no account privileges local user account privileges. Attack Instances Detections è Detected DoS probe u2r r2l Total Table 3: Performance of table look up intrusion detection algorithm against diæerent attack types. Table 3 shows the performance of the table look up intrusion detection algorithm for the diæerent attack types for a threshold selected by the MIT Lincoln Laboratory. If the threshold for detection is set too low, then the false alarm rate will be low, but correct detection rate will be low, too. Similarly, a threshold set too high may end up detecting most intrusions, but suæer from a high false alarm rate. The results shown here appear to be a reasonable threshold for false alarms and detections. False alarm rates are not shown for these diæerent attacks because our algorithm will not label a particular attack it only notes when an attack èany attackè is occurring. As a result, false positives cannot be tracked to particular attack types. However, for the threshold chosen, the total percentage of false positives for all the sessions evaluated was 2.1è. The table shows the intrusion detection algorithm detected only 3 out of 8 denial of service attacks. Four of these missed attacks were a ëwarez" attack that involved uploading æles to an FTP server that permitted this action. Because no particular æaw in the FTP server was exploited and the FTP server conæguration permitted this action, it is not surprising that our anomaly detection algorithm did not detect these four DoS attacks. The algorithm performed very well on the other classes of attacks. The attacks in Table 3 can be broken down into old and new attacks, as well as clear and stealthy attacks. The following tables show this breakdown. Table 4 shows the performance of the algorithm for old and new attacks. An old attack is deæned as an attack identical or similar to an attack that was present in the training data. A new attack 5
6 OLD NEW Attack Instances Detections è Detected Instances Detections è Detected DoS probe u2r r2l Total Table 4: Performance of table look up intrusion detection algorithm for old and new attacks. is an attack that was not present in the training data. The results in this table show the power of the anomaly detection technique in detecting novel attacks against systems. The performance of the algorithm to novel attacks makes this technique viable in the ever-dynamic world of computer security intrusions. CLEAR STEALTHY Attack Instances Detections è Detected Instances Detections è Detections DoS probe u2r r2l Total Table 5: Performance of table look up intrusion detection algorithm for clear and stealthy attacks. Table 5 shows the performance of the algorithm in detecting clear versus stealthy attacks. Stealthy attacks attempt to hide perpetrator's actions from someone monitoring the system or from an intrusion detection system. For example, an attacker may edit the system log æles after an attack to attempt to erase his or her tracks. The anomaly detection approach shows its strong ability to detect stealthy attacks. In summary, the table look up intrusion detection approach performed well in all categories of attacks except denial of service. It correctly classiæed 72.2è of all attack sessions and 97.9è of all non-intrusion sessions. The low false positive rate è2.1èè is desirable for any intrusion detection approach. The intrusion detection algorithm's strengths are in detecting novel attacks against systems and in detecting stealthy attacks both weaknesses of misuse detection or pattern matching intrusion detection approaches. Combining this approach with other intrusion detection approaches èsuch as network-based or misuse detection approachesè will provide a more robust intrusion detection defense that can detect old as well as novel attacks. Acknowledgment We are pleased to acknowledge Richard Lippmann, Marc Zissman, and Isaac Graf of MIT's Lincoln Laboratory for providing us the training and testing data, as well as evaluating our intrusion detection approach. 6
7 References ë1ë P. D'haeseleer, S. Forrest, and P. Helman. An immunological approach to change detection: Algorithms, analysis and implications. In IEEE Symposium on Security and Privacy, ë2ë S. Forrest, S.A. Hofmeyr, and A. Somayaji. Computer immunology. Communications of the ACM, 40è10è:88í96, October ë3ë S. Forrest, S.A. Hofmeyr, A. Somayaji, and T.A. Longstaæ. A sense of self for unix processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 120í128. IEEE, May ë4ë T.D. Garvey and T.F. Lunt. Model-based intrusion detection. In Proceedings of the 14th National Computer Security Conference, October ë5ë K. Ilgun. Ustat: A real-time intrusion detection system for unix. Master's thesis, Computer Science Dept, UCSB, July ë6ë S. Kumar and E.H. Spaæord. A pattern matching model for misuse intrusion detection. The COAST Project, Purdue University, ë7ë W. Lee, S. Stolfo, and P.K. Chan. Learning patterns from unix process execution traces for intrusion detection. In Proceedings of AAAI97 Workshop on AI Methods in Fraud and Risk Management, ë8ë T.F. Lunt. Ides: an intelligent system for detecting intruders. In Proceedings of the Symposium: Computer Security, Threat and Countermeasures, November Rome, Italy. ë9ë T.F. Lunt. A survey of intrusion detection techniques. Computers and Security, 12:405í418, ë10ë T.F. Lunt and R. Jagannathan. A prototype real-time intrusion-detection system. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April ë11ë T.F. Lunt, A. Tamaru, F. Gilham, R. Jagannthan, C. Jalali, H.S. Javitz, A. Valdos, P.G. Neumann, and T.D. Garvey. A real-time intrusion-detection expert system èidesè. Technical Report, Computer Science Laboratory, SRI Internationnal, February ë12ë F. Monrose and A. Rubin. Authentication via keystroke dynamics. In 4th ACM Conference on Computer and Communications Security, April ë13ë P.A. Porras and R.A. Kemmerer. Penetration state transition analysis - a rule-based intrusion detection approach. In Eighth Annual Computer Security Applications Conference, pages 220í 229. IEEE Computer Society Press, November ë14ë T.H. Ptacek and T.N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks Inc., January Online. Available: 7
Modeling System Calls for Intrusion Detection with Dynamic Window Sizes
Modeling System Calls for Intrusion Detection with Dynamic Window Sizes Eleazar Eskin Computer Science Department Columbia University 5 West 2th Street, New York, NY 27 [email protected] Salvatore
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf, K. R. Kendall,
Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
1 of 8 3/25/2005 9:45 AM Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Intrusion Detection systems fall into two broad categories and a single new one. All categories
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
Web Application Security
Web Application Security Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http://www.cs.ucsb.edu/~rsg www.cs.ucsb.edu/~rsg/
Host-based Bottleneck Verification Efficiently Detects Novel Computer Attacks 1
Host-based Bottleneck Verification Efficiently Detects Novel Computer Attacks 1 Robert K. Cunningham, Richard P. Lippmann, David Kassay, Seth E. Webster, Marc A. Zissman MIT Lincoln Laboratory 244 Wood
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
Double guard: Detecting Interruptions in N- Tier Web Applications
Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2014-2018 ISSN: 2249-6645 Double guard: Detecting Interruptions in N- Tier Web Applications P. Krishna Reddy 1, T. Manjula 2, D. Srujan Chandra Reddy 3, T. Dayakar
Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
Computer Science Master s Project. Host-Based Intrusion Detection Using User Signatures
Computer Science Master s Project Host-Based Intrusion Detection Using User Signatures Author: Seth Freeman Degree: Master of Computer Science Submit Date: May 2002 TABLE OF CONTENTS ABSTRACT 1. Introduction
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Intruders and viruses. 8: Network Security 8-1
Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds
CSC574 - Computer and Network Security Module: Intrusion Detection
CSC574 - Computer and Network Security Module: Intrusion Detection Prof. William Enck Spring 2013 1 Intrusion An authorized action... that exploits a vulnerability... that causes a compromise... and thus
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs
Intrusion Detection Systems Oussama El-Rawas History and Concepts of IDSs Overview A brief description about the history of Intrusion Detection Systems An introduction to Intrusion Detection Systems including:
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT
MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT Steven Noel Center for Secure Information Systems George Mason University, Fairfax VA 22030-4444, USA [email protected] Duminda Wijesekera
A Comparison of Four Intrusion Detection Systems for Secure E-Business
A Comparison of Four Intrusion Detection Systems for Secure E-Business C. A. P. Boyce, A. N. Zincir-Heywood Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada {boyce, zincir} @ cs.dal.ca
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis
Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Improving Intrusion Detection Performance Using Keyword Selection and Neural Networks. Abstract
Improving Intrusion Detection Performance Using Keyword Selection and Neural Networks Richard P. Lippmann MIT Lincoln Laboratory, Rm S4-121 244 Wood Street Lexington, MA 02173-0073 [email protected] phone:
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee USENIX Security Symposium (Security 07) Presented by Nawanol
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
Barracuda Intrusion Detection and Prevention System
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges [email protected] Rayford B. Vaughn [email protected] 23 rd National Information Systems Security Conference
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
Data collection mechanisms for intrusion detection systems
Data collection mechanisms for intrusion detection systems Eugene Spafford Diego Zamboni Center for Education and Research in Information Assurance and Security 1315 Recitation Building Purdue University
Artificial Neural Networks for Misuse Detection
Artificial Neural Networks for Misuse Detection James Cannady School of Computer and Information Sciences Nova Southeastern University Fort Lauderdale, FL 33314 [email protected] Abstract Misuse detection
How To Create A System Security System That Can Detect An Anomaly In A System From A Log On A Network On A Computer System
Intrusion Detection Systems and A View To Its Forensic Applications The University of Melbourne Department of Computer Science Parkville 3052, Australia ABSTRACT Traditional computer security has often
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
IMPROVED OFF-LINE INTRUSION DETECTION USING A GENETIC ALGORITHM
IMPROVED OFF-LINE INTRUSION DETECTION USING A GENETIC ALGORITHM Pedro A. Diaz-Gomez Ingenieria de Sistemas, Universidad El Bosque Bogota, Colombia Email: [email protected] Dean F. Hougen Robotics, Evolution,
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
Intrusion Detection from Simple to Cloud
Intrusion Detection from Simple to Cloud ICTN 6865 601 December 7, 2015 Abstract Intrusion detection was used to detect security vulnerabilities for a long time. The methods used in intrusion detection
System for Denial-of-Service Attack Detection Based On Triangle Area Generation
System for Denial-of-Service Attack Detection Based On Triangle Area Generation 1, Heena Salim Shaikh, 2 N Pratik Pramod Shinde, 3 Prathamesh Ravindra Patil, 4 Parag Ramesh Kadam 1, 2, 3, 4 Student 1,
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS Athira A B 1 and Vinod Pathari 2 1 Department of Computer Engineering,National Institute Of Technology Calicut, India
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion
A STATISTICAL PROCESS CONTROL APPROACH FOR NETWORK INTRUSION DETECTION
A STATISTICAL PROCESS CONTROL APPROACH FOR NETWORK INTRUSION DETECTION A Dissertation Presented to The Academic Faculty By Yongro Park In Partial Fulfillment Of the Requirements for the Degree Doctor of
A PEER-BASED HARDWARE PROTOCOL FOR INTRUSION DETECTION SYSTEMS
A PEER-BASED HARDWARE PROTOCOL FOR INTRUSION DETECTION SYSTEMS Major Gregory B. White and Captain Mark L. Huson Department of Computer Science United States Air Force Academy USAF Academy, Colorado 80840
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
CS 392/CS 681 - Computer Security. Module 17 Auditing
CS 392/CS 681 - Computer Security Module 17 Auditing Auditing Audit Independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established
Science Park Research Journal
2321-8045 Science Park Research Journal Original Article th INTRUSION DETECTION SYSTEM An Approach for Finding Attacks Ashutosh Kumar and Mayank Kumar Mittra ABSTRACT Traditionally firewalls are used to
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION. Abstract
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges, Associate Professor Rayford B. Vaughn, Associate Professor Department of Computer Science Mississippi State University
SPAMMING BOTNETS: SIGNATURES AND CHARACTERISTICS
SPAMMING BOTNETS: SIGNATURES AND CHARACTERISTICS INTRODUCTION BOTNETS IN SPAMMING WHAT IS AUTORE? FACING CHALLENGES? WE CAN SOLVE THEM METHODS TO DEAL WITH THAT CHALLENGES Extract URL string, source server
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Intrusion Detection for Grid and Cloud Computing
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal University of Santa Catarina, Brazil Content Type
Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.
Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection
An Introduction to Intrusion-Detection Systems
An Introduction to Intrusion-Detection Systems Hervé Debar IBM Research, Zurich Research Laboratory, Säumerstrasse 4, CH 8803 Rüschlikon, Switzerland [email protected] Abstract Intrusion-detection systems
An Artificial Immune Model for Network Intrusion Detection
An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,
B database Security - A Case Study
WHITE PAPER: ENTERPRISE SECURITY Strengthening Database Security White Paper: Enterprise Security Strengthening Database Security Contents Introduction........................................................................4
Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
A Proposed Architecture of Intrusion Detection Systems for Internet Banking
A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India [email protected]
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper Securing Web Applications As hackers moved from attacking the network to attacking the deployed applications, a category
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
CS 5410 - Computer and Network Security: Intrusion Detection
CS 5410 - Computer and Network Security: Intrusion Detection Professor Kevin Butler Fall 2015 Locked Down You re using all the techniques we will talk about over the course of the semester: Strong access
USING GENETIC ALGORITHM IN NETWORK SECURITY
USING GENETIC ALGORITHM IN NETWORK SECURITY Ehab Talal Abdel-Ra'of Bader 1 & Hebah H. O. Nasereddin 2 1 Amman Arab University. 2 Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan Email:
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
HONEYPOT SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
HONEYPOT SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science
A Seminar report On Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org
Neural Networks for Intrusion Detection and Its Applications
, July 3-5, 2013, London, U.K. Neural Networks for Intrusion Detection and Its Applications E.Kesavulu Reddy, Member IAENG Abstract: With rapid expansion of computer networks during the past decade, security
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
