Computer Science Master s Project. Host-Based Intrusion Detection Using User Signatures
|
|
|
- Chester Hensley
- 10 years ago
- Views:
Transcription
1 Computer Science Master s Project Host-Based Intrusion Detection Using User Signatures Author: Seth Freeman Degree: Master of Computer Science Submit Date: May 2002
2 TABLE OF CONTENTS ABSTRACT 1. Introduction 1.1 Host-Based Intrusion Detection 1.2 Methodology 1.3 Previous Work 2. Creating User Signatures 2.1 Extracting User Commands from Log Files 2.2 Building Probabilistic Finite Automata from User Commands 3. Testing User Signatures 4. Conclusion 5. Implementation 6. Contributions BIBLIOGRAPHY
3 ABSTRACT Developing signatures of users of a computer system is a useful tool for protecting against potential intrusions. Many intrusions occur when an attacker gains unauthorized access to a valid user s account, then performs disruptive behavior while masquerading as a valid user. By developing signatures of each user of a system, we create a model which future user behavior can be compared against. The signature of each user of a system is stored in a probabilistic finite automata (PFA). The PFA is essentially a representation of all the command traces the user has typed in. These command traces are extracted from the log files of a computer, and are determined by the timings between the commands. The probabilities in the automata correspond to the probability that a given command will follow another command in a given command trace. Once we have a PFA for a given user, we can compare future command traces the user types against the automata. Each time we test a command trace against the PFA, a set of probabilities will be returned which corresponds to how well the trace matches the signature. Each and every time a low probability is returned, we detect anomalous behavior, which may or may not correspond to an actual intrusion.
4 1. Introduction 1.1 Host-Based Intrusion Detection Computer security has become an area of utmost importance as the number of people who use computers continues to increase. As more and more computer systems and networks are setup, there are inevitably bugs in these systems which attackers attempt to exploit. Intrusion detection systems (IDS) are designed to monitor a computer or a network to detect and prevent against invalid activity, often using distributed data collection in the style of DOORS [1,2,3]. IDS can monitor users [4], applications, networks [5], or combinations of the three, in order to detect well-known and unknown attacks. The two main methodologies to intrusion detection are anomaly detection and misuse detection. Anomaly detection is the methodology by which a model of normal system or user behavior is created, than any behavior deviating from the model is anomalous. The major advantage of this approach is that unseen or new attacks can be identified, because their pattern will be a deviation from the model of expected behavior. Misuse detection on the other hand, attempts to model well-known attacks. Then any behavior that matches the model is recognized as an attack. The major advantage of misuse detection is that well known attacks can easily be identified, so the system can be protected in time. The disadvantage however, is that no new attacks will be identified. The two main approaches to intrusion detection are host-based intrusion detection, and network based intrusion detection. Host-based intrusion detection attempts to detect against attacks on a particular machine. This is typically done through analysis of a computer s log files. Network-based intrusion detection attempts to detect against attacks on a network. This is typically done through analysis of network traffic. 1.2 Methodology The tool we created uses a host-based anomaly detection scheme to identify invalid user behavior. We first generate a signature of normal behavior for each user of a computer system. We make the assumption that each user has a sequence of commands that they frequently type in. They might search for a given directory, open a text editor, check their mail, compile a program, etc. By having a signature of all the frequent (and infrequent) command traces a user types, we can compare future command traces the user types against the signature. Since we are storing the actual command traces, we not only have a representation of the frequent commands the user types, we also have a representation of the orderings between commands. We represent the signature as a probabilistic finite automata (PFA). We use a finite automata because this allows us to represent the signature such a way that each command is a state, and transitions between states depict how one command follows another. Each transition in the automata has a probability corresponding to the probability that the given state will be reached from the previous state. Testing future traces against the PFA is a simple process of stepping through the automata, and returning the multiplied probability, and average probability, of reaching each state along the automata.
5 Anomalous behavior is defined as any behavior that deviates from the model. Thus the anomalies this tool detects may or may not correspond to an actual intrusion. In many instances, the user may simply be trying out a new set of commands, or their behavior is different due to fatigue or stress. In any instance, the tool described will detect this behavior and raise an alarm. 1.3 Previous Work There have been many previous intrusion detection systems that use the anomaly detection scheme. NNID (Neural Network Intrusion Detection) uses neural networks to predict the next command a user will enter based on previous commands [6]. Haystack, a combined anomaly detection/misuse detection IDS models individual users as well as groups of users. It assigns initial profiles to new users, and updates the profiles once a pattern of actual behavior is recognized [7]. GrIDS (Graph-Based Intrusion Detection System), uses a graphical representation to monitor the activity of not just a user, or a system, but an entire network [8]. ImSafe, a tool that has its roots in anomaly detection, monitors the system call traces produced by specific applications and tries to predict the next system call as accurately as possible [9]. First, ImSafe must go through a learning phase to construct a profile of the application to be monitored. Then, that profile is used during the detection process. The approach outlined in this project is similar to that of ImSafe except that user behavior is modeled instead of application behavior. Next, EMERALD expert-bsm, a real-time forward-reasoning expert system, uses a knowledge base to detect multiple forms of system misuse [10]. The forward-reasoning architecture helps expert-bsm detect intrusive behavior across multiple system event orderings while also accounting for specific pre- and post-conditions of those sequences. 2. Creating User Signatures 2.1 Extracting User Commands from Log Files User signatures are created from the log files generated by the Basic Security Module (BSM) of the Solaris operating system [11]. The BSM is a kernel module that logs all events that occur on a given machine. Each of these events is actually a system call, and for each system call a record is generated, consisting of tokens corresponding to the type of event. In order to extract commands a given user typed, first all system calls generated by the user are extracted from the log file. This is done through the use of the Unix utility commands, auditreduce and praudit. The auditreduce command is used for audit management and record selection, while praudit is used to convert binary log files in to ascii format. At the command prompt, this is done as follows: auditreduce -u [username] [log file in binary form] praudit l The auditreduce command takes the log file specified and extracts all system calls generated from the given username. The output of this is piped to the praudit command, which will then write each record (system call) to stdoutput one record per line. To save
6 the output in a file, a script is started and ended before and after the auditreduce command. Below is an example of what one system call returned from praudit looks like: header,86,2,login telnet,,tue 07 Mar :14:08 AM EST, msec, subject,2051,2051,rjm,2051,rjm,2746,2746, ,text,successful login, return, success,0,trailer,88 Once all the system calls are extracted for a given user, the next step is to identify only the system calls that correspond to actual commands the user entered. To do this, a filter is used to identify execve system calls, because each execve system call corresponds to an actual command the user entered at a prompt. The filter also extracts a small set of system calls that are not execve, namely login and chdir. During the process of extracting the user commands, the filter also extracts the timestamp, and writes both the user command and timestamp to another file. This process is repeated for each of the log files we wish to train on. It is essential that the log files we build our signatures on are attack-free, so that each user s signature is valid, thus invalid behavior will never match the signature. Given the listing of user commands and the timestamp of each command we are ready to build our probabilistic finite automata. 2.2 Building Probabilistic Finite Automata from User Commands PFAs are constructed based on a listing of commands with associated timestamps. Since the PFA consists of frequently seen command traces, it is first necessary to filter the listing of commands and timestamps into a series of command traces. The command traces that are generated are completely dependent on the time intervals between successive commands. A small time interval will produce smaller command traces, while a long time interval will produce longer command traces. Below is an example of two sets of command traces derived from the same command listing, based on different time intervals, t. 10:00 10:01 10:02 10:04 10:05 10:06 10:08 10:09 10:10 login cd vi ls pico mv ls mail exit t = 1 [login, cd, vi] [ls, pico, mv] [ls, mail, exit] t = 3 [login, cd, vi, ls, pico, mv, ls, mail, exit]
7 The PFA is represented in a tree structure. Each node in the PFA represents a command, and the transitions between nodes are used to represent how one command follows another. Below is a simple diagram of a finite automata consisting of the command traces from the above example where t = 1. login ls cd pico mail vi mv exit Once we have the finite automata to represent the sequences of commands a given user has entered, the next step is to assign probabilities to the transitions. Each node in the automata has a corresponding probability, which is the number of times the given command has been seen, divided by the total number of commands seen at the same level. From the above example, the probability of reaching the state login would be 1/3, and the probability of reaching the state ls would be 2/3. Once the probability of reaching each state is computed, the average probability at each level in the tree is computed as well as the standard deviation. A second probability is then assigned to each node, which corresponds to the number of standard deviations from the average probability the probability of reaching the given node is. This second probability is computed by first obtaining the difference between the probability of reaching the node, and the average probability. By dividing the absolute value of this difference from the standard deviation, the number of deviations from the average is obtained. The following equations are then used to compute the second probability. If prob of node A is X standard deviations greater than the average probability at the same level, prob(a) = 1 + ( 0.1 * deviations ) If prob of node A is X standard deviations less than the average probability at the same level, prob(a) = 1 - ( 0.2 * deviations ) If prob of node A is X equal to the average probability at the same level, prob(a) = 1.0
8 There are two major reasons why this method was adopted. One reason is that by assigning a probability to a node which is greater than 1, when future command traces reach that given state, the high probability essentially rewards the behavior. Similarly nodes that have a low probability of being reached are assigned a lower probability. The other reason is this methodology works regardless of the time interval used to generate command traces. Since the time interval determines if long traces or short traces are created, this method assigns probabilities to each node in the automata relative to the surrounding nodes, regardless of the overall structure of the automata. If this model were not used, separate thresholds would have to be set up, based on the time interval. It is important to note that each time a command trace is added to the PFA, the probabilities that nodes will be reached, the average probability of all nodes on a given level, the standard deviation and the second assigned probability all have to be recalculated. This ensures that at all times the automata has the most recent signature of a user. There is also one other structure used alongside the PFA when testing future command traces. A hashtable was constructed consisting of all the commands the user has entered, along with the number of times the command was entered. This data structure is important in the testing phase, when it is necessary to distinguish between commands not seen in a particular command trace, versus commands never seen before. 3. Testing User Signatures Once a PFA is created for a specific user, future user activity can be tested against the PFA to determine if the behavior is anomalous or not. Since the PFA is essentially a representation of command traces, the PFA will detect anomalous command traces. There may be multiple command traces in a given session the PFA is tested against, in which case each trace will be tested individually. Note that these command traces will be generated using the same time interval used to generate the command traces that the PFA consists of. During testing, the PFA will return two probabilities for each command trace it tests. The first probability is the multiplicative probability of each node traversed. The second probability is the average probability of the each node traversed. In both cases, keep in mind the probability used is the one based on the standard deviation from the average, not the probability of reaching the node. The process of traversing the PFA for testing is done as follows. We get the first command from the test command trace and then look for the command in the first level of the automata. If there is an associated node, we move to the node, and keep track of the probability just encountered. If there is no node for the command, we first check if the command has ever been seen, by checking the hashtable of all the commands ever seen. If the command is in this table, then it has been seen, just not following the current state. A probability is assigned in this case which corresponds to the number of times the command has been seen in relation to all the commands that have been seen. If the command is not in this table, then the user has never typed this command before. An ultra low probability is assigned in this case, and the command is stored in a vector. Whenever there is no corresponding transition in the automata to take, the PFA remains in the same state, and the next command from the test command trace is evaluated. This process is
9 repeated for all the commands in a given test trace. When all the commands have been evaluated, the multiplied and averaged probabilities are returned. Below are some examples of the results of testing the PFA on frequently seen and infrequently seen command traces. Here is the PFA we are testing in graphical form: vi cat pwd l[ l[ 1.0 from from 1.0 from 1.0 telnet login cd 1.0 tcsh 1.0 quota 1.0 cat 1.0 mail 1.0 ftp head uptime ls date 1.0 cd cd 1.0 sh 1.0 tcsh 1.0 cd 1.0 rm 1.0 cd 1.0 more col 1.0 lynx lynx 1.0 lynx 1.0 q q 1.0 q 1.0 Here are sample outputs when testing the PFA against various command traces: [login, cd, tcsh, quota, cat, mail] prob is avg is [lpr, lpr, lpr, lpr] flag.. lpr never seen before flag.. lpr never seen before flag.. lpr never seen before flag.. lpr never seen before prob is 1.0E-16 avg is 1.0E-4
10 [ls] prob is avg is [login, cd, quota, ls, cat, more] prob is E-6 avg is From the above examples, it is clear that command traces that match the signature will clearly return higher probabilities than the command traces which don t match any pattern. Furthermore, commands traces that do not match a given pattern still return higher probabilities than command traces consisting of commands never seen before. 4. Conclusions The tool outlined in this project is very successful at identifying anomalous user behavior. The strength of the tool is that the signatures it creates stores information about the frequent commands as well as ordering between commands. The signatures created provide extremely accurate models of typical user behavior. Any user behavior that clearly detours from the signature will return low probabilities and raise an alarm. The success of this tool is directly related to the strength of the signatures it creates. One problem that threatens the creation of strong signatures is the lack of sufficient training data to truly develop a strong representation of a users activity. This may somewhat be solved by using clustering methods, which attempt to group together patterns of similar valid behavior to further isolate invalid behavior. Another limitation of this tool is the inability to differentiate attacks from variations in valid user behavior. This tool would produce way too many false alarms if used in isolation to detect attacks. This however, could be overcome if this tool was used in conjunction with other tools that monitor other aspects of a user or system. Finally, a major strength of this tool is the fact that it could easily be reconfigured to monitor different patterns of behavior. The possibilities for this include network behavior or specific application behavior. 5. Implementation The first step in building user signatures is to extract the user commands from the BSM log files. By combining the auditreduce and praudit unix utility commands as discussed earlier we can generate a list of all the system calls from a given user. The next step is to extract the actual user commands from the system calls, as well as the timestamp. This is done through the Java program Filter.java. The arguments of the program are as follows: java Filter <filename of file with system calls> <output filename> This program takes as input a file containing a listing of system calls, and outputs to
11 another file the actual user commands and the timestamps. This output will then be used as input when creating, updating, or testing PFAs. PFAs are implemented through two small Java programs PFANode.java and PFACollection.java. PFANode.java defines the class PFANode, which is the representation of each node in the PFA. Each PFANode has a label corresponding to the command it stores, an associated probability, and a hashtable of children nodes. PFACollection.java defines the class PFACollection, which defines how PFANodes are organized to generate a PFA. PPFACollection is responsible for creating, updating, and testing a PFA. The two major methods of PFACollection are addtrace and testtrace. The method addtrace takes a vector of commands (command trace) and traverses down the PFA, either adding new nodes or updating already existing nodes in the process. The method testtrace similarly traces down the PFA, but instead it calculates the multiplied and average probability of each PFANode it encounters. There are six Java programs that are used to facilitate the processes of creating, updating, testing and printing PFA s. FilterCommandTraces.java defines the class FilterCommandTraces, which is responsible for generating command traces from a list of commands and timestamps. FilterCommandTraces is given the time interval used to separate traces of commands. This class is used when PFAs are created, updated, and tested. In each case, the commands to be added to the PFA, or tested against the PFA, must be filtered into command traces based on the time interval. The program createpfacollection.java serves the purpose of creating a PFACollection object from a listing of user commands and timestamps. The arguments this program takes are as shown: java createpfacollection l <file which contains listing of filtered files> <interval> java createpfacollection f <filtered file> <interval> The first command line argument it takes specifies whether the second command line argument is a file containing a list of commands, or a file containing a list of files, where each file in the list contains a list of commands. Above the term filtered file refers to a file containing a list of timestamps and commands, one per line. The third command line argument is the time interval that is given to FilterCommandTraces to generate the sequence of command traces. This program will create a PFACollection object, from the sequences of command traces, and write out a serialized object. The serialized object will be written to the name derived by appending the time interval and _pfa to whatever filename was specified as the second command line argument. The program updatepfacollection serves the purpose of updating an already existing PFACollection object with further listing(s) of commands and timestamps. The arguments are below: java updatepfacollection l <serialized PFACollection> <file which contains listing of filtered files> java updatepfacollection f <serialized PFACollection> <filtered file> The first command line argument is the same as described above. However it corresponds to the third command line argument, which can contain a listing of commands, or a
12 listing of files. The program firsts converts the serialized PFACollection object specified in the second command line argument back to a PFACollection object. It then goes through the same steps as createpfacollection to generate command traces and add them to the PFA. It will write out a new serialized PFACollection object with the name of the old PFACollection appended by a +. Note that the time interval passed to FilterCommandTraces is the same interval that was used to create the original PFACollection. This data is stored along with each PFACollection, and is written out with the rest of the PFACollection when serializing the object. The program testpfacollection.java tests a listing of commands against the PFACollection. The arguments are as follows: java testpfacollection l <serialized PFACollection> <file which contains listing of filtered files> java testpfacollection f <serialized PFACollection> <filtered file> The parameters are exactly the same as in updatepfacollection, and again command traces will need to be generated based on the time interval saved in the serialized PFACollection object. However, once we have the command traces from the file(s), they will not be added to the PFACollection, but instead tested against the PFACollection. There are two other programs SerializePFA.java and printpfacollection.java. SerializePFA.java contains the class SerializePFA, which is used to read and write PFACollection objects. This class is used by all the programs which must perform operations on a PFACollection. The program printpfacollection takes as an argument the serialized PFACollection object, and prints out a graphical representation of the PFA, with each command, and the associated probability to the terminal. All of the files described above are located in the intrusion detection project workspace in the subfolder /seth_work/pfa/. 6. Contributions I would like to acknowledge the following people for the contributions they made to this project. Alan Bivens wrote the filtering program that extracts user commands and timestamps from the BSM log files. Joel Branch contributed to the previous work section of this paper through his research on previous anomaly detection tools. BIBLIOGRAPHY [1] A. Bivens, L. Gao, M. F. Hulber and B.K. Szymanski, ``Agent-Based Network Monitoring,'' Proc. Autonomous Agents99Conference, Seattle, WA, May 1999, pp [2] A. Bivens, P. Fry, L. Gao, M.F. Hulber, Q. Zhang and B.K. Szymanski, ``Distributed Object-Oriented Repositories for Network Management,'' Proc. 13th Int. Conference
13 on System Engineering, pp. CS , Las Vegas, NV, August, [3] A. Bivens, R. Gupta, I. McLead, B. Szymanski and J. White, ``Scalability and Performance of an Agent-based Network Management Middleware,'' International Journal of Network Management, submitted, [4] J. Branch, A. Bivens, C-Y. Chan, T-K. Lee and B.K. Szymanski, 2002, ``Denial of Service Intrusion Detection Using Time Dependent Deterministic Finite Automata,'' Proc. Graduate Research Conference, Troy, NY, pp [5] A. Bivens, M. Embrechts, C. Palagiri, R. Smith, and B.K. Szymanski, ``Networkbased Intrusion Detection using Neural Networks,'' Intelligent Engineering Systems through Artificial Neural Networks, Vol. 12, Proc. ANNIE 2002 Conference, November 10-13, 2002, St. Louis, MI, ASME Press, New York, NY, 2002, pp [6] Jake Ryan, Lin Meng-Jane, and Risto Miikkulainen. Intrusion detection with neural networks. In Advances in Neural Information Processing Systems 10, May 1998 [7] Stephen E. Smaha. Haystack: An intrusion detection system. In Fourth AeroSpace Computer Security Applications Conference, pages 37-44, Orlando, FL, December 1988, IEEE. [8] S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, K. Levitt, C. Wee, R. Yip, D. Zerkle, and J. Hoagland. GrIDS-a graph based intrusion detection system for large networks [9] IMSafe. [10] P.A. Porras and P.G. Neumann. Emerald:Event monitoring enabling responses to anomalous live disturbances. In Proceedings of the 20 th National Information Systems Security Conference, pages , October [11] William Osser. Auditing in the Solaris 8 Operating Environment. February [12] Seth E. Webster. The Development and Analysis of Intrusion Detection Algorithms. M.S. Thesis, MIT. May 1998.
NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS
1 NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS ALAN BIVENS [email protected] RASHEDA SMITH [email protected] CHANDRIKA PALAGIRI [email protected] BOLESLAW SZYMANSKI [email protected] MARK
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security
Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques
www.ijcsi.org 387 Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques Utkarsh Dixit 1, Shivali Gupta 2 and Om Pal 3 1 School of Computer Science, Centre
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
Distributed Intrusion Detection System Using Mobile Agent Technology
Distributed Intrusion Detection System Using Mobile Agent Technology Kajal K. Nandeshwar, Komal B. Bijwe Department of Computer Science and Engineering, P. R. Pote (Patil) College of Engineering, Amravati,
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf, K. R. Kendall,
Intrusion Detection with Neural Networks
Intrusion Detection with Neural Networks Jake Ryan Department of Computer Sciences The University of Texas at Austin Austin, TX 78712 [email protected] Meng-Jang Lin Department of Electrical and Computer
Network Security Using Job Oriented Architecture (SUJOA)
www.ijcsi.org 222 Network Security Using Job Oriented Architecture (SUJOA) Tariq Ahamad 1, Abdullah Aljumah 2 College Of Computer Engineering & Sciences Salman Bin Abdulaziz University, KSA ABSTRACT In
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Improving Intrusion Detection Performance Using Keyword Selection and Neural Networks. Abstract
Improving Intrusion Detection Performance Using Keyword Selection and Neural Networks Richard P. Lippmann MIT Lincoln Laboratory, Rm S4-121 244 Wood Street Lexington, MA 02173-0073 [email protected] phone:
An Artificial Immune Model for Network Intrusion Detection
An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
Network & Agent Based Intrusion Detection Systems
Network & Agent Based Intrusion Detection Systems Hakan Albag TU Munich, Dep. of Computer Science Exchange Student Istanbul Tech. Uni., Dep. Of Comp. Engineering Abstract. The following document is focused
USING GENETIC ALGORITHM IN NETWORK SECURITY
USING GENETIC ALGORITHM IN NETWORK SECURITY Ehab Talal Abdel-Ra'of Bader 1 & Hebah H. O. Nasereddin 2 1 Amman Arab University. 2 Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan Email:
Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs
Intrusion Detection Systems Oussama El-Rawas History and Concepts of IDSs Overview A brief description about the history of Intrusion Detection Systems An introduction to Intrusion Detection Systems including:
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
Web Application Security
Web Application Security Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http://www.cs.ucsb.edu/~rsg www.cs.ucsb.edu/~rsg/
A mobile approach for the intrusion detection
!" # $% & ')(+*-,/.0*1324*-5687:9?,?5@1AB4 CD EF
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
Modeling System Calls for Intrusion Detection with Dynamic Window Sizes
Modeling System Calls for Intrusion Detection with Dynamic Window Sizes Eleazar Eskin Computer Science Department Columbia University 5 West 2th Street, New York, NY 27 [email protected] Salvatore
Preprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
Intrusion Detection for Grid and Cloud Computing
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal University of Santa Catarina, Brazil Content Type
Host-based Bottleneck Verification Efficiently Detects Novel Computer Attacks 1
Host-based Bottleneck Verification Efficiently Detects Novel Computer Attacks 1 Robert K. Cunningham, Richard P. Lippmann, David Kassay, Seth E. Webster, Marc A. Zissman MIT Lincoln Laboratory 244 Wood
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
A Network Packet Analyzer with Database Support
Computer Science Master s Project A Network Packet Analyzer with Database Support BY Chi Yu Chan [email protected] DEPARTMENT OF COMPUTER SCIENCE RENSSELAER POLYTECHNIC INSTITUTE TROY, NEW YORK 12180 August,
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
How To Protect A Network From Attack From A Hacker (Hbss)
Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment
INTRUSION DETECTION SYSTEM USING SELF ORGANIZING MAP
Acta Electrotechnica et Informatica No. 1, Vol. 6, 2006 1 INTRUSION DETECTION SYSTEM USING SELF ORGANIZING MAP Liberios VOKOROKOS, Anton BALÁŽ, Martin CHOVANEC Technical University of Košice, Faculty of
A Neural Network Based System for Intrusion Detection and Classification of Attacks
A Neural Network Based System for Intrusion Detection and Classification of Attacks Mehdi MORADI and Mohammad ZULKERNINE Abstract-- With the rapid expansion of computer networks during the past decade,
Using Program Behavior Proæles for Intrusion Detection æ Anup K. Ghosh, Aaron Schwartzbard, & Michael Schatz Reliable Software Technologies Corporation 21515 Ridgetop Circle, è250, Sterling, VA 20166 phone:
RARP ARP. Keywords Data, Network, packets analyzer tools, sniffer
Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Use of Wireless
Access Control and Audit Trail Software
Varian, Inc. 2700 Mitchell Drive Walnut Creek, CA 94598-1675/USA Access Control and Audit Trail Software Operation Manual Varian, Inc. 2002 03-914941-00:3 Table of Contents Introduction... 1 Access Control
CS 392/CS 681 - Computer Security. Module 17 Auditing
CS 392/CS 681 - Computer Security Module 17 Auditing Auditing Audit Independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established
CS 2112 Lab: Version Control
29 September 1 October, 2014 Version Control What is Version Control? You re emailing your project back and forth with your partner. An hour before the deadline, you and your partner both find different
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
Adaptive Anomaly Detection for Network Security
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 5, Number 1 (2013), pp. 1-9 International Research Publication House http://www.irphouse.com Adaptive Anomaly Detection for
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering
Intrusion Detection Systems
Intrusion Detection Systems Sokratis K. Katsikas Dept. of Digital Systems University of Piraeus [email protected] Agenda Overview of IDS Intrusion prevention using game theory Reducing false positives Clustering
USER GUIDE. Snow Inventory Client for Unix Version 1.1.03 Release date 2015-04-29 Document date 2015-05-20
USER GUIDE Product Snow Inventory Client for Unix Version 1.1.03 Release date 2015-04-29 Document date 2015-05-20 CONTENT ABOUT THIS DOCUMENT... 3 OVERVIEW... 3 OPERATING SYSTEMS SUPPORTED... 3 PREREQUISITES...
Credit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No., February 8 7 Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms Y.Dhanalakshmi and Dr.I. Ramesh
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj
How to Detect and Prevent Cyber Attacks
Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security Stephen G. Batsell 1, Nageswara S. Rao 2, Mallikarjun Shankar 1 1 Computational Sciences and Engineering Division
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer
Fred Hantelmann LINUX Start-up Guide A self-contained introduction With 57 Figures Springer Contents Contents Introduction 1 1.1 Linux Versus Unix 2 1.2 Kernel Architecture 3 1.3 Guide 5 1.4 Typographical
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)
Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
Unix Sampler. PEOPLE whoami id who
Unix Sampler PEOPLE whoami id who finger username hostname grep pattern /etc/passwd Learn about yourself. See who is logged on Find out about the person who has an account called username on this host
Scheduling in SAS 9.3
Scheduling in SAS 9.3 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. Scheduling in SAS 9.3. Cary, NC: SAS Institute Inc. Scheduling in SAS 9.3
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
Scheduling in SAS 9.4 Second Edition
Scheduling in SAS 9.4 Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. Scheduling in SAS 9.4, Second Edition. Cary, NC: SAS Institute
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of
An Object Oriented Database for Network Management Data
Master Project Report An Object Oriented Database for Network Management Data by Qifeng Zhang Department of Computer Science Rennselaer Polytechnic Institute May 25, 1999 1. INTRODUCTION The goal of this
Neural Networks for Intrusion Detection and Its Applications
, July 3-5, 2013, London, U.K. Neural Networks for Intrusion Detection and Its Applications E.Kesavulu Reddy, Member IAENG Abstract: With rapid expansion of computer networks during the past decade, security
System Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
A Prevention & Notification System By Using Firewall. Log Data. Pilan Lin
A Prevention & Notification System By Using Firewall Log Data By Pilan Lin 1 Table Of Content ABSTRACT... 3 1 INTRODUCTION... 4 2. Firewall Log data... 6 2.1 How to collect log data... 6 3. Prevention
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.
Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Log Management and Intrusion Detection
Log Management and Intrusion Detection Dr. Guillermo Francia,, III Jacksonville State University Prerequisites Understand Event Logs Understand Signs of Intrusion Know the Tools Log Parser (Microsoft)
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Multi-threaded FTP Client
Multi-threaded FTP Client Jeffrey Sharkey University of Minnesota Duluth Department of Computer Science 320 Heller Hall 1114 Kirby Drive Duluth, Minnesota 55812-2496 Website: http://www.d.umn.edu/~shar0213/
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
The Real Challenges of Configuration Management
The Real Challenges of Configuration Management McCabe & Associates Table of Contents The Real Challenges of CM 3 Introduction 3 Parallel Development 3 Maintaining Multiple Releases 3 Rapid Development
A Frequency-Based Approach to Intrusion Detection
A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,
An Analysis of Wireless Network ARP Spoofing
An Analysis of Wireless Network ARP Spoofing Shailendra Nigam Computer Science & Engineering Department DIET, Kharar Mohali (Punjab) India. Sandeep Kaur Computer Science & Engineering Department BBSBEC,
Thirty Useful Unix Commands
Leaflet U5 Thirty Useful Unix Commands Last revised April 1997 This leaflet contains basic information on thirty of the most frequently used Unix Commands. It is intended for Unix beginners who need a
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
