Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.



Similar documents
A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection

Taxonomy of Intrusion Detection System

Intrusion Detection Systems

SURVEY OF INTRUSION DETECTION SYSTEM

Fuzzy Network Profiling for Intrusion Detection

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

A Survey on Intrusion Detection System with Data Mining Techniques

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

Network Based Intrusion Detection Using Honey pot Deception

Network- vs. Host-based Intrusion Detection

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

Application of Data Mining Techniques in Intrusion Detection

Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms

Network Intrusion Detection Systems

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Conclusions and Future Directions

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION

Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila

Intrusion Detection for Mobile Ad Hoc Networks

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

Fuzzy Network Profiling for Intrusion Detection

System Specification. Author: CMU Team

A Review on Network Intrusion Detection System Using Open Source Snort

Role of Anomaly IDS in Network

Science Park Research Journal

Intrusion Detection via Machine Learning for SCADA System Protection

HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK

Network Intrusion Simulation Using OPNET

Intrusion Detection System using Log Files and Reinforcement Learning

NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL

A survey on Data Mining based Intrusion Detection Systems

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS

Radware s Behavioral Server Cracking Protection

CHAPTER 1 INTRODUCTION

Performance Evaluation of Intrusion Detection Systems

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Intrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA

Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Comparison of Firewall and Intrusion Detection System

FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION. Abstract

The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack

Name. Description. Rationale

Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks

Two State Intrusion Detection System Against DDos Attack in Wireless Network

INTRUSION DETECTION SYSTEMS and Network Security

Intruders and viruses. 8: Network Security 8-1

How To Protect A Network From Attack From A Hacker (Hbss)

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Chapter 9 Firewalls and Intrusion Prevention Systems

An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications

Data Mining for Network Intrusion Detection

An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation

Performance Evaluation of Intrusion Detection Systems using ANN

IDS / IPS. James E. Thiel S.W.A.T.

Data Mining for Digital Forensics

USING GENETIC ALGORITHM IN NETWORK SECURITY

RAVEN, Network Security and Health for the Enterprise

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

How To Prevent Network Attacks

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Neural Networks for Intrusion Detection and Its Applications

Efficient Security Alert Management System

DISCLOSING MALICIOUS TRAFFIC FOR NETWORK SECURITY

Observation and Findings

A Neural Network Based System for Intrusion Detection and Classification of Attacks

Introduction of Intrusion Detection Systems

STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS

Development of a Network Intrusion Detection System

KEITH LEHNERT AND ERIC FRIEDRICH

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?

Index Terms Domain name, Firewall, Packet, Phishing, URL.

How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme

Intrusion Detection System for Cloud Network Using FC-ANN Algorithm

Detecting Anomaly IDS in Network using Bayesian Network

Distributed Intrusion Detection System Using Mobile Agent Technology

Transcription:

www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B. M.E. Final year CSE H.V.P.M s, C.O.E.T, Amravati prajkta.chapke@rediffmail.com H.V.P.M s,c.o.e.t,amravati anjali_dahake@rediffmail.com Abstract The rapid growth of the computers that are interconnected, the crime rate has also increased and the ways to mitigate those crimes has become the important problem now. In the entire globe, organizations, higher learning institutions and governments are completely dependent on the computer networks which play a major role in their daily operations. Hence the necessity for protecting those networked systems has also increased. In the proposed system, we have designed fuzzy logic-based system for effectively identifying the intrusion activities within a network. Currently available intrusion detection systems focus mainly on determining uncharacteristic system events in distributed networks using signature based approach. Due to its limitation of finding novel attacks, we propose a hybrid model based on improved fuzzy and data mining techniques, which can detect both misuse and anomaly attacks. Our aim is to reduce the amount of data retained for processing i.e., attribute selection process and also to improve the detection rate of the existing IDS using data mining technique. We then use improved Kuok fuzzy data mining algorithm, which in turn a modified version of APRIORI algorithm, for implementing fuzzy rules, which allows us to construct if-then rules that reflect common ways of describing security attacks. We applied fuzzy inference engine using mamdani inference mechanism with three variable inputs for faster decision making. Keywords:- Fuzzy logic, apriori, intrusion detection, hybrid system. Introduction In the current scenario, business does not have boundaries to carry out the task, as it is highly distributed across the globe. Securing these widely distributed data has become a hill-climbing task, as there are new types of threats arising from the people, especially in the current economic turmoil, who used to penetrate into the organization network, either for fun or for gaining some vital information which can fetch them monetary benefits. Network based defense systems normally combine network based IDS and packet filtering firewalls. The main drawbacks of these systems are its inability to identify and characterize new attacks and to respond them intelligently. A significant challenge in providing an effective and efficient protective mechanism to a network is the ability to detect novel attacks or any intrusion work at the initial phase and implement proper countermeasures. Information security process includes the risk assessment, which identifies the potential risk to the organizations networks, risk mitigation that suggests the methods to reduce the risks, and countermeasures. Intrusion Detection has become an integral part of the information security process. But, it is not technically feasible to build a system with no vulnerabilities; as such intrusion detection continues to be an important area of research. Need For Hybrid Ids Systems The classification (Debar et al., 1999) of intrusion detection systems that highlights the current research status is as shown in Figure 1. This classification defines families of intrusion detection systems according to their properties. There are four different types of intrusion detection available based on the past and current researches. Principally, an IDS is concerned with the detection of hostile actions. The intrusion detection approaches can be classified into anomaly based and signature based which any network security tools are mostly using (Ozgur et al.,

Page152 2005). One more classification can be made by considering the source of data used for intrusion detection. The taxonomy can be given based on the information derived from a single host (named as Host based IDS (HIDS)) and the information derived from complete segment of the network that is being monitored (named as Network based IDS). Any IDS can be categorized upon its operation as standalone or centralized applications that create a distributed system. Standalone systems will be working individually without any agents but centralized applications work with autonomous agents that are capable of taking preemptive and reactive measures. An IDS is categorized as behavior-based system, when it uses information about the normal behavior of the system it monitors. Behavior on detection describes the response of the IDS after the detection of attacks. It can be divided into active or passive based on the attack response. These two types of intrusion detection systems differ significantly from each other, but complement one another well. The architecture of host-based is completely dependent on agent-based, which means that a software agent resides on each of the hosts, and will be governed by the main system. In addition, more efficient host-based intrusion detection systems are capable of monitoring and collecting system audit trails in real time as well as on a scheduled basis, thus distributing both CPU utilization and network overhead and providing for a flexible means of security administration. It would be advantageous in IDS implementation to completely integrate the NIDS, su ch that it would filter alerts in a identical manner to HIDS and can be controlled from the same centralized location. In conclusion, highly secure environment should require both NIDS and HIDS to be implemented for not only providing a complete defense against dynamic attacks but also to effectively and efficiently monitor, respond and detected the computer/network misuse against threats and malicious activities. Figure 1. Classification of intrusion detection systems Intrusion Detection Systems Using Ai Techniques Intrusion Detection Systems (IDS) is a powerful technology helping in protecting the precious data and networks from malicious and unauthorized access. An intruder is a hacker attempting to break into or misuse the resources of a computer system. Intruders come from outside an organizations network and may attempt to go around firewalls to attack machines on the internal network. Research and development of intrusion detection has been under way for nearly 27 years. The work that is most often cited is the technical report by James P.Anderson [1]. AI techniques like Fuzzy logic, Neural Networks, and recent development of Artificial Immune Systems (AIS) has played an important role in most misuse and anomaly detection. Few researchers [2] have applied the above mentioned techniques for the detection of malicious activities. Another direction of interest could be using ensemble approach [3], where by combining few approaches for detection individual classes. Intrusion detection using fuzzy logic and datamining The method proposed by [4] extracts fuzzy classification rules from numerical data, applying a heuristic learning procedure. The learning procedure initially classifies the input space into nonoverlapping activation rectangles corresponding to different output intervals. In this sense, our work is similar to that of [4,5].There is no overlapping and inhibition areas. However, the disadvantage listed is, the high false positive rates which is the primary

Page153 scaling of all the IDS. Researcher [6] describes the approaches to address three types of issues: accuracy, efficiency, and usability. This works is an enhanced version of the work by Lee [4]. First issues of improving accuracy is achieved by using data mining programs to analyze audit data and extract features that can distinguish normal activities from intrusions. Second issue, efficiency is improved by analyzing the computational costs of features and a multiple-model cost-based approach is used to produce detection models with low cost and high accuracy. Third issue, improved usability, is solved by using adaptive learning algorithmms to facilitate model construction and incremental updates; unsupervised anomaly detection algorithms are used to reduce the reliance on labelled data. Researchers [7] developed the Fuzzy Intrusion Recognition Engine (FIRE) using fuzzy sets and fuzzy rules. FIRE uses simple data mining techniques to process the network input data and generate fuzzy sets for every observed feature. The fuzzy sets are then used to define fuzzy rules to detect individual attacks. FIRE does not establish any sort of model representing the current state of the system, but instead relies on attack specific rules for detection. Instead, FIRE creates and applies fuzzy logic rules to the audit data to classify it as normal or anomalous. Dickerson et al. found that the approach is particularly effective against port scans and probes. The primary disadvantage to this approach is the labour intensive rule generation process. Our research work can be considered as an extension of the above work by automating the rule generation process. Figure 2. The designed Fuzzy system The model proposed [8] combines neural networks and fuzzy logic. This system works by mapping a template graph and user action graph to determine patterns of misuse. The output of this mapping process will be used by the central strategic engine to determine whether an intrusion has taken place or not. The major drawback is that new type attacks rules need to be given by the external security officer i.e. it does not automate rule generation process and more number of components prevents it from working fast. Tombini used an approach wherein the anomaly detection technique is used to produce a list of suspicious items. The classifier module which uses a signature detection technique then classified the suspicious items into false alarms, attacks, and unknown attacks. This approach works on the premise that the anomaly detection component would have a high detection rate, since missed intrusions cannot be detected by the follow-up signature detection component. In addition, it also assumed that the signature detection component will be able to identify false alarms. While the hybrid system can still miss certain types of attacks, its reduced false alarm rate increases the likelihood of examining most of the alerts. Zhang and Zulkernine employed the method random forests algorithm in the signature detection module to detect known intrusions. Thereafter, the outlier detection provided by the random forests algorithm is utilized to detect unknown intrusions. Approaches that use signature detection and anomaly detection in parallel have also been proposed. In such systems, two sets of reports of possible intrusive activity are produced and a correlation component analyzes both sets to detect intrusions. Researchers use association based classification methods to classify normal and abnormal attacks based on the compatibility threshold. Integrating fuzzy logic with datamining Data mining techniques have been commonly used to extract patterns from sets of data. Although association rules can be mined from audit data for anomaly detection, the mined rules are at the data level. Many quantitative features are involved in intrusion detection. As per previous researches (Lunt et al., 1992; Varun et al., 2009) IDES classifies the statistical measures into four types: ordinal measures, categorical measures, binary categorical measures and linear categorical measures. Both ordinal measures and linear categorical measures are quantitative. SRIs EMERALD (Lunt et al., 1989) also divides the network traffic statistical measures into four classes: categorical measures, continuous measures, intensity measures and event distribution measures. Example for continuous measures is the connection duration and intensity measure is the number of packets during a unit of time. The fuzzy sets provide a smooth transition between member and non-member of a set; therefore, there are fewer boundary elements being excluded. An alternative solution using fuzzy sets, introduced by Kuok (Kuok et al., 2001) to categorize quantitative variables, offered smooth transitions from one fuzzy set to another. Classification has been repeatedly applied to

Page154 the problem of intrusion detection either to classify events into separate attack categories or to characterize normal use of a network service. In our research work, the greatest need was to reduce the amount of data needed for processing and the false alarm rate. We are primarily seeking to improve the performance of an existing system rather than trying to replace current intrusion detection methods with a data mining approach. While current signature-based intrusion detection methods have limitations as stated in the previous section, they do still provide important services and this required us to determine how data mining could be used in a complementary way to existing measures and improves it. PROPOSED IIDS FRAMEWORK The proposed IIDS framework (Figure 2) has several components, and the following sections describe briefly about each. Figure 3. IIDS framework. Attributes Prior to any data analysis, attributes representing relevant features of the input data (packets) must be established. The amount of data being sniffed from the network will be heavy. If only vital attributes are chosen then the overhead of fuzzy inference engine will be reduced to the maximum extend. There were 42 variables from DARPA training data. The set of attributes provided to the Data Analyzer is a subset of all possible attributes pertaining to the information contained in packets headers, packet payloads, as well as aggregate information such as statistics in the number and type of packets or established TCP connections. Attributes are represented by names that will be used as linguistic variables by the Data Miner and the Fuzzy Inference Engine. We use traditional attribute selection algorithm that utilizes information gain for selection each attributes based on the information gain obtained for that 2193 particular class of variables available. Data Analyzer Once attributes of relevance have been defined and the data source identified, Data Analyzer is employed to compute configuration parameters that regulate the operation of IDS. This module analyzes packets and computes aggregate information by grouping packets. Packets can be placed in fixed size groups (s group) or in groups of packets captured in a fixed amount of time (t group). Each s group contains the same number of packets covering a variable time range and each t group contains a variable number of packets captured over a fixed period of time. Data Miner A variation of Kuok s algorithm is used to implement the Data Miner, which allows for efficient, single pass, record processing by partitioning data into hierarchical files. From the data sample the algorithm read the records and creates a file for each term of attribute. The algorithm carries over the same process for all the record in the data file. Once the entire data set is processed, the support value for every itemset is calculated. The algorithm extracts all large itemsets, and constructs rules from those large itemsets. The rules with confidence value greater than or equal to minconfidence moved to the rulebase. Inference Engine An inference determines which rules are relevant to the given data. Our prototype utilizes FuzzyJess to check the rules. The engine uses three inputs as explained in the figure. We have configured the inference engine to use Mamdani inference mechanism. The shooting strength concludes whether the modeled behavior satisfies the fact. If the shooting strength is somewhere near to zero indicates a possibility of attack. F. Data set used for testing the prototype We used 1999 DARPA [17] data which is an extension of 1998 data set available. The latest dataset was added with few more attacks that reflect more real-time data. A quick glance at the 1999 DARPA dataset shows it contains 3 weeks of training data and two weeks of testing data. First and third week data do not contain any attack and this was used as training data for anomaly intrusion detection. Second week contains all types of attacks so this was used for creating attack profiles. We used two weeks

Page155 of test data for our testing. The record files were broken down into smaller files as there were few limitations like processing power of the hardware and the size of the main memory. Conclusions And Future Work A few contributions have been made by this research namely; improved apriori algorithm for faster rule generation and reduced querying frequency, reduced features for faster detection of attacks and reduced false positives. Even though the system was tested, our next goal is to turn this system into a light weight system, by overcoming the existing limitations like bottle neck in packet processing, searching for known rules and very high false positive rates and improve the performance by means of faster detection and alert correlation and acceptable rate of false positives. As a token of appreciation to open-source community, our plan is to make this system an open source project once the system is complete and ready by all means to take the high level of real world challenge. References [1] Anderson, P. Computer security threat monitoring and surveillance. Fort Washington.1980. [2] Peyman Kabiri and Ali A. Ghorbani. Research on Intrusion Detection and Response: A Survey. International Journal of Network Security, Vol.1, No.2, PP.84 102, Sep. 2005 [3] Anazida Zainal, Mohd Aizaini Maarof and Siti Mariyam Shamsuddin Ensemble Classifiers for Network Intrusion Detection System, Journal of Information Assurance and Security 4 (2009) 217-225 [4] Lee, W. A Data Mining framework for construction features and models for intrusion detection systems, Columbia University.2001. [5] Manganaris, S.. "A data mining analysis of RTID alarms." Computer Networks2000. 34(4): 571-577. [6] Stolfo, S. J,. "Data mining-based intrusion detectors: an overview of the columbia IDS project." ACM SIGMOD2001. 30(4): 5-14. [7] Dickerson, J. E. and J. A. Dickerson Fuzzy Network Profiling for Intrusion Detection. 19th International Conference of the North American Fuzzy Information Processing Society,2000,301-306. [8] Botha, M., Solms VR, Perry K, Loubser E, The utilization of Artificial Intelligence in a Hybrid Intrusion Detection System. Annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology,2002, 149-155.