Intrusion Detection: Game Theory, Stochastic Processes and Data Mining



Similar documents
CSCE 465 Computer & Network Security

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Intrusion Detection for Mobile Ad Hoc Networks

NETWORK SECURITY (W/LAB) Course Syllabus

Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Network Security A Decision and Game-Theoretic Approach

Marlicia J. Pollard East Carolina University ICTN 4040 SECTION 602 Mrs. Boahn Dr. Lunsford

U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview

SURVEY OF INTRUSION DETECTION SYSTEM

Salvatore J. Stolfo 606 CEPSR

Firewalls Overview and Best Practices. White Paper

IDS / IPS. James E. Thiel S.W.A.T.

Protecting Mobile Devices From TCP Flooding Attacks

Firewalls and IDS. Sumitha Bhandarkar James Esslinger

A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Intrusion Detection for SCADA Systems

Taxonomy of Intrusion Detection System

Security Toolsets for ISP Defense

CHAPTER 1 INTRODUCTION

Massive Cloud Auditing using Data Mining on Hadoop

How To Prevent Network Attacks

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath)

On-Premises DDoS Mitigation for the Enterprise

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

Datascape for Cyber-Security NSA Cyber Defence Exercise Worked Example

Role of Anomaly IDS in Network

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

idata Improving Defences Against Targeted Attack

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2014/2015 NETWORK SECURITY MODULE NO: CPU6004

Chapter 1. Introduction

Intrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA

A Quantitative Approach to Security Monitor Deployment

NERC CIP Version 5 and the PI System

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

ICAB5238B Build a highly secure firewall

Introduction to Cyber Security / Information Security

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Network Security. Outlines: Introduction to Network Security Dfii Defining Security Zones DMZ. July Network Security 08

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

A Review on Network Intrusion Detection System Using Open Source Snort

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

74% 96 Action Items. Compliance

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Cyber Security of the Power Grid

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

SCADA Security Measures

The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack


Network Intrusion Analysis (Hands-on)

Online Network Traffic Security Inspection Using MMT Tool

SourceFireNext-Generation IPS

Network Security Forensics

Information Security Attack Tree Modeling for Enhancing Student Learning

ATTPS Publication: Trustworthy ICT Taxonomy

SCADA SYSTEMS AND SECURITY WHITEPAPER

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Application of Data Mining Techniques in Intrusion Detection

Traffic Analyzer Based on Data Flow Patterns

NETWORK SECURITY. Scott Hand. Melanie Rich-Wittrig. Enrique Jimenez

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

MS Information Security (MSIS)

Conclusions and Future Directions

Chapter 20 Firewalls. Cryptography and Network Security Chapter 22. What is a Firewall? Introduction 4/19/2010

Network Security Administrator

Missing the Obvious: Network Security Monitoring for ICS

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

Cyber Watch. Written by Peter Buxbaum

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS

Security Advisory. Some IPS systems can be easily fingerprinted using simple techniques.

Fuzzy Network Profiling for Intrusion Detection

Traffic Monitoring : Experience

Security Issues in SCADA Networks

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

IDS : Intrusion Detection System the Survey of Information Security

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Software Defined Networking A quantum leap for Devops?

Current and Future Research into Network Security Prof. Madjid Merabti

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)


About the Authors Preface Acknowledgements List of Acronyms

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques

Transcription:

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1

Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic Profiling (Anomaly Detection) Rule Based (Anomaly Detection & Expert Systems) SNORT and BRO Game Theory Stochastic Processes Data Mining 2

Introduction Defence We have discussed the role of firewalls and cryptography (in the form of VPN s) employed as cybersecurity defence tools at the perimeter of systems that we seek to defend Detection We have also discussed the role and nature of intrusion detection schemes employed as cybersecurity tools for the detection of penetrations into systems that we seek to protect 3

Introduction Detection In particular we have considered A taxonomy of attackers Audit Records Stochastic Profiling (Anomaly Detection) Rule Based (Anomaly Detection & Expert Systems) Examples include and are by no means limited to: SNORT BRO» https://www.snort.org/» http://en.wikipedia.org/wiki/snort_(software)» https://www.bro.org/ Gauges and Metrics 4

Introduction Papers We have during the last three weeks been reading a selection of recent intrusion detection papers We consider three areas from the perspectives of: Game Theory Game theoretic models for detecting network intrusions Stochastic Processes First order versus higher order stochastic models for computer intrusion detection Data Mining Network intrusion detection using data mining and network behaviour analysis 5

Introduction Areas considered for each model: 1. Understand the Problem 2. What are the Assumptions 3. What is the Model 4. What is the Solution 5. Is the solution fit for purpose 6

Introduction Game Theory Game theory has been successfully applied to many areas: economics, political science, control, computer science, quantum information, is seen as appropriate mathematical framework for the Analysis Modeling Decision and control of information security and intrusion detection For intrusion detection we model attackers and intrusions detection systems as players in a non cooperative game 7

Game Theory Model The Problem Intrusion detection systems are required as a second line of defense, in order to detect intrusion and generate an appropriate response Detection is typically carried out by monitoring and analyzing network traffic data for unusual activity Approach 1: Analyze all of the data Costly in terms of time, energy and resources (memory, CPU) Approach 2: Analyze a portion of the traffic (sampling) Less costly, but can miss potential intrusions due to sampling methodology, smart intruders, cooperative intruders building intrusion via multiple independent fragments 8

Game Theory Model The Problem Problem: To find a strategy that enhances the probability of detecting intruders whilst using a sampling approach 9

Game Theory Model Assumptions For intrusion detection we can model attackers and intrusions detection systems as players in a non cooperative game 10

Game Theory Model Model 1 Smart intruder Ability to divide an intrusion into different fragments to attack a particular node to select the routing paths used to inject fragments in attempt to decrease the chance of being detected IDS objective to sample according to sampling budget to collect at least m out of n fragments, where n denotes the total number of fragments, m the min # fragments for successful detection 11

Game Theory Model Model 2 Group of cooperative intruders Ability to send series of fragments from different sources using different routes IDS objective to divide the sampling budget over the intruders to sample for each one according to the new budget to collect and analyze all fragments (required in order to detect an intrusion) 12

Game Theory Model 1. The intention of the game theoretic model is to guide the IDS toward an optimal sampling strategy in order to detect malicious packets 2. The strategy of the attacker is to evaluate the probability of choosing each path upon which to send its malicious packet 3. The optimal strategy for the IDS is therefore to assign sampling rates to each link, maximizing the probability of detection without exceeding the total sampling budget We consider Model 1 13

Game Theory Model 1 Setting up the Problem Network Model and Assumptions Introducing the Games Game objectives and Constraints Strategies for the Two Players Game Formulation Single Intruder with Multiple Packets Solution Evaluation Numerical Simulations 14

Stochastic Processes For this approach we have discussed profile based anomaly detection methods rule based anomaly detection methods Discuss each of these approaches under the following headings: What is the Problem? What are the Assumptions? What are the Models? What are the Solutions? Are the solutions fit for purpose? 15

Data Mining, NBA and IDS Data Mining Techniques Feature Selection Data Analysis Classification Analysis Clustering Analysis Association and Correlation Analysis Stream Data Analysis Distributed Data Mining Visualisation and Querying Tools Network Behaviour Analysis 16

Summary Introduction Firewalls Intrusion Detection Schemes Models SNORT and BRO Stochastic Profiling (Anomaly Detection) Rule Based (Anomaly Detection & Expert Systems) Game Theory Stochastic Processes Data Mining 17

Reference 1. 2. 3. 4. 5. 18