Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton Scence and Informaton Applcaton echnology (ESIA 20) echnology Mult-sensor Data Fuson for Cyber Securty Stuaton Awareness Yan Zhang a,b, Shuguang Huang a, Shze Guo b, Junmao Zhu b, a* a Electronc Engneerng Insttute, Hefe 230037, Chna b Insttute of North Electronc Equpment, Bejng 00083, Chna Abstract o analyze the nfluence of securty ncdents on a networed system and accurately evaluate system securty, ths paper proposes a novel cyber securty stuaton assessment model, based on mult-heterogeneous sensors. By usng D-S evdence theory, we fuse securty data submtted from mult-sensors, accordng to the networ topology and the mportance of servces and hosts. Moreover, we adopt the evaluaton polcy that from bottom to top and from local to global n ths model. he evaluaton of a smulated networ ndcates that the proposed approach s sutable for networ envronment, and the evaluaton results are precse and effcent. 20 Publshed by Elsever Ltd. Selecton and/or peer-revew under responsblty of Conference ESIA20 Organzaton 20 Publshed Commttee. by Elsever Ltd. Selecton and/or peer-revew under responsblty of Yjn Wu. Keywords: Sensor; Securty Data; Assessment; Herarchcal Method; Securty Stuaton. Introducton Wth the development of computer networ, nformaton securty deterorates rapdly. o cope wth dfferent types of networ attacs, people often use dfferent types of securty devces (sensor). However, the management of these devces encounters many problems, ncludng Alert Overload, Alert Conflct and hgh False Postve etc. o solve these problems, many studes have tred to apply stuaton awareness to nformaton securty, e.g.: Bass [] proposed mult-sensor data fuson archtecture, Wang et al. [2] proposed the use of neural networ n mult-heterogeneous sensor fuson. We [3] and Zhang [4] mproved the framewor of * Correspondng author. el.: +0-86-055-5767838; fax: +0-86-055-5766654. E-mal address: eejac@63.com. 878-0296 20 Publshed by Elsever Ltd. Selecton and/or peer-revew under responsblty of Conference ESIA20 Organzaton Commttee. do:0.06/j.proenv.20.09.65
030 Yan Zhang et al. / Proceda Envronmental Scences 0 ( 20 ) 029 034 stuaton awareness by jonng n some envronment factors (host number, host servces, servce attacs, etc.), and La [5] used a smple weghted and grey theory to mplement securty stuaton awareness. In ths paper, we use DS Evdence heory to fuse alert that submtted from heterogeneous networ sensors. We perform an experment upon a smulated networ envronment. he results show that the proposed method not only provdes the securty stuaton n the macro system, but also provdes three dfferent levels of assessment of the securty stuaton. 2. Related Wor 2.. Networ securty stuaton awareness Brefly speang, stuaton awareness s to now what s happenng and how to respond. Endsley [6] vewed stuaton awareness as three levels: Percepton, Comprehenson and Projecton. he frst level percepton s to collect data from dfferent sources. he second level comprehenson s to ntegrate and understand these data. And the thrd level projecton s to predct what wll occur wthn a perod of tme. In order to create effcent networ securty stuaton awareness, La [5] proposed a Networ Securty Stuaton Awareness (referred to as NSSA) model. Inspred by Bass [], Lu et al. [7] proposed an nformaton fuson model for networ securty stuaton awareness. Accordng to these studes, current networ securty stuaton awareness only provdes macro nformaton, such as: What nd of networ s beng attaced (Probe, R2L, U2R, DoS...). hs can not help polcy-maers to tae prompt and effectve response. o solve ths problem, we ntroduced the concept of rs assessment, whch can dentfy the most weaness pont. 2.2. DS Evdence heory DS evdence theory s proposed by Shafer n 976. It s used to descrbe dfferent levels of accuracy and often appled to medcal dagnostcs, rs analyss and decson analyss [8]. Before usng the DS fuson rule, the frst step s to defne the target framewor. And then use BPA (Basc Probablty Assgnment) formula to allocate confdence to dfferent sensors. Suppose there are two IDS: O and O 2, and an attac ncdent: H. In O, confdence level m ( H ) represents the probablty that O support the occurrence of H. In O 2, confdence level m 2 ( H ) represents the probablty that O 2 support the occurrence of H. hrough DS rules, the fuson result of O and O 2 evdence s as follows: m( B) m2( C) BCH m2 ( H) () m( B) m2( C) B C After the fuson of the two evdences, m ( ) 2 H s the fnal probablty that the alert may occur. A number of studes have used ths method to lower the False Postve Rate [7] [9]. 3. Proposed Method In ths secton, we proposed a Herarchcal Networ Securty Stuaton Assessment Model (referred HNSSAM) (see Fgure ). hs model jons the DS evdence theory fuson rules wth herarchcal quanttatve rs assessment method, and maes use of confdence level, servce mportance and host mportance. he advantages of ths model are: a) to solve the problem of mass data processng; b) to provde three levels of ntutve securty threat; b) to qucly fnd weanesses n the system or the securty stuaton.
Yan Zhang et al. / Proceda Envronmental Scences 0 ( 20 ) 029 034 03 Mult-Sensors Data Data Verfcaton Formatng D-S Data Fuson Servce Stuaton Assessmen Host Stuaton Assessmen Networ Stuaton Assessmen Stuaton Predcton Fg.. Herarchcal framewor for networ securty stuaton awareness 3.. Pre-processng Data preprocessng module s desgned to collect securty data from dfferent sensors. Data verfcaton mechansm s adopted to determne whether there s a successful attac. By comparng the condtons and the confguraton nformaton (e.g.: OS verson, servces runnng, etc.) necessary for a successful attac, we could smply remove non-mpact attac alert. For example: IDS detected a large number of serv-u drectory traversal attacs whch am at serv-u software runnng on Wndows system. However, the target host s runnng on Lnux system, so attac can not be succeeded. herefore, these nvald alerts should be removed to reduce the number of alerts. Fnally, the securty data wll be converted nto a unform format so as to meet the HNSSAM archtecture. 3.2. D-S Data Fuson Accordng to the basc defnton of DS, we set the target framewor rue _ Postve, False _ Postve. Because the alerts generated by securty equpment clearly have two possbltes: () rue Postve; (2) False Postve, we defne the confdence values of an alert as rue Postve Rate (PR): m (correct alerts) = PR. We obtan PR by supervsed tranng of securty devces n varous attacs. hen the confdence values wll be stored n Knowledge Base for further use. he process of fuson s llustrated n Fgure 2. 3.3. Herarchcal Quanttatve Stuaton Assessment Fg. 2. D-S rule-based alert fuson model For narratve convenence, we defne the followng concepts: Defnton. A: Attac: he actvtes that trgger FW, IDS, Ant-Vrus and other securty devces to generate an alert. After pre-processng and DS data fuson, attac can be expressed as A AK _ YPE, AK _ BEL, SEVERIY, IME, DIP, where AK _ YPE s representatves of attac
032 Yan Zhang et al. / Proceda Envronmental Scences 0 ( 20 ) 029 034 type, AK _ BEL s representatves of the confdence level, SEVERIY s representatves of threat ndex obtaned from the Knowledge Base, IME s representatves of the tme attac taen place, and DIP s representatves of the target host. Defnton 2. Servce Securty Stuaton: he nsecurty degree of a servce after been attaced. Defnton 3. Host Securty Stuaton: he mpact of a number of nsecurty servces on a host. Defnton 4. Networ Securty Stuaton: he mpact of a number of nsecurty hosts on a networ. We frst evaluate how serous the servces provded by the host are under attac. Note that, the mpact of attac on servces s not only related to the level of threat but also related to the networ traffc of user actvtes. Besde, the mpact of attac vares wth dfferent perod of tme [0]. So we proposed the servce securty stuaton assessment formula as follows: B SS 0 j KS t W t Aj (2) In formula (2), S s representatve of servce that s under attac. W s representatve of the weght of tme. We dvde one day nto three contnuous sectons: t, t2, t 3. Based on the statstcal results, networ admnstrators can set each secton a separated traffc descrpton: low, medum, and hgh. he correspondng quanttatve values are, 2, and 3. Followed by normalzaton, we obtan the weght of each tme perodw. W (3) A j s representatve of the value of confdence after alert fuson, j FP _ AK _, FP _ AK _2, HP _ AK _,.... B j s representatve of the severty of the attac. he hgher the value of SSKS t s, the hgher the level of servce threats at tme t s. hen the host securty stuaton s evaluated. he securty stuaton of host s affected by the servces and the securty mechansms [4]. he assessment formula s desgned as follows: WS SS S t SSH t (4) W SP H t, H Host_ A, Host_ B, Host_ C,... SAp SS t s representatves of the securty stuaton of host H at the tme. W S s representatve of the mportance weght of the servce S on host H. SS S s representatves of the securty ndex of the servce S on host H. W SA p s representatves of the mportance weght of the securty standards on host H, SAp Confdentalty, Avalablty, Integrty, Authentcaton, Non _ Repudaton. SP S pq s representatves of the level of nfluence of securty mechansm q on securty standard p, q { encryptng, dgtal _ sgnaturng, access _ controllng...}, p SAp. he greater the value of SSH t s, the hgher the level of the threat to the host H at tme t s. herefore, the networ securty stuaton assessment formula s desgned as follows: SS t W SS t (5) N H H W H s representatves of the mportance weght of host n the networ. he larger the value of SS t s, the hgher threat level of networ at tme t s. N 4. Expermental Results and Analyss o test the effect of ths HNSSAM model, we smulated a mult-sensor networ envronment (see Fgure 3). In ths smulated networ envronment, we deployed four dfferent sensors, the frewall at Internet entry, networ ntruson detecton system, the host ntruson detecton system and ant-vrus software nstalled on the hosts. S pq
Yan Zhang et al. / Proceda Envronmental Scences 0 ( 20 ) 029 034 033 Fg. 3. Expermental networ topology Secton. We dvded one day nto three perods: t = 00:00 ~ 08:00, t 2 = 08:00 ~ 8:00, t 3 = 8:00 ~ 24:00. Each perod s assgned wth a dfferent mportance level. Observed tme and 6 fall n perod t 3, 2 ~ 3 fall n perod t, 4 ~ 5 fall n perod t 2. From to 6, collecton the nformaton that FW, NIDS, HIDS, Ant-Vrus detect attac on Host A, B, C. Secton 2. Accordng to the securty data collected from secton, we loo up the confdence level correspondng to the securty data n the Knowledge Base. By DS fuson rule, we fuse the confdence value. hen the results are multpled by the severty value of attacs n the nowledge base. Fnally, the servce securty stuaton value s obtaned by equ. 2. Secton 3. In accordance wth the analyss of secton 2, we draw the results n Fgure 4 a). We could clearly see n Fgure 4 a) that the RPC servces on the Host A suffer hgher level of threats, whch should be deal wth frstly. Accordng to equ. 4, we obtan the host securty stuaton, as shown n Fgure 4 b). It can be clearly seen that the attacs are actve durng tme to 4. Fg. 4. (a) Securty stuaton of all servces on host A; (b) Securty stuaton of host A Secton 4. In accordance wth the analyss of the results generated n secton 3, t s easy to draw the securty stuaton of all hosts n Fgure 5 a). From ths fgure, admnstrators could fnd out the threat level on each host. Accordng to equ.. 5, we obtan the networ securty stuaton. he results are shown n Fgure 5 b). We could fnd out through ths fgure that ths networ s sufferng more attacs from afternoon to mdnght.
034 Yan Zhang et al. / Proceda Envronmental Scences 0 ( 20 ) 029 034 Fg. 5. (a) Securty stuaton of all hosts on LAN; (b) Securty stuaton of LAN Accordng to the analyss above, t can be seen that HNSSAM framewor provdes three levels of cyber securty stuaton. hs method overcomes the shortcomngs of current herarchcal stuaton awareness systems. It can also assst decson-maers to adjust polcy to enhance securty. 5. Conclusons In ths paper, we analyzed the exstng stuaton assessment algorthms, proposed a novel cyber securty stuaton assessment model based on mult-heterogeneous sensors. Accordng to the proposed model, we mplemented a stuaton awareness system. he evaluaton of a smulated networ ndcates that the approach s sutable for networ envronment, and the evaluaton results are precse and effcent. References [] Bass,., Intruson Detecton Systems and Multsensor Data Fuson, Communcatons of the ACM, Vol. 43, No. 4, Aprl 2000. [2] Wang Huqang, La Jbao, and Yng Lang, Networ Securty Stuaton Awareness Based on Heterogeneous Mult-Sensor Data Fuson and Neural Networ, Second Internatonal Multsymposum on Computer and Computatonal Scences, 2007. [3] We Yong, Lan Y-Feng, A Networ Securty Stuatonal Awareness Model Based on Log Audt and Performance Correcton[J], Chnese Journal of Computers, 2009,(04) [4] Zhang Yong; an Xao-bn; Cu Xao-ln; X Hong-sheng, Networ Securty Stuaton Awareness Approach Based on Marov Game Model[J], Journal of Software, 20,(03) [5] La J-bao; Wang Yng; Wang Hu-qang Zheng Feng-bng Zhou Bng, Research on Networ Securty Stuaton Awareness System Archtecture Based on Mult-source Heterogeneous Sensors[J], Computer Scence, 20,(03) [6] Endsley, M., Desgn and evaluaton for stuaton awareness enhancement, In Proceedngs of the Human Factors Socety 32nd Annual Meetng, Human Factors Socety, pp. 97-0, 988. [7] Lu Mx, Yu Dongme and Zhang Quyu et al., Networ Securty Stuaton Assessment Based on Data Fuson, 2008 Worshop on Knowledge Dscovery and Data Mnng, 2008. [8] Sentz, K. and Ferson, S., Combnaton of Evdence n Dempster-Shafer heory, SAND 2002-0835, Unlmted Release, Aprl 2002. [9] Me Habn and Gong Jan, Intruson Alert Correlaton Based On D-S Evdence heory, Communcatons and Networng n Chna, Second Internatonal Conference on IEEE, 2007. [0] Chen XZ, Zheng QH and Guan XH et al., Quanttatve herarchcal threat evaluaton model for networ securty, Journal of Software, 2006(04)