Artificial Immune Systems and Applications for Computer Security



Similar documents
The Human Immune System and Network Intrusion Detection

An Artificial Immune Model for Network Intrusion Detection

Computational intelligence in intrusion detection systems

specific B cells Humoral immunity lymphocytes antibodies B cells bone marrow Cell-mediated immunity: T cells antibodies proteins

An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors

Immune System Approaches to. Intrusion Detection - A Review

A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM

ENSREdm: E-government Network Security Risk Evaluation Method Based on Danger Model

USING GENETIC ALGORITHM IN NETWORK SECURITY

International Journal of Knowledge and Language Processing KLP International c2011 ISSN Volume 2, Number 3, July 2011 pp.

Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in the Retail Sector

Principles of a Computer Immune System

Keywords - Algorithm, Artificial immune system, Classification, Non-Spam, Spam

The Body s Defenses CHAPTER 24

Proceedings of the Federated Conference on Computer Science and Information Systems pp

2) Macrophages function to engulf and present antigen to other immune cells.

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM

A Review on Intrusion Detection System based on Artificial Immune System

Bio-inspired mechanisms for efficient and adaptive network security

NAIS: A Calibrated Immune Inspired Algorithm to solve Binary Constraint Satisfaction Problems

Firewalls and Intrusion Detection

Danger Theory Based Hybrid Intrusion Detection Systems for Cloud Computing

CHAPTER 1 INTRODUCTION

Name (print) Name (signature) Period. (Total 30 points)

Network Intrusion Detection Systems. Beyond packet filtering

Basics of Immunology

Role of Anomaly IDS in Network

Chapter 43: The Immune System

Network Based Intrusion Detection Using Honey pot Deception

Increasing the Accuracy of a Spam-Detecting Artificial Immune System

Observation and Findings

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for


Towards Heuristic Web Services Composition Using Immune Algorithm

Using Genetic Algorithm for Network Intrusion Detection

Fuzzy Network Profiling for Intrusion Detection

Research on Network Security Situation Awareness Technology based on AIS SunJun Liu 1 1 Department of Computer Science

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Hapten - a small molecule that is antigenic but not (by itself) immunogenic.

How To Design An Intrusion Prevention System

How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

The Multi-Agents Immune System for Network Intrusions Detection (MAISID)

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

An Efficient Three-phase Spam Filtering Technique

The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack

Figure 14.2 Overview of Innate and Adaptive Immunity

The Human Immune System

Artificial Immune System For Collaborative Spam Filtering

Application of Netflow logs in Analysis and Detection of DDoS Attacks

Clonal Selection Method for Immuntiy based Intrusion Detection Systems

ANIMALS FORM & FUNCTION BODY DEFENSES NONSPECIFIC DEFENSES PHYSICAL BARRIERS PHAGOCYTES. Animals Form & Function Activity #4 page 1

Network Intrusion Detection Systems

A survey on Data Mining based Intrusion Detection Systems

LESSON 3: ANTIBODIES/BCR/B-CELL RESPONSES

Hybrid Intrusion Detection System Using K-Means Algorithm

Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks

Content Delivery Network (CDN) and P2P Model

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation

Distributed Denial of Service (DDoS)

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems

B Cell Generation, Activation & Differentiation. B cell maturation

T Cell Maturation,Activation and Differentiation

Fuzzy Network Profiling for Intrusion Detection

Intrusion Detection Systems

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

SURVEY OF INTRUSION DETECTION SYSTEM

Network- vs. Host-based Intrusion Detection

A Review on Network Intrusion Detection System Using Open Source Snort

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap

An Application of Machine Learning to Network Intrusion Detection

Chapter 18: Applications of Immunology

10CS64: COMPUTER NETWORKS - II

Genetic Algorithms commonly used selection, replacement, and variation operators Fernando Lobo University of Algarve

Problem Set 6 KEY

B Cells and Antibodies

Identifying Online Credit Card Fraud using Artificial Immune Systems

Conclusions and Future Directions

Radware s Behavioral Server Cracking Protection

Intrusion Detection via Machine Learning for SCADA System Protection

A thesis presented to. the faculty of. the Russ College of Engineering and Technology of Ohio University. In partial fulfillment

Web Application Security

A Network Monitoring System with a Peer-to-Peer Architecture

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Coimbatore-47, India. Keywords: intrusion detection,honeypots,networksecurity,monitoring

Autoimmunity and immunemediated. FOCiS. Lecture outline

Core Topic 2. The immune system and how vaccines work

Computer Networks & Computer Security


Analysis of Network Packets. C DAC Bangalore Electronics City

Efficient Security Alert Management System

AN IMMUNE AGENTS SYSTEM FOR NETWORK INTRUSIONS DETECTION

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL

Intrusion Detection Systems, Advantages and Disadvantages

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Transcription:

Università degli Studi di Milano Dipartimento di Tecnologie dell Informazione Artificial Immune Systems and Applications for Computer Security Antonia Azzini and Stefania Marrara Artificial Immune System (AIS) Computational systems inspired by theoretical immunology. Development and application domains follow the soft computing paradigms of Artificial Neural Networks (ANNs), Evolutionary Algorithms (EAs) and Fuzzy Systems (FS). Applied in a wide variety of areas: - Pattern recognition and classification (Carter - 2000, Timmis 2002, ) - Optimization (Fukuda 1998, De Castro 2000, ) - Data analysis (Timmis 2001, Von Zuben 2000, ) -Computer Security (Bentley 1999, Forrest 2000, ) - 1

Immune System Purpose: protect the body from the threats posed by pathogens minimize harm to the body and ensures its continued functioning. Aspects that the IS faces: identification or detection of pathogens (self/nonself), efficient elimination of those pathogens Efficient recognition of self antigens, molecules of the own body. Innate vs Adaptative Innate Immune System From birth Not specialized Adaptative Immune system Specific response to pathogenes The adaptive immune system also provides memory capabilities to the immune system. 2

Cell Representation IS: Basic Concepts Cells and molecules interact to detect and eliminate infectious agents (pathogens). Surfaces of immune system cells are covered with receptors, some chemically bind to pathogens and some bind to other immune system cells or molecules to enable the complex system of signaling that mediates the immune response. IS cells circulate around the body (blood and lymphsystems) forming a dynamic system of distributed detection and response. No centralized control and little, if any, hierarchical organization. IS is robust to failure of individual components and attacks on the IS itself. Problem of detecting pathogens is for self and nonself (elements of the body, and pathogens). 3

Pattern Recognition Recognition in the immune system is based on shape complementarity. Basically occurs at molecular level. Shapes of B and T cell surfaces have to be matched by the shapes of Antigens. Major Histocompatibility complex (MHC): antigens presented by molecules expressed in complex mode. Gene Expression Process Antibody Generation: the gene segments of different gene libraries are randomly selected and concatenated in a random order. 4

Immune Network Theory The hypotesis is that the immune system mantains an idiotypic network of interconnected B cells for antigen recognition. These cells both stimulate and suppress each other in certain ways that lead to the stabilization of the network. Two B cells are connected if the affinities they share exceed a certain threshold The strenght of the connection is directly proportional to the affinity they share. Clonal Selection The whole process of: Antigen recognition Cell proliferation (mitosis) Differentiation into memory cells Affinity Maturation: - Degree of binding of the cell receptor with the antigen. - Inversely proportional with mutation: the higher the affinity a cell receptor has with an antigen, the lower the mutation rate and vice-versa. - Directly proportional with proliferation: the higher the affinity the higher the number of offspring generated and vice-versa. 5

Negative Selection Works by learning the set of self strings in a training phase and classifying new data as normal or anomalous during a test phase. It consists of multiple negative detectors are analogous to limphocytes in the immune system. Detection is modeled as partial matching between s and the string representing d. Negative detectors match non-self strings, and not self strings. Negative Selection Algorithm (1) Distributed, by placing different detectors on different computers. Different randomly-generated detectors on different computers confer diversity, because different computers will be able to detect different intrusions. Robust: the loss of some detectors on a single computer will not result in a complete absence of protection. If the self set is representative of empirical normal behaviour, then policy is implicitly specified. Flexible: protection and computational requirements depend on the number of detectors, the number of detectors can be automatically increased. Localized detection no communication is required, the system is scalable (anomaly and signature-based detection). 6

Negative Selection Algorithm (2) In training phase: candidate detectors are randomly generated and compared to all self strings. If a candidate detector matches any self strings it is deleted and replaced by a new random detector. The process is repeated. Positive Selection The T cell receptor (TCR) is similar to that of the B cell,except that it is not secreted as antibody and does not bind directly to antigens. Rather it binds to peptides (small fragments of protein broken down from the pathogen) presented in a complex with a specialised self molecule called the Major Histocompatibility Complex (MHC). MHC is a specialised complex involved in regulating the T cell response in the immune system 7

Positive Selection The widely held view of the reason behind this difference between the MHC of individuals is that this ensures the immune systems of all individuals do not react in the same way to pathogens. Positive selection is an area in immunology where there are contrasting views. This arises around the ability of positive and negative selection to work together to both retain cells that recognise the self-mhc:peptide complex, while also removing cells that recognise any self peptides Artificial Immune Systems Representation: to create abstract models of immune organs, cells and molecules Affinity Measures: to quantify the interactions of these elements Immune Algorithms: govern the dynamics of the AIS 8

Principles of AIS Robustness: consequence of the fact that IS is diverse, distributed, dynamic and error tolerant. Adaptability: can learn to recognize and respond to new infections and retain a memory of them. Autonomy: no outside control required. Anomaly detection: ability to detect novel pathogens to which it has not been previously exposed. Diversity, generality: unique IS for each individual in a population Distributed protection: millions of distributed components that interact locally to provide protection. Detection System Detection Event: when the number of receptors bound exceeds some threshold, the lymphocyte is activated. A detection event occurs in the IS when chemical bonds are established between receptors on the surface of an immune cell, and epitopes, which are locations on the surface of a pathogen or protein fragment (a peptide). A lymphocyte will only be activated by pathogens if its receptors have sufficiently high affinities for particular epitope structures on the pathogens, and if the pathogens exist in sufficient numbers in the locality of the lymphocyte. 9

Immunology for Computer Scientist Recognition: chemical bonds established between specific receptors and epitopes. Receptor Diversity, to ensure that at least some lymphocytes can bind to any given pathogens, dynamic protection, with a continual turnover of lyimphocytes. Adaptation: B-cells, learn foreign proteins and remember them (memory of IS) for speeding up future responses. Affinity maturation enables B-cells to adapt to specific pathogens. Tolerance: responsability of another class of lymphocytes, Thcells, measure of auto-immune response to a self-attack from the IS. Learning and Memory: critical aspects Problem: limited lifetime of B-cells Some Solutions in the literature: Adapted B-cells (memory cells) live up to the lifetime of the organisms [MacKay, 1993]. B-cells constantly restimulated [Gray, 1992]. Consequences: Primary response Secondary response 10

Primary and Secondary Responses Computer Security Computer security system should protect computers from intrusions. Aspects to computer security: Confidentiality, authorized access to confidential data. Integrity, data protected from maliciuous or accidental corruption. Availability of data to the authorized users. Accountability, sufficient information for perpatrators identification. Correctness, minimization of fals alarms from incorrect classification. 11

Computer Security (2) Important issue: ability to determine difference between normal-harmful activity. Anomalies examples: Network Intrusion: attacks on a system coming through the network with computer communications via standard protocols. Traffic volume anomalies: generated from: DoS attacks (intentionally created by attackers) flash crowds (unintentionally caused by a larger numer of normal users) Consequences: dramatic increase in servers load, packet loss and congestion, degrading network operation, impacting QoS of the user. Solution -> timely detect intrusions from the onset. Network traffic anomalies: Anomaly Detection Relies on building models from network data. Discovers variations form the model in the observed data. Problem of: density level detection. Aggregation in time and in space (short and long scales). Different levels of protocol stack: IP packet level, transport level, application level. Traffic volume anomaly examples: Network operation anomaly Flash crowd anomaly Network abuse anomaly 12

Network Intrusion Detection (1) In monitoring network traffic all attacks on a system must come through the network. Computers communicate via standard protocols Protocols monitor allows the ID system to be independent from the local operating system. Attacks can be divided into: Host-targeted attacks: exploit holes in programs running as servers Network-targeted attacks: exploit weaknesses in network protocols. Systems fail to achieve: adaptability - flexibility Network Intrusion Detection (2) The Three-way TCP Handshake for a reliable communication. 13

Anomaly Detection System General Architecture of anomaly detection system. AIS approaches for network security presented in the literature 14

ARTIS for LISYS: Immuno-Inspired Inspired Distributed Detection System Forrest et al. Architecture of AIS Base representation of a TCP/IP SYN packet. Matching Rule: r-contiguous bits 15

Holes and Multiple Representations Holes: derived from patterns in the nonself set that cannot be covered by valid negative detectors of a given specificity. different representation for each local detection system. Extensions of Basic Model (1) GOALS Elimination of Autoreactive Detectors Adaptation to changing self-sets Signature-based detection MECHANISM Costimulation Distributed Tolerization Dynamic Detectors Memory Detectors 16

Extensions of Basic Model (2) Costimulation in the eliminating autoreactive lymphocytes. Distributed tolerization Each detector is created with a randomly-generated bit string (analogous to a receptor) and remains immature for a time period T called the tolerization period. Dynamic Detectors Each detector has a probability pdeath of dying once it has matured. When it dies, it is replaced by a new randomly-generated, immature detector. Memory Detectors The IS remembers the structures of known pathogens to facilitate future responses. Architecture of LISYS and results 17

Immune Technique to Detect Anomalies in Network Traffic (Gonzalez, Dasgupta 2002) AIS technique extending two-class into a multiple class approach. Non-self space is further classified in multiple sub-classes to determine the abnormality level. Genetic algorithm for rules evolution to cover the abnormal space. Detectors are represented by hypercubes that satisfy rules. Satisfactory rule: not include positive samples and cover a large area. The Proposed Approach (a) Self and non-self division of the Descriptor space. (b) Approximation of the non-self space by interval rules. Set of normal samples represented as points in a 2D space. (a) Rectangular rules cover the nonself space using a small value of v. (b) Rectangular rules cover the nonself space using a large value of v. (c) Level of deviation defined by each v, where level 1 corresponds to Non-self cover in (a) and level 2 Corresponds to non-self cover in (b). 18

Anomaly detection in TCP/IP networks (Bouvry et al. 2007) Use only TCP SYN packets as representatives of TCP communication. Antibodies and antigens represented by binary arrays correspondig to headers of packets. Euclidean or Hamming distances measure similarities between antibodies and antigens. Antibodies generation with: Positive characterization: legal traffic is used to create detectors Random characterization: detectors are randomly created Negative characterization: detectors are generated with antibodies not belonging to the legal traffic. Results The cost of running the system highly depends on a method of generation of antibodies. Positive characterization is the faster, weakest for time of detection: it is much larger than Negative. Random characterization requires more computational costs, but best for detection time: it provides the smallest number of detectors. Negative characterization is the most expensive. The choice of method for detector generation is matter of compromise between requested speed and available memory. 19

Negative Selection and Niching by AIS for Network ID (Bentley( et al. 1999) Problems to solve: new antibodies randomly generated are inefficient to detect antigens. Excessive computational time caused by randomgeneration approach Niching of the IS: evolution of antibodies towards the existing antigen patterns to exclude ineffectual detectors. Modified Negative Selection: algorithm with niching that replaces the random generation of pre-detectors with their evolution towards non-self. Modified Negative Selection Algorithm FIRST PHASE: the modified negative selection algorithm builds self profiles, that are encoded in an appropriate data representation. SECOND PHASE: For each self profile and its corresponding detector set: D detector patterns are randomly generated with fitness =0 N detector patterns are randomly selected from D detectors A single self pattern is randomly selected from the self profile Update fitness value of detectors Select fittest P_b% detectors as parents and apply genetic operators (crossover, mutation) to generate new detectors Delete the worst P_w% detectors Create new detector population by including the selected parents and the offspring generated. THIRD PHASE: detector patterns in each detector set are compared to the pattern in each corresponding new self profile. Alarm signal is generated if they are similar beyond a predefined threshold. 20

Data Profiling TCP packets are considered for anomaly detection For each TCP connection are extracted: Connection identifier: initiator address, initiator port, receiver address, receiver port Known port vulnerabilities 3way Handshaking Traffic intensity Detector Phenotype = (Number of Packet =[10,26], Duration =[0.3,0.85], Termination = half closed, etc) Self Phenotype = (Number of Packet = 35, Duration = 0.37, Termination = normal, etc) AIS for NIDS (Gabrielli( et al. 2006) Affinity between a lymphocyte and a traffic substring is substituted by a binary match between the two strings with true if the two strings are equal or false otherwise. Random generation is implemented as a batch procedure executed to replace dead lymphocytes in order to have the same number of active lymphocytes as at the end of the training phase. For each lymphocyte four possible states of life are considered Idle Active Alerted Memory cell Co-stimulation: the flow back from the HTTP system is used to the client to represent the confirmation signal. 21

Lymphocyte state model Conclusions and Future Work AIS constitute a successfull computational intelligence paradigm inspired by IS to solve problems in different domain areas. Evolutionary algorithm and artificial neural networks to improve pattern classification and network security. The choice of method for detector generation is matter of compromise between requested speed and available memory. Current research is directed to find more effective methods of generating detectors (Promising alternative for searching rule detectors is applying coevolutionary algorithms). real-time self-adaptiveness 22

In the Literature J. Kim, P. J. Bentley, U. Aickelin, J. Greensmith, G. Tedesco, and J. Twycross (2007). Immune system approaches to intrusion detection - a review. Natural Computing. V. Cutello, G. Nicosia, M. Pavone, J. Timmis (2007) An Immune Algorithm for Protein Structure Prediction on Lattice Models, IEEE Transactions on Evolutionary Computation. F. Esponda, H. Jia, S. Forrest, and P. Helman (2006), "Protecting Data Privacy through Hard-to-Reverse Negative Databases," Proceedings of the Information Security Conference S. Garrett (2005) How Do We Evaluate Artificial Immune Systems? Evolutionary Computation. F. Gonzalez (2003). A study of artificial immune systems applied to anomaly detection. Technical report. H. Inoue and S. Forrest (2002) Anomaly Intrusion Detection in Dynamic Execution Environments., New Security Paradigms Workshops. L. DeCastro and J. Timmis (2001) Artificial Immune Systems: A New Computational Intelligence Approach 23