CS 5410 - Computer and Network Security: Intrusion Detection



Similar documents
CSC574 - Computer and Network Security Module: Intrusion Detection

CIS 433/533 - Computer and Network Security Intrusion Detection

Intrusion Detection Systems

CSCE 465 Computer & Network Security

The Base Rate Fallacy and its Implications for the Difficulty of Intrusion Detection

Intrusion Detection for Mobile Ad Hoc Networks

IDS / IPS. James E. Thiel S.W.A.T.

CNT Computer and Network Security Review/Wrapup

Web Application Security

Intrusion Detection Systems

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

How To Protect A Network From Attack From A Hacker (Hbss)

Performance Evaluation of Intrusion Detection Systems

CHAPTER 1 INTRODUCTION

Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Observation and Findings

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

CSE543 - Introduction to Computer and Network Security. Module: Final review

Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila

How To Prevent Network Attacks

SURVEY OF INTRUSION DETECTION SYSTEM

Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002

A Framework for the Evaluation of Intrusion Detection Systems

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

A FRAMEWORK FOR AN ADAPTIVE INTRUSION DETECTION SYSTEM WITH DATA MINING. Mahmood Hossain and Susan M. Bridges

Detecting Flooding Attacks Using Power Divergence

Intrusion Detection for Grid and Cloud Computing

Firewalls, Tunnels, and Network Intrusion Detection

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Development of a Network Intrusion Detection System

Intrusion Detection Systems

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Anomaly-based Intrusion Detection in Software as a Service

Detecting Anomaly IDS in Network using Bayesian Network

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Radware s Behavioral Server Cracking Protection

Center of Academic Excellence Cyber Operations Program 2013 Application

Intrusion Detection in AlienVault

A very short history of networking

Intrusion Detection using Sequences of System Calls. Steven A. Hofmeyr Stephanie Forrest Anil Somayaji

Web Application Security

Role of Anomaly IDS in Network

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Application Intrusion Detection

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Closing Wireless Loopholes for PCI Compliance and Security

CS52600: Information Security

Network Security Management

A Survey on Intrusion Detection System with Data Mining Techniques

INTRUSION DETECTION SYSTEMS and Network Security

Calculation Algorithm for Network Flow Parameters Entropy in Anomaly Detection

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Users and Vendors Speak Out: Intrusion Detection and Prevention

A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections

Incident Handling. Applied Risk Management. September 2002

Intrusion Detection Systems

Network Intrusion Detection Systems

Application of Data Mining Techniques in Intrusion Detection

A Decision Maker s Guide to Securing an IT Infrastructure

Mahalanobis Distance Map Approach for Anomaly Detection

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

1 Culminating project

System Specification. Author: CMU Team

Building accurate intrusion detection systems. Diego Zamboni Global Security Analysis Lab IBM Zürich Research Laboratory

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

CS5008: Internet Computing

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

A Model-based Methodology for Developing Secure VoIP Systems

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

WHITE PAPER WHAT HAPPENED?

Software Vulnerability Assessment

Web Application Security Considerations

The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Information Security Basic Concepts

Deployment of Snort IDS in SIP based VoIP environments

Some Research Challenges for Big Data Analytics of Intelligent Security

Security Issues in SCADA Networks

Passive Vulnerability Detection

Intrusion Detection System using Log Files and Reinforcement Learning

STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Finding The Needle: Suppression of False Alarms in Large Intrusion Detection Data Sets

The Intelligent, Proactive Information Assurance and Security Technology IPDM

Security Testing and Vulnerability Management Process. e-governance

Protection profile of an industrial firewall

Data Security Incident Response Plan. [Insert Organization Name]

Architecture Overview

CSE343/443 Lehigh University Fall Course Overview. Presenter: Yinzhi Cao Lehigh University

PROBE: A Process Behavior-Based Host Intrusion Prevention System

How To Protect Your Network From Attack From A Hacker On A University Server

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Spam Detection in Voice-over-IP Calls through Semi-Supervised Clustering

State of Vermont. Intrusion Detection and Prevention Policy. Date: Approved by: Tom Pelham Policy Number:

Transcription:

CS 5410 - Computer and Network Security: Intrusion Detection Professor Kevin Butler Fall 2015

Locked Down You re using all the techniques we will talk about over the course of the semester: Strong access control mechanisms Strong authentication Strong cryptography to preserve confidentiality and integrity Well-configured firewalls (soon, anyhow) What could possibly go wrong? 2

Intrusion An Authorized Action... That Can Lead to a Vulnerability... That Turns into a Compromise... And an Attack... Authentication and Access Control Are No Help! 3

Types of Intrusions Network Malformed (and unauthenticated) packet Let through the firewall Reaches the network-facing daemon Can we detect intrusions from packet contents? Host Input to daemon Triggers a vulnerability (buffer overflow) Injects attacker code Performs malicious action Can we detect intrusions from process behavior? 4

Intrusion Detection (def. by Forrest) An IDS system find anomalies The IDS approach to security is based on the assumption that a system will not be secure, but that violations of security policy (intrusions) can be detected by monitoring and analyzing system behavior. [Forrest 98] However you do it, it requires Training the IDS (training) Looking for anomalies (detection) This is an explosive area in computer security, that has led to lots of new tools, applications, industry 5

Intrusion Detection Systems IDS s claim to detect adversary when they are in the act of attack Monitor operation Trigger mitigation technique on detection Monitor: Network or Host (Application) events A tool that discovers intrusions after the fact are called forensic analysis tools E.g., from system logfiles IDS s really refer to two kinds of detection technologies Anomaly Detection Misuse Detection 6

Anomaly Detection Compares profile of normal systems operation to monitored state Hypothesis: any attack causes enough deviation from profile (generally true?) Q: How do you derive normal operation? AI: learn operational behavior from training data Expert: construct profile from domain knowledge Black-box analysis (vs. white or grey?) Q: Will a profile from one environment be good for others? Pitfall: false learning 7

Misuse Detection Profile signatures of known attacks Monitor operational state for signature Hypothesis: attacks of the same kind has enough similarity to distinguish from normal behavior This is largely pattern matching Q: Where do these signatures come from? Record: recorded progression of known attacks Expert: domain knowledge AI: Learn by negative and positive feedback 8

The confusion matrix What constitutes a intrusion/anomaly is really just a matter of definition A system can exhibit all sorts of behavior Reality T F Detection Result T F True False Positive Negative False True Positive Negative Quality determined by consistency with a given definition context sensitive 9

Sequences of System Calls Forrest et al. in early-mid 90s, understand the characteristics of an intrusion Idea: match sequence of system calls with profiles n-grams of system call sequences (learned) Match sliding windows of sequences If not found, then trigger anomaly Use n-grams of length 5, 6, 11. If found, then it is normal (w.r.t. learned sequences) 10

Evaluating Forrest et al. The qualitative measure of detection is the departure of the trace from the database of n-grams Further they measure how far a particular n-gram i departs by computing the minimum Hamming distance of the sample from the database d min = min( d(i,j) for all normal j in n-gram database) this is called the anomaly signal. Result: on lpr, sendmail, etc. About.05-.07% false positive rates And S A = maximum d min =~.04 Is this good? 11

"gedanken experiment Assume a very good anomaly detector (99%) And a pretty constant attack rate, where you can observe 1 out of 10000 events are malicious Are you going to detect the adversary well? 12

Bayes Rule Pr(x) function, probability of event x Pr(sunny) =.8 (80% of sunny day) Pr(x y), probability of x given y Conditional probability Pr(cavity toothache) =.6 60% chance of cavity given you have a toothache Bayes Rule (of conditional probability) Pr(A B) = Pr(B A) Pr(A) Pr(B) Now: Pr(cavity) =.5, Pr(toothache) =.1 13

The Base-Rate Bayesian Fallacy Setup Deriving is attack (intrusion) probability, 1/10,000 is probability of an alarm, unknown Now, what s? is 99% accurate (higher than most techniques) 14

The Base-Rate Fallacy (cont.) Now plug it in to Bayes Rule So, a 99% accurate detector leads to 1% accurate detection. With 99 false positives per true positive This is a central problem with IDS Suppression of false positives real issue Open question, makes some systems unusable 15

Where is Anomaly Detection Useful? System Attack Density P(T) Detector Flagging Pr(F) Detector Accuracy Pr(F T) True Positives P(T F) A 0.1 0.65 B 0.001 0.99 C 0.1 0.99 D 0.00001 0.99999 Pr(B A) = Pr(A B) Pr(B) Pr(A) 16

The ROC curve Receiver operating characteristic Curve that shows that detection/false positive ratio Ideal Axelsson talks about the real problem with some authority and shows how this is not unique to CS Medical, criminology (think super-bowl), financial 17

Example ROC Curve You are told to design an intrusion detection algorithm that identifies vulnerabilities by solely looking at transaction length, i.e., the algorithm uses a packet length threshold T that determines when a packet is marked as an attack. More formally, the algorithm is defined: where k is the packet length of a suspect packet in bytes, T is the length threshold, and (0,1) indicate that packet should or should not be marked as an attack, respectively. You are given the following data to use to design the algorithm. attack packet lengths: 1, 1, 2, 3, 5, 8 non-attack packet lengths: 2, 2, 4, 6, 6, 7, 8, 9 Draw the ROC curve. 18

The reality Intrusion detections systems are good at catching demonstrably bad behavior (and some subtle) Alarms are the problem How do you suppress them? and not suppress the true positives? This is a limitation of probabilistic pattern matching, and nothing to do with bad science Beware: the fact that an IDS is not alarming does not mean the network is safe All too often: used as a tool to demonstrate all safe, but is not really appropriate for that. 19