Network Intrusion Detection Systems



Similar documents
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Analyzing TCP Traffic Patterns Using Self Organizing Maps

Lesson 5: Network perimeter security

Efficient Security Alert Management System

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

A Review on Network Intrusion Detection System Using Open Source Snort

KEITH LEHNERT AND ERIC FRIEDRICH

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

Network security Exercise 10 Network monitoring

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Taxonomy of Intrusion Detection System

HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK

STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS

Introduction of Intrusion Detection Systems

Mahalanobis Distance Map Approach for Anomaly Detection

Intrusion Detection Systems, Advantages and Disadvantages

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Intrusion Detection in AlienVault

The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack

Network Based Intrusion Detection Using Honey pot Deception

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Volume 1 Issue 11 (November 2014)

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

CSCI 454/554 Computer and Network Security. Topic 8.4 Firewalls and Intrusion Detection Systems (IDS)

Firewalls, Tunnels, and Network Intrusion Detection

Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks

Deployment of Snort IDS in SIP based VoIP environments

Hybrid Intrusion Detection System Using K-Means Algorithm

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Chapter 9 Firewalls and Intrusion Prevention Systems

Role of Anomaly IDS in Network

Self-organized Collaboration of Distributed IDS Sensors

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Network Intrusion Detection using Data Mining Technique

IDS / IPS. James E. Thiel S.W.A.T.

Analysis of Network Packets. C DAC Bangalore Electronics City

Firewall Firewall August, 2003

Intrusion Detection Systems

Network Security Management

Detecting 0-day attacks with Learning Intrusion Detection System

Two State Intrusion Detection System Against DDos Attack in Wireless Network

Intrusion Detection Systems

Efficient and Intelligent Network Infrastructure Protection Strategies for Complex Attacks, IDS Evasions, Insertions and Distributed Denial of Service

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Using Artificial Intelligence in Intrusion Detection Systems

Second-generation (GenII) honeypots

Alarm Clustering for Intrusion Detection Systems in Computer Networks

Chapter 8 Network Security

Stochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection

System for Denial-of-Service Attack Detection Based On Triangle Area Generation

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

Comparison of Firewall and Intrusion Detection System

Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila

CHAPTER 1 INTRODUCTION

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Anomaly-based Intrusion Detection in Software as a Service

False Positives Reduction Techniques in Intrusion Detection Systems-A Review

Detecting Attacks. Signature-based Intrusion Detection. Signature-based Detection. Signature-based Detection. Problems

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

A Model-based Approach to Self-Protection in SCADA Systems

A New Model for Pre-analysis of Network Traffic Using Similarity Measurement

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

AppSec DC November 13, The OWASP Foundation Custom Intrusion Detection Techniques for Monitoring Web Applications

CSCE 465 Computer & Network Security

Endpoint Security Console. Version 3.0 User Guide

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals


Intrusion Detection Systems

An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

A FRAMEWORK FOR AN ADAPTIVE INTRUSION DETECTION SYSTEM WITH DATA MINING. Mahmood Hossain and Susan M. Bridges

A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique

Protecting Against Cyber Threats in Networked Information Systems

Aggregating Distributed Sensor Data for Network Intrusion Detection

INTRUSION DETECTION SYSTEM USING SELF ORGANIZING MAP

Credit Card Fraud Detection Using Self Organised Map

ANALYSIS OF PAYLOAD BASED APPLICATION LEVEL NETWORK ANOMALY DETECTION

DDoS Protection Technology White Paper

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

Intrusion Detection Systems

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Index Terms Domain name, Firewall, Packet, Phishing, URL.

Architecture Overview

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

TECHNICAL NOTE 10/03 DEPLOYMENT GUIDANCE FOR INTRUSION DETECTION SYSTEMS

INTRUSION DETECTION ALARM CORRELATION: A SURVEY

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Intrusion Detection for Mobile Ad Hoc Networks

Transcription:

Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection 1

Introduction: the NIDS problems A strategy for reducing false positives rate Outbound traffic validation issues POSEIDON: a payload-oriented anomaly detection system Correlation issues: input-side alerts and output traffic analysis APHRODITE: the architecture for FP reduction Experiments Conclusions & future work Questions References Agenda 7/1/06 NIDS - False Positive reduction through Anomaly Detection 2

Network Intrusion Detection Systems, no matter if they are Signature or Anomaly based, have in common some problems NIDS problems connected with false alerts False Positives The number of alerts collected by an IDS can be very large (15,000 per day per sensor). The number of FP alerts is very high (thousands per day). Reducing the FP rate often, causes worse NIDS reliability. The task of filtering and analyzing alerts must be done manually. All of these problems cause the final user of NIDS, the security manager, to: an overload of work to recognize true attacks from NIDS mistakes loose confidence in alerts lower the defences level to reduce FP number NIDS problems 7/1/06 NIDS - False Positive reduction through Anomaly Detection 3

Tuning the NIDS can solve some of the FP problems, but alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg: "WEB-MISC http directory traversal"; flow:to_server,established; content:"../"; reference:arachnids,297; classtype:attempted-recon; sid:1113; rev:5;) False Positive <img src=../img/mypic.gif alt= My PIC > TUNING IS NOT ENOUGH! NIDS problems 7/1/06 NIDS - False Positive reduction through Anomaly Detection 4

We believe that the problem with current NIDS is that they ignore roughly half of the network traffic FP s occur when the NIDS fails to consider the legitimate sampled traffic as an attack. We need a way to confirm that an attack is taking place, before raising any alert. Some considerations When an attack takes place, it is likely to produce some kind of unusual effect on the target system. On the other hand, if the data flow is licit, there will be no unusual effect on the target system. Considering a network environment we can observe the reaction of monitored systems by examining the outgoing data flowing from those systems in response of an extern solicitation. Current NIDS only consider incoming requests of monitored systems, as attacks always come from those ones. To increase accuracy on NIDS ability to distinguish real attacks, we need to introduce correlation between incoming and outgoing data. A strategy for reducing FP rate 7/1/06 NIDS - False Positive reduction through Anomaly Detection 5

In general, all real attacks modify the information flow between the monitored system and the systems with wick it is dialoguing with. Attack on on the availability of of the system Classes of attacks Attacks of interruption Consequences When an attack cause the interruption of one or more services in a system, or even causes a system failure, all communications are stopped. Observing output network traffic we will see no more data flowing outside the monitored system. Unauthorized access to to a system Attacks of interception Unauthorized access to a system is mostly done to gain information they wouldn t normally get by the system. If an attempt of attack is done, and the system reacts denying the information disclosure, it will usually send some kind of error message, or no data at all. Attack on on the integrity of of the system Attacks of modification When an attacks causes the modification of the information provided by a system, the behaviour of the system itself will be altered, causing it to alter his normal information flow. Degrades the authenticity of of the system Attacks of fabrication If an unauthorized party gains access to the system and inserts false objects into it, it degrades the authenticity of the system. This cause a deviation in the normal behavior of the system, reflecting in the alteration of the usual output of the system itself. Attacks modify normal information flow 7/1/06 NIDS - False Positive reduction through Anomaly Detection 6

Validation of output traffic for a system is more complex than input validation. Problems in output traffic validation Every instance of an application in a system has a different kind of output traffic, according to the information it contains. There is a number of ways a system can react to an attack. Even if the same attack is carried out on two different system, the reaction won t be the same. How can we associate input traffic with output? How much must we wait to see the response to a suspicious request? A signature-based tool is not suitable for output validation. We need anomaly detection! We need a correlation engine to associate correctly input suspicious request with appropriate responses. Problems in output traffic validation 7/1/06 NIDS - False Positive reduction through Anomaly Detection 7

ANOMALY DETECTION Anomaly detection is more suitable to adapt to the specificity of output traffic inspection. Advantages It can be trained to recognize the normal output traffic of a system / protocol. Disadvantages The training phase takes generally a lot of time and is crucial for the performances during the detection phase. The normal output traffic model, built during training phase, fits at best the specific features of the system it has been trained on. If some features of the system are changed, the normal traffic can change and models need to be updated. Output traffic that is found to be anomalous can be used to confirm the raising of an alert. Anomalous traffic is that one that deviates from his normal behaviour. An output validator built with anomaly detection techniques can confirm alerts raised even if the attack is 0-day. Anomaly Detection 7/1/06 NIDS - False Positive reduction through Anomaly Detection 8

ANOMALY DETECTION To achieve output traffic validation, according with the previous considerations, we designed POSEIDON, a NIDS based on the anomaly-detection approach POSEIDON stands for: Payl Over Som for Intrusion DetectiON Starting from the good results achieved by K. Wang and S. Stolfo with their IDS (PAYL) we built a two-tier NIDS that improves the number of detected attacks using a Self Organizing Map (SOM) to pre-process the traffic. Network-oriented. Main Features Payload-based. It considers mainly the payload of the traffic it inspects. Two-tier architecture. Developed and tested for TCP traffic. POSEIDON A two tier Network Intrusion Detection System 7/1/06 NIDS - False Positive reduction through Anomaly Detection 9

ANOMALY DETECTION PAYL is the base from which we started building our anomaly detection engine PAYL features Anomaly-based engine that uses full payload data to detect anomalies. To characterize traffic profiles only a few other features is used: - monitored host IP address - monitored Service Port - payload length Enhanced by post model-building clustering Benchmarked with reference dataset (DARPA 1999) High detection rate. Low false positives rate. For anomaly detection a slightly modified Mahalanobis distance function is used. Profile (ip_dst / port_dst) Model (length) PAYL (Wang and Stolfo, 2004) 7/1/06 NIDS - False Positive reduction through Anomaly Detection 10

ANOMALY DETECTION PAYL classification method presents some weaknesses that compromise the quality of normal traffic models PAYL classification weaknesses Data with different contents can be clustered in the same class. Similar data can be clustered in two different classes because the length presents a small difference. PAYL classification does not evaluate properly INTER-CLASS SIMILARITY. Is it possible to enhance PAYL classification model? We need unsupervised classification We must classify high-dimensional data (the full payload data) Enhancing PAYL 7/1/06 NIDS - False Positive reduction through Anomaly Detection 11

ANOMALY DETECTION T. Kohonen, in 1995, describe a data visualization technique which reduce the dimensions of data through the use of self-organizing neural networks KEY features Competitive networks with unsupervised learning. SOM training phases: - Initialization - Get Best Matching Unit (BMU) - Update scaling neighbours A 3 x 4 rectangular Self Organizing Map N1.1 N1.2 N1.3 N1.4 Update range N2.1 N2.2 N2.3 N2.4 New samples are used to update network with reducing neighbourhood influence over time N3.1 N3.2 N3.3 N3.4 It is possible to determinate the quality of trained network by quantization error. Advantages Unsupervised and suitable for high dimensional data Suitable to detect anomalies in network traffic (quantization error) Disadvantages Requests a training phase Too many false positives (SOM does not evaluate properly intra-class similarity) Benchmarked against other clustering algorithms (K-means, K-medoids) SOM Self Organizing Maps 7/1/06 NIDS - False Positive reduction through Anomaly Detection 12

ANOMALY DETECTION Using SOM to classify payload, according to service port and monitored IP address, improves PAYL model building phase Added SOM as as Classification Engine SECOND TIER FIRST TIER Profile (ip_dst / port_dst) Model (CLASS) Payload length is is replaced by by SOM classification POSEIDON - Architecture 7/1/06 NIDS - False Positive reduction through Anomaly Detection 13

ANOMALY DETECTION POSEIDON overcomes PAYL on every benchmarked protocol POSEIDON Test Results 7/1/06 NIDS - False Positive reduction through Anomaly Detection 14

CORRELATION ENGINE When a proto-alert is raised, the correlation engine considers the output validator results and forwards the alerts only if there is an output anomaly with some exceptions. CORRELATION ENGINE NIDS Input proto -alert OUTPUT ANOMALY? YES ALERT Suspicious communications are those that caused the raising of alerts by the NIDS Output Anomaly Detection COMMUNICATION TRACKING Exception Missing output response Alarm magnitude Description There could be an interruption attack ( DoS ). The alert is considered as a True Positive and forwarded. If the NIDS is anomaly based it can indicate the magnitude of the alert. If the alert magnitude is high, the alert can be considered as TP even if no suspicious output is found. Need to to set an an appropriate application timeout Number of alarmraising packets Number of alerts directed to a single endpoint are counted for a given time frame. If the count is very high, new alerts will be considered TP even if no suspicious output is found. Correlation issues 7/1/06 NIDS - False Positive reduction through Anomaly Detection 15

APHRODITE is the architecture that combines the correlation engine and the output anomaly detector. It It can be be coupled with both anomaly based or or signature based NIDS APHRODITE High Level Architecture 7/1/06 NIDS - False Positive reduction through Anomaly Detection 16

ANOMALY DETECTION We benchmarked APHRODITE using two different datasets, with both signature-based and anomaly-based NIDS NIDS We coupled APHRODITE with the well known open NIDS Snort: - signature-based - totally open (even the signature database) - detection rule set is configurable We also used POSEIDON as inbound traffic IDS: - anomaly-based - implementation available Datasets The first dataset we used was DARPA 1999: - it has been designed and is widely used for IDS benchmarking - allows one to duplicate and validate experiments - attacks are labelled - has been criticized because of the unrealistic nature of some data parameters To make more exhaustive the tests, we used a second, private dataset: - contains 5 days of HTTP traffic collected from a public network - no attack was injected - attack were found and validated by manual inspection and NIDS processing APHRODITE - Test Methodology 7/1/06 NIDS - False Positive reduction through Anomaly Detection 17

APHRODITE achieves a substantial improvement on the stand-alone systems DARPA 1999 Private dataset PROTOCOL SNORT SNORT + APHRODITE POSEIDON POSEIDON + APHRODITE PROTOCOL POSEIDON POSEIDON + APHRODITE HTTP Alerts DR FP 4318 59,9 % 599 (0,068%) 3363 59,9 % 5 (0,00057%) 873235 100 % 15 (0,0018%) 873220 100 % 0 (0,0%) HTTP Alerts DR FP 1739 100 % 1683 (2,83%) 830 100 % 774 (1,30%) FTP Alerts DR FP 904 31,75 % 875 (3,17%) 336 31,75 % 317 (1,14%) 3529 100 % 3303 (11,31%) 694 100 % 373 (1,35%) Telnet Alerts DR FP 1275 26,83 % 391 (0,041%) 889 26,83 % 6 (0,00063%) 65832 95,12 % 63776 (6,72%) 54093 95,12 % 56885 (5,99%) SMTP Alerts DR FP 2 13,3 % 0 (0,0%) - - - 10239 100 % 6476 (3,69%) 6072 100 % 2797 (1,59%) APHRODITE Test results 7/1/06 NIDS - False Positive reduction through Anomaly Detection 18

Conclusions: The experiments show that our modification to PAYL improves the detection rate and reduce sensibly false positives rate. We strongly believe that this result has been achieved by replacing the original PAYL classification method with a new algorithm (based on self-organizing maps). APHRODITE determinates a substantial reduction of false positives. Reduction of false positives does not introduce extra false negative. APHRODITE is still effective also when it is not trained optimally (in case of quick setup without an accurate tuning phase during training). Future work: Make OAD updateable without a new complete training phase. Make the system able to adapt itself to environment changes in an automatic way. Automate the phase of threshold computation. Conclusions & Future work 7/1/06 NIDS - False Positive reduction through Anomaly Detection 19

ANY QUESTION? Questions & Answers 7/1/06 NIDS - False Positive reduction through Anomaly Detection 20

T. Kohonen. Self-Organizing Maps, volume 30 of Springer Series in Information Sciences. Springer, 1995. (Second Extended Edition 1997). K. Wang and S. J. Stolfo. Anomalous Payload-Based Network Intrusion Detection. In E. Jonsson, A. Valdes, and M. Almgren, editors, RAID 04: Proc. 7th symposium on Recent Advances in Intrusion Detection, volume 3224 of LNCS, pages 203 222. Springer-Verlag, 2004. W. Stallings. Network Security Essentials: Applications and Standards. Prentice-Hall, 2000. Manganaris, S., Christensen, M., Zerkle, D., Hermiz, K.: A Data Mining Analysis of RTID alarms. Computer Networks: The International Journal of Computer and Telecommunications Networking 34(4) (2000) Axelsson, S.: The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inf. Syst. Secur. (TISSEC) 3(3) (2000) Snort NIDS. Official web site URL: http://www.snort.org. References 7/1/06 NIDS - False Positive reduction through Anomaly Detection 21