01/04/2006ecs236 winter 20061 Intrusion Detection ecs236 Winter 2006: Intrusion Detection #3: Anomaly Detection Dr. S. Felix Wu Computer Science Department.

Slides:



Advertisements
Similar presentations
CHAPTER 21 Inferential Statistical Analysis. Understanding probability The idea of probability is central to inferential statistics. It means the chance.
Advertisements

G. Alonso, D. Kossmann Systems Group
MARLAP Measurement Uncertainty
01/04/2007ecs236 winter Intrusion Detection ecs236 Winter 2007: Intrusion Detection #2: Anomaly Detection Dr. S. Felix Wu Computer Science Department.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
INTERPRET MARKETING INFORMATION TO TEST HYPOTHESES AND/OR TO RESOLVE ISSUES. INDICATOR 3.05.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
BA 555 Practical Business Analysis
1 Intrusion Detection CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 4, 2004.
1/55 EF 507 QUANTITATIVE METHODS FOR ECONOMICS AND FINANCE FALL 2008 Chapter 10 Hypothesis Testing.
Unsupervised Intrusion Detection Using Clustering Approach Muhammet Kabukçu Sefa Kılıç Ferhat Kutlu Teoman Toraman 1/29.
10/21/2003DSOM'2003, Heidelberg, Germany1 Visual-based Anomaly Detection for BGP Origin AS Change (OASC) Soon-Tee Teoh 1, Kwan-Liu Ma 1, S. Felix Wu 1,
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
02/06/2006ecs236 winter Intrusion Detection ecs236 Winter 2006: Intrusion Detection #4: Anomaly Detection for Internet Routing Dr. S. Felix Wu Computer.
Basic Business Statistics, 10e © 2006 Prentice-Hall, Inc. Chap 9-1 Chapter 9 Fundamentals of Hypothesis Testing: One-Sample Tests Basic Business Statistics.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall Statistics for Business and Economics 7 th Edition Chapter 9 Hypothesis Testing: Single.
Chapter 8 Introduction to Hypothesis Testing
1 BA 555 Practical Business Analysis Review of Statistics Confidence Interval Estimation Hypothesis Testing Linear Regression Analysis Introduction Case.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Correlation and Regression Analysis
WAC/ISSCI Automated Anomaly Detection Using Time-Variant Normal Profiling Jung-Yeop Kim, Utica College Rex E. Gantenbein, University of Wyoming.
1 of 27 PSYC 4310/6310 Advanced Experimental Methods and Statistics © 2013, Michael Kalsher Michael J. Kalsher Department of Cognitive Science Adv. Experimental.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
Intrusion Detection/Prevention Systems. Objectives and Deliverable Understand the concept of IDS/IPS and the two major categorizations: by features/models,
Chapter 10 Hypothesis Testing
Confidence Intervals and Hypothesis Testing - II
Business Statistics, A First Course (4e) © 2006 Prentice-Hall, Inc. Chap 9-1 Chapter 9 Fundamentals of Hypothesis Testing: One-Sample Tests Business Statistics,
Fundamentals of Hypothesis Testing: One-Sample Tests
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
Network Intrusion Detection Using Random Forests Jiong Zhang Mohammad Zulkernine School of Computing Queen's University Kingston, Ontario, Canada.
Evidence Based Medicine
1 9/23/2015 MATH 224 – Discrete Mathematics Basic finite probability is given by the formula, where |E| is the number of events and |S| is the total number.
Making decisions about distributions: Introduction to the Null Hypothesis 47:269: Research Methods I Dr. Leonard April 14, 2010.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
Statistics for Managers Using Microsoft Excel, 4e © 2004 Prentice-Hall, Inc. Chap 8-1 Chapter 8 Fundamentals of Hypothesis Testing: One-Sample Tests Statistics.
Lecture 9 Chap 9-1 Chapter 2b Fundamentals of Hypothesis Testing: One-Sample Tests.
1 Data Mining: Concepts and Techniques (3 rd ed.) — Chapter 12 — Jiawei Han, Micheline Kamber, and Jian Pei University of Illinois at Urbana-Champaign.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Intrusion Detection State of the Art/Practice Anita Jones University of Virginia.
Chap 8-1 Fundamentals of Hypothesis Testing: One-Sample Tests.
1 A Network Security Monitor Paper By: Heberlein et. al. Presentation By: Eric Hawkins.
NC State / UC Davis / MCNC Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves  S. Felix Wu  Dan Stephenson DARPA.
Cryptography and Network Security Sixth Edition by William Stallings.
Comp. Genomics Recitation 10 4/7/09 Differential expression detection.
STATISTICS FOR SCIENCE RESEARCH (The Basics). Why Stats? Scientists analyze data collected in an experiment to look for patterns or relationships among.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Outline of Today’s Discussion 1.The Distribution of Means (DOM) 2.Hypothesis Testing With The DOM 3.Estimation & Confidence Intervals 4.Confidence Intervals.
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
Network Anomaly Detection Using Autonomous System Flow Aggregates Thienne Johnson 1,2 and Loukas Lazos 1 1 Department of Electrical and Computer Engineering.
Hypothesis Tests for 1-Proportion Presentation 9.
Statistical principles: the normal distribution and methods of testing Or, “Explaining the arrangement of things”
Definition Slides Unit 2: Scientific Research Methods.
Definition Slides Unit 1.2 Research Methods Terms.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
STATISTICS FOR SCIENCE RESEARCH
Malicious Packet Dropping: How It Might Impact the TCP Performance
Detecting Insider Information Theft Using Features from File Access Logs Every action, on your phone, on your computer, online, has some risk associated.
Intrusion Detection system
Indicator 3.05 Interpret marketing information to test hypotheses and/or to resolve issues.
Modeling IDS using hybrid intelligent systems
Presentation transcript:

01/04/2006ecs236 winter Intrusion Detection ecs236 Winter 2006: Intrusion Detection #3: Anomaly Detection Dr. S. Felix Wu Computer Science Department University of California, Davis

01/04/2006ecs236 winter Intrusion Detection Intrusion Detection Model Input event sequence Results Pattern matching

01/04/2006ecs236 winter Scalability of Detection l Number of signatures, amount of analysis l Unknown exploits/vulnerabilities

01/04/2006ecs236 winter Anomaly vs. Signature l Signature Intrusion (Bad things happen!!) –Misuse produces observable bad effect –Specify and look for bad behaviors l Anomaly Intrusion (Good things did not happen!!) –We know what our normal behavior is –Looking for an deviation from the normal behavior, raise early warning

01/04/2006ecs236 winter Reasons for “AND” l Unknown attacks (insider threat) l Better scalability –AND  target/vulnerabilities –SD  exploits

01/04/2006ecs236 winter Another definition… l Signature-based detection –Predefine the signatures of anomalies –Pattern matching l Statistics-based detection –Build statistics profile for expected behaviors –Compare testing behaviors with expected behaviors –Significant deviation Convert our limited/partial understanding/modeling about the target system or protocol into detection heuristics (i.e., BUTTERCUP signatures) Based on our experience, select a set of “features” that will likely to distinguish expected from unexpected behavior.

01/04/2006ecs236 winter What is “vulnerability”?

01/04/2006ecs236 winter What is “vulnerability”? Signature Detection create “effective/strong/scaleable” signatures Anomaly Detection detect/discover “unknown vulnerabilities”

01/04/2006ecs236 winter AND (ANomaly Detection) l Unknown Vulnerabilities/Exploits l Insider Attacks l Understand How and Why these things happened l Understand the limit of AND from both sides

01/04/2006ecs236 winter What is an anomaly?

01/04/2006ecs236 winter For each sample of the statistic measure, X (0, 1] 40% (1, 3] 30% (3, 15] 20% (15, +  ) 10% Input Events SAND

01/04/2006ecs236 winter quantify the anomalies alarm generationthreshold control raw events long term profile “But, which feature(s) to profile??” function F

01/04/2006ecs236 winter What is an anomaly? Events Expected Behavior Model Anomaly Detection

01/04/2006ecs236 winter What is an anomaly? Events Expected Behavior Model Anomaly Detection Knowledge about the Target

01/04/2006ecs236 winter Model vs. Observation the ModelAnomaly Detection Conflicts  Anomalies It could be an attack, but it might well be misunderstanding!!

01/04/2006ecs236 winter Statistic-based ANomaly Detection (SAND) l choose a parameter (a random variable hopefully without any assumption about its probabilistic distribution) l record its statistical “long-term” profile l check how much, quantitatively, its short- term behavior deviates from its long term profile l set the right threshold on the deviation to raise alarms

01/04/2006ecs236 winter decay update clean compute the deviation alarm generationthreshold control timer control raw events long term profile

01/04/2006ecs236 winter Statistical Profiling n Long-Term profile: u capture long-term behavior of a particular statistic measure u e.g., update once per day u half-life: 30 updates F recent 30: 50% F 31-60: 25% F the newer contributes more

01/04/2006ecs236 winter Statistical Pros and Cons l Slower to detect - averaging window l Very good for unknown attacks - as long as “relevant measures” are chosen l Environment (protocol, user, etc) dependency –Need good choices on statistical measures –Statistical profiles might be hard to build –Thresholds might be hard to set

01/04/2006ecs236 winter Long-term Profile l Category, C-Training 4learn the aggregate distribution of a statistic measure l Q Statistics, Q-Training 4learn how much deviation is considered normal l Threshold

01/04/2006ecs236 winter Long-term Profile: C-Training For each sample of the statistic measure, X (0, 50] 20% (50, 75] 30% (75, 90] 40% (90, +  ) 10% l k bins l Expected Distribution, P 1 P 2... P k, where l Training time: months

01/04/2006ecs236 winter Long-term Profile: Q-Training (1) For each sample of the statistic measure, X (0, 50] 20% (50, 75] 40% (75, 90] 20% (90, +  ) 20% l k bins, samples fall into bin l samples in total ( ) l Weighted Sum Scheme with the fading factor  s

01/04/2006ecs236 winter Threshold l Predefined threshold,  l If Prob(Q>q) < , raise alarm

01/04/2006ecs236 winter Long-term Profile: Q-Training (2) l Deviation: 4Example: l Q max 4the largest value among all Q values

01/04/2006ecs236 winter Long-term Profile: Q-Training (3) l Q Distribution 4[0, Qmax) is equally divided into 31 bins and the last bin is [Qmax, +  ) 4distribute all Q values into the 32 bins

01/04/2006ecs236 winter Weighted Sum Scheme l Problems of Sliding Window Scheme 4Keep the most recent N pieces of audit records 4required resource and computing time are O(N) l Assume 4K: number of bins 4Y i : count of audit records falls into i th bin 4N: total number of audit records 4  : fading factor l When E i occurs, update

01/04/2006ecs236 winter FTP Severs and Clients FTP Client SHANG FTP Servers Heidelberg NCU SingNet UIUC

01/04/2006ecs236 winter Q-Measure l Deviation: 4Example: l Q max 4the largest value among all Q values

01/04/2006ecs236 winter

01/04/2006ecs236 winter Threshold l Predefined threshold,  l If Prob(Q>q) < , raise alarm False positive

01/04/2006ecs236 winter

01/04/2006ecs236 winter Mathematics l Many other techniques: –Training/learning –detection

01/04/2006ecs236 winter decay update clean compute the deviation alarm generationthreshold control timer control raw events long term profile

01/04/2006ecs236 winter Dropper Attacks P% Per(K,I,S) Ret(K,S) Ran(K) Intentional or Unintentional??

01/04/2006ecs236 winter Periodical Packet Dropping l Parameters (K, I, S) 4K, the total number of dropped packets in a connection 4I, the interval between two consecutive dropped packets 4S, the position of the first dropped packet. l Example (5, 10, 4) 45 packets dropped in total 41 every 10 packets 4start from the 4 th packet 4The 4 th, 14 th, 24 th, 34 th and 44 th packet will be dropped

01/04/2006ecs236 winter Retransmission Packet Dropping l Parameters (K, S) 4K, the times of dropping the packet's retransmissions 4S, the position of the dropped packet l Example (5, 10) 4first, drops the 10 th packet 4then, drops the retransmissions of the 10 th packet 5 times

01/04/2006ecs236 winter Random Packet Dropping l Parameters (K) 4K, the total number of packets to be dropped in a connection l Example (5) 4randomly drops 5 packets in a connection

01/04/2006ecs236 winter Experiment Setting FTP Internet Divert Socket FTP Client xyz.zip 5.5M FTP Server Attack Agent Data Packets

01/04/2006ecs236 winter Impacts of Packet Dropping On Session Delay

01/04/2006ecs236 winter Compare Impacts of Dropping Patterns PerPD: I=4, S=5 RetPD: S=5

01/04/2006ecs236 winter bone fire redwing light UDP flood FTP data TFN agents TFN target FTP client FTP server congestion air TFN master

01/04/2006ecs236 winter

01/04/2006ecs236 winter TDSAM Experiment Setting FTP Internet Divert Socket FTP Client xyz.zip 5.5M FTP Server Attack Agent TDSAM Data Packets p1, p2, p3, p5, p4 max reordering counting

01/04/2006ecs236 winter

01/04/2006ecs236 winter

01/04/2006ecs236 winter Results: Position Measure

01/04/2006ecs236 winter Results: Delay Measure

01/04/2006ecs236 winter Results: NPR Measure

01/04/2006ecs236 winter Results (good and bad) l False Alarm Rate 4less than 10% in most cases, the highest is 17.4% l Detection Rate 4Position: good on RetPD and most of PerPD > at NCU, 98.7% for PerPD(20,4,5), but 0% for PerPD(100, 40, 5) in which dropped packets are evenly distributed 4Delay: good on those significantly change session delay, e.g., RetPD, PerPD with a large value of K > at SingNet, 100% for RetPD(5,5), but 67.9% for RanPD(10) 4NPR: good on those dropping many packets > at Heidelberg, 0% for RanPD(10), but 100% for RanPD(40)

01/04/2006ecs236 winter Performance Analysis l Good sites correspond to a high detection rate. 4stable and small session delay or packet reordering 4e.g., using Delay Measure for RanPD(10): UIUC (99.5%) > Heidelberg(74.5%) > SingNet (67.9%) > NCU (26.8%) l How to choose the value of nbin is site-specific 4e.g., using Position Measure, lowest false alarm rate occurs when nbin= 5 at Heidelberg(4.0%) and NCU(5.4%), 10 at UIUC(4.5%) and 20 at SingNet(1.6%)

01/04/2006ecs236 winter decay update clean compute the deviation alarm generationthreshold control timer control raw events long term profile

01/04/2006ecs236 winter decay update clean cognitively identify the deviation alarm identification Information Visualization Toolkit raw events cognitive profile

01/04/2006ecs236 winter What is an anomaly?

01/04/2006ecs236 winter What is an anomaly? l The observation of a target system is inconsistent, somewhat, with the expected conceptual model of the same system

01/04/2006ecs236 winter What is an anomaly? l The observation of a target system is inconsistent, somewhat, with the expected conceptual model of the same system l And, this conceptual model can be ANYTHING. –Statistical, logical, or something else

01/04/2006ecs236 winter Model vs. Observation the ModelAnomaly Detection Conflicts  Anomalies It could be an attack, but it might well be misunderstanding!!

01/04/2006ecs236 winter The Challenge Events Expected Behavior Model Anomaly Detection Knowledge about the Target False Positives & Negatives

01/04/2006ecs236 winter Challenge l We know that the detected anomalies can be either true-positive or false-positive. l We try all our best to resolve the puzzle by examining all information available to us. l But, the “ground truth” of these anomalies is very hard to obtain –even with human intelligence

01/04/2006ecs236 winter Problems with AND l We are not sure about whatever we want to detect… l We are not sure either when something is caught… l We are still in the dark… at least in many cases…

01/04/2006ecs236 winter Anomaly Explanation l How will a human resolve the conflict? l The Power of Reasoning and Explanation –We detected something we really want to detect  reducing false negative –Our model can be improved  reduce false positive

01/04/2006ecs236 winter Without Explanation l AND is not as useful?? l Knowledge is the power to utilize information! –Unknown vulnerabilities –Root cause analysis –Event correlation

01/04/2006ecs236 winter Anomaly Explanation the ModelAnomaly Detection Anomaly Analysis and Explanation EBL Explaining both the attack and the normal behavior

01/04/2006ecs236 winter Explanation Simulation Experiments Or Observatinon Conflicts  Anomalies

01/04/2006ecs236 winter the Model model-based event analysis observed system events SBL-based Anomaly Detection analysis reports Example Selection Explanation Based Learning model update

01/04/2006ecs236 winter AND  EXPAND l Anomaly Detection –Detect –Analysis and Explanation –Application

01/04/2006ecs236 winter

01/04/2006ecs236 winter

01/04/2006ecs236 winter

01/04/2006ecs236 winter