MITACS-PINTS Prediction In Interacting Systems Project Leader : Michael Kouriztin.

Slides:



Advertisements
Similar presentations
State Estimation and Kalman Filtering CS B659 Spring 2013 Kris Hauser.
Advertisements

A Hierarchical Multiple Target Tracking Algorithm for Sensor Networks Songhwai Oh and Shankar Sastry EECS, Berkeley Nest Retreat, Jan
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
TRUE Blind ip spoofed portscanning Thomas Olofsson C.T.O Defcom.
Tracking Unknown Dynamics - Combined State and Parameter Estimation Tracking Unknown Dynamics - Combined State and Parameter Estimation Presenters: Hongwei.
1 Reading Log Files. 2 Segment Format
Dynamic Bayesian Networks (DBNs)
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Bayesian Model Selection and Multi-target Tracking Presenters: Xingqiu Zhao and Nikki Hu Joint work with M. A. Kouritzin, H. Long, J. McCrosky, W. Sun.
PHD Approach for Multi-target Tracking
Artificial Learning Approaches for Multi-target Tracking Jesse McCrosky Nikki Hu.
Outline Formulation of Filtering Problem General Conditions for Filtering Equation Filtering Model for Reflecting Diffusions Wong-Zakai Approximation.
Models and Security Requirements for IDS. Overview The system and attack model Security requirements for IDS –Sensitivity –Detection Analysis methodology.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
The University of Texas at Austin, CS 395T, Spring 2008, Prof. William H. Press IMPRS Summer School 2009, Prof. William H. Press 1 4th IMPRS Astronomy.
Statistical based IDS background introduction. Statistical IDS background Why do we do this project Attack introduction IDS architecture Data description.
Chess Review May 11, 2005 Berkeley, CA Tracking Multiple Objects using Sensor Networks and Camera Networks Songhwai Oh EECS, UC Berkeley
Cumulative Violation For any window size  t  Communication-Efficient Tracking for Distributed Cumulative Triggers Ling Huang* Minos Garofalakis.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Vulnerabilities of Passive Internet Threat Monitors Yoichi Shinoda Japan Advanced Institute of Science and Technology Ko Ikai National Police Agency, Japan.
On the Difficulty of Scalably Detecting Network Attacks Kirill Levchenko with Ramamohan Paturi and George Varghese.
School of Computer Science and Information Systems
Computer Security and Penetration Testing
Bro: A System for Detecting Network Intruders in Real-Time Presented by Zachary Schneirov CS Professor Yan Chen.
Particle Filters++ TexPoint fonts used in EMF.
Radial Basis Function Networks
Port Scanning Prabhaker Mateti. Mateti, Port Scanning2 Port scanning Attackers wish to discover services they can break into. Attackers wish to discover.
Port Scanning.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
1. Introduction Generally Intrusion Detection Systems (IDSs), as special-purpose devices to detect network anomalies and attacks, are using two approaches.
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
Layered Approach using Conditional Random Fields For Intrusion Detection.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
Roya Ensafi, Jong Chun Park, Deepak Kapur, and Jedidiah R. Crandall University of New Mexico, Dept. of Computer Science USENIX 2010.
PINTS Network. Multiple Target Tracking Nonlinear Filtering Used for detection, tracking, and prediction of a target in a noisy environment Based entirely.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Network Design and Analysis-----Wang Wenjie Queueing System IV: 1 © Graduate University, Chinese academy of Sciences. Network Design and Analysis Wang.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Mapping Internet Sensors with Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Published At: Usenix Security Symposium, 2005.
Bayesian Classification. Bayesian Classification: Why? A statistical classifier: performs probabilistic prediction, i.e., predicts class membership probabilities.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Instructor: Eyal Amir Grad TAs: Wen Pu, Yonatan Bisk Undergrad TAs: Sam Johnson, Nikhil Johri CS 440 / ECE 448 Introduction to Artificial Intelligence.
June 10, 1999 Discrete Event Simulation - 3 What other subsystems do we need to simulate? Although Packets are responsible for the largest amount of events,
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
Open-Eye Georgios Androulidakis National Technical University of Athens.
Intrusion Detection Cyber Security Spring Reading material Chapter 25 from Computer Security, Matt Bishop Snort –
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Mapping Internet Sensor With Probe Response Attacks Authors: John Bethencourt, Jason Franklin, and Mary Vernon. University of Wisconsin, Madison. Usenix.
ELEC 303 – Random Signals Lecture 17 – Hypothesis testing 2 Dr. Farinaz Koushanfar ECE Dept., Rice University Nov 2, 2009.
Network Devices and Firewalls Lesson 14. It applies to our class…
Chien-Chung Shen Cyber Scanning Chien-Chung Shen
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Footprinting (definition 1)
Defending Against DDoS
What Makes a Network Vulnerable?
IP Traceback Problem: How do we determine where malicious packet came from ? It’s a problem because attacker can spoof source IP address If we know where.
Mapping Internet Sensors With Probe Response Attacks
Modeling, Early Detection, and Mitigation of Internet Worm Attacks
CS 416 Artificial Intelligence
Intrusion Detection Systems
Presentation transcript:

MITACS-PINTS Prediction In Interacting Systems Project Leader : Michael Kouriztin

Network Security Search and Rescue Defence Investing Environmental Monitoring Fraud Detection Nonlinear Filtering Modeling Observing

Countering Espionage in Cyber-Warfare: Detecting Stealthy Portscans Jarett Hailes Surrey Kim Michael Kouritzin Wei Sun 5th MITACS IT-Theme Meeting October 19, 2003

Outline Problem of detecting stealthy port scans Simulations Clustering model & Filtering equation Computer workable approximation

Port scanning: method for discovering network vulnerabilities Reconnaissance stage of a hacker attacks. “Probes” target network via sending packets Port Scanning

Stealthy Techniques Slow Scans : to obscure the attack, an attacker could do the scan very slowly. : Multiple source scans : using multiple sources using multiple sources Idle scanning : bouncing scans from dumb "zombie" host. Spoofed Source IP : sending large number of packets with only one as the real source.

Current Solutions Existing solutions are : Prone to false alarms and miss detects Easily foiled by new scanning techniques Insufficient information (black and white solutions) Cause for unacceptable downtime Extensive human management required

End goal : to probe 30 ports on 10 hosts. Scanning Technique: Half-open SYN Scan and t Scanning Technique: Half-open SYN Scan and to obscure the attack : may use multiple computers (i.e. source IP addresses). may use multiple computers (i.e. source IP addresses). may use may use dumb "zombie" host to bounce scans. slows down scan rate slows down scan rate sends 300 packets in random order sends 300 packets in random order Example

Detection Problem To detect whether or not there is a port scanner present. Via Filtering and Bayesian Model selection Only SYN packets are considered (i.e. No packet flag information used yet) Assume the traffic rates for target hosts

Portscan Detector Results

Traffic Summary Signal to Noise Ratio ,000 1,000,000 Number of Packets Normal Network Traffic Packets : 923,424 Port Scanner Packets : 428

Challenges and Future Work Enormous State Space : Localization : IP spoofing : Stealthy hacker scans all ports certain number of times, decreasing scan rate and using to reduce suspicion

To obscure the attack, an attacker could do the scan very slowly. Unless the target system is normally idle (in which case one packet to a non-listening port is enough for the admin to notice, not a likely real world situation), it is possible to make the delay between ports large enough for this to be likely not recognized as a scan. A way to hide the origin of a scan, while still receiving the information, is to send a large amount (say, 999) of spoofed "port scans", and only one scan from the real source address. Even if all the scans (1000 of them) are detected and logged, there's no way to tell which of the source addresses is real. All we can tell is that we've been port scanned. Idle scanning - a clever side-channel attack allows for the scan to be bounced off a dumb "zombie" host. Intrusion detection system (IDS) reports will finger the innocent zombie as the attacker. Stealthy Techniques

Clustering Model Model packet traffic as marked point process with marks, i.e. packet headers – (Destination, Source, Flags), in Network traffic mixture of two types Normal traffic rate: Normal traffic rate: Malicious & stealthy traffic rate: Malicious & stealthy traffic rate: depends on all previous scans depends on all previous scans Hacker can have stealthy strategy – e.g. scan network host port over so many days Hacker can have stealthy strategy – e.g. scan network host port over so many days Which packets are due to port scans? )(u  ),( t u  S ),( t u 

Filtering Approach New Nonlinear Filtering Approach Provides probabilistic information Provides probabilistic information Other bw Other bw Choose acceptable ratio of miss detect to false alarm Choose acceptable ratio of miss detect to false alarm Asymptotically optimal Asymptotically optimal

Normal Traffic Poisson measure – randomly distributes points across marks, rates, time Number of points in disjoint regions independent Number of points in disjoint regions independent Desired expected number of points everywhere Desired expected number of points everywhere Normal Traffic = Observation noise that must be “filtered out’’    i tvASVU iii tvA ],0[],0[),,( ]),0[],,0[,(  )()(1),( ],0[),0[ 1)](,0[1 dsddutAY tA u       

Port Scanning Buried in this noise is the signal = count of Port Scan packets at various marks Port Scan signal or cluster: Observation = observed traffic: )()(1),( ],0[),0[ 2)],(,0[ dsddutA tA u s         ),(),(),( 1 tAtAYtAY 

Simulation Example End goal : to probe 30 ports on 10 target hosts. Normal Traffic Rates : Cluster dependent scanning rate : Host

Bayesian Model Selection Detecting whether or not there is anomalous traffic on observed computer system. Bayes factor satisfies

Nonlinear Filtering Goal: Approximate Idea: Choose that does not depend on Choose that does not depend on  Then, calculations are simple Then, calculations are simple Reference probability measure method There is artificial probability Q where is Poisson measure with intensity There is artificial probability Q where  is Poisson measure with intensity P(A) = L(t) Q(A) for events A occuring by t; L is martingale P(A) = L(t) Q(A) for events A occuring by t; L is martingale  )),(|(),(tssYAPtA t  )(u

Filtering Equation Unnormalized conditional port scan distribution Then, we approximate Real-world conditional probability satisfies  )),(|)()),(((),(tssYtLtfEtf Q    (1)

Workable Approximation (I) Under general conditions and after modest work we find and prove: Under general conditions and after modest work we find and prove: In probability on pathspace for each fixed observation Y, i.e. in quenched sense. Here

Workable Approximation (II) Equation (1) is still unworkable so we let... S Ex: Suppose S is 1-dimensional... Number of Packets in Each Cell

Workable Approximation (III) Substituting into (1) and approximating counting measures on S with counting measures on with at most L N particles, one finds Here

Workable Approximation (IV) We also discretize amplitude to yield Markov chain approximation Suppose is sequence satisfying Let

Workable Approximation (V) Our Markov chain solves The approximation is given by:

Characterizing and Tracking the signal