Grant Pannell. Intrusion Detection Systems  Attempt to detect unauthorized activity  CIA – Confidentiality, Integrity, Availability  Commonly network-based.

Slides:



Advertisements
Similar presentations
Topics to be discussed Introduction Performance Factors Methodology Test Process Tools Conclusion Abu Bakr Siddiq.
Advertisements

Intrusion Detection CS461/ECE422 Spring Reading Material Chapter 8 of the text.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 10 Performance Tuning.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
Service Discrimination and Audit File Reduction for Effective Intrusion Detection by Fernando Godínez (ITESM) In collaboration with Dieter Hutter (DFKI)
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 Intrusion Detection CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 4, 2004.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
A survey of commercial tools for intrusion detection 1. Introduction 2. Systems analyzed 3. Methodology 4. Results 5. Conclusions Cao er Kai. INSA lab.
seminar on Intrusion detection system
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Lecture 11 Intrusion Detection (cont)
Intrusion Detection System Marmagna Desai [ 520 Presentation]
WAC/ISSCI Automated Anomaly Detection Using Time-Variant Normal Profiling Jung-Yeop Kim, Utica College Rex E. Gantenbein, University of Wyoming.
SOFTWARE.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Masquerade Detection Mark Stamp 1Masquerade Detection.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
Chapter 4: What is an operating system?. What is an operating system? A program or collection of programs that coordinate computer usage among users and.
MCTS Guide to Microsoft Windows Vista Chapter 11 Performance Tuning.
MCTS Guide to Microsoft Windows 7
Network Intrusion Detection Using Random Forests Jiong Zhang Mohammad Zulkernine School of Computing Queen's University Kingston, Ontario, Canada.
IIT Indore © Neminah Hubballi
Intrusion Detection Techniques for Mobile Wireless Networks Zhang, Lee, Yi-An Huang Presented by: Alex Singh and Nabil Taha.
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
Chapter 18 Intruders.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
Module 7: Fundamentals of Administering Windows Server 2008.
Windows 7 Firewall.
Clay Brockman ITK 478 Fall Why intrusion detection? Comparing two types: Monitoring Database Application Behavior Using Time Signatures.
Operating system Security By Murtaza K. Madraswala.
Linux Networking and Security
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Systems II San Pham CS /20/03. Topics Operating Systems Resource Management – Process Management – CPU Scheduling – Deadlock Protection/Security.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
Operating Systems David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 432.
Intrusion Detection Presentation : 3 OF n by Manish Mehta 02/21/03.
7.5 Intrusion Detection Systems Network Security / G.Steffen1.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Intrusion Detection State of the Art/Practice Anita Jones University of Virginia.
Cryptography and Network Security Sixth Edition by William Stallings.
Chapter 9 Intruders.
1 Intrusion Detection “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking resources.”
Intrusion Detection System
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
Library Online Resource Analysis (LORA) System Introduction Electronic information resources and databases have become an essential part of library collections.
Software Engineering Prof. Dr. Bertrand Meyer March 2007 – June 2007 Chair of Software Engineering Lecture #20: Profiling NetBeans Profiler 6.0.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Profiling: What is it? Notes and reflections on profiling and how it could be used in process mining.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Some Great Open Source Intrusion Detection Systems (IDSs)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Access control techniques
Operating system Security
Evaluating a Real-time Anomaly-based IDS
Welcome and thank you for choosing SharkGate
Chapter 2: System Structures
12/6/2018 Honeypot ICT Infrastructure Sashan
Intrusion Detection Systems
Intrusion Detection system
Presentation transcript:

Grant Pannell

Intrusion Detection Systems  Attempt to detect unauthorized activity  CIA – Confidentiality, Integrity, Availability  Commonly network-based  Obsolete? Network traffic encryption  Moving to host-based  Honeypots (emulated services)  Application’s execution flow  Behavior of the user

Detection Methods  Misuse Detection  Rule-based  User states: I use Notepad, not WordPad  Low false-positives, high detection  Can’t predict and learn how a user behaves  Anomaly Detection  Gather audit data (user’s actions) over time  Analyze with statistical methods  Create a profile – User uses Notepad, system learns  Higher false-positives, lower detection rate  Combination of both is best

Profiling a User  Must determine “normal” behavior for anomaly detection  User Profile  Characteristics:  Applications running  Number of Windows, Number of Processes  Performance of running applications (CPU usage)  Keystrokes (delays, speed)  Websites visited

Motivation  Determine unauthorized use  Adoption of encryption of network traffic  Multiple characteristics  Previous studies focus on single characteristics for profiling  Microsoft Windows - graphical user interface  Previous studies focus on command usage

So, what is it exactly? A behavioral host-based intrusion detection system That profiles a user, using multiple characteristics… To detect unauthorized use of a machine … That will run on Microsoft Windows, to take advantage of GUI characteristics

Research Questions  Is it possible? Feasible? Real-world?  Possible in a graphical user interface environment?  Combination of characteristics improves performance?  Taxes system resources?  Detection performance?  Low false-positives (disallowed authorized users)  High detection rate (disallowed intruders)  Detect in a practical amount of time?

Literature Review  Not much research in the public domain…  Behavioural Intrusion Models  Dates back to 1980 by Anderson  Manually collect Audit Trails from machines  Track file and resource access  Furthered by Denning (1987)  Detailed model of Anderson’s work  Tan (1995), Gunetti et al.(1999), Balajinath et al. (2001), Pillai (2004)  All based on UNIX  Characterizes by command usage or performance (CPU, Memory, I/O, etc.)  Different due to the learning algorithm used

Methodology  Developed System  Developed in Microsoft.NET C#  Allow each characteristic to be “snapped-in”  Extensive logging output for analysis and testing  7 Systems Test  2 “Power Users” (Win7 x64, XP x64)  2 Office Based (2x XP x86)  1 Gaming (Vista x64)  2 Web Browsing (Vista x86, XP x86)

Methodology  Learning Mode for ~10 days  System worked for collections then disabled itself  “Perfect” Learning  All false positives  Decreasing false-positives over time (learning)  Detection Mode after 10 days  Only used to break the profile  Used to determine how long it takes to break the profile  Stress test each characteristic

Prototype Architecture

Algorithms  CPU & Memory Usage  3 Techniques:  Standard Deviation (0.5 Pts) (Last 120 Values)  Rolling Average (1 Pts (Overall)  Sliding Limit (2 Pts) (Overall)  Websites Viewed  Can only check if user visits new sites, not if revisiting them  Rolling average  New sites per hour, but check every 30 seconds  Works for learning two cases  Many new sites per hour  No new sites per hour

Algorithms  Number of Windows  Wanted to check Window Titles and Positions  Titles, never static (i.e. “ - MS Word”)  Positions, seeming random for most windows  Rolling average like Websites Viewed  Not always accurate  Number of Processes  Sliding limits  Fully learned profile should include all processes  Therefore deny all new?

Algorithms  Keystroke Usage  Use digraphs  D->i, i-> g, g->r, r->a, a->p, p->h, h->s  Delay between digraphs  Standard Deviations  Collect last 100 values  Overall Scoring System  Directly related to User Activity (2 Pts)  Keystrokes, Number of Windows, Websites Viewed  Indirectly related (Application Profiling) (1 Pt)  CPU Usage, Memory Usage, Number of Processes

False-Positives vs. Number of Collections (Time) (CPU Usage)

False-Positives per Machine (Memory Usage)

False-Positives per Machine (Num Windows)

False-Positives vs. Number of Collections (Time) (Websites Viewed)

False-Positives vs. Number of Collections (Time) (Keystroke Usage)

False-Positives vs. Number of Collections (Time) (Overall Scoring)

False Positive Rate per Characteristic

Results - Intrusions  Test intrusions in Detection Mode  Trying to trigger each characteristic  Keystrokes – another user’s patterns  Only using mouse to open many new processes and windows  Use running processes, attempt abnormalities  Completely new user on same profile  Scoring system  5 point maximum  2 points for directly related  1 point for indirectly related  Minimum 3 accumulations (3*30 secs) to trigger

Average Time to Detect Intrusions per Intrusion Test

Further Research  Time block testing  Categorization  Mouse clicks  More complex learning algorithms  Intruder has physical access to the machine  System Performance

Conclusion  Is it possible? Feasible? Real-world?  Better on directly related characteristics  Possible in a graphical user interface environment?  GUI objects turned out to be not as useful as first proposed  Combination of characteristics improves performance?  Scoring system lowers false-positives  Taxes system resources?  Large history, real-time typing analysis could be better  Detection performance?  Highest false-positive rates at 4.5% with a malfunctioning characteristic  Detect in a practical amount of time?  second detection times

Questions? ?