SRS Kickoff Meeting, Arlington, VA, July 21, 2004

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
Software Quality Assurance Plan
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
SACM Terminology Nancy Cam-Winget, David Waltermire, March.
1 Telstra in Confidence Managing Security for our Mobile Technology.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
STATE OF THE PRACTICE OF INTRUSION DETECTION TECHNOLOGIES Presented by Hap Huynh Based on content by SEI.
Lecture 11 Reliability and Security in IT infrastructure.
Computer Security: Principles and Practice
seminar on Intrusion detection system
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Introduction to Network Defense
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 5 – Implementing Intrusion Prevention.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
A Policy-based Approach to Wireless LAN Security Management George Lapiotis, Byungsuk Kim, Subir Das, Farooq Anjum Speaker: George Lapiotis
Mitigating the Insider Threat using High- dimensional Search and Modeling Telcordia Contact: Eric van den Berg (732)
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Module 14: Configuring Server Security Compliance
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
An Analysis of Location-Hiding Using Overlay Networks Ju Wang and Andrew A. Chien Department of Computer Science and Engineering, University of California.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Client: The Boeing Company Contact: Mr. Nick Multari Adviser: Dr. Thomas Daniels Group 6 Steven BromleyJacob Gionet Jon McKeeBrandon Reher.
Chapter 5: Implementing Intrusion Prevention
Network Security Technologies CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Mitigating the Insider Threat using High-dimensional Search and Modeling Presenter: Eric van den Berg Wednesday, July 13, 2005.
Note1 (Admi1) Overview of administering security.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
1 COPYRIGHT © 2015 ALCATEL-LUCENT. ALL RIGHTS RESERVED. Cognitive Security: Security Analytics and Autonomics for Virtualized Networks Lalita Jagadeesan.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Automatic Detection of Emerging Threats to Computer Networks Andre McDonald.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
CSCE 548 Secure Software Development Security Operations.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Virtualized Execution Realizing Network Infrastructures Enhancing Reliability Application Communities PI Meeting Arlington, VA July 10, 2007.
Role Of Network IDS in Network Perimeter Defense.
A Blackboard-Based Learning Intrusion Detection System: A New Approach
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung 2011/11/22.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Visual Analytics for Cyber Defense Decision-Making Anita D’Amico, Ph.D. Secure Decisions division of Applied Visions, Inc.
DOWeR Detecting Outliers in Web Service Requests Master’s Presentation of Christian Blass.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Some Great Open Source Intrusion Detection Systems (IDSs)
Security Methods and Practice CET4884
Proactive Incident Response
Critical Security Controls
Security Methods and Practice CET4884
Intrusion Detection & Prevention
Intrusion Detection system
Presentation transcript:

Mitigating the Insider Threat using High-dimensional Search and Modeling SRS Kickoff Meeting, Arlington, VA, July 21, 2004 Telcordia Contact: Eric van den Berg (732) 699 2748 evdb@research.telcordia.com Team: Shambhu Upadhyaya (SUNY Buffalo) Roy Maxion (CMU) Raj Rajagopalan (HP Labs & Rutgers) An SAIC Company

Talk outline Problem description Prior art About this project Summary Key ideas Proposed architecture Technical approach Challenges Metrics for success Summary

Insider Threat: Problem motivation 59% of companies have had one or more ‘Insider abuse of net access’ incidents in 2003 Estimated losses due to ‘Insider net abuse’ and ‘unauthorized access’ $15 M Source: FBI/CSI Computer Crime and Security Survey 2004.

What are the key aspects of the Insider Threat problem? Insider attacks are different from outside attacks: starting with privileges that cannot be denied Resource access Knowledge of targets and vulnerabilities Insider attacks are more difficult to detect and defend against Perimeter defenses look for outside attacks Any user or group of users may potentially launch an attack Can inflict wider damage, quicker High premium on not punishing the good users Detection requires large number of correlated data streams to be processed Insiders may subvert single stream detection Need proactive approach Learning of attacks after-the-fact is often too late because damage is done Learning how to deal with similar attacks in the future is critical: insiders already know previous attack signatures are in place

What is done today? Reactive systems Detect attacks late in cycle Anomaly detection systems Few streams for correlation, suffer from curse of dimensionality Human-in-the-loop systems Response not scalable Prior attacks pulled from administrator experience Consequences of response vs impact attack Collateral damage may be large

What is the project goal? We want to build a system that defends critical services and resources against insiders Can detect attacks by correlating large numbers of sensor measurements, and Can synthesize appropriate pro-active responses to protect critical services while minimizing collateral damage.

What is our idea? The highlights Collect data from as many different kinds of sensors as possible Audit logs, Web/application logs, network flow data, firewall logs Construct formal model of organizational information aspect of insider threat Can guide placement of sensors Store sensor data in a unified format Suitably filtered and/or aggregated Create historical record in database Use high-dimensional search techniques Create clusters on historical records Search for records similar to current sensor snapshot Initially use humans for expert knowledge, to label history and tune searches Predict attacks using labeled clusters of historical data Predict attack as soon as state becomes similar to past attack precursor Create proactive, automated response Conduct impact analysis of attack on availability of critical services Generate candidate responses and evaluate their impact before deployment

Proposed architecture

Sensor network Install sensors at multiple system layers to monitor applications, servers, hosts and other devices on which critical services depend: End-host sensors (applications, cpu-load, audit logs, web logs, registry, user challenges, etc) Network sensors (aggregate traffic, flow data,…) Aggregators and filters (to reduce sensor data volume) Main idea: Make it very hard for malicious insider to avoid triggering some sensor

Translation and mapping Translate sensor data Normalize sensor data Filter sensor data Aggregate sensor data Map sensor data into network state description Group sensor values into high-dimensional vector Vector of sensor values forms both ‘query’ for search engine, and part of historical network state description

Search engine and Network state repository Use Search Engine to compare current state document to historical documented network states. Search Engine will use Singular Value Decomposition (SVD) techniques for dimension reduction of attribute space Also experimenting with random projection methods Output of Search Engine “Top-K” list of similar documents, together with distance or similarity. If current state is sufficiently similar to past attack, send attack type and location to Response Engine for impact analysis Build Network state repository Construct schema to support search Addresses ‘Curse of dimensionality’ in anomaly detection

High dimensional Search via SVD on Labeled Clusters 1.0 Normal Insider DoS Worms S8 S10 S13 S14 S9 S4 S15 query S1 1.0 S2 S6 S16 S5 S11 S12 S7 S17 S3

Insider analyzer and modeler New formal threat model that captures the organizational information aspect of the insider threat Threat model based on new graph model This model allows analysis of the following questions: What are likely/feasible attack paths? What is the corresponding difficulty (‘cost’) of each such attack? This component helps determine: Which parts of the organization need more careful monitoring? Which security policies need to be reinforced? Insider analyzer and modeler may also guide placement of sensors, and help label clusters of network states

Impact Analysis using Response Engine Building upon Smart Firewalls technology from Dynamic Coalitions program Response Engine has overview of current network configuration Response Engine logically validates Policies, expressed in terms of end-to-end service availability Response Engine generates candidate reconfigurations to comply with Policies as much as possible In this project Detected attack type and location is translated into its effect on the current network configuration E.g. Server failure due to a Denial of Service attack Response Engine can analyze the impact of both the attack and its candidate responses on the availability of critical resources Administrator can push response into the network

Technical challenges We are testing a new hypothesis of whether search engine techniques can be used effectively for this problem. Our key insight is that network attacks are often similar to each other but it is hard to predict what the small change is. Telcordia has extensive experience with SVD based searches in text-based information retrieval. Here we are testing SVD search technology in a new domain. Training search engine: tune distance metrics, label data, reduce false alarms New ‘Insider attack-information graph’ problem is hard

How do we know if we succeeded? Example Scenario: 1. Launch known insider attack in one part of testbed network and tag the data. 2. Launch the same attack in a different part of testbed network. 3. Detect attack using Search Engine. 4. Analyze impact on network using Response Engine 5. Respond using appropriate configuration change (similar to response to old attack) Success = detection and appropriate response to attack after completing steps 3 through 5. Repeat the experiment changing different parameters of the attack such as topology, location, scale, source/target choices, and finally attack vector.

Summary If we succeed, we will have a system that defends critical services and resources against insiders, which Can detect attacks by correlating large numbers of sensor measurements, and Can synthesize appropriate pro-active responses to protect critical services while minimizing collateral damage.