Network Anomaly Detection Using Autonomous System Flow Aggregates Thienne Johnson 1,2 and Loukas Lazos 1 1 Department of Electrical and Computer Engineering.

Slides:



Advertisements
Similar presentations
Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
Advertisements

New Directions in Traffic Measurement and Accounting Cristian Estan – UCSD George Varghese - UCSD Reviewed by Michela Becchi Discussion Leaders Andrew.
Detectability of Traffic Anomalies in Two Adjacent Networks Augustin Soule, Haakon Ringberg, Fernando Silveira, Jennifer Rexford, Christophe Diot.
Anomaly Detection Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
A Game-theoretic Approach to the Design of Self-Protection and Self-Healing Mechanisms in Autonomic Computing Systems Birendra Mishra Anderson School of.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Detecting P2P Traffic from the P2P Flow Graph Jonghyun Kim Khushboo Shah Stephen Bohacek Electrical and Computer Engineering.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Observed Structure of Addresses in IP Traffic CSCI 780, Fall 2005.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Unsupervised Intrusion Detection Using Clustering Approach Muhammet Kabukçu Sefa Kılıç Ferhat Kutlu Teoman Toraman 1/29.
Statistical based IDS background introduction. Statistical IDS background Why do we do this project Attack introduction IDS architecture Data description.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
12/6/2010CS Andrew Bates - UCCS1 Intrusion Detection and Advanced Persistent Threats CS 591 Andrew Bates University of Colorado at Colorado Springs.
ANOMALY DETECTION AND CHARACTERIZATION: LEARNING AND EXPERIANCE YAN CHEN – MATT MODAFF – AARON BEACH.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Inferring Internet Denial-of- Service Activity David Moore, Geoffrey M Voelker, Stefan Savage Presented by Yuemin Yu – CS290F – Winter 2005.
Collaborating Against Common Enemies Sachin Katti Balachander Krishnamurthy and Dina Katabi AT&T Labs-Research & MIT CSAIL.
Modeling/Detecting the Spread of Active Worms Lixin Gao Dept. Of Electrical & Computer Engineering Univ. of Massachusetts
A Signal Analysis of Network Traffic Anomalies Paul Barford, Jeffrey Kline, David Plonka, and Amos Ron.
Design and Implementation of SIP-aware DDoS Attack Detection System.
Lecture 11 Intrusion Detection (cont)
BotFinder: Finding Bots in Network Traffic Without Deep Packet Inspection F. Tegeler, X. Fu (U Goe), G. Vigna, C. Kruegel (UCSB)
A Signal Analysis of Network Traffic Anomalies Paul Barford with Jeffery Kline, David Plonka, Amos Ron University of Wisconsin – Madison Summer, 2002.
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology USENIX Security '08 Presented by Lei Wu.
1. Introduction Generally Intrusion Detection Systems (IDSs), as special-purpose devices to detect network anomalies and attacks, are using two approaches.
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
GrIDS -- A Graph Based Intrusion Detection System For Large Networks Paper by S. Staniford-Chen et. al.
Network Flow-Based Anomaly Detection of DDoS Attacks Vassilis Chatzigiannakis National Technical University of Athens, Greece TNC.
Network Intrusion Detection Using Random Forests Jiong Zhang Mohammad Zulkernine School of Computing Queen's University Kingston, Ontario, Canada.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
1 The Research on Analyzing Time- Series Data and Anomaly Detection in Internet Flow Yoshiaki HARADA Graduate School of Information Science and Electrical.
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
Department of Information Engineering The Chinese University of Hong Kong A Framework for Monitoring and Measuring a Large-Scale Distributed System in.
Distributed Anomaly Detection in Wireless Sensor Networks Ksutharshan Rajasegarar, Christopher Leckie, Marimutha Palaniswami, James C. Bezdek IEEE ICCS2006(Institutions.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
DoWitcher: Effective Worm Detection and Containment in the Internet Core S. Ranjan et. al in INFOCOM 2007 Presented by: Sailesh Kumar.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
MonNet – a project for network and traffic monitoring Detection of malicious Traffic on Backbone Links via Packet Header Analysis Wolfgang John and Tomas.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Session 1341: Case Studies of Security Studies of Intrusion.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Mapping Internet Sensors with Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Published At: Usenix Security Symposium, 2005.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets,
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
CINBAD CERN/HP ProCurve Joint Project on Networking 26 May 2009 Ryszard Erazm Jurga - CERN Milosz Marian Hulboj - CERN.
Open-Eye Georgios Androulidakis National Technical University of Athens.
Exploiting Temporal Persistence to Detect Covert Botnet Channels Authors: Frederic Giroire, Jaideep Chandrashekar, Nina Taft… RAID 2009 Reporter: Jing.
Bradley Cowie Supervised by Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University DATA CLASSIFICATION FOR CLASSIFIER.
Consensus Extraction from Heterogeneous Detectors to Improve Performance over Network Traffic Anomaly Detection Jing Gao 1, Wei Fan 2, Deepak Turaga 2,
EE515/IS523: Security 101: Think Like an Adversary Evading Anomarly Detection through Variance Injection Attacks on PCA Benjamin I.P. Rubinstein, Blaine.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
DDoS flooding attack detection through a step-by-step investigation
1 Virtual Dark IP for Internet Threat Detection Akihiro Shimoda & Shigeki Goto Waseda University
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
1 Modeling and Measuring Botnets David Dagon, Wenke Lee Georgia Institute of Technology Cliff C. Zou Univ. of Central Florida Funded by NSF CyberTrust.
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
Experience Report: System Log Analysis for Anomaly Detection
Parallel Autonomous Cyber Systems Monitoring and Protection
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Detecting Insider Information Theft Using Features from File Access Logs Every action, on your phone, on your computer, online, has some risk associated.
Intrusion Prevention Systems
2019/1/1 High Performance Intrusion Detection Using HTTP-Based Payload Aggregation 2017 IEEE 42nd Conference on Local Computer Networks (LCN) Author: Felix.
Intrusion Detection system
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
Autonomous Network Alerting Systems and Programmable Networks
Statistical based IDS background introduction
Presentation transcript:

Network Anomaly Detection Using Autonomous System Flow Aggregates Thienne Johnson 1,2 and Loukas Lazos 1 1 Department of Electrical and Computer Engineering 2 Department of Computer Science University of Arizona 1 IEEE GLOBECOM 2014December 10, 2014

2 Network Anomalies

3 Characteristics of Network Anomalies AnomalyCharacteristicsVariations in DDoS(D) DoS against a single victim Number of packets and number of flows AlphaUnusually high rate point to point byte transfer Number of packets and volume ScanScanning a host for a vulnerable port (port scan) Scanning the network for a target port (network scan) Incoming flows to a host:port Incoming flows to a port number Examples

Deep packet inspection scalability problem in terms of computational and storage capacity Deep packet inspection scalability problem in terms of computational and storage capacity Anomaly detection Flow aggregation techniques merge multiple flow records with similar properties, and discarding benign flows summarize IP flows to statistical metrics – reduce the amount of state and history information that is maintained At IP flow level: computation and storage requirements for an online NIDS can still be prohibitively large Flow aggregation techniques merge multiple flow records with similar properties, and discarding benign flows summarize IP flows to statistical metrics – reduce the amount of state and history information that is maintained At IP flow level: computation and storage requirements for an online NIDS can still be prohibitively large 4

To reduce communication and storage overheads – By exploiting the organization of the IP space to Autonomous Systems (ASes) To detect large-scale network threats that create substantial deviations in network activity compared with benign network conditions To reduce communication and storage overheads – By exploiting the organization of the IP space to Autonomous Systems (ASes) To detect large-scale network threats that create substantial deviations in network activity compared with benign network conditions Our Goals 5

Outline System design Case Study Conclusion and future work 6

7 AS level anomalies at a monitored network

8 Methodology

9 – IP-to-AS Flow Translation Aggregate IP flows to AS flows Aggregate IP flows to AS flows Each AS flow: -Number of IP flows -Number of IP packets -Volume (Bytes) Each AS flow: -Number of IP flows -Number of IP packets -Volume (Bytes) 1 1

10 – Metrics for data aggregation Different anomalies affect different network flow parameters During aggregation period A: 1. Packet count (N): number of packets associated with the AS flow 2. Traffic volume (V): traffic volume associated with the AS flow 3. IP Flow count (IP): number of IP flows associated with the AS flow 4. AS Flow count (F): The number of AS flows that are active.Flows from spoofed IP addresses (network/16) are aggregated as a flow from Fake AS nodes.Flows from ASes not contacted before could be an anomalous event.Flows from spoofed IP addresses (network/16) are aggregated as a flow from Fake AS nodes.Flows from ASes not contacted before could be an anomalous event 2 2

11 – Data aggregation Training Phase: intervals I 1,...,I m. Traffic for each of the m intervals is represented by the same model. Training Phase: intervals I 1,...,I m. Traffic for each of the m intervals is represented by the same model. Online Phase: traffic model for the online phase is computed over an epoch, which is shorter than an interval. Collect k samples for each metric using the aggregate values over k aggregation periods Online Phase: traffic model for the online phase is computed over an epoch, which is shorter than an interval. Collect k samples for each metric using the aggregate values over k aggregation periods 2b

12 – Statistical Analysis For every AS flow, and every metric: 3 3

13 – Statistical Analysis pmf X D Training data Real-time data where (KL(P,Q) if the Kullback-Liebler divergence Jeffrey distance Measure statistical divergence 3b

14 – Statistical Analysis Distances are normalized to ensure equal distance scales when multiple metrics are combined to one Value that fall in the 95 th percentile of historical distance for metric i accumulated over moving window W 3c

15 – Composite Metrics To capture the multi-dimensional nature of network behaviors, composite metrics combine several basic metrics 4 4 Weights could be adjusted to favor a subset of metrics, depending on the nature of the anomaly to be detected. weighting formula among the different metrics Foreach Epoch Ci > Threshold? Alert abnormal behavior Foreach Epoch Ci > Threshold? Alert abnormal behavior

16 - Training data update Moving window mechanism for maintaining the training data 5 5 D(E,W) < Threshold Update D(E,W) < Threshold Update

17 Case study MIT LLS DDOS 1.0 intrusion dataset which simulates several DoS attacks and background traffic. Anomaly in AS A Anomaly in AS B

18 Volumetric analysis – no AS distinction Anomaly in AS C

Example of use with IMap Fowler, J; Johnson, T; Simonetto,P; Lazos, P; Kobourov, S.; Schneider, M. and Acedo, C. IMap: Visualizing Network Activity over Internet Maps, Vizsec Anomaly scores per AS 19

Conclusions & Future work NIDS based on AS flow aggregates. Reduction in storage and computation overhead Basic network anomaly detection metrics are adapted to the AS domain Composite metrics of network activity combine several basic metrics New basic metric that counts the number of AS flows for detecting anomalous events NIDS based on AS flow aggregates. Reduction in storage and computation overhead Basic network anomaly detection metrics are adapted to the AS domain Composite metrics of network activity combine several basic metrics New basic metric that counts the number of AS flows for detecting anomalous events 20 Work supported by Office of Naval Research under Contract N D-0033/0002  Formal study on composite metrics targeting known anomalies

Thank you! NETVUE website: 21 IEEE GLOBECOM 2014December 10, 2014