100% found this document useful (1 vote)
92 views4 pages

The Design and Implementation of Host-Based Intrusion Detection System

The document describes a host-based intrusion detection system that was designed and implemented. It combines log file analysis and BP neural network technologies for intrusion detection. Log file analysis uses pattern matching for misuse detection. The BP neural network provides anomaly detection. The system is able to effectively improve detection efficiency and accuracy through this dual approach.

Uploaded by

zia khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
92 views4 pages

The Design and Implementation of Host-Based Intrusion Detection System

The document describes a host-based intrusion detection system that was designed and implemented. It combines log file analysis and BP neural network technologies for intrusion detection. Log file analysis uses pattern matching for misuse detection. The BP neural network provides anomaly detection. The system is able to effectively improve detection efficiency and accuracy through this dual approach.

Uploaded by

zia khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Third International Symposium on Intelligent Information Technology and Security Informatics

The Design and Implementation of Host-based Intrusion Detection System

LIN Ying ZHANG Yan OU Yang-Jia


School of Software Computer Science Department School of Information Science and
Yunnan University Southwest Forestry University Engineering
Kunming,Yunnan Province, China Kunming, Yunnan Province ,China Central South University
[email protected] [email protected] Changsha, Hunan Province, China
[email protected]

AbstractIntrusion detection is the process of identifying and uses methods of statistic analysis methodology, artificial
responding to suspicious activities targeted at computing and neural network technology, data mining technology, and
communication resources, and it has become the mainstream of artificial immune technology. Misuse intrusion detection
information assurance as the dramatic increase in the number of refers to the detection of intrusions by precisely defining
attacks. Intrusion detection system (IDS) monitors and collects them ahead of time and watching for their occurrences[4].
data from a target system that should be protected, processes and Misuse intrusion detection usually use methods of expert
correlates the gathered information, and initiates responses when system, TCP/IP protocol analysis, and pattern matching.
evidence of an intrusion is detected. In this paper, we designed and In this paper, we designed and implemented a host-based
implemented a host-based intrusion detection system, which intrusion detection system, which uses pattern matching and
combines two detection technologies, one is log file analysis
BP neural network as its detection methods. Firstly, the
technology and the other is BP neural network technology. Log file
analysis is an approach of misuse detection, and BP neural network
HIDS uses log files as its primary sources of information,
is an approach of anomaly detection. By combination of these two and through three steps of pre-decoding log file, decoding
kinds of detection technologies, the HIDS that we have log file, and analysis log file, it can effectively identify
implemented can effectively improve the efficiency and accuracy various intrusions. Secondly, based on BP neural network
of intrusion detection. analysis technology and through establishment of system
behavior characteristics profile in advance, the HIDS can
Keywords- intrusion detection; intrusion detection system; identify intrusions by comparison with threshold.
HIDS; Log analysis; BP neural network;OSSEC Experiment results show that the HIDS can effectively
improve the efficiency and accuracy of intrusion detection.
I. INTRODUCTION The rest of the paper is organized as follows. Section 2
describes log analysis technology. Section 3 describes BP
In 1980, James Anderson introduced the concept of neural network analysis technology. Section 4 describes the
Intrusion Detection [1], which defined an intrusion attempt design and implementation of HIDS. Section 5 gives some
or a threat to be the potential possibility of a deliberate screenshot of experiment and section 6 concludes.
unauthorized attempt to access information, to manipulate
information, or to render a system unreliable or unusable. II. LOG FILE ANALYSIS
Since then, several techniques for detecting intrusions have Log files record the behavior of computer system and
been studied. In 1987, the first intrusion detection system aim at recording the action of operating system, applications,
model was studied out by Georgetown University Dorothy and use behaviors. Log file is widely used for system
Denning and SR I / CSL's PeterNeumann[2]. debugging, monitoring, and security detection. Log system is
An Intrusion Detection System(IDS) monitors and particularly important in intrusion detection and log file
collects data from a target system that should be protected, analysis tool have become an indispensable tools for daily
processes and correlates the gathered information, and inspection and maintenance of the system running.
initiates responses when evidence of an intrusion is In general, log analysis-based HIDS includes the
detected[3].Depending on their source of input, IDSs can be following several parts: collection of log file data, pre-
classified into Host-based Intrusion Detection decoding of log file, decoding of log file, analysis of log file
System(HIDS), Network-based Intrusion Detection and report events.
System(NIDS) and Hybrid Intrusion Detection System. A. Collection of log file
Network-based intrusion detection system collects input data The acquisition of host log file data mainly includes two
by monitoring network traffic. Host-based intrusion categories: one is system-level logs, and the other is the
detection system collects input data from the host it application layer logs. You can use your own log tools or
monitors. Hybrid intrusion detection system collects input third party log tools to access log file. In short, in the
data from both of network traffic and hosts it monitors. collection phase, it is necessary to collect operational
Anomaly detection and Misuse detection are two information as far comprehensive as possible.
main techniques that HIDS use. Anomaly detection refers to
B. Pre-decoding of log file
intrusions that can be detected based on anomalous behavior
and use of computer resources. Anomaly detection usually

978-0-7695-4020-7/10 $26.00 2010 IEEE 595


DOI 10.1109/IITSI.2010.127
The purpose of the log file pre-decoding is to extract E. Report Events
general information from the log. For example, suppose a After the process of log file analysis, report to the
new SSHD log produced a SSHD message: controller when necessary.
III. BP NEURAL NETWORK
Back propagation(BP) algorithm[7] is an approximate
steepest descent algorithm, in which the performance index
is mean square error. It can be used to train multilayer neural
After pre-decoding the message, the date Apr 14 17:32:06, networks and it is used widely in practice. It is essentially a
the host name linying, and the program name sshd are network of simple processing elements working together to
extracted. The extracted messages will be recorded as produce a complex output. These elements or nodes are
follows: arranged into different layers: input, middle and output. The
z Time/date->Apr 14 17:32:06 output from a back propagation neural network is computed
z Host name->linying using a procedure known as the forward pass[2][8][9].
z Program name->SSHD The forward pass produces an output vector for a given
C. Decoding of log file input vector based on the current state of the network
Log file decoding is the process to identify key weights. Since the network weights are initialized to random
information from logs. In the HIDS, we use regular values, it is unlikely that reasonable outputs will result before
expressions to identify certain keywords. For example, we training. The weights are adjusted to reduce the error by
still assume that SSHD log produced a SSHD message as propagating.
above. After decoding this message, the content accepted The output error is backward through the network. This
password for root from 172.16.29.26 , the source IP address process is where the back propagation neural network gets its
172.16.29.26 and the user name root are all extracted. name and is known as the backward pass.
The extracted messages will be recorded as follows: The training set is repeatedly presented to the network
z Source IP address->172.16.29.26 and the weight values are adjusted until the overall error is
z User name->root below a predetermined tolerance. Since the Delta rule
z Log->accepted password for root form 172.16.29.26 follows the path of greatest decent along the error surface,
D. Analysis of log file local minima can impede training. The momentum term
After the three stages of log collection, log pre-decoding compensates for this problem to some degree.
and log decoding, all the contents are read into the rules tree. This paper uses the back propagation algorithm to train
In this paper, we constructed the rules tree based on more the multi-layer neural network in order to detect the anomaly
than 400 rules of the OSSEC[5][6] .The general structure of intrusions. There are many measures that can be used to be
the rule tree are shown in Figure 1. input value of BP network algorithm. The following table
illustrates some intrusion detection measures that can be used
as the input value of BP network algorithm.
TABLE I. SOME MEASURES THAT INTRUSION DETECTION CAN USE

Login and session activity


z Login frequency
z Login frequency at different positions
z Time consumed by each session
z Website output

Resources utilization
Figure 1. The rules tree.
z Password failed times when login
z The implementation of commands and procedures
After we got the decoded sequence of events, we will
z Operating frequency
traverse the rules tree to do the matching process. For
z Utilization of procedure resources
example, if we have the rules tree shown in Figure 1 and we
got the event IF, then the matching process can be described File operating activity
as follows: z The frequency of file read, write, create, and delete
First of all, the event IF will be compared with 101 z Records read and write
nodes, if the match is successful, enter 101 in the left node z Read, write, create and delete file
111, else access to its right node 301. If found matching We can use these measures as input value of BP neural
rules, then the first thing is to determine whether to do the network algorithm, through adjust the network parameters to
ignore operations, if not, then perform the audit to effectively minimize the mean square error, and finally establish
track the attacks. Then to determine what instructions should characteristic profile in advance. The training phase may
be implemented. take days or weeks of computer time. This has encouraged

596
considerable research on methods to accelerate the will open a demon, and the demon will check every log files
convergence of algorithm. to find whether there is changes in the log file. If there really
exits a change, then the demon will report to the log
IV. IMPLEMENTATION analyzer.
As discussed above, the HIDS combines two approaches 2) System resources monitor
of misuse detection and anomaly detection. The structure of
Monitoring the use of system resources, and sends the
the whole system is described as the figure 2:
status of the system resources utilization to the system
resources analyzer at regular time.
3) Connector
The connector is responsible for receiving messages from
log monitor and system resources monitor, and sending these
messages to log analyzer and system resources analyzer.
4) Log analyzer
Receiving events from the log monitor, match with the
rule base to determine whether there is invasion, if there is
invasion occurrence, report to the active response unit.
5) System resources analyzer
Receiving events form the system resources monitor, to
calculate whether the abnormal state of current resources use
and thus to determine whether the status is invaded, if it find
there is invasion, report to the active response unit.
Figure 2. The structure of the HIDS.
6) Active response unit
1) Log monitor Receiving events from the log analyzer and system
Monitoring the log file, once the log change, log monitor resources analyzer, decided to perform what kind of
will send events to the log analyzer immediately. operation. Usually, the normal operations include notifying
Generally, we need to monitor three kinds of event logs: users, auditing, disconnecting from network and so on.
application log, security log and system log. We can add
7) Audit database
three XML nodes in the following configuration file.
<localfile> Recording the entire process of intrusion detection, and
<location>Application</location> the attack situation, prepare for use when necessary.
<log_format>eventlog</log_format> V. RESULT OF THE EXPERIMENT
</localfile>
<localfile> Figure 3 is the screenshots that illustrates intrusions that
<location>Security</location> were detected by log analysis technology.
<log_format>eventlog</log_format>
</localfile>
<localfile>
<location>System</location>
<log_format>eventlog</log_format>
</localfile>

The node localfile represents the local file when


system initialization. The node location represents file path
in the disk. The node log_format represents what type of
the log. Log type includes event log, firewall log, SQL log
and so on.
For example, if you want to add a firewall log to the
configuration file, you just need to write as follows: Figure 3. The intrusion information detected by log analysis.
<localfile>
<location>C:/WINDOWS/pfirewall.log</location> Figure 4 is the screenshots that illustrates the training
<log_format>syslog</log_format> results when we used CPU utilization as the input values of
</localfile> BP neural network algorithm.
In this way, when initialize the HIDS, it will
automatically load the above log files that need to be
monitored. When finished the initialization work, the HIDS

597
1) By combining two approaches in the HIDS, these two
detection technology can complement each other, which can
effectively approve the efficiency and accuracy of intrusion
detection.
2) The HIDS can be gradually trained by various input
value, and the administrator can set the threshold to prevent
it is too low or too high.
3) Based on the technology of OSSEC, the HIDS can
monitor various log file, such as firewall log, router log, web
server log, and so on, which greatly improve the
compatibility of the HIDS.

Figure 4. The profile of CPU utilization. REFERENCES

If we use the CPU utilization in one moment as the input [1] J.P Anderson, Computer Security Threat Monitoring and
value to the trained BP neural network. The BP neural Surveillance, Technical report, James P Anderson Co., Fort
network will calculate the output value, if the output value Washington, Pennsylvania, April 1980.
equals to 0, then it is normal, else if the output value equals [2] Dorothy Denning, An Intrusion Detection Model, IEEE
to 1, then it is abnormal. Figure 5 is the screenshot of the Transactions on Software Engineering, February 1987, pp.2- 222.
HIDS detected abnormal CPU utilization. [3] G. Vigna and C. Kruegel, Host-based Intrusion Detection Systems,
in The Handbook of Information Security, Volume III, John Wiley &
Sons, December 2005.
[4] Sandeep Kumar, Eugene H. Spaffor, An application of Pattern
Matching in Intrusion Detection, Technical report 94-013,Purdue
University, Department of computer sciences, March 1994.
[5] Daniel B. Cid, OSSEC[OL] , 2008, http://www.ossec.net.
[6] Andrew Hay,Daniel Cid, Rory Bray, Log Analysis using OSSEC[M],
Syngress, 2007.
[7] Russell, S. and P. Norvig, 2003, Artificial Intelligence: A Modern
Approach[M], 2nd Edn, Prentice Hall, Inc.
Figure 5. The CPU utilization is abnormal. [8] Yen, J.C. and J.I. Guo, 2002, The design and realization of a chaotic
neural signal security system, Pattern Recognition and Image
Analysis (Advances in Mathematical Theory and Applications), 12,pp.
VI. CONCLUSIONS 70-79.
We used two kinds of techniques in the HIDS. One is [9] Lian, S., G. Chen, A. Cheung and Z. Wang, 2004. A chaotic-neural-
anomaly detection technology, and the other is pattern network-based encryption algorithm for JPEG2000 encoded
images.Advances in Neural Networks, Intl. Symp. Neural Networks
matching detection technology. The advantage of our system Proc., Part II, Lecture Notes in Computer Science, 3174,pp.627-632.
lies in:

598

You might also like