Intrusion Detection: Jie Lin
Intrusion Detection: Jie Lin
Jie Lin
Outline
Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion Detection
Intrusions are the activities that violate the security policy of system. Intrusion Detection is the process used to identify intrusions.
Host-based IDSs
Get audit data from host audit trails. Detect attacks against a single host
Distributed IDSs
Gather audit data from multiple host and possibly the
network that connects the hosts Detect attacks involving multiple hosts
Network-Based IDSs
Use network traffic as the audit data source, relieving
the burden on the hosts that usually provide normal computing services Detect attacks from network.
Misuse detection
Catch the intrusions in terms of the
Anomaly detection
Detect any action that significantly deviates
Misuse Detection
Based on known attack actions. Feature extract from known intrusions Integrate the Human knowledge. The rules are pre-defined Disadvantage:
Cannot detect novel or unknown attacks
Anomaly Detection
Based on the normal behavior of a subject. Sometime assume the training audit data does not include intrusion data. Any action that significantly deviates from the normal behavior is considered intrusion.
JAM, MADAM ID
How to decide the features to be used. The features are usually decided by domain experts. It may be not completely.
Accurately and generate much fewer false alarm Is able to detect unknown attacks based on audit
Cannot detect novel or unknown attacks High false-alarm and limited by training data.
Define and extract the features of behavior in system Define and extract the Rules of Intrusion Apply the rules to detect the intrusion
Audit Data 3
2 Features Rules
Intrusion Detection system is a pattern discover and pattern recognition system. The Pattern (Rule) is the most important part in the Intrusion Detection System
Machine Learning & Data mining & Statistics methods Traning Audit Data Feature Extraction Training Data & Knowled ge Pattern Extraction Expert Knowledge & Rule collection & Rule abstraction
Alarms
Discriminate function
Pass
Pattern Matching State Transition & Automata Analysis Case Based reasoning Expert System Measure Based method
Statistical method Information-Theoretic Measures Outlier analysis
Pattern Matching Measure Based method Data Mining method Machine Learning Method
Pattern Matching
to match pattern
Define a set of measures to measure different aspects of a subject of behavior. (Define Pattern) Generate an overall measure to reflect the abnormality of the behavior. For example:
statistic T2= M12+M22 ++Mn2 weighted intrusion score = Mi*Wi Entropy: H(X|Y)= P(X|Y) (-log(P(X|Y)))
Goal is to derive multi-feature (attribute) correlations from a set of records. An expression of an association pattern:
Statistics Approaches
Constructing temporal statistical features from
Pattern Matching
Nobody discuss this idea.
Neural Network
Classification
This is supervised learning. The class will be predetermined in training phase. Define the character of classes in training phase. A common approach in pattern recognition system
Clustering
This is unsupervised learning. There are not predetermined classes in data. Given a set of measurement, the aim is that establishes the class or group in the data. It will output the character of each class or group. In the detection phase, this method will get more time cost (O(n2)). I suggest this method only use in pattern discover phase
Using the pattern matching algorithm to match the pattern in sequent data for detecting intrusion. No necessary to construct the measure. But its time cost is depend on the number of association patterns. It possible constructs a pattern tree to improve the pattern matching time cost to linear time
The exist rules are the knowledge from experts knowledge or other system. The different methods will measure different aspects of intrusions. Combine these rules may find other new patterns of unknown attack. For example:
Snort has a set of rule which come from different people.
The rules may have different aspects of intrusions. We can use the data mining or machine learning method to discover the pattern from these rule.
Machine Learning & Data mining & Statistics methods Traning Audit Data Feature Extraction Training Data & Knowled ge Pattern Extraction Expert Knowledge & Rule collection & Rule abstraction
Alarms
Discriminate function
Pass
Reference
Lee, W., & Stolfo, S.J. (2000). A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security, 3 (4) (pp. 227-261). Jian Pei,Data Mining for Intrusion Detection:Techniques,Applications and Systems, Proceedings of the 20th International Conference on Data Engineering (ICDE 04) Peng Ning and Sushil Jajodia,Intrusion Detection Techniques. From http://discovery.csc.ncsu.edu/Courses/csc774-S03/IDTechniques.pdf Snort---The open source intrusion detection system. (2002). Retrieved February 13, 2003, from http://www.snort.org.
Thank you!