Bayesian Networks For Network Intrusion Detection - New
Bayesian Networks For Network Intrusion Detection - New
Networks for
Network
Intrusion
Detection
Team 9:
Bayesian Blasters
Story of RFNow Inc
RFNow is an emerging service provider in Canada providing 10
Gbps internet services to customers.
RFNow has a history of total network meltdown due to severe
network attacks.
RFNow decided to hire someone build a Bayesian based network
intrusion detection model.
This is the story of how RFNow improved their network with NIDS
system.
Identifying the problem
History of attacks , ARP Poisoning, DDOS, Man in the Middle etc.
Complexity of the attacks (Minor change in the header and it is
not detectable).
Failure to identify the new unknown attacks, zero-day attacks.
Selection of paradigms for automated anomaly detection, Finite
Automata, Neural networks, genetic algorithms, fuzzy logics, SVM
etc.
How to tackle false positive, categorizing true traffic as anomaly?
Building blocks of RFNow’s
Solution
Basic IP header and components of network traffic
Difference between misuse and anomaly detection
Bayesian based intrusion detection
Bayesian Network use in ESIDE-Depian
ESIDE-Depian integration of misuse and anomaly detection
Difference between misuse and
anomaly detection
Identifying menace, knowledge base to compare the incoming
traffic with existing user base. Whitelist model.
How will this identify new type of attack?
Add information to knowledge base, but the it grows the traffic
becomes slow, 10 Gbps ???
Anomaly Detection system, compares the traffic with knowledge
base. Any small change it is will be blocked. E.g. changes in the
network adding jumbo frames in the network.
Bayesian based intrusion
detection
Bayes theorem (Thomas Bayes 1763)
Given the prior information of the network in the knowledge-base the likelihood of
traffic as intrusion can be calculated.
Basic IP
header and
components
of network
traffic
Contd..
Bayesian Network are graphical probabilistic models of
multivariant analysis.
Graphical Models: Bayesian Networks use a visual structure (a
directed graph) to represent relationships among variables.
Probabilistic Models: These networks represent how likely different
variables are, given their relationships.
Multivariate Analysis: They are especially useful when dealing with
multiple variables at the same time, helping to understand and
infer the relationships between them.
Data Collection
(Bayesian
Network)
•Flexibility:
•Expert modules can be dynamically enabled or disabled as needed, enhancing adaptability.
•System prioritizes accurate anomaly detection while balancing performance and representational power.
•Misuse and Anomaly Detection Integration:
•Experts handle both known and zero-day attacks using a unified Bayesian network model.
Let’s get our hands dirty
Problems and Solutions
Integration of Snort:
Solution: Recast Snort as an advisor during both training and real-time operation, allowing the Bayesian
model to absorb and exceed Snort’s knowledge.
Static parameters (TCP, UDP, ICMP) vs. dynamic parameters (connection tracking and payload analysis
requiring time-based modeling).
Solution: Tailored traffic samples were used for testing dynamic experts.
Thank you for your attention