Title: IDGraphs: Intrusion Detection and Analysis Using Histographs
1IDGraphs Intrusion Detection and Analysis Using
Histographs
- Pin Ren, Yan Gao, Zhichun Li, Yan Chen
- Northwestern University
- Benjamin Watson
- North Carolina State University
2 Intrusion Detection Systems (IDS)
- Automatic IDS
- Use attack signatures
- Use statistical thresholds
- Problems
- Finding attack signatures, temporal pattern
- Finding the right detection threshold
- Detecting coordinated attacks
- Studying suspicious streams interactively
3 Traditional IDS Mapping
Block
Vertical
Dest Port
Horizontal
Dest IP
4Other Mappings Spinning Cube
Source IP
Dest IP
Dest Port
Lau 2004
5Other Mappings PortVis
McPherson,Ma,et.al. 2004
6Other Mappings NVisionIP
Dest IP (high)
Dest IP (low)
Lakkaraju,Yurcik and Lee 2004
7Other Mappings VisFlowConnect
Source IP
Dest IP
Local Hosts IP
Yin, Yurcik and Treaster 2004
8 IDGraphs Mapping
High (Suspect)
Num failed connects (Suspicion)
Low (Trusted)
Time
Num failed connects SYN - SYN_ACK
9Case Study 1
One day of traffic 9075 net traces, each with
unique (Source IP,Dest Port) key
10Case Study 1
Net streams composited using histographs Dark
areas are data rich
11Case Study 1
Outliers are also important we make them visible
using splatting
12Case Study 1
Thresholding interaction visualizes automated IDS
thresholding results top 10 streams
13Case Study 1
Lower
14Case Study 1
Lower
15Case Study 1
Too low far too many false positives
16Case Study 1
Hold on, what was that?
17Case Study 1
Filter with an upper bound
18Case Study 1
Source IP
Dest port
Failures
Select and query, stream targets port 25
19Case Study 1
We display only selected stream, and find an
interesting temporal signature, below typical
thresholds
20Case Study 1
Is port 25 a target for other coordinated
attacks? We select all the streams targeting port
25
21Case Study 1
Several streams have similar signatures We query
one of them to obtain the Source IP
22Case Study 1
Selection of all streams from the same
subnet reveals likely coordinated, sub-threshold
attacks from that subnet
23Case Study 1
And what was that hard line?
24Case Study 1
Filter to isolate
25Case Study 1
Query one point on the line reveals a scan from
one source IP to 3 Destination ports, is this
ports combination special?
26Case Study 1
Querying one of the ports Port 9898
27Case Study 1
Port 5554
28Case Study 1
Port 1023 note activity for these 3 ports is
really similar
29New Case Study 2
A different day of traffic 2515 net traces
30Case Study 2
Select the dense, suspicious structure at days
end correlated, coordinated streams target port
445
31Case Study 2
A linked correlation view pixel i,j shows
correlation of streams i and j green positive,
red negative
32Case Study 2
Select the largest green block, and the dark
structure on the left is marked
33Case Study 2
Querying the structure, we find that it shows
spoofed attacks on port 6129
34Case Study 2
Selecting the evening, and a larger
correlation, we find 33 other correlated streams
35Recap
- Finding attack signatures
- Time vs. failures mapping
- Highlight Temporal Pattern
- Finding good thresholds
- Interactive thresholding
- Darkness at main trends
- Splatting for outliers
36Recap
- Detecting coordinated attacks
- Visual structures (shape, brightness, density)
- Linked correlation view
- Interactive study and analysis
- Click and query
- Search and selection
37Future Work
- Short term
- Address clutter when highlighting
- Refine notion of outlier
- Attack classification
- Longer term
- Function with live data streams
- Integration with automated IDS
38Thanks for your attentionAny questions?
Thanks to The National Science Foundation
Contact p-ren_at_cs.northwestern.edu www.cs.northwes
tern.edu/pren/IDgraphs.html
39Case Study 1
Query one point Four streams with same Source
IP, 4 Dest Ports
40Case Study 1
Query another point same pattern
41Case Study 1
Again
42Case Study 1
Querying one of these Source IPs, we find
activity at port 139.
43Case Study 1
All 139 port activity
44Data and Preprocessing
- Real traffic data (NetFlow Logs) from high speed
central router at Northwestern University. - Aggregate the count of failed connections using
keys - (Source IP, Dest ports)
- (Source IP, Dest IP)
- (Dest IP, Dest ports)
- Forming time-series sequences by
- Treat the counts of one unique key as one time
series - Filter out uninteresting ones.
45(No Transcript)
46(No Transcript)
47(No Transcript)