Title: Intrusion Detection Systems
1Intrusion Detection Systems
- Meltem YILDIRIM
- 2004720361
05.05.2005 CmpE 526 Operating System and
Network Security
2Agenda
- Introduction to IDS
- Classification of IDS
- IDS Models
- Available IDS Tools
- Conclusion Future Work
3What is Intrusion?
- Intrusion Actions attempting to break into or
misuse ones system in violation of an
established policy - Types of Intrusion
- Attempted break-ins
- Masquarade attacks
- Penetration of the security
- control system
- Denial of Service
- Malicious Use
4What is an IDS?
- IDS system trying to detect and alert on
attempted intrusions into a system or network - Reactive rather than proactive
- (usually does not prevent unauthorized users
from entering the network, only identifies that
an intrusion has occurred) - May provide diagnostic information, too
- Objective 100 accuracy
- False positive false alarm
- False negative letting an attack pass undetected
5An IDS Protected Enterprise
6Elements of a Basic IDS Model
- Audit Data (logs)
- Keyboard inputs, command-based or
application-based logs - Reference Data Store
- Intrusion signatures (known attack patterns)
- Profiles of normal behaviours
- Algorithms searching for suspicious behaviour
- Alarm
7Classifying IDSs
- Offline v.s. Online
- Host-Based v.s. Network-Based
- Anomaly Detection v.s. Misuse Detection
8Offline v.s. Online
- Offline
- audit data is processed periodically, not
real-time - work on audit logs
- data mining
- Online
- audit data is processed real-time continuously
- may react and prevent an intrusion still going
on
9Host-Based v.s. Network-Based (1)
- Host-Based / HIDS
- A SW installed on each node
Disadvantage Consume CPU time, storage, memory
and other system resources
10Host-Based v.s. Network Based (2)
- Network-Based / NIDS
- Monitors all packets on the network wire
- e.g. may watch for large number of TCP
connection requests to many different ports - Either runs on a single machine (hub, router,
etc.) or is divided into several sensors and one
central analysis point - Usually utilize a network adapter
- Typically host-independent but may be a SW
package installed on a dedicated host - Monitors numerous hosts simultaneously but may
suffer from performance problems as network speed
increases
11Anomaly Detection v.s. Misuse Detection (1)
- Anomaly Detection
- Assumption Attacks differ from normal
behaviour - Analyses the network or system and infers what is
normal - (Establishes a normal activity profile)
- Interprets deviations from this normal
behaviour as an intrusion
- Profile generation
- one-time activity
- current and previous profiles may be merged at
intervals
Activity measures such as CPU time used, number
of network connections in a time period
Adjustment of threshold levels is very important
12Anomaly Detection v.s. Misuse Detection (2)
- Anomaly Detection
- Advantages
- May catch novel attacks we have not seen before
- Disadvantages
- Current implementations do not work very well
(too many false positives/negatives) - Cannot categorize attacks very well
- Difficult to train in highly dynamic environments
- The system may be gradually trained by intruders
13Anomaly Detection v.s. Misuse Detection (3)
- Misuse Detection
- Attacks are known in advance (signatures)
- Matches signatures against the audit data stream
- The attack signatures are usually specified as
rules
14Anomaly Detection v.s. Misuse Detection (4)
- Misuse Detection
- Advantages
- Easy to implement, deploy, update and understand
- Low rate of false positives
- fast
- Disadvantages
- Cannot detect previously unknown attacks
- Constantly needs to be updated with new rules
- As good as the database of attack signatures
15IDS Models
- Predective Pattern Generation
- Fuzzy Classifiers
- Neural Networks
- Support Vector Machines
- Expert Systems
- Decision Trees
- Keystroke Monitoring
- State Transition Analysis
- Pattern Matching
- Autonomous Agents
16Predictive Pattern Recognition
- Try to predict future events based on event
history - e.g. Rule E1 - E2 ? (E3 80, E4 15, E5
5)
E3
Intrusion Left-hand side of the rule is matched
but the right-hand side is statistically deviant
from prediction
E1
E2
E4
E5
17Fuzzy Classifiers (1)
data mining
- No clear boundary between normal and abnormal
events - Selection of features
- Number of abnormal packets (invalid source or
destination IP address) - Number of TCP connections
- Number of failed TCP connections
- Number of ICMP packets
- Number of bytes sent / received per connection
18Fuzzy Classifiers (2)
- Detecting a Port Scan
- if count of UNUSUAL SDPs on port N is HIGH
- and count of DESTINATION HOSTS is HIGH
- and count of SERVICE Ports observed is
MEDIUM-LOW - then Service Scan of Port N is HIGH
- Detecting a DoS Attack
- if count of UNUSUAL SDTs is HIGH
- and count of ICMPs is HIGH
- then DoS ALERT is HIGH
SDP source IP - destination IP - destination port
SDT source IP - destination IP - packet type
19Neural Networks IDS Prototypes (1)
- Perceptron Model
- simplest form of NN
- single neuron with adjustable synapses (weights)
and threshold - baseline for measuring the performance of other
models
20Neural Networks IDS Prototypes (2)
- Backpropagation Model
- Multilayer feedforward network
- input layer at least one hidden layer output
layer - Correct detection rate 80 with 2 false alarms
21Neural Networks Data Preprocessing
- 1st round Selection of data elements
- protocol ID, source port, destination port, etc.
- 2nd round Creation of relational databases
- 3rd round Conversion of query results into an
ASCII comma delimited normalized format
supervised learning
0,2314,80,1573638018,-1580478590,1,1,401,3758,0 0,
1611,6101,801886082,-926167166,1,1,0,2633,1
22Neural Networks Detection Approaches (1)
- Detection by Weight Hamming Distance
- Let Vn 0,1n be the n-dimensional vector space
over the binary field 0,1 where n 0,1,,8 - Let A,B ? Vm
- S Wi ? (Ai ? Bi)
- whd(A,B)
- Find WHD between
- normal and current
- behaviour.
- If WHD gt threshold
- then ALARM
23Neural Networks Detection Approaches (2)
NEW!
- Improved Competitive Learning Network
- When a training example is presented to the
network, the output neurons compete - Winning and losing neurons update their weight
vector differently - Neurons become specialized to detect different
types of attacks
Learning rate
desired actual
?w - ? x (r - y) x Input
24SVM / Support Vector Machines (1)
F n-dimensional feature space
Training period SVMs plot the training vectors
in F and label each vector SVs make up a decision
boundary in the feature space
25SVM / Support Vector Machines (2)
e.g. n 2 features num_failed_logins
number of failed login attempts
num_SU_attempts number of su root command
attempts
We feed the system with labeled vectors The
system automatically draws the boundaries or
hyperplanes by an algorithm
26Expert Systems (forward-chaining)
27Sample Grammar for Expert Systems
- BNF Grammar for Inference Rules
- Variable Definition
- VAR body_1
- body_1 var_name var_value
- var_value list_of(value) value
- Detection Rules
- RULE Id body_2
- Id value / Id is the identifier of the rule
/ - Body_2 list_of(condition) condition gt
alert - condition feature operator term
- operator contain in gt lt
- term value list_of(value) var_name
- Action Rules
- BEHAVIOUR body_3
- body_3 condition gt action_argument
- condition boolean expression
- action update log exit continue
28Decision Trees
- All nodes are represented by a tuple (C, R, F,
L) - C condition
- (feature, operator, value)
- R set of candidate detection rules
- F feature set (already used to decompose tree)
- L set of detection rules matched at that node
root (null, All Rules, Ø, Ø)
root
C4.5 decision tree construction algorithm
29Autonomous Agents
- Several independent small processes operating and
cooperating to maintain the system - Advantages
- Efficiency
- Fault tolerance
- Extensibility
- Scalability
- Can be applied to Wireless Ad Hoc Networks
- Disadvantage
- Overhead of so many processes
30Available IDS Tools
- Commercial
- RealSecure
- Public-Domain
- Shadow
- Snort
- Research Prototypes
- Emerald
31RealSecure
- Real-time IDS
- 3-part architecture
- Network-based recognition engine
- Monitors a network segment and look for packets
that match attack signatures - Response terminate connection, send alert,
record session, reconfigure firewall - Host-based recognition engine
- Analyses system logs
- Response terminate user processes, suspend user
accounts - Administrators module
- www.iss.net
32Shadow
- Composed of
- Sensors
- Reside at key monitoring points in network
(outside firewall) - Extract packet headers save them to a monitoring
file - Analysis station
- Inside firewall
- Reads the monitoring file periodically
- joint venture of Naval Surface Weapons Center
Dahlgren, Network Flight Recorder, the National
Security Agency, and the SANS Institute - www.nswc.navy.mil/ISSEC/CID/
33(No Transcript)
34(No Transcript)
35Snort
- open-source public-domain ID tool
- real-time traffic analysis and packet logging on
IP networks - protocol analysis, content searching / matching
- flexible rules language to describe traffic that
it should collect or pass - large group of users who contribute new
signatures - Installation guides written in Turkish!
- www.snort.org
36Emerald
- Event Monitoring Enabling Responses to Anomalous
Live Disturbances - hybrid method (anomaly misuse detection)
- users are grouped into independently administered
domains (divide-and-conquer) - www.sdl.sri.com/emerald/
37Conclusion Future Work
- Several IDS models either looking for attack
signatures or abnormal behaviours (predictive
pattern generation, NN, SVM, rule-based systems,
decision trees, pattern matching, etc.) - Misuse detection methods are widely used in
practice whereas Anomaly detection methods are
more popular among researchers - Detecting a wider range of intrusions with fewer
false negatives - Adaptation to modern networks with increased
size, speed and mobility
38Conclusion Future Work
- Further investigation in hybrid systems
- Standardization for Interoperability
- IDMEF (Intrusion Detection Message Exchange
Format) proposed by IETF - Defines the format of alerts and alert exhange
protocols - Object-oriented representation, XML
- http//www.ietf.org/internet-drafts/draft-ietf-idw
g-idmef-xml-06.txt
39References
- Kemmerer, R.A., Vigna, G., Intrusion Detection A
Brief History and Overview, Security Privacy,
2002. pp.27-30. - Sherif, J.S., Dearmond, T.G., Intrusion
Detection Systems and Models, Proceedings of the
11th IEEE International Workshops on Enabling
Technologies Infrastructure for Collaborative
Enterprises, 2002. - Abbes, T., Bouhoula, A., Rusinowitch, M.,
Protocol Analysis in Intrusion Detection Using
Decision Tree, Proceedings of the International
Conference on Information Technology Coding and
Computing (ITCC04), 2004. - McHugh, J., Christie, A., Allen, J., Defending
Yourself The Role of Intrusion Detection
Systems, IEEE Software, 2000. - Liu, Y., Tian, D., Wang, A., ANNIDS Intrusion
Detection System Based on Artificial Neural
Network, Proceedings of the 2nd International
Conference on Machine Learning and Cybernetics,
2003. - Mukkamala, S., Janoski, G., Sung, A., Intrusion
Detection Using Neural Networks and Support
Vector Machines, 2002.
40References
- Mukkamal, S., Sung, A., Artificial Intelligent
Techniques for Intrusion Detection, 2003. - Salameh, W.A., Detection of Intrusion Using
Neural Networks, Studies in Informatics and
Control, vol.13, no.2, June 2004. - Lei, J.Z., Ghorbani, A., Network Intrusion
Detection Using an Improved Competitive Learning
Neural Network, Proceedings of the 2nd Annual
Conference on Communication Networks and Services
Research, 2004. - Lindqvist, U., Porras, P., Detecting Computer and
Network Misuse Through the Production-Based
Expert System Toolset (P-BEST), Proceedings of
the 1999 IEEE Symposium on Security and Privacy,
1999.