Intrusion Detection Jie Lin
Outline Introduction  A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion Detection
What is the Intrusion Detection Intrusions are the activities that violate the security policy of system. Intrusion Detection is the process used to identify intrusions.
Types of Intrusion Detection System(1)   Based on the sources of the audit information used by each IDS, the IDSs may be classified into  Host-base IDSs Distributed IDSs Network-based IDSs
Host-based IDSs  Get audit data from host audit trails. Detect attacks against a single host Distributed IDSs Gather audit data from multiple host and possibly the network that connects the hosts Detect attacks involving multiple hosts Network-Based IDSs Use network traffic as the audit data source, relieving the burden on the hosts that usually provide normal computing services Detect attacks from network. Types of Intrusion Detection System(2)
Intrusion Detection Techniques Misuse detection Catch the intrusions in terms of the characteristics of known attacks or system vulnerabilities. Anomaly detection Detect any action that significantly deviates from the normal behavior.
Misuse Detection Based on known attack actions. Feature extract from known intrusions Integrate the Human knowledge. The rules are pre-defined Disadvantage: Cannot detect novel or unknown attacks
Misuse Detection Methods & System AutiGUARD Case Based reasoning IDES,NIDX,P-BEST,ISOA Expert System IDIOT Colored Petri Automata STAT family(STAT,USTAT,NSTAT,NetSTAT) State Transition Analysis RUSSEL,P-BEST Rule-based Languages System Method
Anomaly Detection Based on the normal behavior of a subject. Sometime assume the training audit data does not include intrusion data. Any action that significantly deviates from the normal behavior is considered intrusion.
Anomaly Detection Methods & System JAM, MADAM ID Data mining approaches Machine Learning techniques Time-Based inductive Machine Instance Based Learning Neural Network … IDES, NIDES, EMERALD Statistical method System Method
Anomaly Detection Disadvantages Based on audit data collected over a period of normal operation. When a noise(intrusion) data in the training data, it will make a mis-classification. How to decide the features to be used. The features are usually decided by domain experts. It may be not completely.
Misuse Detection vs. Anomaly Detection High false-alarm and limited by training data. Is able to detect unknown attacks based on audit Anomaly Detection Cannot detect novel or unknown attacks Accurately and generate much fewer false alarm Misuse Detection Disadvantage Advantage
The Frame for Intrusion Detection
Intrusion Detection Approaches Define and extract the features of behavior in system Define and extract the Rules of Intrusion Apply the rules to detect the intrusion Training  Audit Data Features Rules Audit Data Pattern matching  or Classification 1 3 3 2
Thinking about The Intrusion Detection System Intrusion Detection system is a pattern discover and pattern recognition system. The Pattern (Rule) is the most important part in the Intrusion Detection System Pattern(Rule) Expression Pattern(Rule) Discover Pattern Matching & Pattern Recognition.
 
Rule Discover Method Expert System Measure Based method Statistical method Information-Theoretic Measures Outlier analysis Discovery Association Rules Classification Cluster
Pattern Matching & Pattern Recognition Methods  Pattern Matching State Transition & Automata Analysis Case Based reasoning Expert System Measure Based method Statistical method Information-Theoretic Measures Outlier analysis Association Pattern Machine Learning method
Intrusion Detection Techniques
Intrusion Detection Techniques Pattern Matching Measure Based method Data Mining method Machine Learning Method
Pattern Matching KMP-Multiple patterns matching Algorithm Using keyword tree to search Building failure link to guarantee linear time searching Shift-And(Or) pattern matching Algorithm A classical approximate pattern matching algorithm Karp-Rabin fingerprint method Using the Modular arithmetic and Remainder theorem to match pattern …  (Such as regular expression pattern matching)
Measure Based Method Statistical Methods &  Information-Theoretic Measures Define a set of measures to measure different aspects of a subject of behavior. (Define Pattern) Generate an overall measure to reflect the abnormality of the behavior. For example: statistic T 2 = M 1 2 +M 2 2  +…+M n 2 weighted intrusion score =  Σ M i *W i Entropy: H(X|Y)=   Σ Σ P(X|Y) (-log(P(X|Y))) Define the threshold for the overall measure
Association Pattern Discover Goal is to derive multi-feature (attribute) correlations from a set of records. An expression of an association pattern: The Pattern Discover Algorithm: Apriori Algorithm FP(frequent pattern)-Tree
Association Pattern Example
Association Pattern Detecting Statistics  Approaches Constructing temporal statistical features from discovered pattern. Using measure-based method to detect intrusion Pattern Matching Nobody discuss this idea.
Machine Learning Method Time-Based Inductive Machine Like Bayes Network, use the probability and a direct graph to predict the next event Instance Based Learning Define a distance to measure the similarity between feature vectors Neural Network …
Classification This is supervised learning. The class will be predetermined in training phase. Define the character of classes in training phase. A common approach in pattern recognition system
Clustering This is unsupervised learning. There are not predetermined classes in data. Given a set of measurement, the aim is that establishes the class or group in the data. It will output the character of each class or group. In the detection phase, this method will get more time cost (O(n 2 )). I suggest this method only use in pattern discover phase
Ideas for improving Intrusion Detection
Idea 1: Association Pattern Detecting Using the pattern matching algorithm to match the pattern in sequent data for detecting intrusion. No necessary to construct the measure. But its time cost is depend on the number of association patterns. It possible constructs a pattern tree to improve the pattern matching time cost to linear time
Idea 2: Discover Pattern from Rules The exist rules are the knowledge from experts knowledge or other system. The different methods will measure different aspects of intrusions. Combine these rules may find other new patterns of unknown attack. For example:  Snort has a set of rule which come from different people. The rules may have different aspects of intrusions. We can use the data mining or machine learning method to discover the pattern from these rule.
 
Reference Lee, W., & Stolfo, S.J. (2000). A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security, 3 (4) (pp. 227-261). Jian Pei,Data Mining for Intrusion Detection:Techniques,Applications and Systems, Proceedings of the 20th International Conference on Data Engineering (ICDE 04) Peng Ning and Sushil Jajodia,Intrusion Detection Techniques. From http://discovery.csc.ncsu.edu/Courses/csc774-S03/IDTechniques.pdf Snort---The open source intrusion detection system. (2002). Retrieved February 13, 2003, from  http:// www.snort.org .
Thank you!

More Related Content

PPT
Data Mining and Intrusion Detection
PPT
Intrusion Detection
PPT
INTRUSION DETECTION TECHNIQUES
PPTX
Intrusion detection using data mining
PPTX
Analysis and Design for Intrusion Detection System Based on Data Mining
PDF
A Study on Data Mining Based Intrusion Detection System
PPTX
Databse Intrusion Detection Using Data Mining Approach
PPTX
Cyber intrusion
Data Mining and Intrusion Detection
Intrusion Detection
INTRUSION DETECTION TECHNIQUES
Intrusion detection using data mining
Analysis and Design for Intrusion Detection System Based on Data Mining
A Study on Data Mining Based Intrusion Detection System
Databse Intrusion Detection Using Data Mining Approach
Cyber intrusion

What's hot (19)

PDF
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
PPSX
Practical real-time intrusion detection using machine learning approaches
PPTX
Intrusion detection system
PPTX
DM for IDS
PDF
Intrusion Detection System Project Report
PPTX
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
PDF
Optimized Intrusion Detection System using Deep Learning Algorithm
PPT
Intrusion Detection Techniques for Mobile Wireless Networks
PDF
IDS (intrusion detection system)
PDF
A hybrid intrusion detection system for cloud computing environments
PDF
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
PPT
intruders types ,detection & prevention
PDF
Using Machine Learning in Networks Intrusion Detection Systems
PPTX
Intrusion detection
PPTX
Intrusion Detection with Neural Networks
PPTX
Intrusion detection system
PPT
Using Genetic algorithm for Network Intrusion Detection
PPT
Intruders
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
Practical real-time intrusion detection using machine learning approaches
Intrusion detection system
DM for IDS
Intrusion Detection System Project Report
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Optimized Intrusion Detection System using Deep Learning Algorithm
Intrusion Detection Techniques for Mobile Wireless Networks
IDS (intrusion detection system)
A hybrid intrusion detection system for cloud computing environments
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
intruders types ,detection & prevention
Using Machine Learning in Networks Intrusion Detection Systems
Intrusion detection
Intrusion Detection with Neural Networks
Intrusion detection system
Using Genetic algorithm for Network Intrusion Detection
Intruders
Ad

Similar to Intrusion Detection (20)

PPTX
I Dunderstn
PDF
Intrusion Detection and Forensics based on decision tree and Association rule...
PPTX
bigdata analytics and intrusion det1.pptx
DOCX
V1_I1_2012_Paper3.docx
PDF
Study on Data Mining Suitability for Intrusion Detection System (IDS)
PDF
DB-OLS: An Approach for IDS1
PPTX
Supervised Machine Learning Algorithms for Intrusion Detection.pptx
PDF
C3602021025
DOC
Intrusion detection and anomaly detection system using sequential pattern mining
DOC
Intrusion detection and anomaly detection system using sequential pattern mining
DOCX
Ids 013 detection approaches
PDF
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
PPT
data mining for security application
PPT
data mining for security application
PPTX
AI-Powered-Anomaly-Detection-in-Time-Series-Data.pptx
PPTX
AI-Powered-Anomaly-Detection-in-Time-Series-Data.pptx
PDF
Analysis on different Data mining Techniques and algorithms used in IOT
PDF
Critical analysis of genetic algorithm based IDS and an approach for detecti...
PDF
Volume 2-issue-6-2190-2194
PDF
Volume 2-issue-6-2190-2194
I Dunderstn
Intrusion Detection and Forensics based on decision tree and Association rule...
bigdata analytics and intrusion det1.pptx
V1_I1_2012_Paper3.docx
Study on Data Mining Suitability for Intrusion Detection System (IDS)
DB-OLS: An Approach for IDS1
Supervised Machine Learning Algorithms for Intrusion Detection.pptx
C3602021025
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
Ids 013 detection approaches
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
data mining for security application
data mining for security application
AI-Powered-Anomaly-Detection-in-Time-Series-Data.pptx
AI-Powered-Anomaly-Detection-in-Time-Series-Data.pptx
Analysis on different Data mining Techniques and algorithms used in IOT
Critical analysis of genetic algorithm based IDS and an approach for detecti...
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Ad

More from butest (20)

PDF
EL MODELO DE NEGOCIO DE YOUTUBE
DOC
1. MPEG I.B.P frame之不同
PDF
LESSONS FROM THE MICHAEL JACKSON TRIAL
PPT
Timeline: The Life of Michael Jackson
DOCX
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
PDF
LESSONS FROM THE MICHAEL JACKSON TRIAL
PPTX
Com 380, Summer II
PPT
PPT
DOCX
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
DOC
MICHAEL JACKSON.doc
PPTX
Social Networks: Twitter Facebook SL - Slide 1
PPT
Facebook
DOCX
Executive Summary Hare Chevrolet is a General Motors dealership ...
DOC
Welcome to the Dougherty County Public Library's Facebook and ...
DOC
NEWS ANNOUNCEMENT
DOC
C-2100 Ultra Zoom.doc
DOC
MAC Printing on ITS Printers.doc.doc
DOC
Mac OS X Guide.doc
DOC
hier
DOC
WEB DESIGN!
EL MODELO DE NEGOCIO DE YOUTUBE
1. MPEG I.B.P frame之不同
LESSONS FROM THE MICHAEL JACKSON TRIAL
Timeline: The Life of Michael Jackson
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
LESSONS FROM THE MICHAEL JACKSON TRIAL
Com 380, Summer II
PPT
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
MICHAEL JACKSON.doc
Social Networks: Twitter Facebook SL - Slide 1
Facebook
Executive Summary Hare Chevrolet is a General Motors dealership ...
Welcome to the Dougherty County Public Library's Facebook and ...
NEWS ANNOUNCEMENT
C-2100 Ultra Zoom.doc
MAC Printing on ITS Printers.doc.doc
Mac OS X Guide.doc
hier
WEB DESIGN!

Intrusion Detection

  • 2. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion Detection
  • 3. What is the Intrusion Detection Intrusions are the activities that violate the security policy of system. Intrusion Detection is the process used to identify intrusions.
  • 4. Types of Intrusion Detection System(1) Based on the sources of the audit information used by each IDS, the IDSs may be classified into Host-base IDSs Distributed IDSs Network-based IDSs
  • 5. Host-based IDSs Get audit data from host audit trails. Detect attacks against a single host Distributed IDSs Gather audit data from multiple host and possibly the network that connects the hosts Detect attacks involving multiple hosts Network-Based IDSs Use network traffic as the audit data source, relieving the burden on the hosts that usually provide normal computing services Detect attacks from network. Types of Intrusion Detection System(2)
  • 6. Intrusion Detection Techniques Misuse detection Catch the intrusions in terms of the characteristics of known attacks or system vulnerabilities. Anomaly detection Detect any action that significantly deviates from the normal behavior.
  • 7. Misuse Detection Based on known attack actions. Feature extract from known intrusions Integrate the Human knowledge. The rules are pre-defined Disadvantage: Cannot detect novel or unknown attacks
  • 8. Misuse Detection Methods & System AutiGUARD Case Based reasoning IDES,NIDX,P-BEST,ISOA Expert System IDIOT Colored Petri Automata STAT family(STAT,USTAT,NSTAT,NetSTAT) State Transition Analysis RUSSEL,P-BEST Rule-based Languages System Method
  • 9. Anomaly Detection Based on the normal behavior of a subject. Sometime assume the training audit data does not include intrusion data. Any action that significantly deviates from the normal behavior is considered intrusion.
  • 10. Anomaly Detection Methods & System JAM, MADAM ID Data mining approaches Machine Learning techniques Time-Based inductive Machine Instance Based Learning Neural Network … IDES, NIDES, EMERALD Statistical method System Method
  • 11. Anomaly Detection Disadvantages Based on audit data collected over a period of normal operation. When a noise(intrusion) data in the training data, it will make a mis-classification. How to decide the features to be used. The features are usually decided by domain experts. It may be not completely.
  • 12. Misuse Detection vs. Anomaly Detection High false-alarm and limited by training data. Is able to detect unknown attacks based on audit Anomaly Detection Cannot detect novel or unknown attacks Accurately and generate much fewer false alarm Misuse Detection Disadvantage Advantage
  • 13. The Frame for Intrusion Detection
  • 14. Intrusion Detection Approaches Define and extract the features of behavior in system Define and extract the Rules of Intrusion Apply the rules to detect the intrusion Training Audit Data Features Rules Audit Data Pattern matching or Classification 1 3 3 2
  • 15. Thinking about The Intrusion Detection System Intrusion Detection system is a pattern discover and pattern recognition system. The Pattern (Rule) is the most important part in the Intrusion Detection System Pattern(Rule) Expression Pattern(Rule) Discover Pattern Matching & Pattern Recognition.
  • 16.  
  • 17. Rule Discover Method Expert System Measure Based method Statistical method Information-Theoretic Measures Outlier analysis Discovery Association Rules Classification Cluster
  • 18. Pattern Matching & Pattern Recognition Methods Pattern Matching State Transition & Automata Analysis Case Based reasoning Expert System Measure Based method Statistical method Information-Theoretic Measures Outlier analysis Association Pattern Machine Learning method
  • 20. Intrusion Detection Techniques Pattern Matching Measure Based method Data Mining method Machine Learning Method
  • 21. Pattern Matching KMP-Multiple patterns matching Algorithm Using keyword tree to search Building failure link to guarantee linear time searching Shift-And(Or) pattern matching Algorithm A classical approximate pattern matching algorithm Karp-Rabin fingerprint method Using the Modular arithmetic and Remainder theorem to match pattern … (Such as regular expression pattern matching)
  • 22. Measure Based Method Statistical Methods & Information-Theoretic Measures Define a set of measures to measure different aspects of a subject of behavior. (Define Pattern) Generate an overall measure to reflect the abnormality of the behavior. For example: statistic T 2 = M 1 2 +M 2 2 +…+M n 2 weighted intrusion score = Σ M i *W i Entropy: H(X|Y)= Σ Σ P(X|Y) (-log(P(X|Y))) Define the threshold for the overall measure
  • 23. Association Pattern Discover Goal is to derive multi-feature (attribute) correlations from a set of records. An expression of an association pattern: The Pattern Discover Algorithm: Apriori Algorithm FP(frequent pattern)-Tree
  • 25. Association Pattern Detecting Statistics Approaches Constructing temporal statistical features from discovered pattern. Using measure-based method to detect intrusion Pattern Matching Nobody discuss this idea.
  • 26. Machine Learning Method Time-Based Inductive Machine Like Bayes Network, use the probability and a direct graph to predict the next event Instance Based Learning Define a distance to measure the similarity between feature vectors Neural Network …
  • 27. Classification This is supervised learning. The class will be predetermined in training phase. Define the character of classes in training phase. A common approach in pattern recognition system
  • 28. Clustering This is unsupervised learning. There are not predetermined classes in data. Given a set of measurement, the aim is that establishes the class or group in the data. It will output the character of each class or group. In the detection phase, this method will get more time cost (O(n 2 )). I suggest this method only use in pattern discover phase
  • 29. Ideas for improving Intrusion Detection
  • 30. Idea 1: Association Pattern Detecting Using the pattern matching algorithm to match the pattern in sequent data for detecting intrusion. No necessary to construct the measure. But its time cost is depend on the number of association patterns. It possible constructs a pattern tree to improve the pattern matching time cost to linear time
  • 31. Idea 2: Discover Pattern from Rules The exist rules are the knowledge from experts knowledge or other system. The different methods will measure different aspects of intrusions. Combine these rules may find other new patterns of unknown attack. For example: Snort has a set of rule which come from different people. The rules may have different aspects of intrusions. We can use the data mining or machine learning method to discover the pattern from these rule.
  • 32.  
  • 33. Reference Lee, W., & Stolfo, S.J. (2000). A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security, 3 (4) (pp. 227-261). Jian Pei,Data Mining for Intrusion Detection:Techniques,Applications and Systems, Proceedings of the 20th International Conference on Data Engineering (ICDE 04) Peng Ning and Sushil Jajodia,Intrusion Detection Techniques. From http://discovery.csc.ncsu.edu/Courses/csc774-S03/IDTechniques.pdf Snort---The open source intrusion detection system. (2002). Retrieved February 13, 2003, from http:// www.snort.org .