Context-based profiling for anomaly intrusion detection with ... - Supelec

Report 5 Downloads 45 Views
Context-based profiling for anomaly intrusion detection with diagnosis Karim TABIA CRIL-CNRS UMR8188 Artois University FRANCE

1

Context-based profiling for anomaly intrusion detection with diagnosis

Intrusion detection systems  Misuse-based

IDSs : based on known attack signatures  Anomaly-based IDSs : based on deviations from normal profile  Hybrid approaches : serial/parallel combination of anomaly and misuse approaches

2

Context-based profiling for anomaly intrusion detection with diagnosis

Profile-based anomaly IDSs  



Create profiles for traffic, users, hosts… Evaluate current activity’s deviation from learnt profiles Trigger alerts if a threshold is exceeded

Problems: Bad trade-off detection rare/false alarm rate No diagnosis about generated alerts

1. 2. 3

Context-based profiling for anomaly intrusion detection with diagnosis

Our contribution 1.

Context-based profiles: more realistic and more effective Global profiles: One profile represents normal activities relative to entities of interest (ex. A single profile to represent all network services) Context-based profiles: Create profiles to represent activities of “similar” entities (ex. Create a separate profile for each network service: http, ssh, DNS…)

2.

Diagnosis: Use profiles to determine attack categories of anomalous events Create attacks profiles as we create normal activity profiles

4

Context-based profiling for anomaly intrusion detection with diagnosis

Profiling network traffic for anomaly detection  Build

normal profile on normal traffic (attack-free data)  Compute local deviations between audit event features and normal profile  Compute global deviation by aggregating local deviations

5

Context-based profiling for anomaly intrusion detection with diagnosis

Normal profile

6

Context-based profiling for anomaly intrusion detection with diagnosis

Computing local anomaly scores 

Numeric features



Boolean/symbolic features

New/rare/deviating values cause utmost deviations => anomalies 7

Context-based profiling for anomaly intrusion detection with diagnosis

Aggregating local anomaly scores 

Sum of individual attributes’ distances



Fixing anomaly threshold

8

Context-based profiling for anomaly intrusion detection with diagnosis

Darpa’99 data set Training data: normal traffic and attacks (R2L, U2R, Data, DoS, Probing)  Testing data: normal traffic, old & new attacks  Each connection is described by basic features, content features, time based traffic features (computed using a two seconds time window) and host based traffic features (computed using a 100connections window) 

9

Context-based profiling for anomaly intrusion detection with diagnosis

Global profiling 

10

All network data (all services, protocols, …) are represented by a single profile

Context-based profiling for anomaly intrusion detection with diagnosis

Global profiling All traffic relative to all protocols (TCP, UDP and ICMP) and services (http, ssh, DNS, …) is represented by a single profile  Computing deviation: a given audit event (say http connection) is compared to the global profile 

11

Context-based profiling for anomaly intrusion detection with diagnosis

Context-based profiling 

Motivation: When computing deviations, compare audit event only with normal traffic involving same service, user, host, subnet…



Methods: Create separate profile for each important service, user, host, subnet…

12

Context-based profiling for anomaly intrusion detection with diagnosis

Service-based profiling 

13

Each important service is represented by its own profile

Context-based profiling for anomaly intrusion detection with diagnosis

Host-based profiling  Each

important host is represented by its own profile

14

Context-based profiling for anomaly intrusion detection with diagnosis

Anomaly detection with diagnosis  Anomaly

detection only flags events as normal or anomalous  There is need to analyze alerts: time&work consuming since anomaly detection triggers high (false) alarms rates  Solution: Use profiles to evaluate similarities of anomalous events with known attacks

15

Context-based profiling for anomaly intrusion detection with diagnosis

Attack profiling 









Like normal traffic, attacks are represented by attack profiles If an event is flagged anomalous by anomaly - based IDS, then it is compared with different attacks profiles Use same distance measures and aggregating function, thresholding Global attack profiling: Each attack category is represented by a single profile Context-based attack profiling: each attack is represented by a specific profile. 16

Context-based profiling for anomaly intrusion detection with diagnosis

Diagnosing attacks 

17

Global attack profiling: each attack category is represented by a global profile built on training attacks

Context-based profiling for anomaly intrusion detection with diagnosis

Diagnosing attacks 

18

Context- based attack profiling: group similar attacks in specific profiles built on training attacks

Context-based profiling for anomaly intrusion detection with diagnosis

Conclusion  Global profiling is simple but ineffective  Alternatives: service-based, host-based, …  Context-based profiling performs better than global profiling  Service-based profiling performs better than host-based profiling  Possibility of anomaly diagnosis by attack profiling

19

Context-based profiling for anomaly intrusion detection with diagnosis

End. Question? 20

Context-based profiling for anomaly intrusion detection with diagnosis