Anomaly-Based Network Intrusion Detection in Cyber Security

undefined
 
CS548 Spring 2015 Anomaly Detection Showcase
 
Anomaly-based
Network Intrusion Detection (A-NIDS)
 
by Nitish Bahadur, Gulsher Kooner,
Caitlin Kuhlman
 
1
 
1.
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis &
Knowledge Management [Online]. Available:
https://www.palantir.com/solutions/cyber/
2.
Bhuyan, Monowar H., D. K. Bhattacharyya, and Jugal K. Kalita. "Network anomaly
detection: methods, systems and tools." 
Communications Surveys & Tutorials,
IEEE
 16.1 (2014): 303-336.
3.
Garcia-Teodoro, Pedro, et al. "Anomaly-based network intrusion detection:
Techniques, systems and challenges." 
computers & security
 28.1 (2009): 18-28.
4.
 Denning, Dorothy E., "An Intrusion Detection Model," Proceedings of the Seventh
IEEE Symposium on Security and Privacy, May 1986, pages 119–131
5.
Sommer, Robin, and Vern Paxson. "Outside the closed world: On using machine
learning for network intrusion detection." 
Security and Privacy (SP), 2010 IEEE
Symposium on
. IEEE, 2010.
6.
Dokas, Paul, et al. "Data mining for network intrusion detection." 
Proc. NSF
Workshop on Next Generation Data Mining
. 2002.
7.
Minnesota INtrusion Detection System  [Online]. Available:  
http://minds.cs.umn.edu/
 
References
 
2
 
Problem
 
- 
Why is
 Network Intrustion Detection
important?
Relevance
 - How is it related to Anomaly
Detection / Data Mining?
Description
 - What is Anomaly Based Network
Intrustion Detection?
Hypothetical Solution 
- Case Study
 
Overview
 
3
 
What is 
Network Intrustion Detection?
 
Why is Network Intrustion Detection
important?
 
Problem
 
4
 
N
etwork 
I
nstrusion 
D
etection 
S
ystem 
monitors
network traffic and attempts to identify unusual
or suspicious activity
Passive system: alerts are reported to analyst
for further investigation
 
What is NIDS?
 
5
 
A conservative estimate would be $375 billion in
losses in 2013, while the maximum could be as
much as $575 billion
 
Economic Impact
 
http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf
 (
Page 2
)
 
https://media.licdn.com/mpr
/
 
6
 
7
 
Types of computer attacks 
[2]
 
Virus
Worm
Trojan
Denial of service
Network Attack
Physical Attack
 
Password Attack
Information Gathering Attack
User to Root (U2R) attack
Remote to Local (R2L) attack
Probe
 
8
 
How is IDS related to Anomaly Detection?
 
Misue (signature) Based – given a database
of known misuses you compare a intrusion
detection pattern against this database
 
Anomaly Based - estimate what is normal and
raise an alarm when the event is an anomaly
based on some metric.
 
9
 
…is a little vague
 
[2]
 
Network Intrusion
Detection Systems
 
 
 
 
 
“…anomaly-based intrusion detection in networks 
refers
to the problem of finding exceptional patterns in network
traffic that do not conform to the expected normal
behavior.” [2]
 
Systems have been developed since
the 1980’s [4]
 
Still a robust research area
 
Many methods and tools available
 
10
 
Challenges with supervised methods
Data distribution is very skewed – attacks represent a
very small amount of network activity
Training data is hard/impossible to obtain -n
etwork
data often contains proprietary information, and is very
labor intensive for an analyst to label
.
 
Unsupervised Anomaly Detection
Do
esn
’t require training data
Can detect previously unseen attacks
 
 
Machine Learning for Intrusion
 Detection
 
11
 
Common 
Intrusion
 Detection Framework
 
[2]
 
12
 
Types of features: 
Source and destination IP addresses, ports,
packet headers, network traffic statistics
 
Tools
Tcpdump
 command line tool
Snort
 open source IDS packet capture and signature matching
Wireshark 
popular open source packet sniffer
 
 
 
Data Collection
 
13
 
Features
 
14
 
C
o
n
s
t
r
u
c
t
i
o
n
 
Time based statistics
 
Ratio of data coming
in and out of network
 
Packet inspection
 
 
 
 
 
Density based clustering to detect outliers
 
Minnesota INtrusion Detection System (MINDS)
 
[
6
]
 
15
 
Anomaly score assigned to each instance based on
degree of being an outlier -  
local outlier factor (LOF)
 
 
 
 
 
 
 
 
 
 
Comparison of anomaly detection methods
 
16
 
Limitations of Anomaly Based NIDS
 
Challenges
    
Possible Solutions
 
17
 
Solutions – Case Study
DISCLAIMER:
The software/solutions presented here is part of our
research effort for Data Mining showcase.  The
presenters have no association with the corporation or
institution developing or designing the software /
solutions presented in this showcase.   Please do your
due diligence before using a solution.
 
 
 
 
 
 
 
 
 
 
 
18
 
 PALANTIR CYBER
 
19
 
An End-to-End Cyber Intelligence Platform for Analysis &
Knowledge Management
Knowledge management
Complex & adaptive Threats
Against external and internal
 
FUSING INTERNAL AND EXTERNAL CYBER DATA
Structured network logs
Contextual data
Unstructured reporting and third party data
 
ANOMALY DETECTION
 
20
 
Clusterable, distributed data store
Open source technologies Apache’s™ Hadoop
Comb through data archives
Detect anomalies by creating clusters
Visualizations: risk scores, pie charts, and heat maps
Drill down and investigate further
 
THE CYBER MESH
 
21
 
Shared set of cyber threats
P2P sharing among enterprises
Automatic censoring of sensitive data
 
 
THE PALANTIR SOLUTION
 
22
 
 
INSIDER THREAT DETECTION
Identify suspicious or
abnormal employee behavior
 
IDENTITY ACCESS AND
MANAGEMENT
Access logs, Active Directory
records, HR files, VPN activity
 
ANALYTICAL APPLICATIONS
 
23
 
NETWORK DASHBOARDS
 
WEB-BASED IP REPUTATION
ENGINE
 
 
PATTERN DETECTION AND WORKFLOW
 
24
 
Palantir – Uncovering
 Cyber Fraud
 
25
 
 
26
 
Thank You !!
 
Appendix – I – Statistical Network Anomaly
Detection Methods
 
27
 
Appendix – 2 – Classification Network
Anomaly Detection Methods
 
28
 
Appendix – 3 – Clustering & Outlier based
Network Anomaly Detection Methods
 
29
 
Appendix – 4 – Soft Computing based
Network Anomaly Detection Methods
 
30
 
Appendix – 5 – Knowledge based Network
Anomaly Detection Methods
 
31
 
Appendix – 6 – Fusion based Network
Anomaly Detection Methods
 
32
Slide Note
Embed
Share

An overview of the importance of network intrusion detection, its relevance to anomaly detection and data mining, the concept of anomaly-based network intrusion detection, and the economic impact of cybercrime. The content also touches on different types of computer attacks and references related to the topic.

  • Network Security
  • Cyber Security
  • Anomaly Detection
  • Data Mining
  • Cybercrime

Uploaded on Sep 23, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. CS548 Spring 2015 Anomaly Detection Showcase Anomaly-based Network Intrusion Detection (A-NIDS) by Nitish Bahadur, Gulsher Kooner, Caitlin Kuhlman 1

  2. References 1. PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management [Online]. Available: https://www.palantir.com/solutions/cyber/ Bhuyan, Monowar H., D. K. Bhattacharyya, and Jugal K. Kalita. "Network anomaly detection: methods, systems and tools." Communications Surveys & Tutorials, IEEE 16.1 (2014): 303-336. Garcia-Teodoro, Pedro, et al. "Anomaly-based network intrusion detection: Techniques, systems and challenges." computers & security 28.1 (2009): 18-28. Denning, Dorothy E., "An Intrusion Detection Model," Proceedings of the Seventh IEEE Symposium on Security and Privacy, May 1986, pages 119 131 Sommer, Robin, and Vern Paxson. "Outside the closed world: On using machine learning for network intrusion detection." Security and Privacy (SP), 2010 IEEE Symposium on. IEEE, 2010. Dokas, Paul, et al. "Data mining for network intrusion detection." Proc. NSF Workshop on Next Generation Data Mining. 2002. Minnesota INtrusion Detection System [Online]. Available: http://minds.cs.umn.edu/ 2 2. 3. 4. 5. 6. 7.

  3. Overview Problem - Why is Network Intrustion Detection important? Relevance - How is it related to Anomaly Detection / Data Mining? Description - What is Anomaly Based Network Intrustion Detection? Hypothetical Solution - Case Study 3

  4. Problem What is Network Intrustion Detection? Why is Network Intrustion Detection important? 4

  5. What is NIDS? Network Instrusion Detection System monitors network traffic and attempts to identify unusual or suspicious activity Passive system: alerts are reported to analyst for further investigation 5

  6. Economic Impact A conservative estimate would be $375 billion in losses in 2013, while the maximum could be as much as $575 billion http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf (Page 2) https://media.licdn.com/mpr 6 /

  7. 7

  8. Types of computer attacks [2] Password Attack Information Gathering Attack User to Root (U2R) attack Remote to Local (R2L) attack Probe Virus Worm Trojan Denial of service Network Attack Physical Attack 8

  9. How is IDS related to Anomaly Detection? Types of Intrusion Detection Misuse based Anomaly based Hybrid Misue (signature) Based given a database of known misuses you compare a intrusion detection pattern against this database Anomaly Based - estimate what is normal and raise an alarm when the event is an anomaly based on some metric. 9

  10. is a little vague anomaly-based intrusion detection in networks refers to the problem of finding exceptional patterns in network traffic that do not conform to the expected normal behavior. [2] Network Intrusion Detection Systems Systems have been developed since the 1980 s [4] Still a robust research area Many methods and tools available [2] 10

  11. Machine Learning for Intrusion Detection Challenges with supervised methods Data distribution is very skewed attacks represent a very small amount of network activity Training data is hard/impossible to obtain -network data often contains proprietary information, and is very labor intensive for an analyst to label. Unsupervised Anomaly Detection Doesn t require training data Can detect previously unseen attacks 11

  12. Common Intrusion Detection Framework [2] 12

  13. Data Collection Types of features: Source and destination IP addresses, ports, packet headers, network traffic statistics Tools Tcpdump command line tool Snort open source IDS packet capture and signature matching Wireshark popular open source packet sniffer 13

  14. Features Construction Time based statistics Ratio of data coming in and out of network Packet inspection 14

  15. Minnesota INtrusion Detection System (MINDS) Density based clustering to detect outliers [6] 15

  16. Comparison of anomaly detection methods Anomaly score assigned to each instance based on degree of being an outlier - local outlier factor (LOF) 16

  17. Limitations of Anomaly Based NIDS Challenges Possible Solutions High Cost of Errors Limit false positives with post processing Semantic Gap Better interpretation of results- find ways to distinguish anomalies from attacks Relate features to behaviors Diversity of Network Traffic Tailor system to environment Target certain types of attacks Difficulties with Evaluation Outdated benchmark datasets Need real publicly available network traffic 17

  18. Solutions Case Study DISCLAIMER: The software/solutions presented here is part of our research effort for Data Mining showcase. The presenters have no association with the corporation or institution developing or designing the software / solutions presented in this showcase. Please do your due diligence before using a solution. 18

  19. PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management Knowledge management Complex & adaptive Threats Against external and internal FUSING INTERNAL AND EXTERNAL CYBER DATA Structured network logs Contextual data Unstructured reporting and third party data 19

  20. ANOMALY DETECTION Clusterable, distributed data store Open source technologies Apache s Hadoop Comb through data archives Detect anomalies by creating clusters Visualizations: risk scores, pie charts, and heat maps Drill down and investigate further 20

  21. THE CYBER MESH Shared set of cyber threats P2P sharing among enterprises Automatic censoring of sensitive data 21

  22. THE PALANTIR SOLUTION INSIDER THREAT DETECTION Identify suspicious or abnormal employee behavior IDENTITY ACCESS AND MANAGEMENT Access logs, Active Directory records, HR files, VPN activity 22

  23. ANALYTICAL APPLICATIONS NETWORK DASHBOARDS WEB-BASED IP REPUTATION ENGINE 23

  24. PATTERN DETECTION AND WORKFLOW 24

  25. Palantir Uncovering Cyber Fraud 25

  26. Thank You !! 26

  27. Appendix I Statistical Network Anomaly Detection Methods 27

  28. Appendix 2 Classification Network Anomaly Detection Methods 28

  29. Appendix 3 Clustering & Outlier based Network Anomaly Detection Methods 29

  30. Appendix 4 Soft Computing based Network Anomaly Detection Methods 30

  31. Appendix 5 Knowledge based Network Anomaly Detection Methods 31

  32. Appendix 6 Fusion based Network Anomaly Detection Methods 32

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#