Aggregation and Aggregation and Correlation of Correlation of - - PowerPoint PPT Presentation

aggregation and aggregation and correlation of
SMART_READER_LITE
LIVE PREVIEW

Aggregation and Aggregation and Correlation of Correlation of - - PowerPoint PPT Presentation

Aggregation and Aggregation and Correlation of Correlation of Intrusion-Detection Intrusion-Detection Alerts Alerts Herv Debar Herv Debar France Tlcom R&D France Tlcom R&D Andreas Wespi Andreas Wespi IBM Zurich


slide-1
SLIDE 1

Aggregation and Aggregation and Correlation of Correlation of Intrusion-Detection Intrusion-Detection Alerts Alerts

Hervé Debar Hervé Debar France Télécom R&D France Télécom R&D Andreas Wespi Andreas Wespi IBM Zurich Research Laboratory IBM Zurich Research Laboratory

slide-2
SLIDE 2

Introduction Architecture Representation of alerts Aggregation and correlation of alerts Future work

Overview Overview

slide-3
SLIDE 3

Aggregation and correlation of ID alerts generated by a diversity of sensors Flooding: operator gets overloaded by the large number of ID alerts

Context: grouping of related alerts Elimination of false alerts

Scalability

Issues addressed Issues addressed

slide-4
SLIDE 4

What's special about our project? What's special about our project?

Started about 3 years ago Influenced the IDWG work on IDMEF Reused existing framework to integrate the ID sensors and their alerts: Tivoli Enterprise Console Is available as a product: Tivoli Risk Manager

slide-5
SLIDE 5

Introduction Architecture Representation of alerts Aggregation and correlation of alerts Future work

Overview Overview

slide-6
SLIDE 6

Architecture Architecture

Probe (ISS RealSecure) Probe (Cisco Secure IDS) Probe (WebIDS) Aggregation & Correlation (TEC) Aggregation & Correlation (TEC)

Alert emission Diagnostic Alert analysis Alert acquisition Report emission

Report generation

Alert accumulation Alert emission Diagnostic Data acquisition Data formatting Data analysis

Aggregation & Correlation (TEC) Probe (ISS RealSecure)

slide-7
SLIDE 7

Tivoli Enterprise Console Tivoli Enterprise Console

Probe (ISS RealSecure) Probe (Cisco Secure IDS) Probe (WebIDS) Pre-adapter (ISS RealSecure) Pre-adapter (Cisco Secure IDS) TEC_tasks Alert reaction TEC_reception Alert reception TEC_rules Alert correlation T i v

  • l

i E n t e r p r i s e C

  • n

s

  • l

e TEC_display Alert display

slide-8
SLIDE 8

Introduction A generic, scalable ID Architecture Representation of alerts Aggregation and correlation of alerts Future work

Overview Overview

slide-9
SLIDE 9

Data-driven approach

represent in a structured way all information as provided by the probes use same data structure for all types of probes (host- and network-based, knowledge- and behavior-based, ...)

Unified data model:

independence of the correlation algorithms and the actual alerts generated by the probes easy integration of any probe in the correlation framework

Alert class hierarchy (1) Alert class hierarchy (1)

slide-10
SLIDE 10

Data model corresponds to an early draft of the IDWG proposal for a standard message exchange format Abstract classes:

generic part of alerts

Implementation classes:

inherit from abstract classes carry specific alert information generated by specific probes

Alert class hierarchy (2) Alert class hierarchy (2)

slide-11
SLIDE 11

Sensor layer Target layer Source layer Detailed target layer

Layered data model Layered data model

ID Probe

product hostname IP address

ID Alert

time name severity confidence

ICMP

Code Type

TCP/UDP

Src Port Dest Port

Single Hosts

Dest IP

Multiple Hosts

Number of hosts

Real Origin

Src IP

Spoofed Origin

Spoofed Src IP

HTTP

URL

SNMP

Community

slide-12
SLIDE 12

Introduction Architecture Representation of alerts Aggregation and correlation Conclusions and future work

Overview Overview

slide-13
SLIDE 13

Purpose:

error checking unify information provided by different probes

IP address (network-based IDS) vs. hostname (host-based IDS) Port number (network-based IDS) vs. service name (host-based IDS) Validity of timestamp is checked and adjusted if needed

Alert prepocessing Alert prepocessing

slide-14
SLIDE 14

Different sensors see the same attack, e.g.:

duplicate_event('NR_WWW_bat_File', 'RS_HTTP_IE_BAT', [source, dest, url, time], 4.0).

If source, dest, and url of the two events are the same and the timestamps are close, the two events are linked and further on treated as a single event.

Duplicates (1) Duplicates (1)

slide-15
SLIDE 15

Duplicates (2) Duplicates (2)

Two events by the same sensor are related, e.g.:

duplicate_event('WW_Suspicious_Cgi', 'WW_Success', [ids, req_id], 25.0).

Duplicate gets a high severity value due to a successful cgi attack.

slide-16
SLIDE 16

A consequence chain is a set of alerts linked in a given order, where the link must occur within a given time interval, e.g.:

consequence('RS_Http_Phf, 'rs.probe.org', 'WW_InsecCgiPhf', 'web.probe.org', 30, 10.0).

If the WebIDS probe does not report the phf attack within 30 seconds, an internal event is generated with severity 10.0

This feature may be used to check whether a probe is still operational.

Consequences Consequences

slide-17
SLIDE 17

Single alerts may not be significant, but the aggregation of single alerts may reveal the attack. A situation is a set of alerts that have certain characteristics in common Three aggregation axes: source, target, and attack category Systematic combination of aggregation axes results in seven situations

Situations (1) Situations (1)

slide-18
SLIDE 18

1 attack/source/dest attack source dest 2-1 attack/source attack source * 2-2 attack/dest attack * dest 2-3 source/dest * source dest 3-1 attack attack * * 3-2 source * source * 3-3 dest * * dest

Situations (2) Situations (2)

slide-19
SLIDE 19

Situations are evaluated in parallel. Thresholds for different warning levels have to be specified, e.g.

threshold('situation1',warning,minor,critical,source,dest,attack).

Generic as well as specific situations, e.g.:

threshold('situation1', 10.0, 20.0, 30.0, _, _, _). threshold('situation1', 5.0, 10.0, 20.0, 'susp.host.org, _, _).

Different sizes of time windows are considered.

Situations (3) Situations (3)

slide-20
SLIDE 20

Introduction Architecture Representation of alerts Correlation and aggregation Future work

Overview Overview

slide-21
SLIDE 21

Improved correlation rules

Analysis of real data Robust correlation rules

Improved performance by outsourcing certain correlation rules from TEC's prolog engine

Zurich correlation engine

Consider information about network topology and machine configurations Integration of new sensors

Future work Future work

slide-22
SLIDE 22

Operational issues Operational issues

Configuration

Severity and confidence value per alert Default vs. site-specific values

Performance

One alert per second

slide-23
SLIDE 23

Correlation is needed to reduce the number of alerts a system administrator has to handle. A standard message format will help to easily integrate new sensors in our framework.

Conclusions Conclusions