Denial of Service and Anomaly Detection Vasilios A. Siris - - PowerPoint PPT Presentation

denial of service and anomaly detection
SMART_READER_LITE
LIVE PREVIEW

Denial of Service and Anomaly Detection Vasilios A. Siris - - PowerPoint PPT Presentation

Denial of Service and Anomaly Detection Vasilios A. Siris Institute of Computer Science (ICS) FORTH, Crete, Greece vsiris@ics.forth.gr SCAMPI BoF, Zagreb, May 21 2002 Overview What the problem is and why it is difficult Where and why


slide-1
SLIDE 1

Denial of Service and Anomaly Detection

Vasilios A. Siris

Institute of Computer Science (ICS) FORTH, Crete, Greece vsiris@ics.forth.gr

SCAMPI BoF, Zagreb, May 21 2002

slide-2
SLIDE 2

Overview

What the problem is and why it is difficult Where and why naïve schemes fail Consider two algorithms

Adaptive Threshold CUSUM (CUmulative SUM)

Application to SYN attack detection Experimental results Conclusions and future work

slide-3
SLIDE 3

Denial of Service (DoS) attacks

Aim is to prevent users from receiving

service, with some minimum performance

Achieved by consuming resources

Bandwidth Memory Router forwarding capacity Other services: DNS

Technique: flooding

slide-4
SLIDE 4

Importance of DoS attacks

Recent surveys:

40% of all attacks are DoS (2002 CSI/FBI) 90% of all DoS attacks are TCP attacks (2001

Moore et al)

Cost of attack = many € or $

Several millions to billions $ estimated loss from

Feb 2000 attack at Yahoo, CNN, Amazon, etc

Attacks are increasing

DNS route server attack in Oct. 2002 DOLnet’s attack in Dec. 2002 55% Web attacks are DoS (2002 CSI/FBI)

slide-5
SLIDE 5

The DoS problem

Detection Prevention/ Reaction Identification of attackers

Our focus on detection of DoS attacks

Early and reliable detection of attacks Detection of low intensity attacks

slide-6
SLIDE 6

Distributed DoS attack

X

attacker victim

daemon daemon aggregated traffic traffic volume remains low

hosts compromised

Measurement points daemon

slide-7
SLIDE 7

Approaches to anomaly detection

Alarm when behavior deviates from normal Specify normal behavior (operational model)

Thresholds: e.g. load < 0.7

Learn normal behavior

Mean and standard deviation statistics Time series analysis: advantage is that they take

into account time correlations

– Change point detection (hypothesis testing)

Other approaches: bayesian statistics, neural nets

DoS attacks one example of anomaly

Link/device failures

slide-8
SLIDE 8

Non-adaptive approaches not robust

Fixed threshold tests (e.g. normal < 0.7) will

fail due to normal/regular traffic variations

Why not consider an adaptive threshold ?

slide-9
SLIDE 9

Detection of some attacks simpler

no attack with attack

slide-10
SLIDE 10

Detection of some attacks simpler

no attack with attack attack

slide-11
SLIDE 11

Some attacks are more subtle

no attack with attack

slide-12
SLIDE 12

Some attacks are more subtle

no attack with attack attack

slide-13
SLIDE 13

What and when to measure

Variable measured:

Aggregate traffic volume (in fixed time intervals) Traffic volume per flow (in fixed time intervals) # of requests, e.g. TCP, http, … Inter-arrival time of requests Duration of requests (average or bin) Pkt size (average or bin)

Statistic: Mean, variance, covariance, hurst When to measure: order of minutes

10 minutes in our experiments

slide-14
SLIDE 14

Algorithms investigated

Adaptive threshold

Adaptively measure mean rate Alarm when rate more than some percentage

(e.g. > 150% of mean)

CUSUM (CUmulative SUM)

Adaptively measure mean rate Sum the volume sent above some average factor Alarm when volume more than some threshold

slide-15
SLIDE 15

Adaptive Threshold (AT)

Let be time series of measurements

E.g. # of SYN packets in an interval T

Mean measured over some past window L

By adaptively measuring mean can adjust to

periodic (non-stationary) changes

Alarm condition Parameters:

T (measurement interval), L (averaging interval),

β>1 (threshold)

t

y

t

µ t y

t t

at Alarm If βµ >

slide-16
SLIDE 16

Adaptive Threshold (AT)

Let be time series of measurements

E.g. # of SYN packets in an interval T

Mean measured over some past window L

By adaptively measuring mean can adjust to

periodic (non-stationary) changes

Alarm condition Parameters:

T (measurement interval), L (averaging interval),

β>1 (threshold)

t

y

t

µ t y

t t

at Alarm If βµ >

slide-17
SLIDE 17

Adaptive Threshold k (AT-k)

More robust if alarm set when threshold

exceeded for # k of consecutive intervals

Alarm condition Parameters:

T (measurement interval), L (averaging interval),

β (threshold), k (# of intervals threshold exceeded)

t k

t k t i y

i i

at ALARM then 1 If

} {

− = >

>

βµ

slide-18
SLIDE 18

Adaptive Threshold: intuition

Assuming fixed mean t

µ

t

βµ = Threshold

time # Alarm set If # > k

t

y

slide-19
SLIDE 19

CUSUM algorithm

Based on hypothesis testing Current hypothesis (no attack): Alternative hypothesis

:

Alarm condition Parameters: β (surplus), h (alarm threshold)

1

βµ µ =

1

σ σ =

) ( ) ( ln

1

i i i

y p y p s

θ θ

=

=

=

t i i t

s S

1

θ

k t k

S S

≤ <

=

min

min

t h S St at ALARM then If

min >

θ

slide-20
SLIDE 20

CUSUM algorithm

Based on hypothesis testing Current hypothesis (no attack): Alternative hypothesis

:

Alarm condition Parameters: β (surplus), h (alarm threshold)

1

βµ µ =

1

σ σ =

) ( ) ( ln

1

i i i

y p y p s

θ θ

=

=

=

t i i t

s S

1

θ

k t k

S S

≤ <

=

min

min

t h S St at ALARM then If

min >

θ

slide-21
SLIDE 21

CUSUM algorithm: another view

Mean µ estimated using EWMA Surplus: (e.g. ) Alarm condition Parameters:

β>1 (surplus), h (alarm threshold)

+ −

            + − + = 2 '

1 2 1 1

µ µ σ µ

t t t

y g g

t h gt at ALARM then If >

βµ µ µ µ = + = '

1 1

µ µ × = 5 . 1

1

slide-22
SLIDE 22

CUSUM algorithm: another view

Mean µ estimated using EWMA Surplus: (e.g. ) Alarm condition Parameters:

β>1 (surplus), h (alarm threshold)

+ −

            + − + = 2 '

1 2 1 1

µ µ σ µ

t t t

y g g

t h gt at ALARM then If >

βµ µ µ µ = + = '

1 1

µ µ × = 5 . 1

1

slide-23
SLIDE 23

CUSUM algorithm: intuition

Alarm set

f gk >

i

g volume =

2

1

µ µ +

=

i

g

t

y

time

Assuming constant Accumulates excess traffic (memory)

2

1

µ µ +

slide-24
SLIDE 24

Types of DoS attacks

TCP SYN flooding ICMP flooding UDP flooding SMURF attack

slide-25
SLIDE 25

Application to SYN attack detection

Receiver Receiver Sender Senders SYN x

SYN y, ACK x+1

SYN SYN

SYN, ACK

ACK y+1

… …

FYN z

ACK z+1 FYN r

Exploits TCP’s three way

handshake

Half-open connections

consume resources

Source IP addresses spoofed

ACK r

slide-26
SLIDE 26

Performance measures

Attack detection ratio False alarm ratio (false positives) Detection delay Robustness How tunable the algorithm is

Tradeoff between detection ratio, false alarm ratio

and detection delay

Evaluate above for different attack types

Intensity of attack (amplitude) How fast it reaches peak amplitude

slide-27
SLIDE 27

Experiments

Considered actual trace with no attacks ~ 20

hours

# of SYN pkts in 10 second intervals

Synthetic attacks

Intensity of attack (peak) Time to reach peak

time to reach peak peak

+ randomness

slide-28
SLIDE 28

Experiments

Considered real trace without attacks ~ 20 hours

# of SYN pkts in 10 second intervals

50 runs, 95% confidence interval Synthetic attacks

Intensity of attack (peak) Time to reach peak Inter-arrival: exponential, 400 sec

+ randomness

peak time to reach peak

slide-29
SLIDE 29

Adaptive Threshold – k

5.5 11.1 trace trace + attacks attacks alarms

Intense attack: rate ~ 250% mean

slide-30
SLIDE 30

CUSUM

trace trace + attacks attacks alarms

Intense attack: rate ~ 250% mean

slide-31
SLIDE 31

Adaptive Threshold – k

trace trace + attacks attacks alarms

small attack: rate ~ 10% mean

slide-32
SLIDE 32

CUSUM

trace trace + attacks attacks alarms

small attack: rate ~ 10% mean

slide-33
SLIDE 33

CUSUM

threshold

  • Attack amplitude: 150% mean
  • Time to reach peak: 90 sec
slide-34
SLIDE 34

Adaptive Threshold - k

k (consecutive intervals of excess load)

  • Attack amplitude: 150% mean
  • Time to reach peak: 90 sec
slide-35
SLIDE 35

AT-k versus CUSUM

AT-k CUSUM

Detection probability Detection probability False alarm ratio False alarm ratio

better better

  • Attack amplitude: 150% mean
  • Time to reach peak: 90 sec
slide-36
SLIDE 36

AT-k versus CUSUM

AT-k

Detection probability False alarm ratio False alarm ratio

CUSUM

Detection probability

  • Attack amplitude: 50% mean
  • Time to reach peak: 90 sec
slide-37
SLIDE 37

Adaptive Threshold - k

k (consecutive intervals of excess load)

  • Attack amplitude: 50% mean
  • Time to reach peak: 90 sec
slide-38
SLIDE 38

Detection delay Attack peak at 90 sec Attack peak at 10 sec Detection delay False alarm ratio False alarm ratio

better

CUSUM

  • Attack amplitude: 50% mean
slide-39
SLIDE 39

Experiment results

Performance depends on attack characteristics For some (intense) attack types straightforward

procedures can be effective

But simple procedures are not robust for

different attacks

Sound statistical methods are robust and not

necessarily complex

Intuition on how to tune parameters important

slide-40
SLIDE 40

Future work

Application to other measures & statistics Combination of alarms Application to QoS measurements

Measurements: delay, jitter, throughput Up to now: alert when measurements exceed

guarantees

Idea: apply anomaly detection to measurements

=> early detection of QoS violations

slide-41
SLIDE 41

Denial of Service and Anomaly Detection

Vasilios A. Siris

Institute of Computer Science (ICS) FORTH, Crete, Greece vsiris@ics.forth.gr

SCAMPI BOF, Zagreb, May 21 2002

slide-42
SLIDE 42