extracting attack scenarios using intrusion semantics
play

EXTRACTING ATTACK SCENARIOS USING INTRUSION SEMANTICS Sherif Saad, - PowerPoint PPT Presentation

EXTRACTING ATTACK SCENARIOS USING INTRUSION SEMANTICS Sherif Saad, Issa Traore Information Security and Object Technology Lab University of Victoria ECE Department 5 th FPS 2012 Overview 2 Introduction Related Work Approach


  1. EXTRACTING ATTACK SCENARIOS USING INTRUSION SEMANTICS Sherif Saad, Issa Traore Information Security and Object Technology Lab University of Victoria ECE Department 5 th FPS 2012

  2. Overview 2  Introduction  Related Work  Approach  Experiment  Conclusion UVic, 12-12-18

  3. Introduction: Definition 3  Attack Scenario:  Elicits the steps and actions taken by the intruder to breach/compromise the system.  Also known as attack plan.  Attack Pattern:  A collection of malicious actions that together represent a pattern. UVic, 12-12-18

  4. Introduction: Motivation 4  Extracting attack scenario is needed to:  Elicit the attack and extract useful attack intelligence,  Identify the compromised resources,  Spot the system vulnerabilities,  Determine the intruder objectives and the attack severity. UVic, 12-12-18

  5. Introduction: Research problem 5  IDSs generate low level intrusion alerts that describe individual attack event.  IDS are not designed to recognize attack plans or discover multistage attack scenarios.  IDSs tend to generate massive amount of alerts with high rate of redundant alerts and false positives.  False negatives, which correspond to the attacks missed by the IDS. UVic, 12-12-18

  6. Related Works 6  Statistical and Clustering Approaches  Use alerts similarity and statistical characteristics.  Can handle large amount of IDS alerts.  Can reconstruct novel and unknown attack scenarios.  Cannot detect causality between individual attacks  Limited to simple attack scenarios and attack patterns.  Reconstruct false attack scenarios. UVic, 12-12-18

  7. Related Works (ctd.) 7  Knowledge Based Approaches  Use hard coded knowledge and rely on explicit knowledge.  Hard to maintain and update the knowledge-base  Can reconstruct complex and multistage attack scenarios, but not novel attacks scenarios.  Cannot handle false negatives and missing attack steps.  Cannot detect hidden and implicit relations between attacks. UVic, 12-12-18

  8. Research Objectives 8  Develop a new approach that:  Handle large amount of IDS alerts.  Handle complex multistage attack scenarios.  Automatically reconstruct novel and unknown attack scenarios with high accuracy.  Minimize the affect of missing attack steps. UVic, 12-12-18

  9. Approach: Semantic Correlation 9  IDS sensors use different formats and vocabularies to describe the alerts.  IDMEF provides common alert message structure (syntax) not semantic.  IDS alerts message attributes are symbolic data. It is hard to measure similarity or distance between symbolic data. UVic, 12-12-18

  10. Approach: Intrusion Ontology 10 UVic, 12-12-18

  11. Approach: Semantic Relevance 11 UVic, 12-12-18

  12. Approach: Semantic Clustering 12  Use the ontology to measure the semantic relevance between different alert messages.  Using the semantic relevance we build the alert correlation graph (ACG).  Analyze the ACG to extract all maximum cliques in ACG. We consider every maximum clique in the ACG as a candidate attack scenario/pattern. UVic, 12-12-18

  13. Semantic Clustering Example 13 UVic, 12-12-18

  14. Semantic Clustering Example 14 Alerts Correlation Graph All Maximum Cliques in ACG UVic, 12-12-18

  15. Attack Causality Analysis 15  The Impact class in the ontology contains the set of attack prerequisites and consequences.  The causality relation between two attack instances a and b is a value between 0 and 1 given by  The sequence of attacks in the attack scenario is based on the causality between attack instance in the scenario UVic, 12-12-18

  16. Experiments 16  Datasets  DARPA 2000 dataset from MIT Lincoln Laboratory.  The Treasure Hunt dataset. UVic, 12-12-18

  17. Evaluation Metrics 17  Two performance metrics:  Completeness: the ratio between the number of correctly correlated alerts by the number of related alerts (i.e. that belong to the same attack scenario).  Soundness: the ratio between the number of correctly correlated alerts by the number of correlated alerts. UVic, 12-12-18

  18. Experiments Results 18 UVic, 12-12-18

  19. Conclusion & Future Work 19  The use of semantic correlation and ontology:  Allow us to develop a better alert correlation and attack scenario reconstruction technique.  Enable interoperability between heterogeneous IDS sensors.  Improve the knowledge-base maintenance.  Eliminate the need of hard-coded rules. UVic, 12-12-18

  20. Conclusion & Future Work 20  Our future work will focus on:  False negative: improve the attack causality analysis to predict missing attack steps  False positive: develop an ontology-based rule induction to reduce the false positive alerts. UVic, 12-12-18

  21. Thanks Questions?? UVic, 12-12-18

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend