netw ork i ntrusion detection system s
play

Netw ork I ntrusion Detection System s False Positive Reduction - PowerPoint PPT Presentation

Damiano Bolzoni Emmanuele Zambon Netw ork I ntrusion Detection System s False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 08/03/2007 NIDS - False Positive reduction through Anomaly


  1. Damiano Bolzoni – Emmanuele Zambon Netw ork I ntrusion Detection System s False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 08/03/2007 NIDS - False Positive reduction through Anomaly Detection 1

  2. Damiano Bolzoni – Emmanuele Zambon Introduction: the NIDS problems � � A strategy for reducing false positives rate � POSEIDON: a payload-oriented anomaly detection system � APHRODITE: the architecture for FP reduction � Experiments � Conclusion & future work Questions � References � Agenda 08/03/2007 NIDS - False Positive reduction through Anomaly Detection 2

  3. Damiano Bolzoni – Emmanuele Zambon Network Intrusion Detection Systems, no matter if they are Signature or Anomaly based, have in common some problems False False Positives Positives NIDS problems connected with false alerts The number of alerts collected by an IDS can be very large (15,000 per day per sensor). The number of FP is very high (thousands per day). Reducing the FP rate may reduce NIDS reliability . Filtering and analyzing alerts is done manually . For the security manager: – a work overload in recognizing true attacks from NIDS mistakes – lost confidence in alerts – lower the defence level to reduce FP rate NIDS problems 08/03/2007 NIDS - False Positive reduction through Anomaly Detection 3

  4. Damiano Bolzoni – Emmanuele Zambon Tuning the NIDS can solve some of the FP problems, but… alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg: "WEB-MISC http directory traversal"; flow:to_server,established; content:"../" ; reference:arachnids,297; classtype:attempted-recon; sid:1113; rev:5;) False Positive <img src=“ ../ img/mypic.gif” alt=“My PIC”> TUNING IS NOT ENOUGH! NIDS problems 08/03/2007 NIDS - False Positive reduction through Anomaly Detection 4

  5. Damiano Bolzoni – Emmanuele Zambon The problem: current NIDSes ignore roughly half of the network traffic FPs occur when the NIDS fails to consider the legitimate sampled traffic as an attack. We need a way to confirm that an attack is taking place, before raising any alert . Some considerations … When an attack takes place, it is likely to produce some kind of To increase NIDS accuracy unusual effect on the target system. (the ability of detecting real On the other hand, if the data flow is licit, there will be no unusual attacks) we need to introduce effect on the target system. meaningful outgoing data Considering a network environment, we can observe the reaction of analysis and correlate it with monitored systems by examining the outgoing data flowing from incoming data. those systems in response of an extern solicitation. Current NIDSes only consider incoming requests of monitored systems: outgoing traffic is hard to analyze and doesn’t contain any attack data. A strategy for reducing FP rate 08/03/2007 NIDS - False Positive reduction through Anomaly Detection 5

  6. Damiano Bolzoni – Emmanuele Zambon In general, most of the real attacks modify the information flow between the monitored system and the systems with wick it is dialoguing with. Classes of attacks Consequences When an attack causes the interruption of one or more services in a system, or Attacks of interruption even a system failure, all communications are stopped. Attack on the Attack on the Observing output network traffic we will see no more data flowing outside the availability of availability of monitored system. the system the system Attacks of interception Unauthorized access to a system is mostly done to gain information they wouldn’t normally get by the system. Unauthorized Unauthorized If an attempt of attack is done, and the system reacts denying the information access to a access to a disclosure, it will usually send some kind of error message, or no data at all. system system Attacks of modification When an attacks causes the modification of the information provided by a system, the behaviour of the system itself will be altered, causing it to alter his normal Attack on the information flow. Attack on the integrity of the integrity of the system system Attacks of fabrication If an unauthorized party gains access to the system and inserts false objects into it, it degrades the authenticity of the system. Degrades the Degrades the This cause a deviation in the normal behavior of the system, reflecting in the authenticity of authenticity of alteration of the usual output of the system itself. the system the system Attacks modify normal information flow 08/03/2007 NIDS - False Positive reduction through Anomaly Detection 6

  7. Damiano Bolzoni – Emmanuele Zambon Validation of output traffic for a system is more complex than input validation. Problems in output traffic validation Every instance of an application in a system has a different kind of output traffic, accordingly to A signature-based tool is not the information it contains. suitable for output validation. There is a number of ways a system can react to We need anomaly detection ! an attack. Even if the same attack is carried out on two different system, the reaction won’t be the same . We need a correlation engine to How can we associate input traffic with output ? associate correctly input How much must we wait to see the response to suspicious request with a suspicious request? appropriate responses. Problems in output traffic validation 08/03/2007 NIDS - False Positive reduction through Anomaly Detection 7

  8. ANOMALY DETECTION Damiano Bolzoni – Emmanuele Zambon To achieve output traffic validation, according with the previous considerations, we designed POSEIDON, a NIDS based on the anomaly-detection approach POSEIDON stands for: P ayl O ver S om for I ntrusion D etecti ON Main Features Starting from the good results achieved Network -oriented. by K. Wang and S. Stolfo with their IDS ( PAYL ) we propose a two-tier NIDS that Payload -based. It considers only the payload of the traffic it inspects. improves the number of detected attacks using a Self Organizing Map ( SOM ) Two-tier architecture. to pre-process the traffic. Developed and tested for TCP traffic . POSEIDON – A two tier Network Intrusion Detection System 08/03/2007 NIDS - False Positive reduction through Anomaly Detection 8

  9. ANOMALY DETECTION Damiano Bolzoni – Emmanuele Zambon Our anomaly detection engine is based on a modified version of PAYL PAYL features To compare each sample with its Anomaly-detection engine based on statistical models, uses the full payload information. model a slightly modified Mahalanobis distance function is To characterize traffic profiles only few other features used. are used: - monitored host IP address - monitored Service Port - payload length High detection Enhanced by post model-building clustering. High detection rate. Low false rate. Low false positives rate. positives rate. Benchmarked with reference dataset (DARPA 1999). PAYL (Wang and Stolfo, 2004) 08/03/2007 NIDS - False Positive reduction through Anomaly Detection 9

  10. ANOMALY DETECTION Damiano Bolzoni – Emmanuele Zambon PAYL classification method presents some weaknesses that compromise the quality of normal traffic models PAYL classification weaknesses Data with different contents can be clustered in the PAYL classification same class . does not evaluate properly Similar data can be clustered in two different classes INTER-CLASS SIMILARITY. because the length presents a small difference . Is it possible to enhance PAYL classification model? We need unsupervised classification We must classify high-dimensional data (the full payload data) Enhancing PAYL 08/03/2007 NIDS - False Positive reduction through Anomaly Detection 10

  11. ANOMALY DETECTION Damiano Bolzoni – Emmanuele Zambon T. Kohonen, in 1995, describe a data visualization technique which reduce the dimensions of data through the use of self-organizing neural networks KEY features A 3 x 4 Competitive networks with unsupervised learning. A 3 x 4 rectangular Self rectangular Self Organizing Map Organizing Map SOM training phases: - Initialization - Get Best Matching Unit ( BMU ) - Update scaling neighbours New samples are used to update network with reducing neighbourhood influence over time. It is possible to determinate the quality of trained network by quantization error . Advantages Disadvantages Unsupervised and suitable for high-dimensional Requests a training phase data Benchmarked against other clustering algorithms Too many false positives (SOM does not evaluate (K-means, K-medoids) properly intra-class similarity ) SOM – Self Organizing Maps 08/03/2007 NIDS - False Positive reduction through Anomaly Detection 11

  12. ANOMALY DETECTION Damiano Bolzoni – Emmanuele Zambon Using SOM to classify payload, according to service port and monitored IP address, improves PAYL model building phase Added SOM as Added SOM as Classification Classification Engine Engine SECOND TIER SECOND TIER CLASSIFICATION SOM C FEATURES PAYL NETWORK ANOMALY PAYLOAD EXTRACTOR TRAFFIC DEST. ADDRESS SERVICE PORT FIRST TIER FIRST TIER Payload length is Payload length is replaced by SOM replaced by SOM classification classification POSEIDON - Architecture 08/03/2007 NIDS - False Positive reduction through Anomaly Detection 12

  13. ANOMALY DETECTION Damiano Bolzoni – Emmanuele Zambon POSEIDON overcomes PAYL on every benchmarked protocol. POSEIDON – Test Results 08/03/2007 NIDS - False Positive reduction through Anomaly Detection 13

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend