1 1
Colorado State University Yashwant K Malaiya CS 559 L6: Probability & Intrusion Detection
Quantitative Security
CSU Cybersecurity Center Computer Science Dep
Quantitative Security
Quantitative Security Colorado State University Yashwant K Malaiya - - PowerPoint PPT Presentation
Quantitative Security Colorado State University Yashwant K Malaiya CS 559 L6: Probability & Intrusion Detection CSU Cybersecurity Center Computer Science Dep 1 Quantitative Security 1 About this Course CS 559 is a research-oriented
1 1
CSU Cybersecurity Center Computer Science Dep
Quantitative Security
2
Quantitative Security
3
Quantitative Security
4 4
CSU Cybersecurity Center Computer Science Dep
Quantitative Security
5
5
P{A|B} is the probability of A, given we know B has happened.
Quantitative Security
6
6
from A and 0.5% from B are found defective. A produces 90% of the chips. What is the probability a randomly encountered chip will be defective?
i i i
Quantitative Security
7
7
0.5% are drug users. If a person tests positive, what is the probability he is a drug user?
P{A|B} is the probability of A, given we know B has happened.
33.3%
Quantitative Security
8
Disease + Disease - Test +ve TP FP Test –ve FN TN
Quantitative Security
10
Quantitative Security
Intrusion Detection A Survey, Lazarevic, Kumar, Srivastava, 2008
11
11
– X is a random variable that is the height of a randomly chosen student – x is one specific value (say 5’9”)
= =
max min max min max min min
i i i i i x x i i i i x x i
Density function “Cumulative distribution function” (cdf) Expected value (mean)
Quantitative Security
12
12
– Discrete: Bionomial, Poisson – Continuous: Uniform, Gaussian, exponential
– Prob. of r successes in n trials, prob. of one success being p
max min max min
i i i x x
r n r
( ! ! r n r n C r n
r n
= ÷ ÷ ø ö ç ç è æ
incidentally
Quantitative Security
13
Quantitative Security
13
– Probability of r occurrences in time t is given by
t r µ
x l
Often applied to fault arrivals in a system
14
Quantitative Security
14
f (x) = 0, x < a 1 b− a , a ≤ x ≤ b 0, x > b ⎧ ⎨ ⎪ ⎪ ⎩ ⎪ ⎪
15
15
+¥ £ £
x
x
2 2
2 ) ( 2 s µ
40 50 60 70 80 90 100 0.00 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08
Grades Density
Bell-shaped curve
µ = 70 s = 5 µ = 70 s = 10
mean : ) variance ( is which deviation standard : µ s
Laplace discovered it before Gauss in 1774 AD!
Quantitative Security
16
16
random variables tends to have a normal distribution.
The reason why normal distribution is applicable in many cases
Quantitative Security
17
Quantitative Security
17
– If the random variable X is log-normally distributed, then Y = ln(X) has a normal distribution – A log-normal process is the realization of the multiplicative product of many independent random variables, each of which is positive. (From the central limit theorem) – Can’t generate a zero or negative amount, but it has a tail to the right that allows for the possibility of extremely large outcomes. Often a realistic representation of the probability of various amounts
– Widely applicable in social/technological/biological systems: file sizes, network traffic, length of Internet posts. – Formulas, properties: see literature.
0≤X ≤∞
18
Quantitative Security
18
– X value at which you want to evaluate the log-normal function. – mean The arithmetic mean of ln(x). – standard_dev The standard deviation of ln(x). – Cumulative - A logical argument which denotes the type of distribution to be used:
= Cumulative Normal Distribution Function
= Normal Probability Density Function
19
19
continuous distribution.
– Density function
f(t) = l e- l t 0<t£¥ Example:
= e- lt l dt
exponential distribution
parameter generalization of exponential
needed, but is more complex.
l
State 0
5 0 10 0 15 0
t i me
f(t)
e
1/ l
l
Quantitative Security
20
20
Quantitative Security
21
21
Quantitative Security
22
22
Quantitative Security
23
Quantitative Security
23
state i+1, in both cases governed by the rate l. Thus
… 1 i i arrivals
,.. 1 , ) ( ) ( ) (
1
= +
t P t P dt t dP
i i i
l l
We’ll solve it first for P0(t), then for P1(t), then …
24
24
… 1 i i arrivals
t t
l l
2 2
Quantitative Security
25
25
t n n l
We need to solve
1
i i i
Using the expression for P0(t), we can solve it for P1(t). Which we know is Poisson distribution!
Quantitative Security
26
26
time T ith arrival
t t t i i i
e t f e t T P t F e t t t in arrival no P t t P
l l l
l
=
£ £ = = + = > ) ( get we sides, both ating differenti cdf,
derivative is function density the Since 1 } { ) ( by given is (cdf) function
distributi cumulative the Thus )} , ( { } {
1
Exponential distribution i+1th arrival Here we’ll show that the time to next arrival is exponentially distributed.
Quantitative Security
27 27
CSU CyberCenter Course Funding Program – 2019
Cyber-security/cybersecurity/Cyber security?
28
application protocols to identify suspicious activity
29
Quantitative Security
30
Stallings and Brown, 4th ed.
31
No clear diving line between intruder vs authorized user activity
32
https://purplesec.us/intrusion-detection-vs-intrusion-prevention-systems/
33
NIDS: information logged by a NIDS sensor includes
34
Signature Detection can effective for
attacks
attacks
attacks
Anomaly detection can be effective for
35
– Stealth scans, OS fingerprinting, buffer overflows, back doors, CGI exploits, etc.
simple.
backdoor.rules shellcode.rules ….
36
Performance comparison of intrusion detection systems and application of machine learning to Snort system