Alfonso Valdes Keith Skinner SRI International

Similar documents
Intrusion Detection -- A 20 year practice. Outline. Till Peng Liu School of IST Penn State University

CSE 565 Computer Security Fall 2018

CE Advanced Network Security

Configuring attack detection and prevention 1

intelop Stealth IPS false Positive

Improved Detection of Low-Profile Probes and Denial-of-Service Attacks*

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Anomaly based Network Intrusion Detection System

Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks. Anna Giannakou, Daniel Gunter, Sean Peisert

Configuring attack detection and prevention 1

Raj Jain. Washington University in St. Louis

Basic Concepts in Intrusion Detection

Distributed Denial of Service (DDoS)

Anomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model

EMERALD Development Team

Communication Pattern Anomaly Detection in Process Control Systems

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Intrusion Detection Systems (IDS)

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

* Knowledge of Adaptive Security Appliance (ASA) firewall, Adaptive Security Device Manager (ASDM).

Network Security. Chapter 0. Attacks and Attack Detection

Cooperative Anomaly and Intrusion Detection for Alert Correlation in Networked Computing Systems

Packet Header Anomaly Detection Using Bayesian Belief Network

Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks. Carlos García Cordero Sascha Hauke Max Mühlhäuser Mathias Fischer

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Networks and Communications MS216 - Course Outline -

Bayesian Learning Networks Approach to Cybercrime Detection

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Detecting Specific Threats

Firewalls, Tunnels, and Network Intrusion Detection

Very Fast Containment of Scanning Worms. Nicholas Weaver, Stuart Staniford, Vern Paxson ICSI, Nevis Networks, ICSI & LBNL

CHAPTER V KDD CUP 99 DATASET. With the widespread use of computer networks, the number of attacks has grown

CS Review. Prof. Clarkson Spring 2017

Managing Latency in IPS Networks

Protection Against Distributed Denial of Service Attacks

WHY SIEMS WITH ADVANCED NETWORK- TRAFFIC ANALYTICS IS A POWERFUL COMBINATION. A Novetta Cyber Analytics Brief

Combination of Three Machine Learning Algorithms for Intrusion Detection Systems in Computer Networks

IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic

Emerging Threat Intelligence using IDS/IPS. Chris Arman Kiloyan

UMSSIA INTRUSION DETECTION

Anti-DDoS. FAQs. Issue 11 Date HUAWEI TECHNOLOGIES CO., LTD.

A Robust Classifier for Passive TCP/IP Fingerprinting

Intrusion Detection and Malware Analysis

IDS: Signature Detection

Cisco IOS Classic Firewall/IPS: Configuring Context Based Access Control (CBAC) for Denial of Service Protection

ASA/PIX Security Appliance

Chapter 7. Network Intrusion Detection and Analysis. SeoulTech UCS Lab (Daming Wu)

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Intrusion Detection Systems (IDS)

Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Activating Intrusion Prevention Service

The Reconnaissance Phase

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

Check Point DDoS Protector Simple and Easy Mitigation

Statistical Anomaly Intrusion Detection System

Yuri Gushin & Alex Behar

Intrusion Detection by Combining and Clustering Diverse Monitor Data

Week Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development

Cisco Firepower NGFW. Anticipate, block, and respond to threats

McAfee Network Security Platform Administration Course

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

Double Guard: Detecting intrusions in Multitier web applications with Security

Big Data Analytics for Host Misbehavior Detection

A Data Mining Framework for Building Intrusion Detection Models

CS419 Spring Computer Security. Vinod Ganapathy Lecture 13. Chapter 6: Intrusion Detection

NetDetector The Most Advanced Network Security and Forensics Analysis System

RSA INCIDENT RESPONSE SERVICES

Gladiator Incident Alert

Network Traffic Anomaly Detection Based on Packet Bytes ABSTRACT Bugs in the attack. Evasion. 1. INTRODUCTION User Behavior. 2.

2. INTRUDER DETECTION SYSTEMS

CHAPTER 2 DARPA KDDCUP99 DATASET

Configuring Event Action Rules

Mapping Internet Sensors with Probe Response Attacks

Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT

Cisco Intrusion Prevention Solutions

Request for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref )

Network Intrusion Goals and Methods

A Software Tool for Network Intrusion Detection

ProCurve Network Immunity

Intrusion Detection System

Scrutinizer Flow Analytics

INTRUSION DETECTION WITH TREE-BASED DATA MINING CLASSIFICATION TECHNIQUES BY USING KDD DATASET

ASA Access Control. Section 3

Configuring Firewall TCP SYN Cookie

Introduction Challenges with using ML Guidelines for using ML Conclusions

Monitoring the Device

Mapping Internet Sensors with Probe Response Attacks

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic

Fuzzy Intrusion Detection

Demystifying Service Discovery: Implementing an Internet-Wide Scanner

CIT 480: Securing Computer Systems

Authors: Mark Handley, Vern Paxson, Christian Kreibich

RSA INCIDENT RESPONSE SERVICES

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration

Lab 4: Network Packet Capture and Analysis using Wireshark

Intrusion Detection Systems

Configuring Event Action Rules

Transcription:

Adaptive, Model-Based Monitoring And Threat Detection Alfonso Valdes Keith Skinner SRI International http://www.sdl.sri.com/emerald/adaptbn-paper/adaptbn.html

2 Outline Objectives Approach Bayes net models Key components: Session and availability monitors TCP data characterization What we detect Results Llabs 99 data EMERALD Live Demo Environment Real World Summary

3 Objectives Explore middle ground between signature systems and anomaly detection Evaluate approach with data sets of interest Lincoln Labs data Real-time demonstration environment Real-world deployment Establish: Generalization potential of important attack models Ability to detect novel attacks

4 Approach There is room for a detection paradigm that Comprehends attack models but Reasons probabilistically Bayes models seem like a good candidate We can describe or learn the statistical behavior of several observable variables under various modes of normal or attack behavior Probabilistic aspect allows for generalization Our approach models normal and attack behaviors according to conditional probability tables Model-based aspect has multiple benefits: Superior to pure anomaly detection as far as threat classification Models can be specified, learned, or hybrid Capabilities beyond intrusion detection to resource availability monitoring

5 BN Algorithms Describe the world in terms of conditional probabilities Model observables as nodes in a directed graph Children get π (prior) messages from parents Parents get λ (likelihood) messages from children At leaf nodes, λ messages correspond to observations Belief state is updated as new evidence is observed π(a) A π(β) π(c) λ(β) λ(a) λ(c) λ(d) π(d) This diagram illustrates message propagation in a tree fragment B C π(x) λ(y) λ(x) π(y) D X Y

6 Learning, adaptation Bayes models have a network structure and node parameters Conditional probability tables, or CPT CPT(i,j)=P(child state = j parent state = i) We did not try to learn structure CPT s can be learned off-line or adaptively For real world data, no ground truth. We observed hypothesis capture on very long runs ebayes has optional capability to generate new hypotheses if no existing ones fit (resulted in discovery of unanticipated attacks in Lincoln data) Stability of learning and hypothesis generation are still research issues for us We have used offline learning to generate CPT s that perform well for the Lincoln data, the demo data, and real world data

7 Transition and Update New sessions start with a default prior over normal and attack hypotheses Inference results in new belief In progress alerts may be generated This passes through a temporal transition model Tends to decay back to normal But once a session is sufficiently suspicious, it will be reported New inference results in updated belief Developing smarter transition model New Observations Mail FTP DICT Transition Function Bayes Inference Model Mail FTP DICT

8 EMERALD Inference Techniques Probabilistic systems can trigger on previously unseen patterns indicative of Suspicious activity When things are heading south Anomaly Detection Signature Engine Bayes Technique Deviations from Learned Norms Detect patterns of Interest Probabilistic models of misuse Generalization Yes May need new rules Yes Specificity No Yes Yes Sensitivity Moderate High High False alarms Moderate Low Low Adaptation Yes No Yes

9 Data Reduction Key Components ETCPGEN processes live TCP traffic or TCPDUMP logs for batch experimentation and tuning Among other things, reassembles fragmented packets Hardware pre-filtering (?) EMONTCP processes ETCPGEN events Reconstructs TCP connections. Adapts to traffic volume to estimate connection outcome Also supplies source/destination address and port, connection setup time, data volume Session Monitor and Availability Monitor work concurrently from this point, using the same high-speed Bayes inference library Raw event rate reduced by a factor of 10-2 -10-3 at the output of EMONTCP Alerts are a small fraction of EMONTCP events

10 ebayes Event Flow Raw Ethernet Traffic ebayes Session etcpgen TCP Headers emontcp Connection Events ebayes Availability Alerts Active Display efunnel Attack Logs

11 TCP Data Characterization At present, consider TCP headers, externally initiated connections to internal hosts only Session is a temporally contiguous burst from a source IP Session time out based on last event; whether there are any apparent open connections, etc. Not too important to get exactly right (worst case: multiple alerts for the same attack session) Considering random time out, longer for higher session badness At the same time, valid hosts/ports are adaptively learned Accesses to invalid ports are considered more sensitive (detects stealth sweeps) Component Correlation: the state of a service is communicated to the session monitor. If a service is down, prior expectation of certain error modes changes. Alerts for innocent victims are largely suppressed These are still part of the GUI report for the service down message (see below)

12 Detections: EBAYES Session Monitor More of a conventional ID system, encodes important attack models in its conditional probabilitites Coupled to the availability monitor Prior expectation of anomalous session behavior conditioned on health of host/service requested Attacks detected Portsweeps (including stealthy sweeps of suspicious ports) IP Sweeps Floods: Syn floods, mail bombs, etc. Process table exhaustion Nonspecific high-error-rate traffic (often indicates password guessing) Other BAD

13 Detections: Availability Monitor EBAYES Availability Monitor (Blue Sensor) Dynamically learns valid traffic patterns via unsupervised discovery Aging functions enable analysis of traffic bursts (response/recovery) Bayes inference continuously gives a belief in service availability Resolver alerts maintain threads of events. Outage resulting in millions of failure events are deinterleaved as to host, port, and clients. Administrator sees a single report. Capable of Adaptively Detecting Excess failed connection rate Time to complete connection Variance from daily traffic norms Degraded state may or may not be due to an attack

14 Lincoln Labs 99 Data Detected 100% of visible Neptune (as syn flood) Detected all but 1 visible portsweep Naïve portsweeps trivial Stealthy portsweeps detected based on accesses to invalid ports ( invalid determined adaptively) - confidence usually lower Missed portsweep was 4 ports from 3 different IP s Detected mailbombs Satans look like port or IP sweeps or syn floods Mscan looks like a portsweep and a syn flood Process table model covers process table and LL Apache attacks. Sucessful Apache also detected by availability monitor Detected several dictionary, netcat, and selfping attacks to various services WITH NO PREDEFINED MODEL Availability monitor detects, e.g., DOSNUKE No false alarms at 30% confidence threshold

15 GUI Snapshot, LL week 4

16 EMERALD Live Demo Environment Live environment is a simulated e-commerce site behind a reasonably configured firewall Simulated normal traffic accesses allowed services A multi-stage attack is launched from a hacker console ebayes runs in integrated fashion with other EMERALD components Detects mscan (much stealthier than LL mscan: 28 connections, 6 ports, over in a flash) Detects syn flood Availability monitor detects success of syn flood Availability monitor detects physical disconnect Without modification, we detect nmap, strobe variants as portsweeps No false alarms at 30% confidence threshold

17 Real World We run this continuously monitoring our router to the outside Processes total about 15M, stable, and a few percent of CPU 2M Packets/Day 40K Connection events (synthetic)/day 4K Sessions/Day ~20 Alerts/Day (Reduced by half via meta alert fusion - see my Thursday talk) About 10 CPU minutes processing/day, Pentium III/500, FreeBSD No ground truth Real traffic looks different: New failure modes (added a failed but innocuous http model) Traffic from robots and crawlers Nonetheless, we detect frequent IP sweeps. Details of some look like nasty known attacks Some apparent attempted syn_floods as well Detected down http (apparently non-malicious) before sysadmin

18 Real World Alerts Observe about 20 alerts per day (1 per 200 sessions) Many are very likely good hits Sufficiently serious to get our sysadmin s attention Many port 113 accesses Used by POP, IMAP, Filtered at the router, so appears invalid Confidence usually around 35% HTTP traffic with normal open/abnormal close connections New hypothesis generated, these largely go away Looks like one of the LL 99 Apache Back attacks Erroneous (but probably not malicious) DNS traffic

19 Summary Probabilistic model-based inference fills an important gap between anomaly detection and signature approaches We have a high-performance inference engine and two effective components TCP Session monitor System availability monitor Session monitor detects a variety of attacks in Lincoln data, demo data, and real data Key advantages of availability monitor: Dynamic discovery of resources or services ( did you know you had all those? ) Real-time adaptation to traffic bursts Rapid detection of degraded modes, due to attacks, coordinated attacks, or non-malicious faults