Internet Threat Detection System Using Bayesian Estimation

Similar documents
AIMMS Function Reference - Date Time Related Identifiers

INFORMATION TECHNOLOGY SPREADSHEETS. Part 1

Detecting Drive-by-Download Attacks based on HTTP Context-Types Ryo Kiire, Shigeki Goto Waseda University

Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH

JPCERT/CC Internet Threat Monitoring Report [July 1, September 30, 2014]

JPCERT/CC Incident Handling Report [January 1, March 31, 2018]

A First Look at QUIC in the Wild

A Signal Analysis of Network Traffic Anomalies

CIMA Certificate BA Interactive Timetable

Monitoring and 3D Visualization of the Internet Threats

Total Market Demand Wed Jul 26 Thu Jul 27 Fri Jul 28 Sat Jul 29 Sun Jul 30 Mon Jul 31 Tue Aug 01

3-4 DAEDALUS: Practical Alert System Based on Large-scale Darknet Monitoring for Protecting Live Networks

Observation by Internet Fix-Point Monitoring System (TALOT2) for March 2011

MONITORING REPORT ON THE WEBSITE OF THE STATISTICAL SERVICE OF CYPRUS DECEMBER The report is issued by the.

The Threat Landscape and Security Trends. Jeremy Ward

Detecting Lateral Movement in APTs ~Analysis Approach on Windows Event Logs~ June 17, 2016 Shingo ABE ICS security Response Group JPCERT/CC

NORTHWEST. Course Schedule: Through June 2018 MICROSOFT ACCESS. Access 2016 / Access 2010 / Last Revised: 11/13/2017

Statistics Clearinghouse function Infrastructure Alert function

This tutorial is designed for those who would like to understand the basics of i-mode in simple and easy steps.

Package RcppBDT. August 29, 2016

Pennington County Government Justice Center. Schematic Design - October 27, 2015

CIMA Asia. Interactive Timetable Live Online

Conditional Formatting

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

Basic Concepts in Intrusion Detection

CIMA Asia. Interactive Timetable Live Online

Firewalls, Tunnels, and Network Intrusion Detection

Observation by the Internet Fixed-Point Monitoring System (TALOT2) for November 2011

Quantitative Vulnerability Assessment of Systems Software

Configuring Anomaly Detection

Mapping Internet Sensors with Probe Response Attacks

Section 1.2: What is a Function? y = 4x

Proposal of the Security Information Sharing System with RDF Site Summary

Mapping Internet Sensors with Probe Response Attacks

Summit Days. Structure and numbering of JVN, and Security content automation framework. Future of Global Vulnerability Reporting Summit

Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT

Troop calendar

18050 (2.48 pages/visit) Jul Sep May Jun Aug Number of visits

An advanced data leakage detection system analyzing relations between data leak activity

Observation by Internet Fix-Point Monitoring System (TALOT2) for February 2011

ANOMALY DETECTION IN COMMUNICTION NETWORKS

ASSOCIATION OF CHARTERED CERTIFIED ACCOUNTANTS

UK EPR GDA PROJECT. Name/Initials Date 30/06/2011 Name/Initials Date 30/06/2011. Resolution Plan Revision History

Countermeasures against Mobile spam

ThaiCERT Incident Response & Phishing cases in Thailand. By Kitisak Jirawannakool Thai Computer Emergency Response team (ThaiCERT)

4-2 Rapid Analysis Technologies for Live Networks

Overview Intrusion Detection Systems and Practices

Decision Making Information from Your Mobile Device with Today's Rockwell Software

Commonwealth of the Northern Mariana Islands

Data Security & Operating Environment

Notes Lesson 3 4. Positive. Coordinate. lines in the plane can be written in standard form. Horizontal

JPCERT/CC Incident Handling Report [October 1, 2015 December 31, 2015]

Japan s Measures against Spam

Feasibility study of scenario based self training material for incident response

vol.15 August 1, 2017 JSOC Analysis Team

Real-Time Human Detection using Relational Depth Similarity Features

2015 DDoS Attack Trends and 2016 Outlook

Configuring Anomaly Detection

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

Overview of nicter - R&D project against Cyber Attacks in Japan -

intelop Stealth IPS false Positive

Today we spend some time in programming with the internet and their protocols too. Hope you did already work with the Starter 1 and 2 or 3 and 4 at:

Configuring Anomaly Detection

Statistics for web9 (2008)

76 days Wed 8/24/16 Wed 12/7/16 Daniel Wang,Shreyas Makde,Madhavi Potluri,Roua 2 Requirements analysis 11 days Wed 8/24/16 Wed 9/7/16

BatteryStats.com Page 1 of 9

How to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption

DNS Query Access and Backscattering SMTP Distributed Denial-of-Service Attack

DUTCH BENCHMARK The 2017 Edition

Statistical Methods in Trending. Ron Spivey RETIRED Associate Director Global Complaints Tending Alcon Laboratories

TCA metric #3. TCA and fair execution. The metrics that the FX industry must use.

Implementation of Signature-based Detection System using Snort in Windows

ROC in Assessing IDS Quality

Q WEB APPLICATION ATTACK STATISTICS

Securing CS-MARS C H A P T E R

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates

A Visualization Tool to Improve the Performance of a Classifier Based on Hidden Markov Models

Traffic Analysis on a Domain Name System Server. SMTP Access Generates Many Name-Resolving Packets to a Greater Extent than Does POP3 Access

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology


1 of 10 8/10/2009 4:51 PM

Regular Paper Classification Method of Unknown Web Sites Based on Distribution Information of Malicious IP addresses

TOSHIBA. Semiconductor company Ref. : H Asia Pacific Satelite Industries TO : APPROVAL SHEET FOR TC7SH04FU(T5L,JF,T.

Unique visitors Number of visits Pages Hits Bandwidth (1.64 visits/visitor) 850 (2.47 Pages/Visit)

SIPS: A Stateful and Flow-Based Intrusion Prevention System for Applications

Security Technologies for Dynamic Collaboration

Security: A year of Red Hat Enterprise Linux 4. Mark J Cox

10) LEVEL 4 Assessment Success Pack. EOY Target: Teacher: WA Grade: Targets: Name: Class:

Social Behavior Prediction Through Reality Mining

Software Security. Final Exam Preparation. Be aware, there is no guarantee for the correctness of the answers!

Assessing Global Security Threat Levels Bryan Lu, Project Manager / Researcher

WHITE PAPER HIGH-FIDELITY THREAT INTELLIGENCE: UNDERSTANDING FALSE POSITIVES IN A MULTI-LAYER SECURITY STRATEGY


Advancing the Art of Internet Edge Outage Detection

Grade 4 Mathematics Pacing Guide

The Power of Prediction: Cloud Bandwidth and Cost Reduction

Statistics for cornish-maine.org ( )... 4/25/15, 12:07 PM

Centralized Controller Model: AG-150A

Airside Congestion. Airside Congestion

No domain left behind

Transcription:

Internet Threat Detection System Using Bayesian Estimation Masaki Ishiguro 1 Hironobu Suzuki 2 Ichiro Murase 1 Hiroyuki Ohno 3 Abstract. We present an Internet security threat detection system 4 using Bayesian estimation method. This system analyzes security state of the Internet using Bayesian estimation with transition of frequencies of IP packet arrival events to some specified IP addresses such as port scanning, worm activities and so on. While the system calculates the frequency of access events in each time interval, Bayesian updating has been repeatedly applied to improve the confidence in degree of Internet critical states. When the system detects security threat(s) on the Internet, a security alert message is automatically sent to registered E-mail addresses, such as system administrators, and the system issues security alert details on our Web site 5. We also provide simple HTML and HDML for mobile phone browsers aka NTT DoCoMo s i-mode and KDDI s EZweb. Since the security state of the Internet changes dynamically, application of Bayesian estimation for threat detection is considered suitable because parameters of the model of Bayesian estimation are considered as dynamically changing quantities. This paper is focused on mechanism of detecting security threat using Bayesian estimation and our experimental evaluation. 1 Introduction Recently, the number of large-scale security incidents has been increasing via network by computer worm (ex. MSblaster, Welchia) and malicious automatic scan/attack toolkit. Time-lags between discovery of software vulnerabilities and distribution of this exploit codes is becoming shorter and shorter. Occasionally, -day attack is happened. This situation leads to serious damage for computer and network systems on the Internet. Although many of intrusion detection systems (IDS) have been developed and operated, IDS only detects network attacks from evidence by signature and/or trace after intrusion into their network has occured. The large amount of IDS data and its statistical analysis are required if we want to know what s going on the Internet. For example, Incidents.org 1 Information Technology Development Dept., Mitsubishi Research Institute, Inc 2 Hironobu SUZUKI Office 3 Emergency Communications Group, Communications Research Laboratory 4 We call this the Internet Weather Forecast System. 5 www.clscan.org. This site is opened to the public. provides InternetStormCenter (isc.incidents.org) and CERT/CC starts AirCERT project (www.cert.org). Still we need some way to find something from bunch of data. Our goal is to provide Open 24 hours a day, 7 days a week security threat watching service without human resources. So, we have developed a system that analyzes security state of the Internet using Bayesian estimation with transition of frequencies of IP packet arrival events to some specified IP addresses. 2 Internet Threat Detection Method We describe an Internet threat detection method which detects critical state of the Internet caused by increase of wide area network attacks by analyzing time-series transition of frequencies of port scanning events to some specified IP addresses. We define critical states of the Internet as highly probable states where wide-area network attacks are becoming active in the Internet and may cause loss Tof srvices or damages to a network site. he Basic

idea of Bayesian estimation is to repeat updating a degree of confidence based on observations to gain improved probability distribution. Our method uses differences between frequency of port scans and their trend as observations. Given a target time t (denoted as estimation time in Figure 1), we set some period of time (we call it confidence update period ). 6 5 4 3 2 1 Frequency Trend Local standard deviation Confidence Update Period (T) Difference of frequency and trend (r) Thu Jan 2 12:: 23 Wed Jan 8 12:: 23 Tue Jan 14 12:: 23 Mon Jan 2 12:: 23 Sun Jan 26 12:: 23 Sat Feb 1 12:: 23 Fri Feb 7 12:: 23 Thu Feb 13 12:: 23 Wed Feb 19 12:: 23 Tue Feb 25 12:: 23 Mon Mar 3 12:: 23 Sun Mar 9 12:: 23 Sat Mar 15 12:: 23 Fri Mar 21 12:: 23 Thu Mar 27 12:: 23 Wed Apr 2 12:: 23 Tue Apr 8 12:: 23 Mon Apr 14 12:: 23 Sun Apr 2 12:: 23 Sat Apr 26 12:: 23 Fri May 2 12:: 23 Thu May 8 12:: 23 Wed May 14 12:: 23 Tue May 2 12:: 23 Mon May 26 12:: 23 Sun Jun 1 12:: 23 Target Time Figure 1: Time-series frequency of port scans and parameters of Bayesian estimation We set up an initial prior probability distribution of confidence of critical states of the Internet. By observing frequency of port scans, moving average of frequency (we call it frequency trend ), and standard deviation of difference between frequency and its trend at each time during confidence update period, we can update prior probability distribution to get posterior probability distribution using likelihood function defined in equation (1) and (2) based on updating equation (3). P (r s ) = P (r s 1 ) = r kσ r + r kσ r kσ r + r (1) (2) P (s i r) = P (s i)p (r s i ) j P (s (3) j)p (r s j ) where s i (i =, 1) represents states of the Internet as follows: { s : critical state (4) s 1 : safe state r is observational value representing difference between frequency of port scans and their trend. P (s i r) is a posterior probability that the Internet state is s i after observing r. P (s i ) is prior probability that the state is s i before observing r. P (r s j ) is a likelihood function with which r is observed at state s i. We defined likelihood functions (1) and (2) so that difference between frequency of port scans and their trend increases at critical state. In equations (1) and (2), σ r is a local standard deviation of difference between frequency of port scans and their trend within the confidence updating period. k is a parameter defining sensitivity of updating speed (we call this Update deviation factor ). Ranges of equations (1) and (2) are the real numbers between to 1. By repeating this update process at each time step within confidence updating period, we can get estimated confidence of critical status of the Internet. 3 An Overview of Internet Threat Detection System An Internet threat detection system that we propose is to send alert messages to system administrators hopefully before their network sites have been attacked, by observing changes of port scanning to some specified IP addresses in the Internet and detecting threat caused by increasing activities of network attacks. Our system detects critical states of the Internet by analyzing time-series frequencies of port scans based on Bayesian estimation. Figure 2 is an overview of our Internet threat detection system and its environment. Our system consists of a number of sensor systems, a log server, an analysis and detection system,

Hostile host Hostile host Port scanning Log server Internet Port scanning Offline data transfer Analysis Prediction Notification system Alerts to Cell Phone Or by E-mail To:. Subject: Internet Alert Date: ------------ Alert Level: severe (2) Confidence:.89 : Figure 2: An overview of our Internet threat detection system an notification system. The sensor systems record TCP/UDP access events making use of Linux syslog in clscan[4] compatible data format and sends them to the log server. The log server collects clscan data from several sensor systems and provides data to the analysis and detection system on demand. The analysis and detection system detects critical status of the Internet based on the method described in section 2 and request the notification system to send alerts. The notification system alerts system administrators about the critical status of the Internet. Currently, the notification system notifies critical status to system administrators by cell phone data communication system such as i-mode, ez web operated by cell phone companies in Japan. ratio that negative samples are mistakenly classified as positive samples, true-positive fraction which is a ratio that positive samples are correctly classified as positive are totally considered for performance evaluation. True-positive fraction represents sensitivity of detection. False-positive fraction corresponds to peculiarity of samples. Our research aims at detecting critical states of the Internet where wide-area network attacks are increasing. It is difficult to evaluate performance of this type of problem, because true states of this kind of definition cannot be provided in advance in general. In this experiment, we specified manually the time during the sample period where the Internet is in critical state by observing time-series frequencies of port scans. We use this information as true state of the Internet and compares with the predication result obtained by using our system. Data we used in this experiment is that in the period during January 1, 23 to December 1, 23. Figure 3 shows time-series transition of frequencies of port scans of some ports whose number of accesses are relatively large and on which JPCERT, an incident response organization, made critical alerts during this period. amount 8 7 6 5 4 3 2 port8 port135 port25 port1434 4 Experimental Evaluation We show experimental evaluation of our Internet threat detection system conducting by ROC (Receiver Operating Characteristics) analysis whose effectiveness is well-known in the field of signal detection research. In ROC analysis, false-positive fraction which is a 1 Jan/1 Feb/1 Apr/1 May/1 Jul/1 Aug/1 Oct/1 Nov/1 time Figure 3: Time-series frequencies of port scans Port 8 is used by http servers. An alert on Microsoft IIS 5. vulnerability of port 8 was made

on March 18, 23 by JPCERT(JPCERT-AT-23-3). Port 135 is used by Windows RPC services. An alert on port scans to TCP port 135 which is wellknown for W32/Blaster is made on August 15,23 (JPCERT-AT-23-6). Port 25 is used by SMTP servers. An alert on sendmail vulnerability was made on March 3, 23 (JPCERT-AT-23-4). Port 1434 is used by Microsoft SQL server 2. An alert on port scans to UDP 1434 was made on January 27, 23 (JPCERT-AT-23-1-27). Figure 4 is a time-series transition of estimation on degree of critical status of the Internet corresponding to Figure 3. Probability.4.35.3.25.2.15.1.5 Negative cases Positive cases.1.2.3.4.5.6.7.8.9 1 Estimated Values 1.9.8.7 port8 port135 port25 port1434 Figure 5: Distributions of Bayesian estimated values of critical and safe status Baysian estimate.6.5.4.3.2.1 Jan/1 Feb/1 Apr/1 May/1 Jul/1 Aug/1 Oct/1 Nov/1 time Figure 4: Time-series transition of Bayesian estimation on critical status estimated values can be used as a good index for discrimination. Figure 6 shows the ROC curve which can be obtained by plotting points composed of false-positive fraction and true-positive fraction. false-positive fraction can be calculated by summing up right-side area of positive cases from each estimated value in Figure 5 and true-positive fraction can be calculated by summing up negative cases. Table tab:parameters shows experiments and their parameter values and performance value, that is a area size of ROC curve called Az values. Among these ports we selected port 25 (SMTP) as a target of ROC analysis, because transition of frequency of port scans are relatively complex during this period and Warnings to this port were made by several incident response organizations such as CERT Advisory. Figure 5 is a distribution of Bayesian estimation values at times in critical state (depicted as positive cases) and in safe state (depicted as negative cases). We can see in Figure 5 that peak of distribution of positive cases is located at around.9 in horizontal axis and peak of distribution of negative cases is located at around.1, which we can confirm our Table 1: Parameter values and Az Value for experiments ID in Fig 6 Bayesian Confidence Trend Az update deviation factor update period period T31B5k.5.5 5 31.95 T1B5k.5.5 5 1.79 T1B3k.5.5 3 1.8

1.8 performance of detection and obtained a better parameter set of trend period, Bayesian update deviation factor, and Bayesian update period among three experiments. True-Positive Fraction.6.4.2.2.4.6.8 1 False-Positive Fraction T31B5k.5 T1B5k.5 T1B3k.5 baseline Figure 6: ROC curve of thread detection of port 25 ROC curves is located over the line y = x. The upper it is located, the better its performance is. In Figure6, we can conclude that the performance is better among the three experiment when trend period is 31 days, Bayesian update deviation factor is.5, and Confidence update period is 5 days. References [1] P. Porras and P. Neumann, EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances,In Proceedings of the Nineteenth National Computer Security Conference, October 1997. [2] Richard O. Duda et al.,pattern Classification, John Wiley & Sons21 [3] Masaki Ishiguro et al., Discrimination Method of Malignant and Benign Tumors based on Machine Learning to Features of Liver CT images, Japanese Society of Medical Imaging Technology (JAMIT), Vol.19,No.1,pp.43-49. [4] Hironobu Suzuki, clscan home page, http:- //www.pp.iij4u.or.jp/ h2np/h2np/lscan/ [5] Hitosi Mizutomo, Development of DDoS Attack Predication System IPSJ Computer Security Symposium 23, pp.97-12. 5 Conclusions We have developed a system which detects Internet threats caused by increasing activities of network attacks and makes alerts to system administrators hopefully before their network sites have been attacked. Internet threats are detected by observing time-series transition of frequencies of port scans to some specified IP addresses and applying Bayesian estimation. Degree of confidence in critical states on the Internet can be estimated by repeatedly updating the confidence based on the difference between frequency of port scans and its trend. Internet threats are automatically detected and alert messages are sent to system administrators. By conducting ROC analysis, we have compared