CSCE 465 Lecture 18
Jump to navigation
Jump to search
« previous | Thursday, March 28, 2013 | next »
Intrusion Detection System
Intrusion: a set of actions aimed to compromise security goals (CIA)
Intrusion detection is the process of identifying and responding to intrusion activities
Why is this necessary?
- Prevention is not always perfect
- Detection can stop some attacks that circumvent prevention
- multi-layered defense
Assumptions
- System activities are observable
- intrusive activities have distinct evidence vs. normal activities
Components
From algorithmic perspective:
- Features: capture intrusion evidence
- Models: pierce evidence together and make decision (attack vs. normal)
From system architecture perspective:
- Audit data (pre)processor (collect observable data: logs, system calls, events, etc.)
- knowledge base / detection models (what kind of behavior is good/bad?)
- decision engine (uses KB to make decision)
- alarm generation and response
Approaches
- Deployment:
- Network-based
- Host-based
- Analysis (require foundation on "what an attack looks like")
- Misuse detection
- Signature-based / pattern recognition
- Always reactive: Cannot detect new attacks
- e.g. looking for shell-code in incoming packets
- Anomaly detection
- statistical-based
- Training session builds up data of normal activity
- Can detect new attacks
- higher false-positive rate: new nomal activities may be interpreted as anomalies
- Misuse detection
- Development and Maintenance
- Hand-coding of "expert knowledge" (good, but time-consuming with slow turnaround)
- Machine learning based on audit data
Performance Metrics
(See STAT 211 Topic 2#Conditional Probability→)
Algorithm: (Alarm = A, Intrusion = I)
- True Positive rate =
- False Negative rate =
- False Positive rate =
- True Negative Rate =
- Bayesian detection rate = ("Given that an action is an intrusion, how likely is the IDS to catch it?"
detection | |||
---|---|---|---|
T | F | ||
intrusion | T | True Positive | False Negative |
F | False Positive | True Negative |
Tradeoff between True Positive Rate and False Positive Rate
Baye's Theorem
(See STAT 211 Topic 2#Bayes' Theorem→)
- is the base rate
Base Rate Fallacy: Even if false alarm rate (Pr[A | ¬I]) is very low, Bayesian detection rate (Pr[I | A]) is still low if base-rate (Pr[I]) is low
for example. Suppose , , . The Bayesian detection rate is only !
Probability plotted on ROC curve
Host-Based IDS
Uses OS auditing mechanisms (logs, system events)
"A Sense of Self: Immunology Approach"
Anomaly detection for Unix processes
- Simple and short sequences of events (system calls per process) to distinguish "self" from not (e.g. open, read, mmap, mmap, open, getrlimit, mmap, close, ...)
- Sliding window of length (e.g. in [open, read, mmap, mmap, open], getrlimit, mmap, close, ... → open, [read, mmap, mmap, open, getrlimit], mmap, close, ...)
- Percentage matched > ε → normal
Network IDS
- Deployment at strategic locations (packet sniffing via tcpdump at routers
- Inspecting network traffic for violations of protocols and unusual connection params.
- Monitoring user activities
- May be defeated by encryption (e.g. SSH)