anomaly intrusion detection by clustering transactional audit streams in a host computer

15
Intelligent Database Systems Lab 國國國國國國國國 National Yunlin University of Science and Technology Anomaly intrusion detection by clustering transactional audit streams in a host computer Nam Hun Park , Sang Hyun Oh, Won Suk Lee InS, Vol.180, 2010, pp. 2375–2389. Presenter : Wei-Shen Tai 2010/4/14

Upload: ulric-chen

Post on 01-Jan-2016

22 views

Category:

Documents


0 download

DESCRIPTION

Anomaly intrusion detection by clustering transactional audit streams in a host computer. Nam Hun Park , Sang Hyun Oh, Won Suk Lee InS , Vol.180, 2010, pp. 2375–2389. Presenter : Wei- Shen Tai 20 10 / 4/14. Outline. Introduction Related works Clustering transactional user activities - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Anomaly intrusion detection by clustering transactional audit streams in a host computer

Intelligent Database Systems Lab

國立雲林科技大學National Yunlin University of Science and Technology

Anomaly intrusion detection by clustering transactional audit streams in a host computer

Nam Hun Park , Sang Hyun Oh, Won Suk Lee

InS, Vol.180, 2010, pp. 2375–2389.

Presenter : Wei-Shen Tai

2010/4/14

Page 2: Anomaly intrusion detection by clustering transactional audit streams in a host computer

N.Y.U.S.T.

I. M.

Intelligent Database Systems Lab

2

Outline

Introduction Related works Clustering transactional user activities Anomaly detection of clusters on transactional

features Experimental results Conclusion Comments

Page 3: Anomaly intrusion detection by clustering transactional audit streams in a host computer

N.Y.U.S.T.

I. M.

Intelligent Database Systems Lab

3

Motivation

Most anomaly intrusion detection approaches Only the static behavior of a user in the audit data set. For a real-time environment, the current activities of a user

should be processed as soon as possible to be reflected for the anomaly detection.

??

?

Page 4: Anomaly intrusion detection by clustering transactional audit streams in a host computer

N.Y.U.S.T.

I. M.

Intelligent Database Systems Lab

4

Objective

A grid-based clustering algorithm for an audit data stream Detects anomaly intrusions on continuous transactional audit streams

based on partitioned grids.

Page 5: Anomaly intrusion detection by clustering transactional audit streams in a host computer

N.Y.U.S.T.

I. M.

Intelligent Database Systems Lab

5

A transactional data stream and initial cell

A transaction in an audit data stream Contains a set of activities (logs) performed in sequence by a user. The number of data values in a transaction is The number of transactions in the current data stream

is Initial cell g

For each feature, the range of an initial cell g becomes the united intervals of

Page 6: Anomaly intrusion detection by clustering transactional audit streams in a host computer

N.Y.U.S.T.

I. M.

Intelligent Database Systems Lab

6

Grid-based clusters

Distribution statistics of an initial cell gt = 5, 100 transactions in this Dt , the support of g is ct = 20

t = 5, 250 transactions in Dt , t_avg ={50, 20, 30, 50, 20….}

t = 5, 250 transactions in Dt , Tg is the number of data in this range of T

Page 7: Anomaly intrusion detection by clustering transactional audit streams in a host computer

N.Y.U.S.T.

I. M.

Intelligent Database Systems Lab

7

Split of initial cells When a new data element et is generated, distribution statistics of the

cell g were updated

When the current support (ct) of the cell g is greater than split support threshold , two intermediate cells g11 and g2 2 are created as the children of the initial cell.

Those children of initial cells will be split under their support is less than split support threshold.

Page 8: Anomaly intrusion detection by clustering transactional audit streams in a host computer

N.Y.U.S.T.

I. M.

Intelligent Database Systems Lab

8

Dividing grid-cells on distributions

To partition a dense grid-cell μ-partition, σ-partition, and hybrid-partition hybrid-partition: If dev > deve, pick μ-partition.

Otherwise, pick σ-partition

Page 9: Anomaly intrusion detection by clustering transactional audit streams in a host computer

N.Y.U.S.T.

I. M.

Intelligent Database Systems Lab

9

Cluster properties

A cluster C containing a set of v adjacent dense unit grid-cells

Page 10: Anomaly intrusion detection by clustering transactional audit streams in a host computer

N.Y.U.S.T.

I. M.

Intelligent Database Systems Lab

10

Decaying weights on activities

Forgetting factor It is employed to diminish the effects of old patterns.

A decay-base b determines the amount of weight reduction per decay-unit and is greater than 1. A decay-base-life w is defined as the number of decay-units.

A new transaction is generated in the current data stream

Page 11: Anomaly intrusion detection by clustering transactional audit streams in a host computer

N.Y.U.S.T.

I. M.

Intelligent Database Systems Lab

11

Profiling method

Internal summary contains the properties of each cluster.

External summary represents the statistics of noise data objects, i.e., the data objects outside all clusters.

s f

Page 12: Anomaly intrusion detection by clustering transactional audit streams in a host computer

N.Y.U.S.T.

I. M.

Intelligent Database Systems Lab

12

Anomaly detection method

Internal distance, ratio

Normalizing factor γ is a user-defined parameter that can control the effect of an internal difference.

External distance, ratio

Page 13: Anomaly intrusion detection by clustering transactional audit streams in a host computer

N.Y.U.S.T.

I. M.

Intelligent Database Systems Lab

13

Experimental results

Page 14: Anomaly intrusion detection by clustering transactional audit streams in a host computer

N.Y.U.S.T.

I. M.

Intelligent Database Systems Lab

14

Conclusion

An anomaly detection method based on a grid-based clustering algorithm For each feature, clusters can be effectively found without

physically maintaining any data elements of an audit data stream.

A user’s new activities are continuously reflected to the ongoing clustering results and the profile of the user at the same time.

Page 15: Anomaly intrusion detection by clustering transactional audit streams in a host computer

N.Y.U.S.T.

I. M.

Intelligent Database Systems Lab

15

Comments Advantage

This proposed method provides a solution for anomaly intrusion detection. It seems plausible to apply this method to detect anomaly activities in different

fields. Drawback

Cold start problem will occur under no manual supervision. That is, the system cannot distinguish normal clusters from abnormal clusters in the beginning.

Application Dynamic data clustering for continuous data stream.