intrusion detection system

43
Intrusion Detection System By:Aniruddh Siddh

Upload: aniruddh-siddh

Post on 27-May-2017

220 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: intrusion detection system

Intrusion Detection System

By:Aniruddh Siddh

Page 2: intrusion detection system

Introduction

Intrusion Detection is the process of observing and analyzing the events arising in a computer or network system to identify all security problems. IDS provides three important security functions; monitor, detect and respond to unauthorized activities .

Page 3: intrusion detection system

IDS Types

• Host Based Intrusion Detection (HIDS):Host based intrusion detection (HIDS) refers to intrusion detection on a single host system. The data is collected from an individual host system If there is any unauthorized change or activity is detected, it alerts the user.

Page 4: intrusion detection system

• Network Based Intrusion Detection (NIDS):A network-based intrusion detection system (NIDS) is used to monitor and analyze network traffic to protect a system from network-based threats where the data is traffic across the network. NIDS examines the traffic in real time for attempting to detect intrusion patterns.

Page 5: intrusion detection system

• Hybrid Intrusion Detection :The current trend in intrusion detection is to combine both types host-based and network-based IDS to design hybrid systems. flexibility increases the security level.

Page 6: intrusion detection system

The Data

• In the 1998 DARPA intrusion detection evaluation program, an environment was set up to acquire raw TCP/IP dump data for a network by simulating a typical U.S. Air Force LAN.

• KDD Cup99 dataset

Page 7: intrusion detection system

Attack types fall into four main categories:1. DOS: denial of service2. Unauthorized access from a remote

machine(R2L)3. User to Root Attacks(U2Su)4. Probing: surveillance and other probing

Page 8: intrusion detection system

INTRUSION DETECTION APPROACHES

• Misuse Detection: Misuse Detection system tries to match data with known attack pattern. Disadvantages· Any new form of misuse is not detected· Resource consuming and slows down the throughputAdvantages· It raises fewer false alarms because they can be very specific about what it is they are looking for.

Page 9: intrusion detection system
Page 10: intrusion detection system

• Anomaly detection:This System watches for unknown intrusion for abnormalities in traffic.Disadvantages· It raises high false alarm· Limited by training dataAdvantage· New form of attack can be detected.

Page 11: intrusion detection system
Page 12: intrusion detection system

Different intrusion detection approaches

• Back propagation network• Fuzzy logic Intrusion Detection System• Support Vector Machine Intrusion Detection

System• Extreme learning machine

Page 13: intrusion detection system

Back Propagation networks

• A Back Propagation network learns by example.• You give the algorithm examples of what you

want the network to do and it changes the network’s weights so that,when training is finished, it will give you the required output for a particular input.

• Back Propagation networks are ideal for simple Pattern Recognition and Mapping Tasks.

Page 14: intrusion detection system
Page 15: intrusion detection system
Page 16: intrusion detection system

RESULTS

The proposed IDS is experimented using the Waikato Environment for Knowledge Analysis (WEKA) and the dataset used is KDD Cup99 dataset.Performance measure used to evaluate BPN

• Detection rate :indicates the percentage of detected attack among all attack data.

• False-alarm rate

Page 17: intrusion detection system
Page 18: intrusion detection system

• Back Propagation Neural Network Algorithm, which shows a poor detection of attackers. So in future to improve the security the ELM technique is used.

Page 19: intrusion detection system

Genetic fuzzy based automatic IDS

By combining fuzzy set theory with Genetic, the proposed method can deal with the mixed database that contains both discrete and continuous attributes.

Page 20: intrusion detection system

Features of the proposed method aresummarized as follows

• can deal with both discrete and Continuous attributes

• fitness function contributes to mining more new Rules with higher accuracy.

• can be flexibly Applied to both misuse and anomaly detection.

• Experienced knowledge on intrusion patterns is not required before the training

• High detection rates are obtained in both misuse detection and anomaly detection.

Page 21: intrusion detection system
Page 22: intrusion detection system
Page 23: intrusion detection system

• In the misuse detection method shows high Detection rate and low false alarm.

• In the anomaly detection, the results show high Detection rate and reasonable false alarm even without pre experienced knowledge, which is an important advantage of the proposed method.

Page 24: intrusion detection system

• The important function of the proposed method is to efficiently extract new rules that are statistically significant and they can be used for several purposes.

• run speed of algorithm is faster in the learning stage compared with the published run speeds of the existing algorithms.

Page 25: intrusion detection system

Support Vector Machine Intrusion Detection System

Support vector machine proposed as an essential technique for intrusion detection system . It is a machine learning algorithm which is used for both classification and regression.

• Support vector machine (SVM) performs classification by constructing hyper planes in a multi-dimensional space that separates two classes. SVM tries to achieve maximum separation between the classes.

Page 26: intrusion detection system
Page 27: intrusion detection system

SVM is popular because• it can be easy to use and this algorithm • has good adaptability and generalization

performance regarding new attacks signature • this same algorithm detect a variety of attacks

with little tuning.• SVMs have great potential to be used due to its

scalability and faster training and running time.

Page 28: intrusion detection system

• Even though Support Vector Machine can produce better generalization performance, it has drawbacks as well:

• the intensive computation involved in its training which is at least quadratic with respect to the number of training examples.

• Large training time ,for large complex applications, it generates large network size.

Page 29: intrusion detection system

Extreme Learning Machine (ELM)

features:• It is easy to use• Faster learning speed• High generalization performance• Suitable for all non-linear activation functions• Suitable for complex activation functions

Page 30: intrusion detection system

Extreme Learning Machines (ELM) has worked for the ``generalized'' single-hidden layer feed forward networks (SLFNs).(i) Randomly assign input weights and biasesaccording to some continuous probability density function.(ii) Calculate hidden layer of output matrix .(iii) Calculate the output weights

Page 31: intrusion detection system
Page 32: intrusion detection system

• In comparison, basic ELM and SVM increase slowly when the number of data increases. Eventually, SVM starts consuming more time for both training and testing than basic ELM.

• As the dataset becomes larger, basic ELM outperforms SVM with faster learning speed.

Page 33: intrusion detection system

• Mr. Kamlesh Lahre, Mr. Tarun dhar Diwan Analyze Different approaches for IDS using KDD 99 Data Set

• Feature Selection for Intrusion Detection using Neural Networks and Support Vector Machines Andrew H. Sung1,2 & Srinivas Mukkamala1

• 1Department of Computer Science• V. Jaiganesh, Dr. P. Sumathi, S. Mangayarkarasi An Analysis of

Intrusion Detection System using Back Propagation Neural Network• Intrusion Detection Systems: A Survey and Analysis of Classification

Techniques V. Jaiganesh 1, S. Mangayarkarasi 2, Dr. P. Sumathi 3• A STUDY ON GENETIC-FUZZY BASED AUTOMATIC INTRUSION

DETECTION ON NETWORK DATASETS J.JABEZ 1, DR. G.S.ANADHA MALA2

Page 34: intrusion detection system

• Survey: Learning Techniques for Intrusion Detection System (IDS) Roshani Gaidhane, Student*, Prof. C. Vaidya, Dr. M. Raghuwanshi

• Intrusion Detection Using Neural Networks and Support Vector Machines Srinivas Mukkamala, Guadalupe Janoski, Andrew Sung

• Extreme Learning Machine: Towards Tuning-Free Learning• - A Unified Learning Technique for Regression and Multiclass

Classification by Guang-Bin HUANG

Page 35: intrusion detection system

•Thank you

Page 36: intrusion detection system
Page 37: intrusion detection system
Page 38: intrusion detection system
Page 39: intrusion detection system
Page 40: intrusion detection system
Page 41: intrusion detection system

Artificial Neural Network Intrusion Detection System

• IDS designers exploit ANN as a pattern recognition technique. Pattern recognition can be implemented by using a feed-forward neural network that has been trained accordingly.

Page 42: intrusion detection system

They consist of many similar building blocks – neurons. It iseligible to distinguish three types of units or layers:

1. Input layer – receives an input data from externalresources. Neuron's output is after processing passed to nextlayer.

2. Hidden layer(s) – receives an input from neuron atadjacent layer. Output signals are passed to output layer orremain within the ANN.

3. Output layer – receives an input from adjacent hiddenlayer. Output signals are sent out of ANN to post-processing.

Page 43: intrusion detection system

• drawbacks of ANN-based: lower detection precision, especially for low-frequent attacks, e.g., Remote to Local (R2L), User to Root (U2R).