panacea: automating attack classification for anomaly-based network intrusion detection systems

17

Upload: makani

Post on 06-Jan-2016

39 views

Category:

Documents


1 download

DESCRIPTION

PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS. Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao. Reference. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS
Page 2: PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS

PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS

Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao

Page 3: PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS

Reference Damiano Bolzoni, Sandro Etalle and Pieter H

artel. Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems . RAID"09,2010

Page 4: PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS

Outline Introduction to Intrusion Detection PANACEA:AUTOMATIC ATTACK CLASSIFICATI

ON Experiment Summary

Page 5: PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS

Intrusion Detection

Primary assumption: user and program activities can be monitored and modeled

An Intrusion Detection System is an important part of the Security Management system for computers and networks.

Page 6: PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS

Approaches to IDS

Technique Misuse(signature) Based Anomaly Based

Concept Model well-known attacks use these known patterns to identify intrusion.

Are trained using normal behavior of the systemTry to flag the deviation from normal pattern as intrusion

Pros and Cons

Specific to attacks can not extend to unknown intrusion patterns ( False Negatives)

Usual changes due to traffic etc may lead higher number of false alarms

Page 7: PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS

IT’S A HARD LIFE IN THE REAL WORLD FOR AN ANOMALY-BASED IDS… Training sets are not “clean by default”

Threshed values must be manually set

Alerts must be manually classified

lack of usability → nobody will deploy such an IDS

Page 8: PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS

WHY ALERT CLASSIFICATION SHOULD BE AUTOMATED?

Use alert correlation/verification and attack trees techniques so far, only available for signature-based IDSs

Automatic countermeasures activated based on attack classification/impact block the source IP in case of a buffer overflow

Reduce the required user knowledge and workload less knowledge and workload →less $$$

Page 9: PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS

PANACEAAUTOMATIC ATTACK CLASSIFICATION Idea:

attacks in the same class share some common content

Goals: effective

75% of correct classifications, with no human intervention flexible

allow both automatic and manual alert classification in training mode

allow pre-and user-defined attack classes allow users to tweak the alert classification model

Page 10: PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS

PANACEA

Page 11: PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS

ALERT INFORMATION EXTRACTOR Uses a Bloom filter to store occurrences of n-

grams data are sparse, few collisions can handle N-grams (N >> 3)

Stores thousands of alerts, for “batch training”

Page 12: PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS

ATTACK CLASSIFICATION ENGINE

Two different classification algorithms non-incremental learning, more accurate than in

cremental ones process 3000 alerts in less than 40s

Support Vector Machine (SVM) black box, users have a few “tweak” points

RIPPER generates human-readable rules

Page 13: PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS

RIPPER Examples of output RIPPER rules:

IF bf[i] = 1 AND . . . AND bf[k] = 1 THEN class = cross-site scripting

IF bf[l] = 1 AND . . . AND bf[n] = 1 THEN class = sql injection

Page 14: PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS

AUTOMATIC MODE -DATASET A 3000+ Snort alerts

pre-defined alert classes (10) alerts generated by Nessus and a proprietary VA

tool no manual classification cross-folding validation

Page 15: PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS

MANUAL MODE-DATASET B 1500+ Snort web alertsalerts generated by N

essus, Nikto and Milw0rm attacks attacks are manually classified (WASC taxon

omy) cross-folding validation

Page 16: PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS

MANUAL MODE -DATASET C Training set: Dataset B Testing set: 100 anomaly-based alerts

alerts have been captured in the wild by our POSEIDON (analyzes packet payloads) and Sphinx (analyzes web requests)

Page 17: PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS

SUMMARY

SVM performs better than RIPPER on a class with few samples (~50)

RIPPER performs better than SVM on a class with a sufficient number of samples (~70)

SVM performs better than RIPPER on a class with a high intra-class diversity and when attack payloads have not been observed during training