Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
CS 5410 - Computer and Network Security: Intrusion Detection
Professor Kevin Butler Fall 2015
CS 5410 - Computer and Network Security: Intrusion Detection - - PowerPoint PPT Presentation
CS 5410 - Computer and Network Security: Intrusion Detection Professor Kevin Butler Fall 2015 Southeastern Security for Enterprise and Infrastructure (SENSEI) Center Locked Down Youre using all the techniques we will talk about over the
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
Professor Kevin Butler Fall 2015
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
and integrity
anyhow)
2
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
3
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
4
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
that a system will not be secure, but that violations of security policy (intrusions) can be detected by monitoring and analyzing system behavior.” [Forrest 98]
lots of new tools, applications, industry
5
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
called forensic analysis tools
6
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
monitored state
(generally true?)
7
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
similarity to distinguish from normal behavior
8
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
intrusion/anomaly is really just a matter of definition
– A system can exhibit all sorts of behavior
consistency with a given definition
– context sensitive
9
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
– n-grams of system call sequences (learned)
10
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
departure of the trace from the database of n-grams
departs by computing the minimum Hamming distance of the sample from the database
dmin = min( d(i,j) | for all normal j in n-gram database)
this is called the anomaly signal.
11
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
12
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
13
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
14
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
15
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
16
Attack Density P(T) Detector Flagging Pr(F) Detector Accuracy Pr(F|T) True Positives P(T|F)
0.1 0.65
0.001 0.99
0.1 0.99
0.00001 0.99999
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
how this is not unique to CS
Ideal
17
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
identifies vulnerabilities by solely looking at transaction length, i.e., the algorithm uses a packet length threshold T that determines when a packet is marked as an attack. More formally, the algorithm is defined:
the length threshold, and (0,1) indicate that packet should or should not be marked as an attack, respectively. You are given the following data to use to design the algorithm.
18
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
demonstrably bad behavior (and some subtle)
and nothing to do with bad science
the network is safe
not really appropriate for that.
19