39
A Wavelet Approach A Wavelet Approach to Network to Network Intrusion Intrusion Detection Detection W. Oblitey & S. Ezekiel W. Oblitey & S. Ezekiel IUP Computer Science IUP Computer Science Dept. Dept.

A Wavelet Approach to Network Intrusion Detection

  • Upload
    norris

  • View
    39

  • Download
    0

Embed Size (px)

DESCRIPTION

A Wavelet Approach to Network Intrusion Detection. W. Oblitey & S. Ezekiel IUP Computer Science Dept. Intrusion Detection:. Provides monitoring of system resources to help detect intrusion and/or identify attacks. Complimentary to blocking devices. Insider attacks. - PowerPoint PPT Presentation

Citation preview

Page 1: A Wavelet Approach to Network Intrusion Detection

A Wavelet Approach to A Wavelet Approach to Network Intrusion Network Intrusion

DetectionDetection

W. Oblitey & S. EzekielW. Oblitey & S. Ezekiel IUP Computer Science Dept.IUP Computer Science Dept.

Page 2: A Wavelet Approach to Network Intrusion Detection

Intrusion Detection: Intrusion Detection: Provides monitoring of system resources to Provides monitoring of system resources to

help detect intrusion and/or identify attacks.help detect intrusion and/or identify attacks. Complimentary to blocking devices. Complimentary to blocking devices.

Insider attacks.Insider attacks. Attacks that use traffic permitted by the firewall.Attacks that use traffic permitted by the firewall.

Can monitor the attack after it crosses through Can monitor the attack after it crosses through the firewall. the firewall.

Helps gather useful information forHelps gather useful information for Detecting attackers,Detecting attackers, Identifying attackers,Identifying attackers, Reveal new attack strategies.Reveal new attack strategies.

Page 3: A Wavelet Approach to Network Intrusion Detection

Classification:Classification: Intrusion Detection Systems classified Intrusion Detection Systems classified

according to how they detect malicious according to how they detect malicious activity:activity: Signature detection systemsSignature detection systems

Also called Misuse detection systemsAlso called Misuse detection systems Anomaly detection systemsAnomaly detection systems

Also classified as:Also classified as: Network-based intrusion detection systemsNetwork-based intrusion detection systems

Monitor network trafficMonitor network traffic Host-based intrusion detection systems.Host-based intrusion detection systems.

Monitor activity on host machinesMonitor activity on host machines

Page 4: A Wavelet Approach to Network Intrusion Detection

Signature Detection:Signature Detection: Achieved by creating signatures:Achieved by creating signatures:

Models of attackModels of attack Monitored events compared to models to Monitored events compared to models to

determine qualification as attacks.determine qualification as attacks. Excellent at detecting known attacks.Excellent at detecting known attacks. Requires the signatures to be created and entered Requires the signatures to be created and entered

into the sensor’s database before operation.into the sensor’s database before operation. May generate false alarms (False Positives). May generate false alarms (False Positives). Problem:Problem:

Needs a large number of signatures for effective Needs a large number of signatures for effective detection.detection.

The database can grow very massive.The database can grow very massive.

Page 5: A Wavelet Approach to Network Intrusion Detection

Anomaly Detection:Anomaly Detection: Creates a model of normal use and Creates a model of normal use and

looks for activity that does not looks for activity that does not conform to the model.conform to the model.

Problems with this method:Problems with this method: Difficulty in creating the model of Difficulty in creating the model of

normal activitynormal activity If the network already had malicious If the network already had malicious

activity on it, is it ‘normal activity’?activity on it, is it ‘normal activity’? Some patterns classified as anomalies Some patterns classified as anomalies

may not be malicious.may not be malicious.

Page 6: A Wavelet Approach to Network Intrusion Detection

Network-Based IDSNetwork-Based IDS By far the most commonly employed By far the most commonly employed

form of Intrusion Detection Systems.form of Intrusion Detection Systems. To many people, “IDS” is To many people, “IDS” is

synonymous with “NIDS”.synonymous with “NIDS”. Matured more quickly than the host-Matured more quickly than the host-

based equivalents.based equivalents. Large number of NIDS products Large number of NIDS products

available on the market.available on the market.

Page 7: A Wavelet Approach to Network Intrusion Detection

Deploying NIDSDeploying NIDS Points to consider:Points to consider:

Where do sensors belong in the network?Where do sensors belong in the network? What is to be protected the most?What is to be protected the most? Which devices hold critical information assets?Which devices hold critical information assets?

Cost effectiveness;Cost effectiveness; We cannot deploy sensors on all network We cannot deploy sensors on all network

segments.segments. Even not manageable.Even not manageable. We need to carefully consider where sensors We need to carefully consider where sensors

are to be deployed.are to be deployed.

Page 8: A Wavelet Approach to Network Intrusion Detection

Locations for IDS SensorsLocations for IDS Sensors Just inside the firewall.Just inside the firewall.

The firewall is a bottleneck for all traffic.The firewall is a bottleneck for all traffic. All inbound/outbound traffic pass here.All inbound/outbound traffic pass here. The sensor can inspect all incoming and outgoing traffic.The sensor can inspect all incoming and outgoing traffic.

On the DMZ.On the DMZ. The publicly reachable hosts located here are often get The publicly reachable hosts located here are often get

attacked.attacked. The DMZ is usually the attacker’s first point of entry into The DMZ is usually the attacker’s first point of entry into

the network.the network. On the server farm segment.On the server farm segment.

We can monitor mission-critical application servers.We can monitor mission-critical application servers. Example: Financial, Logistical, Human Resources functions.Example: Financial, Logistical, Human Resources functions.

Also monitors insider attacks.Also monitors insider attacks. On the network segments connecting the On the network segments connecting the

mainframe or midrange hosts.mainframe or midrange hosts. Monitor mission-critical devises.Monitor mission-critical devises.

Page 9: A Wavelet Approach to Network Intrusion Detection

The Network Monitoring ProblemThe Network Monitoring Problem

Network-based IDS sensors employ sniffing to Network-based IDS sensors employ sniffing to monitor the network traffic.monitor the network traffic.

Networks using hubs:Networks using hubs: Can monitor all packets.Can monitor all packets. Hubs transmit every packet out of every connected Hubs transmit every packet out of every connected

interface.interface. Switched networks:Switched networks:

The sensor must be able to sniff the passing traffic.The sensor must be able to sniff the passing traffic. Switches forward packets only to ports connected Switches forward packets only to ports connected

to destination hosts.to destination hosts.

Page 10: A Wavelet Approach to Network Intrusion Detection

Monitoring Switched NetworksMonitoring Switched Networks Use of Switch Port Analyzer (SPAN) Use of Switch Port Analyzer (SPAN)

configurations.configurations. Causes switch to copy all packets destined to a Causes switch to copy all packets destined to a

given interface.given interface. Transmits packets to the modified port.Transmits packets to the modified port.

Use of hubs in conjunction with the switches.Use of hubs in conjunction with the switches. The hub must be a fault-tolerant one.The hub must be a fault-tolerant one.

Use of taps in conjunction with the switches.Use of taps in conjunction with the switches. Fault-tolerant hub-like devices.Fault-tolerant hub-like devices. Permit only one-way transmission of data out of Permit only one-way transmission of data out of

the monitoring port.the monitoring port.

Page 11: A Wavelet Approach to Network Intrusion Detection

NIDS Signature TypesNIDS Signature Types These look for patterns in packet These look for patterns in packet

payloads that indicate possible payloads that indicate possible attacks.attacks.

Port signaturesPort signatures Watch for connection attempts to a Watch for connection attempts to a

known or frequently attacked ports.known or frequently attacked ports. Header signaturesHeader signatures

These watch for dangerous or illogical These watch for dangerous or illogical combinations in packet headers.combinations in packet headers.

Page 12: A Wavelet Approach to Network Intrusion Detection

Network IDS Reactions TypesNetwork IDS Reactions Types Typical reactions of network-based Typical reactions of network-based

IDS with active monitoring upon IDS with active monitoring upon detection of attack in progress:detection of attack in progress: TCP resetsTCP resets IP session loggingIP session logging Shunning or blockingShunning or blocking

Capabilities are configurable on per-Capabilities are configurable on per-signature basis:signature basis: Sensor responds based on configuration.Sensor responds based on configuration.

Page 13: A Wavelet Approach to Network Intrusion Detection

TCP Reset ReactionTCP Reset Reaction Operates by sending a TCP reset Operates by sending a TCP reset

packet to the victim host.packet to the victim host. This terminates the TCP session.This terminates the TCP session.

Spoofs the IP address of the attacker.Spoofs the IP address of the attacker. Resets are sent from the sensor’s Resets are sent from the sensor’s

monitoring/sniffing interface.monitoring/sniffing interface. It can terminate an attack in progress It can terminate an attack in progress

but cannot stop the initial attack but cannot stop the initial attack packet from reaching the victim.packet from reaching the victim.

Page 14: A Wavelet Approach to Network Intrusion Detection

IP Session LoggingIP Session Logging The sensor records traffic passing between The sensor records traffic passing between

the attacker and the victim.the attacker and the victim. Can be very useful in analyzing the attack.Can be very useful in analyzing the attack. Can be used to prevent future attacks.Can be used to prevent future attacks.

Limitation:Limitation: Only the trigger and the subsequent packets are Only the trigger and the subsequent packets are

logged.logged. Preceding packets are lost.Preceding packets are lost.

Can impact sensor performance.Can impact sensor performance. Quickly consumes large amounts of disk Quickly consumes large amounts of disk

space.space.

Page 15: A Wavelet Approach to Network Intrusion Detection

Shunning/BlockingShunning/Blocking Sensor connects to the firewall or a packet-Sensor connects to the firewall or a packet-

filtering router.filtering router. Configures filtering rulesConfigures filtering rules

Blocks packets from the attackerBlocks packets from the attacker Needs arrangement of proper authentication:Needs arrangement of proper authentication:

Ensures that the sensor can securely log into the Ensures that the sensor can securely log into the firewall or router.firewall or router.

A temporary measure that buy time for the A temporary measure that buy time for the administrator.administrator.

The problem with spoofed source addresses.The problem with spoofed source addresses.

Page 16: A Wavelet Approach to Network Intrusion Detection

Host-based IDSHost-based IDS Started in the early 1980s when networks Started in the early 1980s when networks

were not do prevalent.were not do prevalent. Primarily used to protect only critical serversPrimarily used to protect only critical servers Software agent resides on the protected Software agent resides on the protected

systemsystem Signature based:Signature based:

Detects intrusions by analyzing logs of operating Detects intrusions by analyzing logs of operating systems and applications, resource utilization, systems and applications, resource utilization, and other system activityand other system activity

Use of resources can have impact on system Use of resources can have impact on system performanceperformance

Page 17: A Wavelet Approach to Network Intrusion Detection

HIDS Methods of OperationHIDS Methods of Operation Auditing logs:Auditing logs:

system logs, event logs, security logs, syslogsystem logs, event logs, security logs, syslog Monitoring file checksums to identify Monitoring file checksums to identify

changeschanges Elementary network-based signature Elementary network-based signature

techniques including port activitytechniques including port activity Intercepting and evaluating requests by Intercepting and evaluating requests by

applications for system resources before applications for system resources before they are processedthey are processed

Monitoring of system processes for Monitoring of system processes for suspicious activitysuspicious activity

Page 18: A Wavelet Approach to Network Intrusion Detection

Log File AuditingLog File Auditing Detects past activityDetects past activity

Cannot stop the action that set off the alarm Cannot stop the action that set off the alarm from taking place.from taking place.

Log Files:Log Files: Monitor changes in the log files.Monitor changes in the log files. New entries for changes logs are compared New entries for changes logs are compared

with HIDS attack signature patterns for with HIDS attack signature patterns for matchmatch

If match is detected, administrator is alertedIf match is detected, administrator is alerted

Page 19: A Wavelet Approach to Network Intrusion Detection

File Checksum ExaminationFile Checksum Examination Detects past activity:Detects past activity:

Cannot stop the action that set off the Cannot stop the action that set off the alarm from taking place.alarm from taking place.

Hashes created only for system files Hashes created only for system files that should not change or change that should not change or change infrequently.infrequently.

Inclusion of frequently changing files is Inclusion of frequently changing files is a huge disturbance.a huge disturbance.

File checksum systems, like Tripwire, File checksum systems, like Tripwire, may also be employed.may also be employed.

Page 20: A Wavelet Approach to Network Intrusion Detection

Network-Based TechniquesNetwork-Based Techniques The IDS product monitors packets The IDS product monitors packets

entering and leaving the host’s NIC for entering and leaving the host’s NIC for signs of malicious activity.signs of malicious activity.

Designed to protect only the host in Designed to protect only the host in question.question.

The attack signatures used are not as The attack signatures used are not as sophisticated as those used in NIDs.sophisticated as those used in NIDs.

Provides rudimentary network-based Provides rudimentary network-based protections.protections.

Page 21: A Wavelet Approach to Network Intrusion Detection

Intercepting RequestsIntercepting Requests Intercepts calls to the operating Intercepts calls to the operating

system before they are processed.system before they are processed. Is able to validate software calls made Is able to validate software calls made

to the operating system and kernel.to the operating system and kernel. Validation is accomplished by:Validation is accomplished by:

Generic rules about what processes may Generic rules about what processes may have access to resources.have access to resources.

Matching calls to system resources with Matching calls to system resources with predefined models which identify predefined models which identify malicious activity.malicious activity.

Page 22: A Wavelet Approach to Network Intrusion Detection

System MonitoringSystem Monitoring Can preempt attacks before they are executed.Can preempt attacks before they are executed. This type of monitoring can:This type of monitoring can:

Prevent files from being modified.Prevent files from being modified. Allow access to data files only to a predefined set of Allow access to data files only to a predefined set of

processes.processes. Protect system registry settings from modification.Protect system registry settings from modification. Prevent critical system services from being stopped.Prevent critical system services from being stopped. Protect settings for users from being modified.Protect settings for users from being modified. Stop exploitation of application vulnerabilities.Stop exploitation of application vulnerabilities.

Page 23: A Wavelet Approach to Network Intrusion Detection

HIDS SoftwareHIDS Software Deployed by installing agent software on Deployed by installing agent software on

the system.the system. Effective for detecting insider-attacks.Effective for detecting insider-attacks. Host wrappers:Host wrappers:

Inexpensive and deployable on all machinesInexpensive and deployable on all machines Do not provide in-depth, active monitoring Do not provide in-depth, active monitoring

measures of agent-based HIDS productsmeasures of agent-based HIDS products Sometimes referred to as personal firewallsSometimes referred to as personal firewalls

Agent-based software:Agent-based software: More suited for single purpose serversMore suited for single purpose servers

Page 24: A Wavelet Approach to Network Intrusion Detection

HIDS Active Monitoring CapabilitiesHIDS Active Monitoring Capabilities

Options commonly used:Options commonly used: Log the eventLog the event

Very good for post mortem analysisVery good for post mortem analysis Alert the administratorAlert the administrator

Through email or SNMP trapsThrough email or SNMP traps Terminate the user loginTerminate the user login

Perhaps with a warning messagePerhaps with a warning message Disable the user accountDisable the user account

Preventing access to memory, processor Preventing access to memory, processor time, or disk space.time, or disk space.

Page 25: A Wavelet Approach to Network Intrusion Detection

Advantages of Host-based IDSAdvantages of Host-based IDS Can verify success or failure of attackCan verify success or failure of attack

By reviewing log entriesBy reviewing log entries Monitors user and system activitiesMonitors user and system activities

Useful in forensic analysis of the attackUseful in forensic analysis of the attack Can protect against non-network-based attacksCan protect against non-network-based attacks Reacts very quickly to intrusionsReacts very quickly to intrusions

By preventing access to system resourcesBy preventing access to system resources By immediately identifying a breach when it occursBy immediately identifying a breach when it occurs

Does not rely on particular network infrastructureDoes not rely on particular network infrastructure Not limited by switched infrastructuresNot limited by switched infrastructures

Installed on the protected server itselfInstalled on the protected server itself Does not require additional hardware to deployDoes not require additional hardware to deploy Needs no changes to the network infrastructureNeeds no changes to the network infrastructure

Page 26: A Wavelet Approach to Network Intrusion Detection

Active/Passive DetectionActive/Passive Detection The ability of an IDS to take action when they The ability of an IDS to take action when they

detect suspicious activity.detect suspicious activity. Passive Systems:Passive Systems:

Take no action to stop or prevent the activity.Take no action to stop or prevent the activity. They log events.They log events. They alert administrators.They alert administrators. They record the traffic for analysis.They record the traffic for analysis.

Active Systems:Active Systems: They do all the recordings that passive systems They do all the recordings that passive systems

do,do, They interoperate with firewalls and routersThey interoperate with firewalls and routers

Can cause blocking or shunningCan cause blocking or shunning They can send TCP resets.They can send TCP resets.

Page 27: A Wavelet Approach to Network Intrusion Detection

Our ApproachOur Approach We present a variant but novel We present a variant but novel

approach of the anomaly detection approach of the anomaly detection scheme.scheme.

We show how to detect attacks We show how to detect attacks without the use of data banks.without the use of data banks.

We show how to correlate multiple We show how to correlate multiple inputs to define the basis of a new inputs to define the basis of a new generation analysis engine.generation analysis engine.

Page 28: A Wavelet Approach to Network Intrusion Detection

Signals and signal Processing:Signals and signal Processing: Signal definition:Signal definition:

A function of independent variables like time, A function of independent variables like time, distance, position, temperature, and pressure. distance, position, temperature, and pressure.

Signals play important part in our daily livesSignals play important part in our daily lives Examples: speech, music, picture, and video.Examples: speech, music, picture, and video.

Signal Classification:Signal Classification: Analog – the independent variable on which the Analog – the independent variable on which the

signal depends is continuous.signal depends is continuous. Digital – the independent variable is discrete.Digital – the independent variable is discrete. Digital signals are presented a a sequence of Digital signals are presented a a sequence of

numbers (samples).numbers (samples). Signals carry informationSignals carry information

The objective of signal processing is to extract this The objective of signal processing is to extract this useful information.useful information.

Page 29: A Wavelet Approach to Network Intrusion Detection

Energy of a Signal:Energy of a Signal: We can also define a signal as a function We can also define a signal as a function

of varying amplitude through time.of varying amplitude through time. The measure of a signal’s strength is the The measure of a signal’s strength is the

area under the absolute value of the area under the absolute value of the curve.curve.

This measure is referred to as the energy This measure is referred to as the energy of the signal and is defined as:of the signal and is defined as: Energy of continuous signalEnergy of continuous signal

Energy of discrete signal Energy of discrete signal

2( )aE x t dt

2( )dt

E x t

Page 30: A Wavelet Approach to Network Intrusion Detection

Wavelet:Wavelet: Is a waveform of effectively limited duration that Is a waveform of effectively limited duration that

has an average value of zero.has an average value of zero. Presently used in many fields of science and Presently used in many fields of science and

engineering.engineering. It development resulted from the need to generate It development resulted from the need to generate

algorithms that would compute compact algorithms that would compute compact representations of signals and data sets at an representations of signals and data sets at an accelerated pace.accelerated pace.

Started as Alfred Haar’s step functions, now called Started as Alfred Haar’s step functions, now called wavelets. wavelets.

We analyze wavelets by breaking up a signal into We analyze wavelets by breaking up a signal into shifted and scaled versions of the original (mother) shifted and scaled versions of the original (mother) wavelet.wavelet.

Page 31: A Wavelet Approach to Network Intrusion Detection

Our Network Topology:Our Network Topology: We set up a star topology network;We set up a star topology network;

Four computers in an islandFour computers in an island Each running Linux RedHat 9.2Each running Linux RedHat 9.2 The machines are connected by a switchThe machines are connected by a switch The switch is connected to a PIX 515E FirewallThe switch is connected to a PIX 515E Firewall 3Com Ethernet Hub sits between the switch and the 3Com Ethernet Hub sits between the switch and the

firewall firewall For Sniffing and capturing packetsFor Sniffing and capturing packets

We duplicated this island six times and connected We duplicated this island six times and connected them with routers.them with routers.

We then connected the islands, via the routers, to We then connected the islands, via the routers, to a central Cisco switch.a central Cisco switch.

For simulation purposes, we installed For simulation purposes, we installed Windows XP on one machine in island one.Windows XP on one machine in island one.

Page 32: A Wavelet Approach to Network Intrusion Detection

DataData CollectionCollection:: We generated packets with a Perl script on a We generated packets with a Perl script on a

Linux system. Linux system. We used the three most common protocols for We used the three most common protocols for

our simulation:our simulation: HTTP, FTP, and SMTP.HTTP, FTP, and SMTP.

For each protocol:For each protocol: We generated a constant traffic;We generated a constant traffic; We created 50 datasets each consisting of the number We created 50 datasets each consisting of the number

of packets transmitted over two minute intervals.of packets transmitted over two minute intervals. We executed the same traffic scripts with a random We executed the same traffic scripts with a random

pause between 0 and 60 seconds.pause between 0 and 60 seconds. We then rerun the traffic between 0 and 15 seconds to We then rerun the traffic between 0 and 15 seconds to

create additional datasets.create additional datasets. We collected all the 150 datasets by Ethereal for We collected all the 150 datasets by Ethereal for

further analysis.further analysis.

Page 33: A Wavelet Approach to Network Intrusion Detection

Results: Figure 1Results: Figure 1

Page 34: A Wavelet Approach to Network Intrusion Detection

Figure 2Figure 2

Page 35: A Wavelet Approach to Network Intrusion Detection

Figure 3Figure 3

Page 36: A Wavelet Approach to Network Intrusion Detection

Figure 4Figure 4

Page 37: A Wavelet Approach to Network Intrusion Detection

Figure 5Figure 5

Page 38: A Wavelet Approach to Network Intrusion Detection

Figure 6Figure 6

Page 39: A Wavelet Approach to Network Intrusion Detection

Conclusion & Future DirectionConclusion & Future Direction We have presented:We have presented:

A wavelet based – framework for A wavelet based – framework for network monitoringnetwork monitoring

This is our first phase for the This is our first phase for the development of an engine for Network development of an engine for Network Intrusion Analysis Intrusion Analysis

This will not depend on databases and This will not depend on databases and thus will minimize false negatives and thus will minimize false negatives and false positivesfalse positives