Data Mining and Intruston Detection


Published on

1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Data Mining and Intruston Detection

  1. 1. Data Mining and Intrusion Detection Alan Hunt Will Fletcher Auburn University
  2. 2. Outline <ul><li>Intrusion Detection Systems </li></ul><ul><li>Data Mining </li></ul><ul><li>Data Mining and Intrusion Detection </li></ul><ul><li>Data Mining Traffic Analysis to Determine and Predict User Behavior </li></ul><ul><li>A Priest, a Rabbi, an Intrusion Detection System, a Data Miner and a Graduate Student Walk into a Bar </li></ul><ul><li>The Bartender Says: I’m sorry, we don’t serve miners </li></ul><ul><li>Resources </li></ul><ul><li>Questions? </li></ul>
  3. 3. Intrusions <ul><li>Intrusions are actions aimed to compromise the confidentiality, integrity, and/or availability of a computer or computer network. </li></ul><ul><li>Solution: Intrusion Detection Systems </li></ul>
  4. 4. Intrusion Detection Systems <ul><li>Monitors network traffic looking for suspicious activity. </li></ul><ul><li>Various approaches </li></ul><ul><ul><li>Network based intrusion detection (NIDS) – monitors network traffic </li></ul></ul><ul><ul><li>Host based intrusion detection (HIDS) – monitors a single host </li></ul></ul><ul><ul><li>Signature based (similar to antivirus software), also known as “misuse detection” </li></ul></ul><ul><ul><li>Anomaly detection </li></ul></ul>
  5. 5. Intrusion Detection <ul><li>Limitations of Signature based IDS </li></ul><ul><ul><li>Signature database has to be manually revised for each new type of discovered intrusion </li></ul></ul><ul><ul><li>They cannot detect emerging threats </li></ul></ul><ul><ul><li>Substantial latency in deployment of newly created signatures </li></ul></ul><ul><li>Limitations of Anomaly Detection </li></ul><ul><ul><li>False Positives – alert when no attack exists. Typically, anomaly detection is prone to a high number of false alarms due to previously unseen legitimate behavior. </li></ul></ul><ul><li>Data Overload </li></ul><ul><ul><li>The amount of data for analysts to examine is growing too large. This is the problem that data mining looks to solve. </li></ul></ul><ul><li>Lack of Adaptability </li></ul>
  6. 6. Data Mining <ul><li>Data Mining - Extraction of interesting ( non-trivial, implicit, previously unknown and potentially useful) information or patterns from data in large databases [Han and Kamber 2005]. </li></ul><ul><li>Data mining is used to sort through the tremendous amounts of data stored by automated data collection tools. </li></ul><ul><li>Extracts rules, regularities, patterns, and constraints from databases. </li></ul>
  7. 7. Data Mining Techniques <ul><li>Association rule mining </li></ul><ul><ul><li>Finding frequent patterns, associations, correlations, or causal structures among sets of items or objects in transaction databases, relational databases, and other information repositories. </li></ul></ul><ul><li>Sequence or path analysis </li></ul><ul><ul><li>looking for patterns where one event leads to another later event </li></ul></ul><ul><li>Classification </li></ul><ul><ul><li>predicts categorical class labels </li></ul></ul><ul><ul><li>classifies data (constructs a model) based on the training set and the values ( class labels ) in a classifying attribute and uses it in classifying new data </li></ul></ul>
  8. 8. Data Mining Techniques <ul><li>Cluster analysis </li></ul><ul><ul><li>Grouping a set of data objects into clusters. Objects in same cluster are similar. </li></ul></ul><ul><li>Forecasting </li></ul><ul><ul><li>Discovering patterns in data that can lead to reasonable predictions about the future </li></ul></ul>
  9. 9. Data Mining and Intrusion Detection <ul><li>Data mining can help automate the process of investigating intrusion detection alarms. </li></ul><ul><li>Data mining on historical audit data and intrusion detection alarms can reduce future false alarms. </li></ul>
  10. 10. Data Mining and Intrusion Detection <ul><li>[Julisch and Dacier 2002] apply data mining to historical intrusion detection alarms to gain “new and actionable insights”. </li></ul><ul><li>Insights can be used to reduce the number of future alarms to be dealt with. </li></ul><ul><li>Use clustering technique on previously mined knowledge to efficiently handle intrusion detection alarms </li></ul>
  11. 11. Data Mining and Intrusion Detection <ul><li>Method proposed by Lee, Stolfo, and Mok </li></ul><ul><ul><li>Process raw audit data into ASCII network events </li></ul></ul><ul><ul><li>Summarize into connection records (attributes such as service, duration, flags, etc.) </li></ul></ul><ul><ul><li>Apply data mining algorithms to connection records to compute frequent sequential patterns </li></ul></ul><ul><ul><li>Classification algorithms then used to inductively learn the detection models </li></ul></ul>
  12. 12. Data Mining and Behavior <ul><li>Detecting Behavior </li></ul><ul><ul><li>Data mining has been used to predict behavior </li></ul></ul><ul><ul><li>Modify these techniques to identify anonymous users on a network </li></ul></ul><ul><ul><li>Predict future needs based on past patterns </li></ul></ul>
  13. 13. Data Mining and Behavior <ul><li>For Example </li></ul><ul><ul><li>User A typically creates a lot of ssh traffic to a particular server </li></ul></ul><ul><ul><li>User B checks her email and receives large files via FTP after lunch </li></ul></ul><ul><ul><li>User C refreshes the slashdot homepage 10 time per minute for 8 hours </li></ul></ul>
  14. 14. Data Mining and Behavior <ul><li>Research Questions </li></ul><ul><ul><li>Can this behavior be correctly predicted? </li></ul></ul><ul><ul><li>Can users be differentiated based solely on network traffic? </li></ul></ul>
  15. 15. References <ul><li>Intrusion detection: Specification-based anomaly detection: a new approach for detecting network intrusions R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Twat, H. Yang, S. Zhou November 2002   Proceedings of the 9th ACM conference on Computer and communications security </li></ul><ul><li>Industry track papers: Mining intrusion detection alarms for actionable knowledge Klaus Julisch, Marc Dacier July 2002   Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining </li></ul><ul><li>Detecting intrusions using system calls: alternative data models Warrender, C.; Flicker, S.; Pearlmutter, B.; Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on , 9-12 May 1999 Pages:133 - 145 </li></ul><ul><li>Mining in a data-flow environment: experience in network intrusion detection Wenke Lee, Salvatore J. Stolfo, Kui W. Mok August 1999   Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining </li></ul><ul><li>ADMIT: anomaly-based data mining for intrusions. Karlton Sequeira and Mohammed Zaki; Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining. Pages: 386 – 395. 2002 </li></ul><ul><li> han /bk/1intro. ppt </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul>