SlideShare a Scribd company logo
1 of 18
Download to read offline
Dynamic response recognition by
neural network to detect network
host anomaly activity
Vladimir Eliseev - Infotecs JSC, National Research
University (MPEI)
Yury Shabalin - National Research University
(MPEI), Alfa Bank JSC
The 8th International Conference on Security of Information and Networks
In Technical Cooperation with ACM SIGSAC
September 8-10, 2015 Sochi/Russia
Formulation of the problem
• There are many typical
network servers
• Every of them can be
attacked in many known or
unknown ways
• Every server may fail to
operate due to internal
problem far from illegal
actions
The question is:
How to detect server failure in
all cases from the most general
point of view?
Requests
Replies
Attack
2
Anomaly detection
General subdivision:
• Attack detection
– Host based
– Network based
• System health sensors
– Specific for vendor
hardware and software
General disadvantages:
1. Separate systems with
different control and
tuning
2. Too complicated to
maintain all of them
3. Need to gather events
in SIEM to analyze
4. There are breaches for
zero-day attacks
3
Host based anomaly detection
Pro
• Known attack is recognized
for sure
• Independent from server’s
software and hardware
Contra
• Event of attack is detected
even it has no effect
• System problems and
unknown attacks are not
detected
Pro
• Applicable both for known
and some unknown attacks
• Hardware independent
Contra
• Very specific and sensitive
for application and system
software change or upgrade
Network based anomaly detection
4
Normal and anomaly server behavior
• Normal
Typical requests lead to
typical number and size of
replies and typical load
• Defaced
Hacked server produces
less traffic and less load
• Under DoS attack
Typical requests and
attacking traffic together
make higher load and
less number of replies
• Software bug
Typical requests cause
unusual outgoing traffic
and load
Requests
Replies
Requests
DoS attack
Replies
CPU, Mem, I/O
Requests
Replies
CPU, Mem, I/O
CPU, Mem, I/O
Requests
Replies
Hacked earlier CPU, Mem, I/O
5
Our idea
Measurement of server operations:
– Incoming traffic (by port and protocol)
– Outgoing traffic (by port and protocol)
– Computer load (CPU, memory, I/O consumption)
Calculate and remember dynamic response of server
(change of outputs to the change of inputs) to
distinguish typical (=normal) response from anomaly.
Incoming
requests
Outgoing
replies
CPU, Mem, I/O
Inputsxi
Outputsyj
6
Principals
• Considering network server as a
multidimensional dynamic plant
• Counting amount of traffic but not scanning
its content
• Every network interface of server should be
accounted separately with all open ports
• Network traffic and server performance
metrics are measured in constant time
window base
7
Dynamic response calculation
Scalar input/output response of a server from the control
theory point of view:
• Small delay – much less than time window
• Short transient time
• Non-linear behavior
Matrix of Pearson correlation coefficients 𝑅(𝑘) = 𝑟𝑖𝑗 𝑘
𝑛𝑚
where n inputs xi, m outputs yj at time tk and
𝑟𝑖𝑗 𝑘 =
𝑥𝑖 𝑘 − 𝑙 − 𝑥𝑖 𝑘 𝑦𝑗 𝑘 − 𝑙 − 𝑦𝑗 𝑘𝑑−1
𝑙=0
𝑥𝑖 𝑘 − 𝑙 − 𝑥𝑖 𝑘 2 𝑦𝑗 𝑘 − 𝑙 − 𝑦𝑗 𝑘
2𝑑−1
𝑙=0
𝑥𝑖 𝑘 =
1
𝑑
𝑥𝑖(𝑘 − 𝑙)
𝑑−1
𝑙=0
𝑦𝑗 𝑘 =
1
𝑑
𝑦𝑗(𝑘 − 𝑙)
𝑑−1
𝑙=0
8
Dynamic response recognition
Need to learn typical correlation matrices. Then it’s
needed to accept known matrices and reject other.
One class classification problem is solved by:
• Support vector machine (SVM)
• Neural network (NN) as auto-associative memory
Requests
Replies
Correlation matrices R(k) at time tk
t
9
Neural network approach
for one class classification
𝑒 𝑟 𝑘 = 𝑅 𝑘 − 𝑅∗ 𝑘 = 𝑟𝑖𝑗 𝑘 − 𝑟𝑖𝑗
∗
𝑘
2
𝑁
𝑖=1
𝑀
𝑗=1
1
2
𝑅 𝑘 𝑅∗ 𝑘
Calculated
from real data
Reconstructed
by NN
Reconstruction
error:
Small error: known
input/output response
Otherwise: unknown
input/output response
Neural network
(MLP)
10
Experimental stand description
Incoming traffic Outgoing traffic Performance
TCP total TCP total CPU usage
UDP total UDP total Memory usage
HTTP HTTP I/O usage
• VMware Workstation
as VM host
environment
• Windows-based
Apache Web server (1)
• Self-made requests
generator and attack
simulator (2)
• MySQL DBMS (3)
• Wireshark traffic
sniffer (4)
3 input and
6 output variables
=> 3x6 correlation
matrix size
11
Training traffic data series (normal)
TCP in
TCP out UDP out
UDP in HTTP in
HTTP out
I/OCPU
Mem
12Time length 2100s, Δt=1s
Neural network training
• One class classifier NN structure:
• Regression diagram of NN training (by LM):
13
Traffic data series with anomalies
TCP in
TCP out UDP out
UDP in HTTP in
HTTP out
I/OCPU
Mem
14Time length 2100s, Δt=1s
Reconstruction error plot
Normal traffic Traffic with anomalies
Two different traffic series reconstruction
error in the same Y axis scale (small scale)
Correlation base width d=3
HTTP input data rate (large scale)
0
1000
2000
3000
4000
5000
6000
1250
1255
1260
1265
1270
1275
1280
1285
1290
1295
1300
1305
1310
1315
1320
1325
1330
1335
1340
1345
1350
Incoming data
With anomaly fragments Normal
Reconstruction error (large scale)
0
1
2
3
4
5
1250
1255
1260
1265
1270
1275
1280
1285
1290
1295
1300
1305
1310
1315
1320
1325
1330
1335
1340
1345
1350
Reconstruction error
With anomaly fragments Normal
Anomalies
Anomaly
Threshold
Threshold
15
Discussion
Pro
1. Training is fully automatic
(does not need traffic
labeling)
2. Very high runtime
performance
3. Any server failure causes
alarm (both security and
non-security related)
4. Can fight zero day attacks
5. Data leak detection
Contra
1. Maintenance actions will
cause alarm
2. Not for desktops
3. Hardware and software
upgrade and even
reconfiguration may need to
train classifier once again on
fresh data
4. Attacks with small impact to
measured properties can not
be detected
16
Conclusion
• Dynamic plant response approach was adopted
for a network server behavior investigation
• One class neural network classifier for correlation
matrix reconstruction was implemented
• Simulation experiments approved feasibility of
the method
• Potential advantages and disadvantages were
discussed
• Further research should be performed
17
Thank you for attention!
Vladimir Eliseev vlad-eliseev@mail.ru
Yury Shabalin yury.shabalin@gmail.com

More Related Content

What's hot

Dealing with Exceptions Computer Architecture part 1
Dealing with Exceptions Computer Architecture part 1Dealing with Exceptions Computer Architecture part 1
Dealing with Exceptions Computer Architecture part 1Gaditek
 
03 top level view of computer function and interconnection.ppt.enc
03 top level view of computer function and interconnection.ppt.enc03 top level view of computer function and interconnection.ppt.enc
03 top level view of computer function and interconnection.ppt.encAnwal Mirza
 
MC9S08MP16: 8-bit MCU For BLDC Motor Control
MC9S08MP16: 8-bit MCU For BLDC Motor ControlMC9S08MP16: 8-bit MCU For BLDC Motor Control
MC9S08MP16: 8-bit MCU For BLDC Motor ControlPremier Farnell
 
Operating system 03 handling of interrupts
Operating system 03 handling of interruptsOperating system 03 handling of interrupts
Operating system 03 handling of interruptsVaibhav Khanna
 
[EWiLi2016] Enabling power-awareness for the Xen Hypervisor
[EWiLi2016] Enabling power-awareness for the Xen Hypervisor[EWiLi2016] Enabling power-awareness for the Xen Hypervisor
[EWiLi2016] Enabling power-awareness for the Xen HypervisorMatteo Ferroni
 
15 control-computer organization and archietecture-CO-COA
15 control-computer organization and archietecture-CO-COA15 control-computer organization and archietecture-CO-COA
15 control-computer organization and archietecture-CO-COAJay Patel
 
Direct memory access (dma)
Direct memory access (dma)Direct memory access (dma)
Direct memory access (dma)Zubair Khalid
 
Computer function-and-interconnection 3
Computer function-and-interconnection 3Computer function-and-interconnection 3
Computer function-and-interconnection 3Mujaheed Sulantingan
 
Free OpManager training Part3- Network performance monitoring
Free OpManager training Part3- Network performance monitoringFree OpManager training Part3- Network performance monitoring
Free OpManager training Part3- Network performance monitoringManageEngine, Zoho Corporation
 
03 top level view of computer function and interconnection
03 top level view of computer function and interconnection03 top level view of computer function and interconnection
03 top level view of computer function and interconnectionSher Shah Merkhel
 
Instruction cycle
Instruction cycleInstruction cycle
Instruction cycleKumar
 
Instrumenting Open vSwitch with Monitoring Capabilities: Designs and Challenges
Instrumenting Open vSwitch with Monitoring Capabilities: Designs and ChallengesInstrumenting Open vSwitch with Monitoring Capabilities: Designs and Challenges
Instrumenting Open vSwitch with Monitoring Capabilities: Designs and ChallengesAJAY KHARAT
 
ASIP (Application-specific instruction-set processor)
ASIP (Application-specific instruction-set processor)ASIP (Application-specific instruction-set processor)
ASIP (Application-specific instruction-set processor)Hamid Reza
 
Free OpManager training Part 2- Monitoring Server Performance
Free OpManager training Part 2- Monitoring Server PerformanceFree OpManager training Part 2- Monitoring Server Performance
Free OpManager training Part 2- Monitoring Server PerformanceManageEngine, Zoho Corporation
 
Free OpManager training Part1- Discovery and classification
Free OpManager training Part1- Discovery and classificationFree OpManager training Part1- Discovery and classification
Free OpManager training Part1- Discovery and classificationManageEngine, Zoho Corporation
 
PLNOG 5: Elżbieta Jasińska - Plot Your Network
PLNOG 5: Elżbieta Jasińska - Plot Your Network PLNOG 5: Elżbieta Jasińska - Plot Your Network
PLNOG 5: Elżbieta Jasińska - Plot Your Network PROIDEA
 
Overview Study on PIC32MX3XX / 4XX 32-Bit Controller
Overview Study on PIC32MX3XX / 4XX 32-Bit ControllerOverview Study on PIC32MX3XX / 4XX 32-Bit Controller
Overview Study on PIC32MX3XX / 4XX 32-Bit ControllerPremier Farnell
 

What's hot (20)

Dealing with Exceptions Computer Architecture part 1
Dealing with Exceptions Computer Architecture part 1Dealing with Exceptions Computer Architecture part 1
Dealing with Exceptions Computer Architecture part 1
 
03 top level view of computer function and interconnection.ppt.enc
03 top level view of computer function and interconnection.ppt.enc03 top level view of computer function and interconnection.ppt.enc
03 top level view of computer function and interconnection.ppt.enc
 
MC9S08MP16: 8-bit MCU For BLDC Motor Control
MC9S08MP16: 8-bit MCU For BLDC Motor ControlMC9S08MP16: 8-bit MCU For BLDC Motor Control
MC9S08MP16: 8-bit MCU For BLDC Motor Control
 
Operating system 03 handling of interrupts
Operating system 03 handling of interruptsOperating system 03 handling of interrupts
Operating system 03 handling of interrupts
 
[EWiLi2016] Enabling power-awareness for the Xen Hypervisor
[EWiLi2016] Enabling power-awareness for the Xen Hypervisor[EWiLi2016] Enabling power-awareness for the Xen Hypervisor
[EWiLi2016] Enabling power-awareness for the Xen Hypervisor
 
15 control-computer organization and archietecture-CO-COA
15 control-computer organization and archietecture-CO-COA15 control-computer organization and archietecture-CO-COA
15 control-computer organization and archietecture-CO-COA
 
Direct memory access (dma)
Direct memory access (dma)Direct memory access (dma)
Direct memory access (dma)
 
Computer function-and-interconnection 3
Computer function-and-interconnection 3Computer function-and-interconnection 3
Computer function-and-interconnection 3
 
Lecture 37
Lecture 37Lecture 37
Lecture 37
 
Free OpManager training Part3- Network performance monitoring
Free OpManager training Part3- Network performance monitoringFree OpManager training Part3- Network performance monitoring
Free OpManager training Part3- Network performance monitoring
 
03 top level view of computer function and interconnection
03 top level view of computer function and interconnection03 top level view of computer function and interconnection
03 top level view of computer function and interconnection
 
Instruction cycle
Instruction cycleInstruction cycle
Instruction cycle
 
Instrumenting Open vSwitch with Monitoring Capabilities: Designs and Challenges
Instrumenting Open vSwitch with Monitoring Capabilities: Designs and ChallengesInstrumenting Open vSwitch with Monitoring Capabilities: Designs and Challenges
Instrumenting Open vSwitch with Monitoring Capabilities: Designs and Challenges
 
ASIP (Application-specific instruction-set processor)
ASIP (Application-specific instruction-set processor)ASIP (Application-specific instruction-set processor)
ASIP (Application-specific instruction-set processor)
 
Free OpManager training Part 2- Monitoring Server Performance
Free OpManager training Part 2- Monitoring Server PerformanceFree OpManager training Part 2- Monitoring Server Performance
Free OpManager training Part 2- Monitoring Server Performance
 
Free OpManager training Part1- Discovery and classification
Free OpManager training Part1- Discovery and classificationFree OpManager training Part1- Discovery and classification
Free OpManager training Part1- Discovery and classification
 
PLNOG 5: Elżbieta Jasińska - Plot Your Network
PLNOG 5: Elżbieta Jasińska - Plot Your Network PLNOG 5: Elżbieta Jasińska - Plot Your Network
PLNOG 5: Elżbieta Jasińska - Plot Your Network
 
AVR ATmega32
AVR ATmega32AVR ATmega32
AVR ATmega32
 
Overview Study on PIC32MX3XX / 4XX 32-Bit Controller
Overview Study on PIC32MX3XX / 4XX 32-Bit ControllerOverview Study on PIC32MX3XX / 4XX 32-Bit Controller
Overview Study on PIC32MX3XX / 4XX 32-Bit Controller
 
Micro controller
Micro controllerMicro controller
Micro controller
 

Similar to Dynamic response recognition by neural network to detect network host anomaly activity

Open programmable architecture for java enabled network devices
Open programmable architecture for java enabled network devicesOpen programmable architecture for java enabled network devices
Open programmable architecture for java enabled network devicesTal Lavian Ph.D.
 
Open Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network DevicesOpen Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network DevicesTal Lavian Ph.D.
 
Introduction to embedded System.pptx
Introduction to embedded System.pptxIntroduction to embedded System.pptx
Introduction to embedded System.pptxPratik Gohel
 
Network State Awareness & Troubleshooting
Network State Awareness & TroubleshootingNetwork State Awareness & Troubleshooting
Network State Awareness & TroubleshootingAPNIC
 
Network visibility and control using industry standard sFlow telemetry
Network visibility and control using industry standard sFlow telemetryNetwork visibility and control using industry standard sFlow telemetry
Network visibility and control using industry standard sFlow telemetrypphaal
 
PLANT INFORMATION SYSTEM.ppt
PLANT INFORMATION SYSTEM.pptPLANT INFORMATION SYSTEM.ppt
PLANT INFORMATION SYSTEM.pptSachin Patidar
 
Module -4_microprocessor (1).pptx
Module -4_microprocessor (1).pptxModule -4_microprocessor (1).pptx
Module -4_microprocessor (1).pptxDrVaibhavMeshram
 
CPN302 your-linux-ami-optimization-and-performance
CPN302 your-linux-ami-optimization-and-performanceCPN302 your-linux-ami-optimization-and-performance
CPN302 your-linux-ami-optimization-and-performanceCoburn Watson
 
Application of the Actor Model to Large Scale NDE Data Analysis
Application of the Actor Model to Large Scale NDE Data AnalysisApplication of the Actor Model to Large Scale NDE Data Analysis
Application of the Actor Model to Large Scale NDE Data AnalysisChrisCoughlin9
 
Parallel machines flinkforward2017
Parallel machines flinkforward2017Parallel machines flinkforward2017
Parallel machines flinkforward2017Nisha Talagala
 
Monitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerMonitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerManageEngine
 
I/O systems chapter 12 OS
I/O systems chapter 12 OS I/O systems chapter 12 OS
I/O systems chapter 12 OS ssuser45ae56
 
Introduction to Computer Architecture and Organization
Introduction to Computer Architecture and OrganizationIntroduction to Computer Architecture and Organization
Introduction to Computer Architecture and OrganizationDr. Balaji Ganesh Rajagopal
 
Advanced debugging on ARM Cortex devices such as STM32, Kinetis, LPC, etc.
Advanced debugging on ARM Cortex devices such as STM32, Kinetis, LPC, etc.Advanced debugging on ARM Cortex devices such as STM32, Kinetis, LPC, etc.
Advanced debugging on ARM Cortex devices such as STM32, Kinetis, LPC, etc.Atollic
 
OPAL-RT RT13 Conference: Rapid control prototyping solutions for power electr...
OPAL-RT RT13 Conference: Rapid control prototyping solutions for power electr...OPAL-RT RT13 Conference: Rapid control prototyping solutions for power electr...
OPAL-RT RT13 Conference: Rapid control prototyping solutions for power electr...OPAL-RT TECHNOLOGIES
 
Co se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkCo se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkSecurity Session
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
 

Similar to Dynamic response recognition by neural network to detect network host anomaly activity (20)

Open programmable architecture for java enabled network devices
Open programmable architecture for java enabled network devicesOpen programmable architecture for java enabled network devices
Open programmable architecture for java enabled network devices
 
Open Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network DevicesOpen Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network Devices
 
Introduction to embedded System.pptx
Introduction to embedded System.pptxIntroduction to embedded System.pptx
Introduction to embedded System.pptx
 
Network State Awareness & Troubleshooting
Network State Awareness & TroubleshootingNetwork State Awareness & Troubleshooting
Network State Awareness & Troubleshooting
 
Stream Processing Overview
Stream Processing OverviewStream Processing Overview
Stream Processing Overview
 
Artificial neural networks
Artificial neural networks Artificial neural networks
Artificial neural networks
 
Network visibility and control using industry standard sFlow telemetry
Network visibility and control using industry standard sFlow telemetryNetwork visibility and control using industry standard sFlow telemetry
Network visibility and control using industry standard sFlow telemetry
 
PLANT INFORMATION SYSTEM.ppt
PLANT INFORMATION SYSTEM.pptPLANT INFORMATION SYSTEM.ppt
PLANT INFORMATION SYSTEM.ppt
 
Module -4_microprocessor (1).pptx
Module -4_microprocessor (1).pptxModule -4_microprocessor (1).pptx
Module -4_microprocessor (1).pptx
 
CPN302 your-linux-ami-optimization-and-performance
CPN302 your-linux-ami-optimization-and-performanceCPN302 your-linux-ami-optimization-and-performance
CPN302 your-linux-ami-optimization-and-performance
 
Application of the Actor Model to Large Scale NDE Data Analysis
Application of the Actor Model to Large Scale NDE Data AnalysisApplication of the Actor Model to Large Scale NDE Data Analysis
Application of the Actor Model to Large Scale NDE Data Analysis
 
Parallel machines flinkforward2017
Parallel machines flinkforward2017Parallel machines flinkforward2017
Parallel machines flinkforward2017
 
Monitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerMonitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManager
 
I/O systems chapter 12 OS
I/O systems chapter 12 OS I/O systems chapter 12 OS
I/O systems chapter 12 OS
 
Introduction to Computer Architecture and Organization
Introduction to Computer Architecture and OrganizationIntroduction to Computer Architecture and Organization
Introduction to Computer Architecture and Organization
 
Lecture9
Lecture9Lecture9
Lecture9
 
Advanced debugging on ARM Cortex devices such as STM32, Kinetis, LPC, etc.
Advanced debugging on ARM Cortex devices such as STM32, Kinetis, LPC, etc.Advanced debugging on ARM Cortex devices such as STM32, Kinetis, LPC, etc.
Advanced debugging on ARM Cortex devices such as STM32, Kinetis, LPC, etc.
 
OPAL-RT RT13 Conference: Rapid control prototyping solutions for power electr...
OPAL-RT RT13 Conference: Rapid control prototyping solutions for power electr...OPAL-RT RT13 Conference: Rapid control prototyping solutions for power electr...
OPAL-RT RT13 Conference: Rapid control prototyping solutions for power electr...
 
Co se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkCo se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel Minařík
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 

Recently uploaded

Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptxAlMamun560346
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...ssifa0344
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.Nitya salvi
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfSumit Kumar yadav
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and ClassificationsAreesha Ahmad
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfrohankumarsinghrore1
 
Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPirithiRaju
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learninglevieagacer
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxFarihaAbdulRasheed
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPirithiRaju
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...chandars293
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfSumit Kumar yadav
 
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Servicenishacall1
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)Areesha Ahmad
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICEayushi9330
 
GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)Areesha Ahmad
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Silpa
 

Recently uploaded (20)

Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptx
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdf
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdf
 
Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdf
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learning
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdf
 
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
 

Dynamic response recognition by neural network to detect network host anomaly activity

  • 1. Dynamic response recognition by neural network to detect network host anomaly activity Vladimir Eliseev - Infotecs JSC, National Research University (MPEI) Yury Shabalin - National Research University (MPEI), Alfa Bank JSC The 8th International Conference on Security of Information and Networks In Technical Cooperation with ACM SIGSAC September 8-10, 2015 Sochi/Russia
  • 2. Formulation of the problem • There are many typical network servers • Every of them can be attacked in many known or unknown ways • Every server may fail to operate due to internal problem far from illegal actions The question is: How to detect server failure in all cases from the most general point of view? Requests Replies Attack 2
  • 3. Anomaly detection General subdivision: • Attack detection – Host based – Network based • System health sensors – Specific for vendor hardware and software General disadvantages: 1. Separate systems with different control and tuning 2. Too complicated to maintain all of them 3. Need to gather events in SIEM to analyze 4. There are breaches for zero-day attacks 3
  • 4. Host based anomaly detection Pro • Known attack is recognized for sure • Independent from server’s software and hardware Contra • Event of attack is detected even it has no effect • System problems and unknown attacks are not detected Pro • Applicable both for known and some unknown attacks • Hardware independent Contra • Very specific and sensitive for application and system software change or upgrade Network based anomaly detection 4
  • 5. Normal and anomaly server behavior • Normal Typical requests lead to typical number and size of replies and typical load • Defaced Hacked server produces less traffic and less load • Under DoS attack Typical requests and attacking traffic together make higher load and less number of replies • Software bug Typical requests cause unusual outgoing traffic and load Requests Replies Requests DoS attack Replies CPU, Mem, I/O Requests Replies CPU, Mem, I/O CPU, Mem, I/O Requests Replies Hacked earlier CPU, Mem, I/O 5
  • 6. Our idea Measurement of server operations: – Incoming traffic (by port and protocol) – Outgoing traffic (by port and protocol) – Computer load (CPU, memory, I/O consumption) Calculate and remember dynamic response of server (change of outputs to the change of inputs) to distinguish typical (=normal) response from anomaly. Incoming requests Outgoing replies CPU, Mem, I/O Inputsxi Outputsyj 6
  • 7. Principals • Considering network server as a multidimensional dynamic plant • Counting amount of traffic but not scanning its content • Every network interface of server should be accounted separately with all open ports • Network traffic and server performance metrics are measured in constant time window base 7
  • 8. Dynamic response calculation Scalar input/output response of a server from the control theory point of view: • Small delay – much less than time window • Short transient time • Non-linear behavior Matrix of Pearson correlation coefficients 𝑅(𝑘) = 𝑟𝑖𝑗 𝑘 𝑛𝑚 where n inputs xi, m outputs yj at time tk and 𝑟𝑖𝑗 𝑘 = 𝑥𝑖 𝑘 − 𝑙 − 𝑥𝑖 𝑘 𝑦𝑗 𝑘 − 𝑙 − 𝑦𝑗 𝑘𝑑−1 𝑙=0 𝑥𝑖 𝑘 − 𝑙 − 𝑥𝑖 𝑘 2 𝑦𝑗 𝑘 − 𝑙 − 𝑦𝑗 𝑘 2𝑑−1 𝑙=0 𝑥𝑖 𝑘 = 1 𝑑 𝑥𝑖(𝑘 − 𝑙) 𝑑−1 𝑙=0 𝑦𝑗 𝑘 = 1 𝑑 𝑦𝑗(𝑘 − 𝑙) 𝑑−1 𝑙=0 8
  • 9. Dynamic response recognition Need to learn typical correlation matrices. Then it’s needed to accept known matrices and reject other. One class classification problem is solved by: • Support vector machine (SVM) • Neural network (NN) as auto-associative memory Requests Replies Correlation matrices R(k) at time tk t 9
  • 10. Neural network approach for one class classification 𝑒 𝑟 𝑘 = 𝑅 𝑘 − 𝑅∗ 𝑘 = 𝑟𝑖𝑗 𝑘 − 𝑟𝑖𝑗 ∗ 𝑘 2 𝑁 𝑖=1 𝑀 𝑗=1 1 2 𝑅 𝑘 𝑅∗ 𝑘 Calculated from real data Reconstructed by NN Reconstruction error: Small error: known input/output response Otherwise: unknown input/output response Neural network (MLP) 10
  • 11. Experimental stand description Incoming traffic Outgoing traffic Performance TCP total TCP total CPU usage UDP total UDP total Memory usage HTTP HTTP I/O usage • VMware Workstation as VM host environment • Windows-based Apache Web server (1) • Self-made requests generator and attack simulator (2) • MySQL DBMS (3) • Wireshark traffic sniffer (4) 3 input and 6 output variables => 3x6 correlation matrix size 11
  • 12. Training traffic data series (normal) TCP in TCP out UDP out UDP in HTTP in HTTP out I/OCPU Mem 12Time length 2100s, Δt=1s
  • 13. Neural network training • One class classifier NN structure: • Regression diagram of NN training (by LM): 13
  • 14. Traffic data series with anomalies TCP in TCP out UDP out UDP in HTTP in HTTP out I/OCPU Mem 14Time length 2100s, Δt=1s
  • 15. Reconstruction error plot Normal traffic Traffic with anomalies Two different traffic series reconstruction error in the same Y axis scale (small scale) Correlation base width d=3 HTTP input data rate (large scale) 0 1000 2000 3000 4000 5000 6000 1250 1255 1260 1265 1270 1275 1280 1285 1290 1295 1300 1305 1310 1315 1320 1325 1330 1335 1340 1345 1350 Incoming data With anomaly fragments Normal Reconstruction error (large scale) 0 1 2 3 4 5 1250 1255 1260 1265 1270 1275 1280 1285 1290 1295 1300 1305 1310 1315 1320 1325 1330 1335 1340 1345 1350 Reconstruction error With anomaly fragments Normal Anomalies Anomaly Threshold Threshold 15
  • 16. Discussion Pro 1. Training is fully automatic (does not need traffic labeling) 2. Very high runtime performance 3. Any server failure causes alarm (both security and non-security related) 4. Can fight zero day attacks 5. Data leak detection Contra 1. Maintenance actions will cause alarm 2. Not for desktops 3. Hardware and software upgrade and even reconfiguration may need to train classifier once again on fresh data 4. Attacks with small impact to measured properties can not be detected 16
  • 17. Conclusion • Dynamic plant response approach was adopted for a network server behavior investigation • One class neural network classifier for correlation matrix reconstruction was implemented • Simulation experiments approved feasibility of the method • Potential advantages and disadvantages were discussed • Further research should be performed 17
  • 18. Thank you for attention! Vladimir Eliseev vlad-eliseev@mail.ru Yury Shabalin yury.shabalin@gmail.com