SlideShare a Scribd company logo
Jan 2014, HAPPIEST MINDS TECHNOLOGIES
User Behavior based Anomaly Detection for Cyber Network Security
By
Sandip K Pal
Manish Anand
Happiest Minds, Analytics Practice
SHARING. MINDFUL. INTEGRITY. LEARNING. EXCELLENCE. SOCIAL RESPONSIBILITY.
2
© 2013 Happiest Minds Technologies Pvt. Ltd. All Rights Reserved
Copyright Information
This document is an exclusive property of Happiest Minds Technologies Pvt. Ltd.It is
intended for limited circulation.
3
© 2013 Happiest Minds Technologies Pvt. Ltd. All Rights Reserved
Abstract
Fusion of data from multiple sources is generating new information from existing data. Now users
can access any information from inside or outside of the organization very easily. It helps to increase
the user productivity and knowledge shared within the organization. But this leads to a new area of
network security threat, “Inside Threat”. Now users can share critical information of organization to
outside the organization if he/she has access to the information. The current network security tool
cannot prevent the new threat. In this paper, we address this issue by “Building real time anomaly
detection system based on users’ current behavior and previous behavior”.
Introduction
Securing data in a networked environment has been a major concern for Network
Administrator and Security Personnel who are responsible for network security, as the
networks are under threat byintruders. Generaing new information from existing data
becomes more critical while integrating data from multiple sources. The intrusion may get
access to value information and they might share/steal the information, causing damage to
the network and applications running on the data base. Detection of anomaly is very
essential as it is impossible to secure all the information in the network. To secure the
information, there are many methods and techniques in place:
Authentication: Technology that requires user authentication before using the system. There
are different levels of authentication like authenticating the user with user id and password
(one factor authentication), security token (two factor authentication) or finger print (three
factor authentication).
Packet Inspection: Examines the data part (and possibly also the header) of a packet as it
passes an inspection point, searching for protocol non-compliance, viruses, spam, intrusions
or defined criteria to decide whether the packet may pass or if it needs to be routed to a
different destination or for the purpose of collecting statistical information.
Signature Detection: It monitors packets in the network and compares them with pre-
configured and pre-determined attack patterns.
All three methods can detect anomaly in the network but they have low detection rate and
high false alarm rate. They cannot detect new anomaly. Behavior based anomaly detection
helps solve this problem.
Network Behavior Anomaly Detection (NBAD) is a way to enhance the security of proprietary
network by monitoring traffic and noting the unusual pattern or departure from normal
behavior. It offers security, in addition to that provided by traditional anti-threat applications
such as firewalls, antivirus software and spyware-detection software. NBAD Solution
aggregates data from multiple sources and establishes the benchmark for normal behavior.
After establishing a benchmark for normal traffic, it passively monitors network activity and
flags unknown, new or unusual patterns that might indicate the presence of a threat. For
example: when normal users access the network, they do it at human scale with a mouse
and keyboard. If a hacker is accessing the network, it is very fast, with high-volume click rates
4
© 2013 Happiest Minds Technologies Pvt. Ltd. All Rights Reserved
and looking for different site/files and his/her login pattern is different. "Nothing about it
looks like a normal user."
NBAD is also good at spotting new anomaly and zero day exploits. It helps a network
administrator minimize the time and labor involved in locating and resolving problems.
Behavior Based Anomaly Detection Solution Framework:
System log data is massive in volume and semi–structured. It is very difficult and not cost
effective to store data in normal data or processes using statistical tools. Store, process and
aggregate data in Hadoop platform using map & reduce algorithm and use the aggregate
data in statistical tools for data analysis and model building.
Proposed Solution Framework (Figure 1)
Approach:
Step1:
 Process the massive system log data in Hadoop platform
 Convert semi structured data to structured data
 Aggregate data using map & reduce algorithm
5
© 2013 Happiest Minds Technologies Pvt. Ltd. All Rights Reserved
Step 2:
 Clean the data and create featured vector for each user
 Identify the outlier and do the missing value treatment
 Generate the insight for the data
 Identify the behavioral attribute for cluster
Step 3:
 Apply different cluster algorithms on massive data
 Select best methods and number of cluster users
 Cluster the users based on different behavioral attributes
 Cluster, profiling & identification of outlier cluster
 Rule generation for real time segmentation
Step 4:
 Aggregation of real time log and create feature vector for each user
 Real time user segmentation based on current user behavior and segmentation
rules
 Identify the anomaly behavior user who belongs to outlier cluster
Case Study:
Executive Summary
There are thousands of users in an enterprise who connect systems everyday and generate
massive system log data. They can access any information if they have authentication for
that and can share the information with the outside world. Detection of anomaly from
system log based on current rules is no more effective and it might miss some critical cases.
The enterprise wanted to improve the anomaly detection rate and minimize the false alert
rate.
The objective of this study was to detect anomaly from massive system log data based on
user behavioral attributes like number of destinations, number of sessions, number of
applications started by users, file transfer size, duration of sessions etc.
System log data used for this study contains all the action taken by users when connections
were started with internal and/or external systems. Important fields of system log were Start
time of the session, Source IP, Destination connecting location, firewall rule apply on the
connection, application start by connection, file transfer size, session ID of connection,
protocol applied on connection, action taken by firewall, packet transfer from source to
destination, packet transfer from destination to source.
6
© 2013 Happiest Minds Technologies Pvt. Ltd. All Rights Reserved
Data Description Output (Figure 2)
After data analysis we identified that:
 There were 903 users common across the days
 Most of them logged in between 8 AM - 2 PM
 There was a drastic drop in the number of users at 10AM on Jun17
 Maximum file transfers occurred between 4 PM and 6 PM
7
© 2013 Happiest Minds Technologies Pvt. Ltd. All Rights Reserved
Cluster Output (Figure 3)
Data Analysis revealed that were five segments based on the number of destination IPs,
number of firewall rules applied on the users, number of applications started by users,
number of sessions started by users, number of events completed by users, total file
transferred size, number of categories.
Cluster 3 with high file transfer size and Cluster 5 with high number of destinations were
statistically different from other clusters. Cluster 3 was the outlier cluster.
Anomaly Detection Output (Figure 4)
There were nine with anomaly behavior and their average file transfer size was more than
645 MB.
8
© 2013 Happiest Minds Technologies Pvt. Ltd. All Rights Reserved
Conclusion:
Behavior based anomaly detection solution significantly increases the anomaly detection
rate and minimizes the false alert rate. It also minimizes the time and labor involved in
identification and resolving threats. The next step of this analysis is to build the prediction
model to forecast threats with severity. The solution framework shown in the Figure 1 can be
customized with specific requirements of each client. It can be implemented with any other
platform without modifying the present processes and infrastructures significantly.
References:
1. “Using Strategy Objectives for Network Security Analysis” by Elie Burstein and John C.
Mitchell
2. “Detecting APT Activity with Network Traffic Analysis” by Nart Villeneuve and James
Bennett
3. “Design of intrusion detection system based of artificial neural network application of
rough set” by Dilip Kumar Barman & Dr.Guruprasad Khataniar

More Related Content

What's hot

INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
ijcsit
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
bharatsvnit
 

What's hot (19)

Kg2417521755
Kg2417521755Kg2417521755
Kg2417521755
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
 
5
55
5
 
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkill
 
Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...
 
4
44
4
 
A45010107
A45010107A45010107
A45010107
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
 
Privacy Preserving Data Leak Detection for Sensitive Data
Privacy Preserving Data Leak Detection for Sensitive DataPrivacy Preserving Data Leak Detection for Sensitive Data
Privacy Preserving Data Leak Detection for Sensitive Data
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
 
6
66
6
 
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionData Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage Detection
 
Intrusion detection system via fuzzy
Intrusion detection system via fuzzyIntrusion detection system via fuzzy
Intrusion detection system via fuzzy
 
P2 Project
P2 ProjectP2 Project
P2 Project
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 

Similar to Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security

rpaper
rpaperrpaper
rpaper
imu409
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works Brief
Sunny Geo
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works Brief
Sunny Geo
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
Subrat Swain
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
 

Similar to Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security (20)

User Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityUser Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network Security
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
 
1639(pm proofreading)(tracked)
1639(pm proofreading)(tracked)1639(pm proofreading)(tracked)
1639(pm proofreading)(tracked)
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
 
rpaper
rpaperrpaper
rpaper
 
Enchaning system effiency through process scanning
Enchaning system effiency through process scanningEnchaning system effiency through process scanning
Enchaning system effiency through process scanning
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works Brief
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works Brief
 
finl.docx
finl.docxfinl.docx
finl.docx
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Strategies for Data Leakage Prevention
Strategies for Data Leakage PreventionStrategies for Data Leakage Prevention
Strategies for Data Leakage Prevention
 
Automatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueAutomatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram Technique
 
Classification with R
Classification with RClassification with R
Classification with R
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
 
Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 

More from Happiest Minds Technologies

More from Happiest Minds Technologies (20)

Largest Electricity provider in the US- Case Study
Largest Electricity provider in the US- Case StudyLargest Electricity provider in the US- Case Study
Largest Electricity provider in the US- Case Study
 
BFSI GLOBAL TRENDS FY 24
BFSI GLOBAL TRENDS FY 24BFSI GLOBAL TRENDS FY 24
BFSI GLOBAL TRENDS FY 24
 
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKINGARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
 
DIGITAL MANUFACTURING
DIGITAL MANUFACTURINGDIGITAL MANUFACTURING
DIGITAL MANUFACTURING
 
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & InsuranceExploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
 
AN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSEAN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSE
 
VMware to AWS Cloud Migration
VMware to AWS Cloud MigrationVMware to AWS Cloud Migration
VMware to AWS Cloud Migration
 
Digital-Content-Monetization-DCM-Platform-2.pdf
Digital-Content-Monetization-DCM-Platform-2.pdfDigital-Content-Monetization-DCM-Platform-2.pdf
Digital-Content-Monetization-DCM-Platform-2.pdf
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
 
Cloud Reshaping Banking
Cloud Reshaping BankingCloud Reshaping Banking
Cloud Reshaping Banking
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UK
 
PAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArkPAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArk
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)
 
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
 
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
 
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
 
How to Approach Tool Integrations
How to Approach Tool IntegrationsHow to Approach Tool Integrations
How to Approach Tool Integrations
 
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
 

Recently uploaded

一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
nscud
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
Opendatabay
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
yhkoc
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
ArpitMalhotra16
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
ewymefz
 
Computer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sComputer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage s
MAQIB18
 
Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...
Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...
Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...
Domenico Conte
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
ewymefz
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
vcaxypu
 

Recently uploaded (20)

tapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive datatapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive data
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
 
Uber Ride Supply Demand Gap Analysis Report
Uber Ride Supply Demand Gap Analysis ReportUber Ride Supply Demand Gap Analysis Report
Uber Ride Supply Demand Gap Analysis Report
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
 
Slip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp ClaimsSlip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp Claims
 
How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization Sample
 
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictSupply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 
Computer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sComputer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage s
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 
Using PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBUsing PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDB
 
Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...
Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...
Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 

Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security

  • 1. Jan 2014, HAPPIEST MINDS TECHNOLOGIES User Behavior based Anomaly Detection for Cyber Network Security By Sandip K Pal Manish Anand Happiest Minds, Analytics Practice SHARING. MINDFUL. INTEGRITY. LEARNING. EXCELLENCE. SOCIAL RESPONSIBILITY.
  • 2. 2 © 2013 Happiest Minds Technologies Pvt. Ltd. All Rights Reserved Copyright Information This document is an exclusive property of Happiest Minds Technologies Pvt. Ltd.It is intended for limited circulation.
  • 3. 3 © 2013 Happiest Minds Technologies Pvt. Ltd. All Rights Reserved Abstract Fusion of data from multiple sources is generating new information from existing data. Now users can access any information from inside or outside of the organization very easily. It helps to increase the user productivity and knowledge shared within the organization. But this leads to a new area of network security threat, “Inside Threat”. Now users can share critical information of organization to outside the organization if he/she has access to the information. The current network security tool cannot prevent the new threat. In this paper, we address this issue by “Building real time anomaly detection system based on users’ current behavior and previous behavior”. Introduction Securing data in a networked environment has been a major concern for Network Administrator and Security Personnel who are responsible for network security, as the networks are under threat byintruders. Generaing new information from existing data becomes more critical while integrating data from multiple sources. The intrusion may get access to value information and they might share/steal the information, causing damage to the network and applications running on the data base. Detection of anomaly is very essential as it is impossible to secure all the information in the network. To secure the information, there are many methods and techniques in place: Authentication: Technology that requires user authentication before using the system. There are different levels of authentication like authenticating the user with user id and password (one factor authentication), security token (two factor authentication) or finger print (three factor authentication). Packet Inspection: Examines the data part (and possibly also the header) of a packet as it passes an inspection point, searching for protocol non-compliance, viruses, spam, intrusions or defined criteria to decide whether the packet may pass or if it needs to be routed to a different destination or for the purpose of collecting statistical information. Signature Detection: It monitors packets in the network and compares them with pre- configured and pre-determined attack patterns. All three methods can detect anomaly in the network but they have low detection rate and high false alarm rate. They cannot detect new anomaly. Behavior based anomaly detection helps solve this problem. Network Behavior Anomaly Detection (NBAD) is a way to enhance the security of proprietary network by monitoring traffic and noting the unusual pattern or departure from normal behavior. It offers security, in addition to that provided by traditional anti-threat applications such as firewalls, antivirus software and spyware-detection software. NBAD Solution aggregates data from multiple sources and establishes the benchmark for normal behavior. After establishing a benchmark for normal traffic, it passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. For example: when normal users access the network, they do it at human scale with a mouse and keyboard. If a hacker is accessing the network, it is very fast, with high-volume click rates
  • 4. 4 © 2013 Happiest Minds Technologies Pvt. Ltd. All Rights Reserved and looking for different site/files and his/her login pattern is different. "Nothing about it looks like a normal user." NBAD is also good at spotting new anomaly and zero day exploits. It helps a network administrator minimize the time and labor involved in locating and resolving problems. Behavior Based Anomaly Detection Solution Framework: System log data is massive in volume and semi–structured. It is very difficult and not cost effective to store data in normal data or processes using statistical tools. Store, process and aggregate data in Hadoop platform using map & reduce algorithm and use the aggregate data in statistical tools for data analysis and model building. Proposed Solution Framework (Figure 1) Approach: Step1:  Process the massive system log data in Hadoop platform  Convert semi structured data to structured data  Aggregate data using map & reduce algorithm
  • 5. 5 © 2013 Happiest Minds Technologies Pvt. Ltd. All Rights Reserved Step 2:  Clean the data and create featured vector for each user  Identify the outlier and do the missing value treatment  Generate the insight for the data  Identify the behavioral attribute for cluster Step 3:  Apply different cluster algorithms on massive data  Select best methods and number of cluster users  Cluster the users based on different behavioral attributes  Cluster, profiling & identification of outlier cluster  Rule generation for real time segmentation Step 4:  Aggregation of real time log and create feature vector for each user  Real time user segmentation based on current user behavior and segmentation rules  Identify the anomaly behavior user who belongs to outlier cluster Case Study: Executive Summary There are thousands of users in an enterprise who connect systems everyday and generate massive system log data. They can access any information if they have authentication for that and can share the information with the outside world. Detection of anomaly from system log based on current rules is no more effective and it might miss some critical cases. The enterprise wanted to improve the anomaly detection rate and minimize the false alert rate. The objective of this study was to detect anomaly from massive system log data based on user behavioral attributes like number of destinations, number of sessions, number of applications started by users, file transfer size, duration of sessions etc. System log data used for this study contains all the action taken by users when connections were started with internal and/or external systems. Important fields of system log were Start time of the session, Source IP, Destination connecting location, firewall rule apply on the connection, application start by connection, file transfer size, session ID of connection, protocol applied on connection, action taken by firewall, packet transfer from source to destination, packet transfer from destination to source.
  • 6. 6 © 2013 Happiest Minds Technologies Pvt. Ltd. All Rights Reserved Data Description Output (Figure 2) After data analysis we identified that:  There were 903 users common across the days  Most of them logged in between 8 AM - 2 PM  There was a drastic drop in the number of users at 10AM on Jun17  Maximum file transfers occurred between 4 PM and 6 PM
  • 7. 7 © 2013 Happiest Minds Technologies Pvt. Ltd. All Rights Reserved Cluster Output (Figure 3) Data Analysis revealed that were five segments based on the number of destination IPs, number of firewall rules applied on the users, number of applications started by users, number of sessions started by users, number of events completed by users, total file transferred size, number of categories. Cluster 3 with high file transfer size and Cluster 5 with high number of destinations were statistically different from other clusters. Cluster 3 was the outlier cluster. Anomaly Detection Output (Figure 4) There were nine with anomaly behavior and their average file transfer size was more than 645 MB.
  • 8. 8 © 2013 Happiest Minds Technologies Pvt. Ltd. All Rights Reserved Conclusion: Behavior based anomaly detection solution significantly increases the anomaly detection rate and minimizes the false alert rate. It also minimizes the time and labor involved in identification and resolving threats. The next step of this analysis is to build the prediction model to forecast threats with severity. The solution framework shown in the Figure 1 can be customized with specific requirements of each client. It can be implemented with any other platform without modifying the present processes and infrastructures significantly. References: 1. “Using Strategy Objectives for Network Security Analysis” by Elie Burstein and John C. Mitchell 2. “Detecting APT Activity with Network Traffic Analysis” by Nart Villeneuve and James Bennett 3. “Design of intrusion detection system based of artificial neural network application of rough set” by Dilip Kumar Barman & Dr.Guruprasad Khataniar