190 likes | 283 Views
Network Behaviors Monitoring and Management. Shian-Shyong Tseng Department of Computer and Information Science, National Chiao Tung Univ. Introduction. Dramatically increasing growth of networked computer resources.
E N D
Network Behaviors Monitoring and Management Shian-Shyong Tseng Department of Computer and Information Science, National Chiao Tung Univ.
Introduction • Dramatically increasing growth of networked computer resources. • How to identify possible intrusion behaviors and secure the system infrastructure. • Representation of intrusion patterns • Intrusion Detection Markup Language (IDML) based on XML.
Introduction • Data Mining for Intrusion Analysis. • Finding Unknown Intrusions by Analyzing Network Logs.
Related Works • Related Products • CheckPoint2000, TIS Firewall Toolkit (FWTK) , Server Guard, Cisco PIX Firewall, Sonic Wall, Cyber Guard 4.0, Border Ware 6.0, etc... • The Problem • Can not detect complex intrusions. • Lack of extendibility for unknown intrusions.
Related Works • Intrusion categories • Probing • User to Root • Remote to Local • DoS • Intrusion Representation. • Implicit representation, Rule oriented representation, Pattern oriented representation, Specific representation.
Related Works • Intrusion Detection Systems. • Firewall Systems • Single and simple rules • Packet Level Filtering • Research Models • Complicated rules, Goal Tree, etc. • The performance may not meet the on-line performance requirements. • Ideal intrusion detection system • Efficient detection mechanism • Good representation of expert knowledge
IDML Based I. D. Model • A standardized intrusion behavior expression will help to accumulate expertise about intrusion. • Issues to design an intrusion detection system: • Pattern representation • Computability • Understandability • Performance • Extendibility and maintenance
IDML Components • Property • A pair of property name and value. • Event • A set of properties. • Event Comparator • Expressing the condition of an intrusion pattern. • Intrusion State • States are defined to record information about the situation of the intrusion process. • Intrusion Pattern
Intrusion Pattern Representation in IDML • Issues for an intrusion pattern representation: • How to collect and analyze the event information required in the pattern • How to transform the intrusion into state transition pattern • How to express event comparison between states • What kind of actions should be taken for the intrusion
IDML Parser • IDML Parser • Parse the related information in the IDML document. • Intrusion patterns can be transformed into finite state machine for further intrusion detecting.
Intrusion Pattern State Machine • The finite state machine for IDML documents.
User Identification for I. D. • User identification to find the person with intruding attempt. • IP Address • User Login • Application Log • User behavior mining
Data Mining for Intrusion Pattern • The Platform
Center of Intrusion Detection System • CIDS • Center of Intrusion Detection System. • Receive Events and Network Records from IDD. • Provide Offline Data Mining. • Provide Knowledge feedback to IDD.
Intrusion Detection Device • IDD • Intrusion Detection Device • Provide Online Detection with Knowledge from CIDS. • Provide Data Collection. • Report records and events using IDML. • Detection Model based on IDML.
Concluding remarks • A standardized and flexible mechanism for intrusion detection. • Knowledge accumulation. • Experiments. • IDD and CIDS model for Intrusion Data Mining. • KDD based on IDML.