Ijnsa 050214
Ijnsa 050214
Ijnsa 050214
2, March 2013
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BASED ON DEVIANT SYSTEM BEHAVIOUR
Arpitha M1, Geetha V1, Gowranga K H2 and Bhakthavathsalam R2
1
Department of Information Science and Engineering Alpha College Of Engineering, Bangalore, India
2
arpitha119@gmail.com, geethaanjali78@gmail.com
Supercomputer Education and Research Center Indian Institute of Science, Bangalore, India
gowranga@serc.iisc.ernet.in, bhaktha@serc.iisc.ernet.in
ABSTRACT
With the ever increasing numberand diverse type of attacks, including new and previouslyunseen attacks, the effectiveness of an Intrusion DetectionSystem is very important. Hence there is high demand to reduce the threat level in networks to ensure the data and services offered by them to be more secure. In this paper we developed an effective test suite for improving the efficiency and accuracy of an intrusion detection system using the layered CRFs. We set up different types of checks at multiple levels in each layer.Our framework examines various attributes at every layer in order to effectively identify any breach of security. Once the attack is detected, it is intimated throughmobile phone to the system administrator for safeguarding the server system. We established experimentally that the layered CRFs can thus be more effectivein detecting intrusions when compared with the other previouslyknown techniques.
KEYWORDS
Network Security, Intrusion Detection, Layered Approach, Conditional Random Fields, Mobile Phones
1. INTRODUCTION
The current state of network is vulnerable they are prone to increasing number of attacks. Thus securing a network from unwanted malicious traffic is of prime concern. A computer network needs to provide continuous services, such as e-mail to users, while on the other it stores huge amount of data which is of vital significance. Recently, there has been increasing concern over safeguarding the vast amount of data stored in a network from malicious modifications and disclosure to unauthorized individuals. Intrusion Detection Systems (IDS) [1] are based on two concepts; matching of the previously seen and hence known anomalous patterns from an internal
DOI : 10.5121/ijnsa.2013.5214 179
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
database of signatures or building profiles based on normal data and detecting deviations from the expected behaviour[2].Based on the mode of deployment, the Intrusion Detection Systems are classifiedas Network based [3] andHost based [4]. Network based systems make a decision by analysing the network logs and packet headers from the incoming and outgoing packets. Host based systems monitor's individual systems and uses system logs extensively to make any decision. Intrusion Detection Systems are either Signature based or Behaviour based [5]. The Signature based systems build a model based on the available knowledge of the attacks. The Behaviour based systems which build a model based on the available knowledge of the normal use of the system.We propose and evaluate the use of the CRFs [6] also which is a novel technique for the task of Intrusion Detection along with Layered Approach. Further, our system can be used as a standalone system monitoring an entire Network or a single Host or even a single Application running on a particular host.
180
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
181
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
3. IMPLEMENTATION
Implementation is the stage when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and its constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods.
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
overhead among different layers. Every layer in the LIDS framework is trained separately and then deployed sequentially.
We define four layers that correspond to the four attack groups [15]. They are Probe layer, DoS layer, R2L layer, and U2R layer. Each layer is then separately trained with features. Feature selection is significant for Layered Approach. The layers essentially act as filters that block any anomalous connection, thereby eliminating the need of further processing at subsequent layers enabling quick response to intrusion. The effect of such a sequence of layers is that the anomalous events are identified and blocked as soon as they are detected. Hence, we implement the LIDS and select four set of features for every layer. In many situations, there is a trade-off between efficiency and accuracy of the system and there can be various avenues to improve system performance. To balance this trade-off, we use the CRFs that are more accurate, though expensive, but we implement the Layered Approach to improve overall system performance. The performance of our proposed system, Layered CRFs is comparable to that of the decision trees and the naive Bayes, and our system has higher attack detection accuracy.
183
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
When these features are analyzed individually, they do not provide any information that can aid in detecting attacks. However, when these features are analyzed together, they can provide meaningful information.
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
connection and service requested and the host level features such as the number of failed login attempts among others for detecting R2L attack . U2R layer (User to Root attacks) The U2R attacks involve the semantic details that are very difficult to capture at an early stage. Such attacks are often content based and target an application. Hence, for U2R attacks, we select features such as number of file creations and number of shell prompts invoked, while we ignored features such as protocol and source bytes.
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
at the right schedule. Users who do not login at the right schedule are denied access and will be treated as intruders.
Intrusion detection systems [17] serve three essential security functions: they monitor, detect, and respond to unauthorized activity by company insiders and outsider intrusion. An IDS installed on
186
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
a network provides much the same purpose as a burglar alarm system installed in a house. Intrusion detection systems use policies to define certain events that, if detected will issue an alert. In other words, if a particular event is considered to constitute a security incident, an alert will be issued if that event is detected. Many intrusion detection systems not only recognize a particular incident and issue an appropriate alert, they also respond automatically to the event. Such a response might include logging off a user, disabling a user account, and launching of scripts. Our system has the capability of sending out alerts, so that the administrator of the IDS will receive a notification of a possible security incident in the form of a page, email, or SNMP trap [18].
4. RESULTS We have represented the results for every operation that is performed as per the proposed algorithm. Our results confirm that the implementations that are carried out are effectively displaying the outcomes accurately. We have produced results for eight possible conditions on the use of four CRFs. type of a
system is very much suited in an organizational network. Finally, our system has the advantage that the number of layers can be increased or decreased depending upon the environment in which the system is deployed, giving flexibility to the network administrator.
187
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
For every valid user the security checks are followed in sequence in the given time schedule and the necessary action is taken. At the first level the user level agent gets activated and authenticates the user. At the second level the process level agent gets activated and the user can use the process allocated. At the next level the packet level agent gets activated and the user is allowed to transmit files. Once all the necessary operations of the user is fulfilled the client panel sucessfully terminates. At the first level user is checked for authentication and if he is not authenticated he is treated as an intruder. Next he is checked for the use of processes and if he is violating the allocated process uasage he is treated as a process level intruder. At the third level if the file transmissions are
188
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
crossing the fixed bytes of data he is treated as a packet level intruder.Adding to al these even when the user tries to access at a time which is not scheduled he will be treated as an intuder [19].
The results represent the intrusions detected at various levels of the security checks. For an invalid user or intruder the security checks are explicit. All the events of intrusions are alerted to the sytem administrator to his mobile phone to ensure that the intuder is blocked at the level at which he is detected ensuring security to the IDS.
189
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
From the above results it can be concluded that our proposed system is capable of detecting intrusions at various layers by using layered conditional random fields and when detected they will be first intimated to the system administrator at the server side so that necessary actions can be taken. The particular intruder will be denied of access thereby indicating that the intruder is blocked at a particular level.
5. CONCLUSIONS
As security incidents become more numerous, IDS tools are becoming increasingly necessary. They round out the security factor, working in conjunction with other information security tools, such as firewalls, and allow for the complete supervision of all network activity. In our project we have implemented a system for building robust and efficient intrusion detection systems by implementing the layered conditional random fields using mobile phones. Ideally, the best IDS tools combine both approaches. That way, the user gets comprehensive coverage, making sure to guard against as many threats as possible. It is clear that using intrusion detection systems is an important and necessary tool in the security manager's arsenal. Our system addresses the problem of finding intruders effectively and blocking them as soon as they are detected. The Layered Approach is a signature based system and the Conditional Random Fields is an anomaly based system thus combining these both systems would result in a hybrid system. Taking a thread from the integrated approach we have established scheduled user login and successful communication with the system administrator through the mobile phones. Our system can help in identifying an attack once it is detected at a particular layer, which expedites the intrusion mechanism, thus minimizing the impact of an attack. Once the attack is detected, it is intimated through mobile phone to the system administrator for safe guarding the server system. This type of a system is very much suited in an organizational network. Finally,
190
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013
our system has the advantage that the number of layers can be increased or decreased depending upon the environment in which the system is deployed, giving flexibility to the network administrator.
ACKNOWLEDGEMENT
The authors sincerely thank the authorities of Supercomputer Education and Research Center, Indian Institute of Science for the encouragement and support.
REFERENCES
[1] [2] [3] Intrusion Detection Systems Basics. http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf PengNing and SushilJajodia,(2003) Intrusion Detection Techniques, in H. Bidgoli (Ed.), The Internet Encyclopedia, John Wiley & Sons. Harley Kozushko, (2003) Intrusion Detection: Host-Based and Network-Based Intrusion Detection Systems. http://infohost.nmt.edu/~sfs/Students/HarleyKozushko/Papers/IntrusionDetectionPaper.pdf SANS Institute, (2012) Intrusion Detection FAQ.http://www.sans.org/resources/idfaq/ E. Tombini, H. Debar, L. Me, and M. Ducasse, (2003) A Serial Comb ination of Anomaly and Misuse IDSes Applied to HTTP Traffic, Proc. 20th Annual Computer Security Applications Conference (ACSAC04), pp. 428-437. Kapil Kumar Gupta, BaikunthNath, KotagiriRamamohanarao, (2010)Conditional Random Fields for IntrusionDetection,Proc. IEEE dependable and secure computing . McHugh, John, (2001) "Intrusion and Intrusion Detection", Technical Report, CERT Coordination Center,Software Engineering Institute, Carnegie Mellon University. J. P. Anderson, (2010) Computer Security Threat Monitoring and Surveillance, http://csrc.nist.gov/ publications/history/ande80.pdf Y.-S. Wu, B. Foo, Y. Mei, and S. Bagchi, (2003)Collaborative Intrusion Detection System (CIDS): AFramework for Accurate and Efficient IDS, Proc. 19th Ann. Computer Security Applications Conf. (ACSAC 03), pp. 234-244. R. Agrawal, T. Imielinski, and A. Swami, (1993)Mining Association Rules between Sets of Items in Large Databases, Proc. ACM SIGMOD, vol. 22, no. 2, pp. 207 -216. K.K. Gupta, B. Nath, and R. Kotagiri, (2006)Network Security Framework, Intl J. Computer Science and Network Security, vol. 6, no. 7B,pp. 151-157. K.K.Gupta, (2009)Robust and Efficient Intrusion Detection Systems, ww2.cs.mu.oz.au/~kgupta/files/phd-completion.pdf Kapil Kumar Gupta, BaikunthNath, RamamohanaraoKotagiri, (2010) Layered Approach Using Conditional Random Fields for Intrusion Detection, Proc. IEEE dependable and secure computi ng. N.B. Amor, S. Benferhat, and Z. Elouedi, (2004)Naive Bayes vs.Decision Trees in Intrusion Detection Systems, Proc. ACM Symp.Applied Computing (SAC 04), pp. 420 -424. T. Abraham, (2008)IDDM: Intrusion Detection Using Data Mining Techniques. http://www.dsto.defence./gov.au/publications/2345/DSTO-GD-0286.pdf C. Sutton and A. McCallum, (2006) An Introd uction to Conditional Random Fields for RelationalLearning, Introduction to Statistical Relational Learning, Edited by LiseGetoor and Ben Taskar,Published by The MIT Press. SANS Institute, (2001) Understanding Intrusion Detection Systems, SANS Institute. http://www.sans.org/reading_room/whitepapers/detection/understanding-intrusiondetectionsystems 191
[4] [5]
[17]
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.2, March 2013 [18] Rebecca Bace, An Introduction to Intrusion Detection and Assessment for System and Network Security Management, ICSA, Inc. http://www.icsalabs.com/icsa/docs/html/communities/ids/whitepaper/Intrusion1.pdf Arpitha M, Geetha V, Gowranga K H and Bhakthavathsalam R, (2013) Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones, Lecture Notes in Electrical Engineering 131, Springer Science,NY, pp 537-549. http://www.springer.com/engineering/signals/book/978-1-4614-6153-1
[19]
AUTHORS
Arpitha M has obtained her B.E. degree from the Dept of Information Science and Engineering, Alpha College of Engineering affiliated to Visvesvaraya Technological University. She has successfully completed her final semester project at IISc. She has presented a paper at the NetCom2012 conference. Her interests are Wireless Technology and Network Security. Geetha V has obtained her B.E. degree from the Dept of Information Science and Engineering, Alpha College of Engineering, Bangalore affiliated to Visvesvaraya Technological University. She has successfully completed her final semester project at IISc. She has published a paper in the NCS-2012 conference. Her interests are Network Security & Mobile Communication. Mr.Gowranga K H is currently working as a Scientific Assistant in Supercomputer Education and Research Center, IISc, Bangalore. His research interests include Wireless Networks, Webmail Systems, and Digital Communication. Dr.Bhakthavathsalam R is presently working as a Senior Scientific Officer in SERC, IISc, Bangalore. His areas of interests are Electromagnetics, Wireless Networks and Pervasive Computing and Communication. He is a Member of ACM and CSI.
192