Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/775047.775102acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
Article

Learning nonstationary models of normal network traffic for detecting novel attacks

Published: 23 July 2002 Publication History

Abstract

Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new attacks which do not have known signatures. In this paper we propose a learning algorithm that constructs models of normal behavior from attack-free network traffic. Behavior that deviates from the learned normal model signals possible novel attacks. Our IDS is unique in two respects. First, it is nonstationary, modeling probabilities based on the time since the last event rather than on average rate. This prevents alarm floods. Second, the IDS learns protocol vocabularies (at the data link through application layers) in order to detect unknown attacks that attempt to exploit implementation errors in poorly tested features of the target software. On the 1999 DARPA IDS evaluation data set [9], we detect 70 of 180 attacks (with 100 false alarms), about evenly divided between user behavioral anomalies (IP addresses and ports, as modeled by most other systems) and protocol anomalies. Because our methods are unconventional there is a significant non-overlap of our IDS with the original DARPA participants, which implies that they could be combined to increase coverage.

References

[1]
Anderson, Debra, Teresa F. Lunt, Harold Javitz, Ann Tamaru, Alfonso Valdes, "Detecting unusual program behavior using the statistical component of the Next-generation Intrusion Detection Expert System (NIDES)", Computer Science Laboratory SRI-CSL 95--06 May 1995. http://www.srl.sfi.com/papers/5/s/5sri/5sri.pdf]]
[2]
Bell, Timothy, Ian H. Witten, John G. Cleary, "Modeling for Text Compression", ACM Computing Surveys (21)4, pp. 557--591, Dec. 1989.]]
[3]
Barbará, D., N. Wu, S. Jajodia, "Detecting Novel Network Intrusions using Bayes Estimators", First SIAM International Conference on Data Mining, 2001, http://www.siam.org/meetings/sdm01/pdf/sdm01_29.pdf]]
[4]
Floyd, S. and V. Paxson, "Difficulties in Simulating the Internet." IEEE/ACM Transactions on Networking Vol. 9, no. 4, pp. 392--403, Aug. 2001. http://www.icir.org/vern/papers.html]]
[5]
Forrest, S., S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A Sense of Self for Unix Processes", Proceedings of 1996 IEEE Symposium on Computer Security and Privacy. ftp://ftp.cs.unm.edu/pub/forrest/ieee-sp-96-unix.pdf]]
[6]
Ghosh, A.K., A. Schwartzbard, M. Schatz, "Learning Program Behavior Profiles for Intrusion Detection", Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring, April 9--12, 1999, Santa Clara, CA. http://www.cigital.com/~anup/usenix_id99.pdf]]
[7]
M. Handley, C. Kreibich and V. Paxson, "Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics", Proc. USENIX Security Symposium, 2001.]]
[8]
Kendall, Kristopher, "A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems", Masters Thesis, MIT, 1999.]]
[9]
Lippmann, R., et al., "The 1999 DARPA Off-Line Intrusion Detection Evaluation", Computer Networks 34(4) 579--595, 2000.]]
[10]
Mahoney, M., P. K. Chan, "PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic", Florida Tech. technical report 2001--04, http://cs.fit.edu/~tr/]]
[11]
Neumann, P., and P. Porras, "Experience with EMERALD to DATE", Proceedings 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, April 1999, 73--80, http://www.csl.sri.com/neumann/det99.html]]
[12]
Paxson, Vern, "Bro: A System for Detecting Network Intruders in Real-Time", Lawrence Berkeley National Laboratory Proceedings, 7'th USENIX Security Symposium, Jan. 26--29, 1998, San Antonio TX, http://www.usenix.org/publications/library/proceedings/sec98/paxson.html]]
[13]
Paxson, Vern, and Sally Floyd, "The Failure of Poisson Modeling", IEEE/ACM Transactions on Networking (3) 226--244, 1995.]]
[14]
Ptacek, Thomas H., and Timothy N. Newsham, "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection", January, 1998, http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html]]
[15]
Roesch, Martin, "Snort - Lightweight Intrusion Detection for Networks", Proc. USENIX Lisa '99, Seattle: Nov. 7--12, 1999.]]
[16]
Sasha/Beetle, "A Strict Anomaly Detection Model for IDS", Phrack 56(11), 2000, http://www.phrack.org]]
[17]
Sekar, R., M. Bendre, D. Dhurjati, P. Bollineni, "A Fast Automaton-based Method for Detecting Anomalous Program Behaviors". Proceedings of the 2001 IEEE Symposium on Security and Privacy.]]
[18]
SPADE, Silicon Defense, http://www.silicondefense.com/software/spice/]]

Cited By

View all
  • (2024)Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection SystemsSensors10.3390/s2402047924:2(479)Online publication date: 12-Jan-2024
  • (2024)Outlier Detection Using a GPU-Based Parallel Algorithm: Quantum ClusteringInternational Journal on Artificial Intelligence Tools10.1142/S021821302350077X33:04Online publication date: 30-May-2024
  • (2024)Anomaly Detection Integration-Framework for Network Services in Computer Education SystemsInternational Journal of Pattern Recognition and Artificial Intelligence10.1142/S021800142451014538:09Online publication date: 29-Jun-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
KDD '02: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
July 2002
719 pages
ISBN:158113567X
DOI:10.1145/775047
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 July 2002

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

KDD02
Sponsor:

Acceptance Rates

KDD '02 Paper Acceptance Rate 44 of 307 submissions, 14%;
Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)25
  • Downloads (Last 6 weeks)2
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection SystemsSensors10.3390/s2402047924:2(479)Online publication date: 12-Jan-2024
  • (2024)Outlier Detection Using a GPU-Based Parallel Algorithm: Quantum ClusteringInternational Journal on Artificial Intelligence Tools10.1142/S021821302350077X33:04Online publication date: 30-May-2024
  • (2024)Anomaly Detection Integration-Framework for Network Services in Computer Education SystemsInternational Journal of Pattern Recognition and Artificial Intelligence10.1142/S021800142451014538:09Online publication date: 29-Jun-2024
  • (2023)Investigation of LSSVM and RBFNN-based Techniques for Intrusion Detection Systems for IoT Networks2023 International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS)10.1109/ICSSAS57918.2023.10331782(1306-1311)Online publication date: 18-Oct-2023
  • (2022)A Hybrid Clustering Approach Based on Fuzzy Logic and Evolutionary Computation for Anomaly DetectionAlgorithms10.3390/a1510034215:10(342)Online publication date: 22-Sep-2022
  • (2022)Research on Web Application Anomaly Intrusion Detection Model Based On Massive Logs2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)10.1109/ICNISC57059.2022.00010(6-10)Online publication date: Sep-2022
  • (2021)An AETA Geoacoustic Signal Anomaly Detection Method Based on FindCBLOFProceedings of the 4th International Conference on Information Science and Systems10.1145/3459955.3460605(90-96)Online publication date: 17-Mar-2021
  • (2021)Intelligent Security of Computer NetworksIntelligent Network Management and Control10.1002/9781119817840.ch1(1-24)Online publication date: 26-Mar-2021
  • (2020)Machine Learning Applications in Misuse and Anomaly DetectionEthics, Laws, and Policies for Privacy, Security, and Liability [Working Title]10.5772/intechopen.92653Online publication date: 19-Jun-2020
  • (2020)Introductory Chapter: Machine Learning in Misuse and Anomaly DetectionComputer and Network Security10.5772/intechopen.92168Online publication date: 10-Jun-2020
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media