Top Banner
Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC Seminar April 05, 2016 Atul Bohara and Uttam Thakore PI: Bill Sanders 1
41

Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

May 31, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Intrusion Detection by Combining and Clustering

Diverse Monitor DataTSS/ACC Seminar

April 05, 2016

Atul Bohara and Uttam Thakore

PI: Bill Sanders

1

Page 2: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Outline

• Motivation

• Overview of the approach

• Feature extraction and selection

• Clustering

• Intrusion detection

• Results

• Future directions

2

Page 3: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Motivation

• Monitoring in enterprise systems is extremely diverse and verbose

3

Page 4: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Motivation

• Monitoring in enterprise systems is extremely diverse and verbose

Image: http://blog.bro.org/2012/01/monster-logs.html

Image: http://blog.wildpackets.com/2008/10/28/simplify_analysis_-

_packet-based_traffic_netflow_statistics_in_one_ui.html4

Page 5: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Motivation

• Monitoring in enterprise systems is extremely diverse and verbose

Image: http://blog.bro.org/2012/01/monster-logs.html

Image: http://blog.wildpackets.com/2008/10/28/simplify_analysis_-

_packet-based_traffic_netflow_statistics_in_one_ui.html

Problems:

• High false positive rate and verbosity

• Limited ability to combine and analyze

heterogeneous data together

• Require significant input from system

expert

5

Page 6: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Our Contributions

• We fuse data from the host-level and network-level context to perform anomaly detection

• We use unsupervised clustering to identify usage behavior patterns in the data and detect anomalous behavior

• We find attacks that are undetectable with individual monitors alone

6

Page 7: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Overview of Approach

System Logs

Firewall Logs

Feature

Extraction

Feature

Selection &

Fusion

Cluster

Analysis

Intrusion

Detection

Data

Sources

7

Page 8: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Data Sources

System Logs

Firewall Logs

8

Page 9: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Dataset Description

• VAST Challenge 2011, Mini Challenge 2 dataset [link]

• Small enterprise network

• Types of logs• Network-level:

• Firewall logs

• Snort IDS logs

• Host-level• Operating system security event logs

(system logs)

• Attacks were injected into the logs

Snort IDSFirewall logs

OS security event

logs

9

Page 10: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Threat Model

Network flooding attacks• Distributed Denial of Service

(DDoS) from Internet

• Port scan from external host

• Port scan from workstations

Behavior-changing malware• Worm installed on workstations

10

Page 11: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Feature Extraction

System Logs

Firewall Logs

11

Page 12: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Feature Extraction

Four types of features:• Identification – IP address and timestamp

• Network traffic-based – source/destination IP addresses and ports, TCP connections

• Service-based – connections to different types of servers, e.g., DNS, database, web

• Authentication-based – significant authentication events from system logs

Aggregated into one-minute time intervals

12

Page 13: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Features Extracted

Example System Log Features Example Firewall Log Features

13

Features in orange are identification features.

• IP address

• Timestamp

• # failed logon events from this host (4625)

• # special privileges assignment to new logon (4672)

• # target domain name = NT AUTHORITY

• # remote interactive logons (logon type = 10)

• # NTLM authentications/logons

• # distinct subject logon IDs

• IP address

• Timestamp

• # of unique destination IPs

• # of unique source ports

• # of connections built

• # of accesses to DNS server IPs

• # of accesses to database IPs

Page 14: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Feature Selection & Fusion

System Logs

Firewall Logs

14

Page 15: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Feature Selection

• Not all features are equal!• Some are correlated

• E.g., number of NTLM authentications and number of authentication attempts with host name starting with “WS”

• Some are not useful for clustering• E.g., number of successful logon events

• High dimensionality problem

• Techniques for feature selection:• Pearson correlation coefficient to remove strongly

correlated features• Compare normalized average feature value across

clusters

System log feature distributions

Firewall log feature distributions

15

Page 16: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Features Extracted

System Log Features

Total number of features 36

Number of identification

features

2

Number of service-based

features

2

Number of authentication-

based features

32

Firewall Log Features

16

Total number of features 17

Number of identification

features

2

Number of network traffic-based

features

6

Number of service-based

features

9

Total number of features

after selection

20 Total number of features

after selection

12

Page 17: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Fusion

We fuse the logs using inner join on identification features

Identification Network traffic-basedService-based Authentication-based

Fused feature vector

Syslog feature vectorFirewall feature vector

17

Page 18: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Cluster Analysis

System Logs

Firewall Logs

18

Page 19: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Clustering Techniques

• Apply k-means and DBSCAN clustering algorithms

19

Algorithm Type Cluster shape Noise

handling

Parameter

selection

k-means Centroid based Spherical

clusters

No WCSD,

Silhouettes

DBSCAN Density based Arbitrary

shaped clusters

Yes k-dist graph

Page 20: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Cluster Analysis

20

0

0.2

1.5

0.4

0.6

PC

3

0.8

1

PC2

0.80.5 0.6

PC1

0.40.2

0 0

Outliers : 80

Cluster1 : 14876

Cluster2 : 11825

Cluster3 : 810

Cluster4 : 3009

Cluster5 : 20

Cluster6 : 53

Cluster7 : 84

DBSCAN Clustering on Firewall Logs

Page 21: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Cluster Analysis

0

0.2

1.5

0.4

0.6

PC

3

0.8

1

PC2

0.80.5 0.6

PC1

0.40.2

0 0

Outliers : 80

Cluster1 : 14876

Cluster2 : 11825

Cluster3 : 810

Cluster4 : 3009

Cluster5 : 20

Cluster6 : 53

Cluster7 : 84

DBSCAN Clustering on Firewall Logs Normalized Average Feature Values

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 1

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 2

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 6

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 7

Page 22: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Cluster Analysis

22

0

0.2

0.8

0.4

0.5

0.6

PC

3

0.6

PC1PC2

0.8

0.4 00.2

0 -0.5

Outliers : 80Cluster1 : 25342Cluster2 : 54Cluster3 : 37Cluster4 : 23

DBSCAN Clustering on Firewall + System Logs

Page 23: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Cluster Analysis

0

0.2

0.8

0.4

0.5

0.6

PC

3

0.6

PC1PC2

0.8

0.4 00.2

0 -0.5

Outliers : 80Cluster1 : 25342Cluster2 : 54Cluster3 : 37Cluster4 : 23

DBSCAN Clustering on Firewall + System Logs Normalized Average Feature Values

1 3 5 7 9 11 13 15 17 19 21 23 25 27

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

vera

ge

va

lue

Cluster 1

1 3 5 7 9 11 13 15 17 19 21 23 25 27

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

vera

ge

va

lue

Cluster 2

1 3 5 7 9 11 13 15 17 19 21 23 25 27

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

vera

ge

valu

e

Cluster 3

1 3 5 7 9 11 13 15 17 19 21 23 25 27

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

vera

ge

valu

e

Cluster 4

Page 24: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Intrusion Detection

System Logs

Firewall Logs

24

Page 25: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Intrusion Detection Approach

• More than 80% data points are captured with in 3 clusters

• These clusters contained more than 50% hosts

• Features have high probability mass at low values

25

Page 26: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Intrusion Detection Approach

• More than 80% data points are captured with in 3 clusters

• These clusters contained more than 50% hosts

• Features have high probability mass at low values

Our approach: Examine the size and distribution of hosts for each clusters

26

Page 27: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Intrusion Detection Approach (contd.)

27

Clusters

Page 28: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Intrusion Detection Approach (contd.)

28

Normal or Anomalous

Page 29: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Intrusion Detection Approach (contd.)

29

Normal or Anomalous Feature Distributions

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 1

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 2

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lized

ave

rag

e v

alu

e

Cluster 6

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lized

ave

rag

e v

alu

e

Cluster 7

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 1

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 2

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1N

orm

aliz

ed a

ve

rag

e v

alu

e

Cluster 6

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 7

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 1

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 2

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 6

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 7

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1N

orm

aliz

ed

ave

rag

e v

alu

e

Cluster 1

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

Norm

aliz

ed

ave

rag

e v

alu

e

Cluster 2

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 6

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 7

Page 30: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Intrusion Detection Approach (contd.)

30

Normal or Anomalous Feature Distributions Distances

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 1

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 2

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lized

ave

rag

e v

alu

e

Cluster 6

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lized

ave

rag

e v

alu

e

Cluster 7

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 1

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 2

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1N

orm

aliz

ed a

ve

rag

e v

alu

e

Cluster 6

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 7

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 1

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 2

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 6

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 7

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1N

orm

aliz

ed

ave

rag

e v

alu

e

Cluster 1

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

Norm

aliz

ed

ave

rag

e v

alu

e

Cluster 2

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 6

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 7

Page 31: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Intrusion Detection Approach (contd.)

31

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 1

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 2

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lized

ave

rag

e v

alu

e

Cluster 6

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lized

ave

rag

e v

alu

e

Cluster 7

Normal or Anomalous Feature Distributions Distances Normalcy

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 1

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 2

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1N

orm

aliz

ed a

ve

rag

e v

alu

e

Cluster 6

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 7

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 1

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 2

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 6

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 7

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1N

orm

aliz

ed

ave

rag

e v

alu

e

Cluster 1

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

Norm

aliz

ed

ave

rag

e v

alu

e

Cluster 2

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 6

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 7

Page 32: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Intrusion Detection Results: Firewall Logs

0

0.2

1.5

0.4

0.6

PC

3

0.8

1

PC2

0.80.5 0.6

PC1

0.40.2

0 0

Outliers : 80

Cluster1 : 14876

Cluster2 : 11825

Cluster3 : 810

Cluster4 : 3009

Cluster5 : 20

Cluster6 : 53

Cluster7 : 84 Cluster 6: DoS by external hosts

Anomalous clusters: Clusters 6,5,3,4,7

32

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 1

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 2

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 6

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 7

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 1

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 2

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1N

orm

aliz

ed

ave

rag

e v

alu

eCluster 6

1 2 3 4 5 6 7 8 9 10

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

ve

rag

e v

alu

e

Cluster 7

Page 33: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Intrusion Detection Results: Firewall Logs

0

0.2

1.5

0.4

0.6

PC

3

0.8

1

PC2

0.80.5 0.6

PC1

0.40.2

0 0

Outliers : 80

Cluster1 : 14876

Cluster2 : 11825

Cluster3 : 810

Cluster4 : 3009

Cluster5 : 20

Cluster6 : 53

Cluster7 : 84

Cluster 5: Port scan by internal hosts

Cluster 6: DoS by external hosts

Cluster 3, 4, 7: Anomalous but not malicious

Anomalous clusters: Clusters 6,5,3,4,7

33

Page 34: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Intrusion Detection Results: Firewall + System Logs

0

0.2

0.8

0.4

0.5

0.6

PC

3

0.6

PC1PC2

0.8

0.4 00.2

0 -0.5

Outliers : 80Cluster1 : 25342Cluster2 : 54Cluster3 : 37Cluster4 : 23

Cluster 2: Worm infected host

Anomalous clusters: Clusters 2,4,3

34

1 3 5 7 9 11 13 15 17 19 21 23 25 27

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

vera

ge

va

lue

Cluster 1

1 3 5 7 9 11 13 15 17 19 21 23 25 27

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

vera

ge

va

lue

Cluster 2

1 3 5 7 9 11 13 15 17 19 21 23 25 27

Features

0

0.2

0.4

0.6

0.8

1N

orm

aliz

ed

avera

ge

valu

e

Cluster 3

1 3 5 7 9 11 13 15 17 19 21 23 25 27

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

vera

ge

valu

e

Cluster 4

1 3 5 7 9 11 13 15 17 19 21 23 25 27

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

vera

ge

va

lue

Cluster 1

1 3 5 7 9 11 13 15 17 19 21 23 25 27

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

vera

ge

va

lue

Cluster 2

1 3 5 7 9 11 13 15 17 19 21 23 25 27

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

vera

ge

valu

e

Cluster 3

1 3 5 7 9 11 13 15 17 19 21 23 25 27

Features

0

0.2

0.4

0.6

0.8

1

No

rma

lize

d a

vera

ge

valu

e

Cluster 4

Page 35: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Intrusion Detection Results: Firewall + System Logs

0

0.2

0.8

0.4

0.5

0.6

PC

3

0.6

PC1PC2

0.8

0.4 00.2

0 -0.5

Outliers : 80Cluster1 : 25342Cluster2 : 54Cluster3 : 37Cluster4 : 23

Cluster 2: Worm infected host

Cluster 3: Anomalous but not malicious

Cluster 4: Port scan by internal hosts

Anomalous clusters: Clusters 2,4,3

35

Page 36: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Intrusion Detection Summary

Cluster

ID

% Data

points

No. of Unique

hosts

Represented

Attack

Significant features

Firewall data

6 0.172 5 DoS # of unique source ports, # of connections

built, # of connections torn down

5 0.065 3 Port scan # of unique destination IPs

Firewall + System log data

4 0.090 2 Port scan # of connections built, # of connections torn

down

2 0.211 1 Worm # anonymous target user names, # NTLM

authentications, # session keys requested

36

Page 37: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Conclusion

• Intrusion detection using clustering techniques• Without labelling the data

• Without explicit profile for normal behavior

• Generic time-aware features to detect malicious behavior• Can be used for other attack types, e.g., brute-force attacks and data

exfiltration

• Allow data fusion across monitors

• Additional visibility into the system behavior• Average feature values analysis

• More holistic view

• Data reduction

37

Page 38: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Discussion

• Works well for the attacks that change the system behavior, including zero-days

• Complementary to rule-based intrusion detection approaches

• Might not work properly for the attacks that do not change the outward behavior of hosts, such as privilege escalation• However, a better choice of features might change this for some attacks

38

Page 39: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Future Directions

• Attack classes and features• Classify security attacks and respective features to detect them

• Data-driven feature selection

• Clustering algorithm choice• Hierarchical clustering

• Distribution-based clustering

• Online classification• Online clustering

• Train classifier using cluster labels

39

Page 40: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Questions?

40

Page 41: Intrusion Detection by Combining and Clustering …assured-cloud-computing.illinois.edu/files/2016/01/...Intrusion Detection by Combining and Clustering Diverse Monitor Data TSS/ACC

Thank you!

41