340 likes | 445 Views
Packet Anomaly Intrusion Detection PAID. Constantine Manikopoulos and Zheng Zhang New Jersey Center for Wireless Networking and Security ( NJWINS ) at NJIT George Mason University September 24-26, 2003. The HIDE/PAID Project.
E N D
Packet Anomaly Intrusion Detection PAID Constantine Manikopoulos and Zheng Zhang New Jersey Center for Wireless Networking and Security (NJWINS) at NJIT George Mason University September 24-26, 2003
The HIDE/PAID Project NJWINS – US Army SBIR Phase II Research and Development Effort • Prototype and Evaluate an Intrusion Detection System for the Tactical Internet of the Digital Battlefield
System Architecture • Components • Probe • Event preprocessor • NN classifier • Post processor
PDF Representation • Binned PDF Representation • S be the sample space of a random variable • events E1, E2,…, Ek a mutually exclusive partition of S • Piis the expected probability of the occurrence of the event Ei • Pi’ be the frequency of the occurrence of Ei during a given time interval
Similarity Measuring Algorithms • 2-like test. • Kolmogorov-Smirnov test. • Anderson-Darling’s statistic. • Kupier’s statistic. • Others.
Similarity Measuring Algorithms • pi is the expected probability of event Ei. • Pi’ is the observed probability of event Ei during a time interval. • f(N) is a function that takes into account the total number of occurrences during a time window.
Reference Model Updating • Reference Model Updating Algorithm • pold is the reference model before updating • Pnew is the reference model after updating • is a programmable predefined adaptation rate s is a learning rate determined by the outputs of the neural network
Sample Visualization Attack traffic Normal
Data Description • DARPA’98 Intrusion Detection Evaluation Data Set • Seven weeks of training data • Two weeks of testing data (not used because the attack truth is not available) • Categories of the simulated attacks: DOS, Probe, R2L, U2R
System Configuration • Only Non-stealthy DOS attacks are tested: • Neptune (SYN flooding), • Pod (Ping-of-Death), • Smurf (ICMP flooding), • Teardrop (Pathetic IP Fragmentation) • PDF Observation Time Window: 30s. • Classifier: Backpropagation with 4 hidden neurons