1 / 87

Anomaly Detection Systems

Anomaly Detection Systems. Contents. Statistical methods Systems with learning Clustering in anomaly detection systems. Anomaly detection.

efuru
Télécharger la présentation

Anomaly Detection Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Anomaly Detection Systems

  2. Contents • Statistical methods • Systems with learning • Clustering in anomaly detection systems

  3. Anomaly detection • Anomaly detection involves a process of establishing profiles of normal behaviour, comparing actual user/network behaviour to those profiles, and flagging deviations from the normal. • The basis of anomaly detection is the assertion that abnormal behaviour patterns indicate misuse of systems.

  4. Anomaly detection • Profiles are defined as sets of metrics. Metrics are measures of particular aspects of user behaviour. • Each metric is associated with a threshold or range of values.

  5. Anomaly detection • Anomaly detection depends on an assumption that users exhibit predictable, consistent patterns of system usage. • The approach also accommodates adaptations to changes in user behaviour over time.

  6. Anomaly detection • The completeness of anomaly detection has yet to be verified (no one knows whether any given set of metrics is rich enough to express all anomalous behaviour).

  7. Statistical methods • Parametric methods • Analytical approaches in which assumptions are made about the underlying distribution of the data being analyzed. • The usual assumption is that the distributions of usage patterns are Gaussian: x0 – mean  - standard deviation

  8. Statistical methods • Non-parametric methods • Involve nonparametric data classification techniques - cluster analysis.

  9. Statistical methods • The Denning’s model (the IDES model for intrusion). • Four statistical models may be included in the system: • Operational model • Mean and standard deviation model • Multivariate model • Markov process model. • Each model is suitable for a particular type of system metric.

  10. Statistical methods • Operational model • This model applies to metrics such as event counters for the number of password failures in a particular time interval. • The model compares the metric to a set threshold, triggering an anomaly when the metric exceeds the threshold value.

  11. Statistical methods • Mean and standard deviation model • A classical mean and standard deviation characterization of data. • The assumption is that all the analyzer knows about system behaviour metrics are the mean and standard deviations.

  12. Statistical methods • Mean and standard deviation model (cont.) • A new behaviour observation is defined to be abnormal if it falls outside a confidence interval. • This confidence interval is defined as d standard deviations from the mean for some parameter d (usually d=3).

  13. Statistical methods • Mean and standard deviation model (cont.) • This characterization is applicable to event counters, interval timers, and resource measures (memory, CPU, etc.) • It is possible to assign weights to these computations, such that more recent data are assigned greater weights.

  14. Statistical methods • Multivariate model • This is an extension to the mean and standard deviation model. • It is based on performing correlations among two or more metrics. • Instead of basing the detection of an anomaly strictly on one measure, one might base it on the correlation of that measure with another measure.

  15. Statistical methods • Multivariate model (cont.) • Example: • Instead of detecting an anomaly based solely on the observed length of a session, one might base it on the correlation of the length of the session with the number of CPU cycles utilized.

  16. Statistical methods • Markov process model • Under this model, the detector considers each different type of audit event as a state variable and uses a state transition matrix to characterize the transition frequencies between states (not the frequencies of the individual states/audit records).

  17. Statistical methods • Markov process model (cont.) • A new observation is defined as anomalous if its probability, as determined by the previous state and value in the state transition matrix, is too low/high. • This allows the detector to spot unusual command or event sequences, not just single events. • This introduces the notion of performing stateful analysis of event streams (frequent episodes, etc.)

  18. Statistical methods • Markov process model (cont.) • Example - NIDES (Next-generation Intrusion Detection Expert System) • Developed by SRI (Stanford Research Institute) in 1990s. • Measures various activity levels. • Combines these into a single “normality” measure. • Checks this against a threshold. • If the measure is above the threshold, the activity is considered abnormal.

  19. Statistical methods • Markov process model (cont.) • Example - NIDES (cont.) • NIDES measures • Intensity measures • An example would be the number of audit records (log entries) generated within a set time interval. • Several different time intervals are used in order to track short-, medium-, and long-term behaviour.

  20. Statistical methods • Markov process model (cont.) • Example - NIDES (cont.) • NIDES measures (cont.) • Distribution measures • The overall distribution of the various audit records (log file entries) is tracked via histograms. • A difference measure is defined to determine how close a given short-term histogram is to “normal” behaviour.

  21. Statistical methods • Markov process model (cont.) • Example - NIDES (cont.) • NIDES measures (cont.) • Categorical data • The names of files accessed or the names of remote computers accessed are examples of categorical data used.

  22. Statistical methods • Markov process model (cont.) • Example - NIDES (cont.) • NIDES measures (cont.) • Counting measures • These are numerical values that measure parameters such as the number of seconds of CPU time used. • They are generally taken over a fixed amount of time or over a specific event, such as a single login. • Thus, they are similar in character to intensity measures, although they measure a different kind of activity.

  23. Statistical methods • Markov process model (cont.) • Example - NIDES (cont.) • The different measurements each define a statistic Sj . • These measurements are assumed (constructed to be) appropriate (this includes normalization), and are combined to produce a 2-like statistic:

  24. Statistical methods • Markov process model (cont.) • Example - NIDES (cont.) • A more complicated measure would include the correlation between the events (as was done with IDES): • Here, C is the correlation matrix between Si and Sj for all i and j. IS is called the IDES score.

  25. Statistical methods • Markov process model (cont.) • Example - NIDES (cont.) • NIDES compares recent activity with past activity, using a methodology that amounts to a sliding window on the past. • Thus it is designed to detect changes in activity and to adapt to new activity levels.

  26. Statistical methods • Markov process model (cont.) • Example - NIDES (cont.) • NIDES intensity measures are counts of audit records per time unit etc. • This provides an overall activity level for the system. • These are updated continuously rather than recomputed at each time interval.

  27. Statistical methods • Markov process model (cont.) • Example - NIDES (cont.) • Possible elements that can be monitored with this basic idea: • Average system load. • Number of active processes. • Number of E-mails received. • Different types of audit records (can be tracked separately).

  28. Statistical methods • Markov process model (cont.) • Example - NIDES (cont.) • The obvious extension of the intensity measures idea is to track the different types of audit records. • This leads to a distribution (histogram) for the audit records. • Similarly, one could track the sizes of E-mail messages received, or the types of files accessed. • These can be updated continuously. • Distributions are then compared by means of a squared error metric.

  29. Statistical methods • Markov process model (cont.) • Example - NIDES (cont.) • Categorical measures can be for example the names of files accessed. • They are treated just like distributional measures. • Now each bin corresponds to a categorical, while with distributional measures the bin can correspond to a range of values. • The updates are still done continuously.

  30. Statistical methods • Markov process model (cont.) • Example - NIDES (cont.) • All the measures are combined into the T2 statistic. • The value is compared with a threshold to determine if the activity is “abnormal”. • The threshold is usually set empirically, based on the observed network behaviour in some period of time.

  31. Statistical methods • Markov process model (cont.) • Example - NIDES (cont.) • NIDES produces a single, overall measure of “normality”, which could allow further investigation into the components that make up the statistic upon an alert. • The problem with this is that an unusually low value for one statistic can mask a high one for another – multifaceted measures are more useful.

  32. Statistical methods • Advantages of parametric approach • Statistical anomaly detection could reveal interesting, sometimes suspicious, activities that could lead to discoveries of security breaches.

  33. Statistical methods • Advantages of parametric approach (cont.) • Parametric statistical systems do not require the constant updates and maintenance that misuse detection systems do. • However, metrics must be well chosen, adequate for good discrimination, and well-adapted to changes in behaviour (that is, changes in user behaviour must produce a consistent, noticeable change in the corresponding metrics).

  34. Statistical methods • Disadvantages of parametric approach • Batch mode processing of audit records, which eliminates the capability to perform automated responses to block damage. • Although more recent systems attempt to perform real-time analysis of audit data, the memory and processing loads involved in using and maintaining the user profile knowledge base usually cause the system to lag behind audit record generation.

  35. Statistical methods • Disadvantages of parametric approach (cont.) • The nature of statistical analysis reduces the capability of taking into account the sequential relationships between events. • The exact order of the occurrence of events is not provided as an attribute in most of these systems.

  36. Statistical methods • Disadvantages of parametric approach (cont.) • Because many anomalies indicating attack depend on such sequential event relationships, this situation represents a serious limitation to the approach. • In cases when quantitative methods (Denning's operational model) are utilized, it is also difficult to select appropriate values for thresholds and ranges.

  37. Statistical methods • Disadvantages of parametric approach (cont.) • The false positive rates associated with statistical analysis systems are high, which sometimes leads to users ignoring or disabling the systems. • The false negative rates are also difficult to reduce in these systems.

  38. Statistical methods • Nonparametric measures • One of the problems of parametric methods is that error rates are high when the assumptions about the distribution are incorrect.

  39. Statistical methods • Nonparametric measures (cont.) • When researchers began collecting information about system usage patterns that included attributes such as system resource usage, the distributions were discovered not to be normal. • Then, including normal distribution assumption into the measures led to high error rates.

  40. Statistical methods • Nonparametric measures (cont.) • A way of overcoming these problems is to utilize nonparametric techniques for performing anomaly detection. • This approach provides the capability of accommodating users with less predictable usage patterns and allows the analyzer to take into account system measures that are not easily accommodated by parametric schemes.

  41. Statistical methods • Nonparametric measures (cont.) • The nonparametric approach involves nonparametric data classification techniques, specifically cluster analysis. • In cluster analysis, large quantities of historical data are collected (a sample set) and organized into clusters according to some evaluation criteria.

  42. Statistical methods • Nonparametric measures (cont.) • Preprocessing is performed in which features associated with a particular event stream (often mapped to a specific user) are converted into a vector representation (for example, Xi = [f1, f2, ..., fn] in an n-dimensional state).

  43. Statistical methods • Nonparametric measures (cont.) • A clustering algorithm is used to group vectors into classes by behaviours, attempting to group them so that members of each class are as close as possible to each other while different classes are as far apart as they can be.

  44. Statistical methods • Nonparametric measures (cont.) • In nonparametric statistical anomaly detection, the premise is that a user's activity data, as expressed in terms of the features, falls into two distinct clusters: one indicating anomalous activity and the other indicating normal activity.

  45. Statistical methods • Nonparametric measures (cont.) • Various clustering algorithms are available. These range from algorithms that use simple distance measures to determine whether an object falls into a cluster, to more complex concept-based measures (in which an object is "scored“ according to a set of conditions and that score is used to determine membership in a particular cluster) . • Different clustering algorithms usually best serve different data sets and analysis goals.

  46. Statistical methods • Nonparametric measures (cont.) • The advantages of nonparametric approaches include the capability of performing reliable reduction of event data (in the transformation of raw event data to vectors). • This effect may reach as high as two orders of magnitude compared to the classical approach that does not include vectors.

  47. Statistical methods • Nonparametric measures (cont.) • Other benefits are improvement in the speed of detection and improvement in accuracy over parametric statistical analysis. • Disadvantages involve concerns that expanding features beyond resource usage would reduce the efficiency and the accuracy of the analysis.

  48. Systems with learning • Two phases of system operation: • The learning phase, in which the system is taught what a normal behaviour is. • The recognition phase, in which the system classifies the input vectors according to the knowledge acquired in the learning process. • These systems also include a conversion of raw data into feature vectors.

  49. Systems with learning • Example: Neural networks • Neural networks use adaptive learning techniques to characterize anomalous behaviour. • This analysis technique operates on historical sets of training data, which are presumably cleansed of any data indicating intrusions or other undesirable user behaviour.

  50. Systems with learning • Example: Neural networks (cont.) • Neural networks consist of numerous simple processing elements called neurons that interact by using weighted connections. • The knowledge of a neural network is encoded in the structure of the net in terms of connections between units and their weights. • The actual learning process takes place by changing weights and adding or removing connections.

More Related