-
Notifications
You must be signed in to change notification settings - Fork 0
/
ids-fusion.tex
285 lines (268 loc) · 13.9 KB
/
ids-fusion.tex
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
\section{Intrusion detection fusion}
\label{sec:ids-fusion}
% \longidses ({\idses}) are systems that sense intrusions in computer networks and
% hosts.
{\ids} fusion % \footnote{In the computer security community, this process is often called ``\ids
% correlation,'' but we prefer ``fusion'' as it more accurately describes the
% process, and doesn't collide with statistical terminology.
% Indeed, in some cases the term ``\ids correlation'' is not used to describe an
% automated process, but rather a human-executed process of investigating an
% \ids-generated alert~\cite[e.g.]{drew14:_what_role_secur_event_correl_intrus_detec}.}
is the
problem of creating a
coherent overall picture of network status out of reports from multiple
{\idses} scattered around a computer network. % we wish to defend.
An \ids fusion system must answer two questions:
\begin{compactenum}
\item How do the reports issued by the \idses correspond to events? Multiple
reports, from the same \ids or from different \idses, might
actually refer to the same event. This is the problem of \emph{clustering}
reports into events.
\item Which hypothesized events do we accept as actual? This is the problem of
\emph{assessing} the likelihood of event hypotheses.
\end{compactenum}
Goldman and Harp discuss the first of these two
questions~\shortcite{goldman:09Scyllarus}. In this paper we will
focus on the second question, assuming a solution to the first.
Existing \idses are not designed to work together as part of a
suite of sensors. Instead, each program generates a separate,
often voluminous, stream of reports; fusing them into a coherent
overview is left
% WONTFIX restore to QR15
%as an exercise for
to
the user.
Ideally, network administrators would have a suite of different \idses active,
since different \ids approaches
% WONTFIX restore to QR15
% --- network (NIDS) vs.\
% host-based (HIDS), signature vs.\ anomaly-based ---
bring different
strengths and weaknesses, and have different ``fields of view.'' For example, local
privilege escalation attacks may be invisible to a NIDS; HIDS systems are more
accurate for many purposes, but impose higher administrative burdens because
they must be scattered around the defended network, rather that centrally
deployed like NIDS. Signature-based IDSes provide fewer false positives, but
are more likely to be blind to zero-day attacks than anomaly-based systems.
%%
%% Hm, can we just get rid of the details NIDS/HIDS and
%% signature/anomaly comparisons, and keep just the takeaway? I don't
%% believe we refer to them after this.
%%
% Briefly, more accurate \idses have significantly higher software
% administration burdens, and there is an inevitable tradeoff between
% false positives and false negatives.
% This tradeoff applies for all of the different varieties of IDS,
% for example NIDS or HIDS, signature-based, anomaly-detecting, various
% hybrids.
% clarification relevant to [[file:todo.txt::*Review%203:%20Flavors%20of%20IDS][Review 3: Flavors of IDS]]
We will not discuss the varieties of \idses further here -- there is a
voluminous literature on them. The \emph{precise} nature of \ids weaknesses and
strengths is not critical to our investigation here, but the fact that there
\emph{are} such strengths and weaknesses is what motivates our information
fusion, and difficulties in modeling the events and sensors is what motivates
our use of qualitative methods.
%%
%%Some systems aim to overcome the limitations of existing \idses by assembling
%%a suite of
%%sensors. This can be a very efficient way to overcome the problem
%%of false positives, but relies crucially on finding sensors that fail
%%relatively independently.
%%
%%
%% NIDS systems are easy to deploy; from only one
%% or two locations, they can watch all relevant traffic. Unfortunately, they also have
%% substantial problems with false positives and false negatives, because they
%% don't ``know'' the meaning of the traffic they see. Often they must draw
%% conclusions based only on information in packet headers (although some
%% systems do attempt to reconstruct higher level protocols from packet data),
%% and more extensive reasoning about traffic either would slow down the
%% network, or must ignore some packets altogether.
%% A HIDS may take into account much more information about the state
%% of a defended system, but installing HIDS pervasively involves deploying and
%% configuring much more software. Typically HIDS are installed on only the most
%% critical assets.
%%
%% Signature-based systems attempt to match patterns of known bad behavior. Such
%% \idses are plagued by false negatives, both because of novel attacks for which
%% there are no patterns to match, and because of known %knowledgeable attackers take
%% countermeasures against signature identification (e.g.\ encrypting malware, or
%% permuting its structure). Anomaly detectors are prone to false
%% positives: anomalies are often benignly anomalous,
%% not maliciously so. Detectors often believe there is an
%% anomaly when none exists because computer usage patterns are
%% notoriously difficult to learn: they are often non-stationary, they vary
%% substantially from location-to-location, etc.
%% \draft{Add citations of papers on the challenges of anomaly detection.}
The most substantial challenge in managing \idses is the information overload
that they can impose.
Much of this overload comes from the high false positive rate. This rate is
partly due to
inaccurate sensors.
Another problem is the ``base rate fallacy''~\cite{Axelsson:1999:BFI:319709.319710}:
in intrusion detection, as in
other applications where very unlikely events must be detected, even a seemingly
accurate sensor may yield too many false positives. Axelsson gives the example
of a 99\% accurate test detecting a disease that strikes only 1/10,000
patients.
Although the sensor is accurate,
the probability of having the disease given a positive test result is
only 1\%.
% %% This next bit seem redundant.
%, although the probability of the sensor labeling correctly is 99\%.
% New paragraph to address
% [[file:todo.txt::*Review%201:%20learned%20or%20hand-made%20domains?][Review 1: learned or hand-made domains?]]
% and [[file:todo.txt::*Review%201:%20Hand-made%20vs.%20generated][Review 1: Hand-made vs. generated]]
Some of our reviewers expressed the concern that we would have difficulty
\emph{modeling} the rare events in \ids fusion. There are three
reasons when this problem does not
arise. One is that these attack events are not rare in the
world: they are rare with respect to our sampling rate. As we point out above,
if we are sampling individual packets, the probability of any attack is
vanishingly small, but that doesn't mean that attacks are rare at the
``macroscopic'' level. Second, our causal models are limited to models of
sensing and fusion, part/whole, and class/subclass relations. These models are
very simply generated by rules. Finally, the \ids developers provide us initial
ontologies of events implicitly with their rules. Our knowledge engineering
aims at smoothing inconsistencies between these implicit ontologies, and
extending causal models by identifying cases where \ids developers have
provided incorrect intuitions about the events their systems detect.
At any rate, this concern is not relevant to the evaluation of the uncertainty
calculus, which is our focus in this paper.
Users regularly ignore or disable their {\idses}, unable to absorb
massive streams of false alarms.
``Users attending an `ABCs of IDS' event at London's City University yesterday
said more the 80 per cent of the alerts they received were false, with one
citing 60 alerts he had received about non-existent problems that morning at
0300''~\cite{Register}.
Recently, Target is reported to have ignored warnings about the
data breach that resulted in theft of millions of credit
card records~\cite{TargetIgnoredIDS}:
``They are bombarded with alerts. They get so many that they just don't respond
to everything''~\cite{finkle14:_target}.
Figure
\ref{fig:workloadReduction} gives a sense of the gravity of this
problem. It shows how our earlier system was able to winnow
the
flow of reports in a small corporate network over a day of operation~\anoncite{goldman:09Scyllarus}.
% Data reduction must join building a comprehensive overview
% and overcoming false positives and negatives as goals of \ids fusion.
\begin{figure}[t]
\ifthenelse{\boolean{blackAndWhite}}{%
\includegraphics[width=.45\textwidth]{figures/funnel-dup-cropped.pdf} }{%
\includegraphics[width=.45\textwidth]{figures/funnel-dup-cropped.pdf}}
\centering
\caption{Scyllarus workload reduction%
% Squash citation here; cited in sentence referencing figure.
%~\anoncite{goldman:09Scyllarus}
.}
\label{fig:workloadReduction}
\end{figure}
% For example:
% \begin{quotation}
% Users attending an `ABCs of IDS' event \ldots
% %at London's City University yesterday
% said more the 80 per cent of the alerts they received were
% false, with one citing 60 alerts he had received \ldots
% %about non-existent problems
% that morning at 0300....
% %The concern is that
% [A]dopters \ldots
% %of the technology
% will \ldots %fail to maintain it or
% simply leave it to gather dust as overworked admins get bombarded with false alarms.~\cite{Register}
% \end{quotation}
% Often the most damning weakness of an IDS is a high false positive rate.
% In general, with any
% sensor, one must pay in false positives for whatever is gained in
% sensitivity.
%\footnote{Receiver operating characteristic (ROC)
%curves provide a way of assessing how
%well a particular sensor can provide true detections for a particular
%cost in false positives. The ROC curve is the curve one gets
%when plotting $p(\mbox{hit})$ vs $p(\mbox{false positive})$ as
%the detector's threshold is swept from its most conservative
%to most liberal settings~\cite{MacMillanCreelman:91}.}
% Data reduction, a comprehensive overview, and overcoming false positives and
% false negatives are the goals of \ids fusion.
% Such systems aim to overcome the limitations of existing \idses by assembling
% a suite of
% sensors. This can be a very efficient way to overcome the problem
% of false positives, as long as we can find sensors that fail
% relatively independently.
% A shared framework like ours can also provide protection against
% {\em systematic\/} false positives. For example, in an early installation of
% \correlator{}, we worked with (an earlier version of) the IDS {\tt
% snort}, which contained rules for detecting IP sweeps. We found that,
% in sites where \longnav\ were run, this rule was tripped by the normal operation of \nav .
% An automatic update server for \nav\ periodically scanned the network,
% looking for hosts running the \nav\ update client.
% Such clients listened on
% \navport.\footnote{We are not singling out {\tt snort} for
% criticism. Our experience has been with {\tt snort}, but
% virtually all network-based \ids es would exhibit this kind of behavior.}
% The ordinary solution to this kind of problem is to edit the \ids\ rule to
% keep it from firing in this circumstance, for example by ignoring IP
% sweeps that hit only \navport .
% This approach is unsatisfactory for two reasons. First, in sites
% where multiple IDSes are run, this means that we must separately
% update the configuration of each individual IDS.
% Second, it allows a clever attacker free rein with traffic on this
% port.
% On the other hand, if we have a central repository of this kind of
% information, we get two corresponding advantages:
% First, we have only a single point of update. Instead of fixing each
% individual sensor, we reconfigure so that all of the reports
% corresponding to this class of false positives will be filtered out.
% Second, we can collect additional information, for example, logs of
% the \nav\ server, that allow us to distinguish between true \nav\
% events, and transmissions from a clever attacker that are disguised as
% \nav\ transmissions.
\draft{Challenges of IDS evaluation}
\paragraph{Related work.}
%% TODO Restore for QR'15
%SecurityFocus has developed the
%Attack Registry and Intelligence Service~\shortcite[ARIS]{ARIS}.
%Its extractor consolidates {\ids} reports from four different
%{\idses} into XML, and presents them in an incident
%console. However it makes no attempts to fuse the reports, nor weigh
%evidence for and against them.
%
%% TODO Restore full version for QR'15
STAT and MetaSTAT~\cite{vigna01:designing}
use finite-state models to detect and fuse events,
but do not attempt to judge the plausibility of different
events.
%MetaSTAT is a fusion system built on a set of STAT-based
%{\idses}~\cite{vigna01:designing}.
%STAT is signature-based, and detects events by matching
%against extended finite-state event models.
%MetaSTAT uses
%finite-state models of across-sensor events to consume events
%from lower-level sensors at a higher level,
%but does not attempt to judge the plausibility of different
%events.
EMERALD/eBayes~\cite{raid2001-pac} fusion is the most similar to our systems.
Their sensors are Bayes net-based, and the correlation approach
allows ``upstream'' sensors to adjust the priors on ``downstream''
sensors.
Its fusion is limited to clustering alerts that meet a
similarity criterion; they do not have models of high-level events like
ours (see below). To the best of our knowledge, they do not
address the difficult issues of acquiring probability parameters for \ids fusion.
The Prelude IDS's Correlator
%% TODO Restore full version for QR'15
% allows users to analyze reports sent to Prelude
%from compatible IDSes~\cite{PreludeCor} following user-provided
%rules. Its function
is closest to
our clustering subsystem, but its knowledge resides in stateful
rules instead of an ontology of attacks~\cite{PreludeCor}.
%% TODO Restore full version for QR'15
%The Arcsight Enterprise Security Manager~\cite{ArcsightEsm},
%also ties correlated IDS reports to an installation's security goals
%and vulnerability information.
%%% Local Variables:
%%% mode: latex
%%% TeX-master: "main"
%%% End: