DOC PREVIEW
UW-Madison ECE 539 - A Neural Network Approach To Intrusion Detection

This preview shows page 1-2 out of 6 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

A Neural Network Approach To Intrusion DetectionIntroductionWork PerformedResultsDiscussionReferencesA Neural Network Approach To Intrusion DetectionMary KrajnakContentsIntroduction1. Problem Statement & Motivation2. Other Approaches3. This Projects ApproachWork Performed1. Data Retrieval2. Data Analysis & Encoding3. Preprocessing4. Network ConfigurationResultsDiscussionReferencesIntroductionMotivationNetwork security has become increasingly important as computers become increasing integrated parts of our lives. Many companies, governments, and private homes rely on secure connections over web services. Computer hackers pose a significant threat to our daily lives.Problem StatementIn order to protect networks from misuse an intrusion detection system (IDS) is often put in place. Methods requiring hand-coded rules to determine which packets are legitimate and which packets get dropped are difficult to create. They are also unreliable as the methods of attack change with time. A system which can identify network attacks without having to hard-code rules is desirable. Other ApproachesThe basic schemes for flexibly detecting malicious network traffic is known as "anomaly intrusion detection". It classifies attacks by setting some baseline for normal behavior and classifying all other abnormal traffic as malicious. There have been many different approaches to implementing this type of IDS. Some systems implement a packet analyzer which inspects each packet, rejecting ones which do not comply with some predetermined standard. Kuo-Chen Lee and his associates implemented an packet analyzer IDS which inspected packet headers with a Bayesian approach. Their model led to over 99% accuracy in detection, as well as a .03% false positive rate [1].Other systems use statistical analysis to attempt to model "normal" behavior of a network. Bahrololum and Khaleghi of the Iran Telecommunication Research Center modeled behavior using Hierarchical Gaussian Mixture Model, which accurately classified about 95% of attacks [2].This Projects ApproachThis paper presents a Neural Network approach to classifying attacks. It analyzes tcpdump data from network traffic to determine trends. The aim is to determine if a neural network would be an appropriate tool for detecting intrusions. If successful, it would provide anomaly detection without complex means for determining a behavior model.Work PerformedData RetrievalThe US Defense Advanced Research Projects Agency (DARPA) simulated two months of network traffic and attacks. DARPA then released the data set to the public to encourage performance improvements of the then current IDS's. This paper uses the 1998 DARPA Intrusion Detection Evaluation Data Sets.Data Analysis & EncodingSamples > 1,000,000Features 8Feature Types session date, start time, duration of connection, service used by session, source port, destination port, source IP, destination IPAlong with the eight features of each connection, a score is assigned to each session to indicate if it is an attack and if so the name of the attack.Once the data was retrieved it had to be encoded into numeric data for use in the neural network. The table below describes how each feature was encoded.Feature Original format Encoded formatsession date m:int + '/' + d:int + '/' + y:int mdy:intstart time, duration h:int + ':' + m:int + ':' + s:int i = h*3600 + m*60 + sservice name array of characters int of each character's ascii value added togethersource port, destination port x:int x:intsource IP, destination IP w:int + '.' x:int + '.' + y:int + '.' + z:intwxyz:intData PreprocessingSince the features are encoded using different methods the input data was preprocessed to prevent any large feature value from dominating. The data was scaled into range [-1,1]. Of the eight features available this project used duration, name, source port, destination port, source IP, and destination IP. The choices of the features used was determined empirically. Initially the IP addresses were not included, but they produced better classification.Testing and Training DataSince there is an abundance of data samples it was not necessary to use techniques to artificially increase the amount of data. Instead, 70% of the collected data was used for training and 30% was used for testing.Network ConfigurationThis project used a back propagation neural network, as the tcp data is most likely not linearly separable. Initially, six different network configurations were tested: 3-layer network with 2, 4, or 5 hidden neurons and a 4-layer network with 2, 4, or 5 hidden neurons. There was no significantdifference found in any of the test results so a 3-layer, 4 hidden neuron configuration was selected for the final tests.ResultsThe neural network was very unsuccessful at classifying all types of attacks at the same time. The data is composed of several different categories of attacks: Denial of Service, Root Attacks, Remote to User Attacks, and Probing. When attempting to identify all types of attacks with one network it achieved a 39.3% classification rate, with a 65.5% false positive rate. However, when each attack was considered individually the classification rate greatly improved to around 99% for others. Table 1 contains the classification rate for some of the tests.Graph 1Classification of 'smurf' attacks.Table 2 Classificationall attacks 39.30%smurf attacks (DoS) 99.90%back (DoS) 95.50%satan (probe) 99.30%DiscussionUsing neural networks for intrusion detection seems to have promise, at least when each attack is considered individually. One could build a clustering algorithm and use the results of the backpropagation neural network to create a machine to classify all types of attacks. The classification rate of the tests compares well to the other methods of intrusion detection.One item of concern is the false positives. Many of the individual tests produced 3-5% false positive rates. As one could imagine, an ISP provider would not be keen on using a system which slows the flow of legitimate traffic. However, a company with a great need for security might be willing to be more conservative with their traffic flow.References1. Lee, K., Chang, J., and Chen, M.. "PAID: Packet Analysis for Anomaly Intrusion Detection"Advances in Knowledge Discovery and Data Mining. National Taiwan University, 20082. Bahrololum, M. and Khalegh, M. "Anomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model" International Journal of Computer


View Full Document

UW-Madison ECE 539 - A Neural Network Approach To Intrusion Detection

Documents in this Course
Load more
Download A Neural Network Approach To Intrusion Detection
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view A Neural Network Approach To Intrusion Detection and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view A Neural Network Approach To Intrusion Detection 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?