extracting attack scenarios using intrusion semantics
play

EXTRACTING ATTACK SCENARIOS USING INTRUSION SEMANTICS Sherif Saad, - PowerPoint PPT Presentation

EXTRACTING ATTACK SCENARIOS USING INTRUSION SEMANTICS Sherif Saad, Issa Traore Information Security and Object Technology Lab University of Victoria ECE Department 5 th FPS 2012 Overview 2 Introduction Related Work Approach


  1. EXTRACTING ATTACK SCENARIOS USING INTRUSION SEMANTICS Sherif Saad, Issa Traore Information Security and Object Technology Lab University of Victoria ECE Department 5 th FPS 2012

  2. Overview 2  Introduction  Related Work  Approach  Experiment  Conclusion UVic, 12-12-18

  3. Introduction: Definition 3  Attack Scenario:  Elicits the steps and actions taken by the intruder to breach/compromise the system.  Also known as attack plan.  Attack Pattern:  A collection of malicious actions that together represent a pattern. UVic, 12-12-18

  4. Introduction: Motivation 4  Extracting attack scenario is needed to:  Elicit the attack and extract useful attack intelligence,  Identify the compromised resources,  Spot the system vulnerabilities,  Determine the intruder objectives and the attack severity. UVic, 12-12-18

  5. Introduction: Research problem 5  IDSs generate low level intrusion alerts that describe individual attack event.  IDS are not designed to recognize attack plans or discover multistage attack scenarios.  IDSs tend to generate massive amount of alerts with high rate of redundant alerts and false positives.  False negatives, which correspond to the attacks missed by the IDS. UVic, 12-12-18

  6. Related Works 6  Statistical and Clustering Approaches  Use alerts similarity and statistical characteristics.  Can handle large amount of IDS alerts.  Can reconstruct novel and unknown attack scenarios.  Cannot detect causality between individual attacks  Limited to simple attack scenarios and attack patterns.  Reconstruct false attack scenarios. UVic, 12-12-18

  7. Related Works (ctd.) 7  Knowledge Based Approaches  Use hard coded knowledge and rely on explicit knowledge.  Hard to maintain and update the knowledge-base  Can reconstruct complex and multistage attack scenarios, but not novel attacks scenarios.  Cannot handle false negatives and missing attack steps.  Cannot detect hidden and implicit relations between attacks. UVic, 12-12-18

  8. Research Objectives 8  Develop a new approach that:  Handle large amount of IDS alerts.  Handle complex multistage attack scenarios.  Automatically reconstruct novel and unknown attack scenarios with high accuracy.  Minimize the affect of missing attack steps. UVic, 12-12-18

  9. Approach: Semantic Correlation 9  IDS sensors use different formats and vocabularies to describe the alerts.  IDMEF provides common alert message structure (syntax) not semantic.  IDS alerts message attributes are symbolic data. It is hard to measure similarity or distance between symbolic data. UVic, 12-12-18

  10. Approach: Intrusion Ontology 10 UVic, 12-12-18

  11. Approach: Semantic Relevance 11 UVic, 12-12-18

  12. Approach: Semantic Clustering 12  Use the ontology to measure the semantic relevance between different alert messages.  Using the semantic relevance we build the alert correlation graph (ACG).  Analyze the ACG to extract all maximum cliques in ACG. We consider every maximum clique in the ACG as a candidate attack scenario/pattern. UVic, 12-12-18

  13. Semantic Clustering Example 13 UVic, 12-12-18

  14. Semantic Clustering Example 14 Alerts Correlation Graph All Maximum Cliques in ACG UVic, 12-12-18

  15. Attack Causality Analysis 15  The Impact class in the ontology contains the set of attack prerequisites and consequences.  The causality relation between two attack instances a and b is a value between 0 and 1 given by  The sequence of attacks in the attack scenario is based on the causality between attack instance in the scenario UVic, 12-12-18

  16. Experiments 16  Datasets  DARPA 2000 dataset from MIT Lincoln Laboratory.  The Treasure Hunt dataset. UVic, 12-12-18

  17. Evaluation Metrics 17  Two performance metrics:  Completeness: the ratio between the number of correctly correlated alerts by the number of related alerts (i.e. that belong to the same attack scenario).  Soundness: the ratio between the number of correctly correlated alerts by the number of correlated alerts. UVic, 12-12-18

  18. Experiments Results 18 UVic, 12-12-18

  19. Conclusion & Future Work 19  The use of semantic correlation and ontology:  Allow us to develop a better alert correlation and attack scenario reconstruction technique.  Enable interoperability between heterogeneous IDS sensors.  Improve the knowledge-base maintenance.  Eliminate the need of hard-coded rules. UVic, 12-12-18

  20. Conclusion & Future Work 20  Our future work will focus on:  False negative: improve the attack causality analysis to predict missing attack steps  False positive: develop an ontology-based rule induction to reduce the false positive alerts. UVic, 12-12-18

  21. Thanks Questions?? UVic, 12-12-18

Recommend


More recommend