Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors:Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser and George Yamoyany Source :Proceedings of the 2002 Annual Research Conference of South African Institute for Computer Scientists and Information Technologists (SAICSIT), pp. 149-155, September 2002. Speaker:Chien-Jen Hsueh Date :2005/12/06 Outline Introduction Intrusion Detection System (IDS) IDS & Overview of Current IDS Problems of IDS Fuzzy application Generic Hybrid Intrusion Identification Strategy Three independent computational components Next Generation Proactive Identification Model (NeGPAIM) Conclusions Comments 2 Introduction Computer security gains important Environment changes fast Information becomes a precious asset Increase security requirements ex: 2001 CSI/FBI Computer Crime & Security Survey Need more powerful security technology New techniques Neural network Fuzzy engine 3 Introduction IDS Fuzzy application Conclusions Comments Intrusion Detection System IDS & Overview of Current IDS A process of intelligently monitoring the events Analysis signs of violation Attempts to compromise security components Consists of three functional components Information source: provider a stream of event records Analysis engine: finds signs of intrusions Response component: generates reactions based on the outcome of the analysis engine 4 Introduction IDS (1/3) Fuzzy application Conclusions Comments Problems of IDS_Analyses Two approaches of analysis engine Misuse detection Detects intrusions that follow well-known patterns of attack Primary limitation of this approach Looks only for known weakness May not be of much use in detecting unknown future intrusions Anomaly detection Using statistical techniques to find patterns that was abnormal Main problem of this approach Tend to be computationally expensive Trained incorrectly to recognize an intrusive behavior due to insufficient data Introduction IDS (2/3) Fuzzy application Conclusions Comments 5 IDS Problems Mostly current commercial IDS (CIDS) based on the misuse detection approach Make highly ineffective Intruders do not match the known attack patterns of CIDS New attack patterns is time consuming Difficult to identify effectively by IDS due to insufficient data 6 Introduction IDS (3/3) Fuzzy application Conclusions Comments Fuzzy Application Generic Hybrid Intrusion Identification Strategy Hybrid system idea can be used to improve the monitoring functionality of current IDS Three independent computational components Central analysis engine Fuzzy engine Neural engine 7 Introduction IDS Fuzzy application (1/11) Conclusions Comments Generic Hybrid Intrusion Identification Strategy Implement the misuse detection approach 8 Introduction IDS Fuzzy application (2/11) Conclusions Comments Fuzzy Engine and Fuzzy Logic Fuzzy Engine Implements the misuse detection approach based on fuzzy logic A superset of boolean logic Extended to handle the concept of partial truth Completely False True values Completely True Provide a more effective monitoring functionality It will not require regular updates on new intrusion attacks 9 Introduction IDS Fuzzy application (3/11) Conclusions Comments Fuzzy logic application Developing two graphs using fuzzy logic Compare generic intrusion phases and actions of an intruder there by prediction patterns of misuse Template graph represent six generic intrusion phases User action graph represent the actual action of the intruder Mapping of graphs possible determine patterns of misuse 10 Introduction IDS Fuzzy application (4/11) Conclusions Comments Template Graphs • Template Graphs will use to represent the six generic intrusion phases 11 Introduction IDS Fuzzy application (5/11) Conclusions Comments User Action Graph • User action graph will represent the actual actions of the misuse 12 Introduction IDS Fuzzy application (6/11) Conclusions Comments Mapping of Graphs and the Functions The output is a numeric value Used by the central strategy engine to determine if a intruder is carrying out an intrusion attack 13 Introduction IDS Fuzzy application (7/11) Conclusions Comments Next Generation Proactive Identification Model Next Generation Proactive Identification Model (NeGPAIM) Based on Hybrid Intrusion Identification Strategy Consists of nine major components Information Provider, Collector Coupler, Information Refiner Neural Engine, Central Analysis Engine Responder and Manager Fuzzy Engine All components are resided on a 3-tier architecture Client, external host and internal host 14 Introduction IDS Fuzzy application (8/11) Conclusions Comments Fuzzy Engine One of two low-level processing unit of NeGPAIM Used to determine whether a intruder’s intrusion attack Compute a template and user action graph for each user Map the two graphs Notify the central analysis engine with an intrusion value Performed on a continuous basis 15 Introduction IDS Fuzzy application (9/11) Conclusions Comments General Representation of NeGPAIM 16 Introduction IDS Fuzzy application (10/11) Conclusions Comments Practical Implementation of NeGPAIM Implementing Fuzzy Engine Prototype (IFEP) An initial prototype to test the feasibility of the model Only implemented the fuzzy engine Developed by employing CLIPS developing software Tested by way of several independent case studies IFEP was successful in performing misuse detection 17 Introduction IDS Fuzzy application (11/11) Conclusions Comments Conclusions NeGPAIM provide stronger detection approach Monitor and identify intrusion proactively and dynamically Ex: A attacker has the objective of stealing credit card information identify at an early stage and disconnect the attack session Fuzzy engine implements misuse detection Differs from current misuse detection system It does not search for particular pattern of attack Searches for general misuse of resources and objects Still need the information security officer 18 Introduction IDS Fuzzy application Conclusions Comments Comments Fuzzy logic and engine may usefully use in other security techniques Authentication, Key distribution… Combine with other AI concept Neural engine, Intelligence Agent… Fuzzy logic using in Digital Rights Management 19 Introduction IDS Fuzzy application Conclusions Comments Thank you for listening… 20 Fuzzy theory report by Chien-Jen Hsueh, December 2005