INTRUSION DETECTION USING EXPERT SYSTEM
#1

Submitted by
Shiv Kumar

[attachment=10355]
INTRUSION DETECTION USING EXPERT SYSTEM
Intrusion Detection

Intrusion detection is a set of techniques and methods that are used to detect suspicious activity both at network level and host level.
Various examples of suspicious activities
 Attempted break-in
 Masquerading
 Penetration by legitimate user
 Trojan Horse
 Virus
 Denial of Service
Techniques of Intrusion Detection
Generally there are two techniques

 Misuse Detection: detection on the basis of known attacks with high success rate and low time cost, but when faces the unknown attacks it becomes powerless
 Anomaly Detection: This technique identifies the observed activities that deviate unknown intrusions, which can't be addressed by former technique. Disadvantages?
Intrusion Detection Expert System
The intrusion detection expert system is software or hardware or combination of both used to detect intruder activity with the help of knowledge base and inferencing technique of expert system
- Dorothy E. Denning
Intrusion Detection Model
The model given is the base model.
Important Terms used are:
 Subjects
 Objects
 Audit records
 Profiles
 Anomaly records
 Activity rules
Brief detail of components
 Subject: Initiators of activity
 Object: Resources managed by system like files
 Audit records:
<Subject, Action, Object, Exception-condition, Resource-Usage, Time-stamp>
 Profiles: <Variable-Name, Action-Pattern, Exception-Pattern, Resource-Usage, Period, Variable-Type, Threshold, Subject-Pattern, Object-Pattern, Value>
 Activity rules are actions when some condition is satisfied
Intrusion Detection Based on Site
Based on site two types are there
 Host based: These act as agents on a host. Here system and log files are detected for any intruder activity.
 Network based: These capture data packets traveling on the network media and match them to a database of signatures.
Host based Intrusion
 Reactive systems: They inform only when something has happened.
 Proactive systems: They sniff the network traffic coming to a particular host
These typically monitor system, event, and security logs. When any of these changes, it is compared to attack signatures to see if there is match.
One popular method for detecting intrusion checks key system files and executables via checksums .
Types of Host based
These can be classified into four types

 File system monitoring
 Log file analysis
 Connection analysis
 Kernel based analysis
Strength:
 Detects attack missed by network based
 Overcome deployment challenges faced by their counterparts
 Lower cost of entry
 Verifies success or failure of an attack
Strengths of Network based Intrusion
 Lower cost of ownership
 Detect attacks that host based miss like IP-based DOS.
 More difficult for an attacker to remove evidence
 Real time detection and response
 Detect unsuccessful attacks and malicious intent
 Operating system independence
Continuous expert voting algorithm
It deals with the fatal disadvantage of machine learning approach.
Some terminology
 Knowledge: A program or network behavior
 Expert: Composed of different type of knowledge
 Suspicious set: Knowledge extract from suspicious data
 Expert matching: If suspicious set include the same type and number of knowledge as expert
 Expert power: Expert a1 can deduce a result r1 which represent the detection accuracy, then r1 is said to be expert power
 Arbitrage value: If the expert power below the average, it can be regarded this trend as normal or abnormal.
Steps:
 Form the expert knowledge database.
 Perform expert matching of suspicious set
 If succeed and arbitrage value is less than expert power, mark set as normal
 Otherwise calculate contiguous expert
Example
The table shows the expert set
what will happen if suspicious set contains
Auto-start=N, Keylogger=N, ProcessI=Y
If the number of expert which its power value below the arbitrage value is more than the number of expert which its power value beyond the arbitrage value, data is abnormal.
Data Mining Technique
Data mining generally refers to the process of extracting descriptive models from large stores of data. Various data mining technique can be used in intrusion detection like
 SVM based classification which is based on support vectors. In this optimized hyperplane is achieved which performs classification.
 Outlier Detection in which subspace outlying technique is used. SPOT can be used as the tool.
 Frequent Association rule mining
Association Rule Mining
The goal of mining association rules is to derive multi feature correlation from a database table. Any association rule is described by support and confidence.
Am, pascal → dir1 { c=2/3 }
 Axis feature
 Auxiliary feature
 Frequent Episode: Study the frequent sequential patterns of network events in order to understand the nature of many attacks.
 Frequent sequential pattern are computed in two steps
(a) Frequent association computation
(b) Frequent serial pattern from these association
Example
(service=http, flag = S0, dst_host=victim), (service = http, flag = S0, dst_host=victim) → (service = http, flag =S0, dst_host=victim) [.93, .03, 2]
Feature Construction
Intrusion patterns is used as a guideline for adding additional features into the connection records to build better classification models. The following automatic procedure for parsing a frequent episode and construct feature
 Assume F0 is used as reference feature
 Add the following features that examine only the connections in past w seconds share the same value in F0 as current feature
- A count of these connection
- F1 different from F0 have same value in all items in episode, add a percentage of these connections
- V2 be a value of a feature F2 other than F0 and F1. If V2 is in all itemsets of episode, add a percentage of connections that have same value otherwise average value
Fuzzy Expert System Based Approach
Fuzzy logic addresses the formal principle of approximate reasoning.
Provide sound foundation to handle imprecision and vagueness as well as mature inference mechanisms.
Every fuzzy set is represented by membership function.
Fuzzy inference system uses the concept of FAM(Fuzzy associative mapping) unlike traditional expert system mapping.
Good Membership function decision is the bottleneck of fuzzy system which is solved by Genetic algorithm approaches.
SNORT
Snort is a libcap based packet sniffer and logger
It features rules based logging to perform content pattern matching and detect variety of attacks.
Both snort and tcpdump has the capability to filter traffic.
Difference between snort and tcpdump?
FB-SNORT CASE STUDY
Snort detects many kinds of attacks, but it gives many false positive alarms especially when detecting port scanning attacks.
To solve this problem Fuzzy expert system is added with snort.
The main advantage of adding this is to make snort more intelligent. Now it can tell what is the level of port scanning attack on the basis of audit data and also reducing false alarms.
Port scanning attack
Attackers commonly attempt to connect to other hosts and scan their ports as starter to other attacks.
By this they try to deduce what are the services available on a host.
Port scanning has three variants
 Open Scan
 Half-open scan
 Stealth scan
Architecture of FB-SNORT
Parameters for fuzzy logic:
 NSP: number of sent packets
 ART: Average time between received packets by destination/victim
 NRP: number of received packets
For a port scanning attack ART must be low and NRP and NSP is high.
The value of these parameters can be calculated at victim with the help of wireshark for defining initial membership functions
Conclusion
 We have seen some of the techniques by which we can make expert system for intrusion detection more intelligent.
 We have discussed types of intrusion detection systems and also their strengths and limitations
 Snort and its components are discussed alongwith FB-Snort which performs better in case of port scanning attacks.
Reply
#2

can you send the report of the project "Network Traffic Analysis and Intrusion Detection Using Packet Sniffer" to rajendran.ar26[at]gmail.com....if you have
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: expert system for car fault detection an control chapter two, intrusion detection expert systems, an expert system for diagnosing eye diseases using clips, pdf srs on expert system, the application of expert system methodology to car fault detection and correction, expert system on car engine fault detection and correction, expert system,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  OBJECT TRACKING AND DETECTION full report project topics 9 30,846 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  Host-Based Intrusion Detection Using user signatures nit_cal 2 2,383 06-10-2016, 10:27 AM
Last Post: ijasti
  DETECTION OF THE MALARIAL PARASITE INFECTED BLOOD IMAGES BY 3D-ANALYSIS project report tiger 2 2,387 26-09-2016, 10:55 AM
Last Post: ijasti
  ULTRA SONIC TECHNIQUES FOR THE DETECTION OF HIDDEN CORROSION IN AIR CRAFT WING SKIN seminar projects crazy 5 6,097 15-04-2016, 08:04 PM
Last Post: knagpur
  ARTIFICIAL INTELLIGENCE IN VIRUS DETECTION AND RECOGNITION seminar project explorer 2 3,349 22-07-2013, 11:44 AM
Last Post: computer topic
  Layered Approach Using Conditional Random Fields for Intrusion Detection project report helper 11 7,748 01-03-2013, 11:58 AM
Last Post: [email protected]
  Security System using Biometrics ( Download Full Seminar Report ) computer science crazy 7 10,345 02-02-2013, 03:56 PM
Last Post: seminar details
  TWO WAY STUDENT INFORMATION SYSTEM USING CELLULAR TECHNOLOGY smart paper boy 3 3,479 24-12-2012, 11:24 AM
Last Post: seminar details
  A Secure Mobile Healthcare System using Trust-Based Multicast Scheme seminar class 3 7,958 22-12-2012, 10:54 AM
Last Post: seminar details
  A Seminar Report On INTRUSION DETECTION SYSTEM Computer Science Clay 1 5,753 23-11-2012, 01:13 PM
Last Post: seminar details

Forum Jump: