2
Using a Distributed Object Using a Distributed Object - - Oriented Database Oriented Database Management System in Support of a High Management System in Support of a High - - speed speed Network Intrusion Detection System Network Intrusion Detection System Data Repository Data Repository 2Lt Phillip W. Polk, GCS 2Lt Phillip W. Polk, GCS - - 01M 01M The Problem • Current cutting-edge Intrusion Detection Systems - in particular, those of the USAF - use relational database management systems (RDBMS) for long-term incident storage and correlation engine repositories Implications Network intrusion events are naturally represented as objects, BUT • Relational databases are not well-suited for distributed systems and the rapid capture of object-form data from intrusion detection sensors Research Hypothesis • A well-balanced distributed object-oriented database management system (DOODBMS) more naturally stores network incident data, resulting in significantly higher data storage rates without substantially increasing data retrieval overhead. In English: Replacing the RDBMS with a DOOBMS can remove the storage bottleneck without causing a retrieval bottleneck Results • Demonstrated increased throughput performance with respect to RDBMS • Demonstrated inconclusive, but seemingly minimal, impact to data retrieval performance • Demonstrated the effective distribution of the repository to counter the single-point-of-failure problem • Defined an object-oriented architecture and programming paradigm for future system development Results immediately generalize to other systems, including the deployed ASIM/CIDDS system currently used operationally by the USAF Generic IDS with repository AFRL’s AIDE System Overview AIDE After Re-Design to DOODBMS 0 20 40 60 80 100 120 100 500 1000 2000 5000 10000 # of Objects/Records Time (sec) OOAIDE AIDE OOAIDE w/Rep 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 All Events All Events with Signature Events of single IP Events of single IP with Sensor Query seconds OOAIDE AIDE Insertion Performance Comparison Query Performance Comparison

Generic IDS with repository Using a Distributed Object-Oriented

  • Upload
    others

  • View
    12

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Generic IDS with repository Using a Distributed Object-Oriented

Using a Distributed ObjectUsing a Distributed Object--Oriented DatabaseOriented DatabaseManagement System in Support of a HighManagement System in Support of a High--speedspeed

Network Intrusion Detection SystemNetwork Intrusion Detection SystemData RepositoryData Repository

2Lt Phillip W. Polk, GCS2Lt Phillip W. Polk, GCS--01M01M

The Problem

• Current cutting-edge Intrusion Detection Systems - in particular, those of the USAF - use relational database management systems (RDBMS) for long-term incident storage and correlation engine repositories

Implications

• Network intrusion events are naturally represented as objects, BUT

• Relational databases are not well-suited for distributed systems and the rapid capture of object-form data from intrusion detection sensors

Research Hypothesis

• A well-balanced distributed object-oriented database management system (DOODBMS) more naturally stores network incident data, resulting in significantly higher data storage rates without substantially increasing data retrieval overhead.

In English: Replacing the RDBMS with a DOOBMS can removethe storage bottleneck without causing a retrieval bottleneck

Results

• Demonstrated increased throughput performance with respect to RDBMS

• Demonstrated inconclusive, but seemingly minimal, impact to data retrieval performance

• Demonstrated the effective distribution of the repository to counter the single-point-of-failure problem

• Defined an object-oriented architecture and programming paradigm for future system development

Results immediately generalize to other systems, including the deployed ASIM/CIDDS system currently used operationally by the USAF

Generic IDS with repository

AFRL’s AIDE System Overview

AIDE After Re-Design to DOODBMS

0

20

40

60

80

100

120

100 500 1000 2000 5000 10000

# of Objects/Records

Tim

e (s

ec)

OOAIDE

AIDE

OOAIDE w/Rep

00.5

11.5

22.5

33.5

44.5

5

All Events All Events withSignature

Events ofsingle IP

Events ofsingle IP with

SensorQuery

seco

nds OOAIDE

AIDE

Insertion Performance Comparison Query Performance Comparison

Page 2: Generic IDS with repository Using a Distributed Object-Oriented

Capt Paul D. Williams_____________________________________________

Recipient of the Class 01M

Commandant’s Awardfor Best Thesis

Sponsored ByDefensive Information Warfare BranchInformation Directorate, AFRL/IFGBAir Force Research Laboratory

The ChallengeØ INFOSEC Research Council: Intrusion/Misuse Detection is the top Information Assurance (IA) priorityØ Office of the Assistant Secretary of Defense (OASD/C3I): Intrusion Detection leads the IA Hard Problems listØ National Security Agency: The methodical, structured threat poses the most significant security risk to our National Information Infrastructures

The ProblemØ Signature-based Intrusion Detection (ID) is reactiveØ Operation depends upon existing signaturesØ Signatures typically created in attack post-mortemØ Both signature creation and distribution are manual processes

Ø Signature success depends on generalityØ New attacks are often variations of old ones

Ø Problem domain is always changing

Ø Problem domain space is enormousØ 1.94 × 10 84 possible events using just 29 packet features

The ApproachComputer Defense Immune System (CDIS) ⇒ WarthogØ Build upon AFIT’s Computer Virus Immune System

Ø Integrate several different techniquesØ Computer immunology

Ø Develop antibodies through negative selection and maturation

Ø Computer virus and intrusion detection

Ø AFIT’s multi-agent systems engineering (MaSE) methodology

Ø Parallel and distributed computation

Ø Utilize an Interactive Evolutionary Stochastic Search processØ Genetic Algorithms - coupled with human analyst for search guidance

Master

Agent Layer

Slave Layer (Zombies)

Target Layer

What is “Low and Slow” ?

Ø Coordinated, distributed, reconnaissance and penetration attemptsperpetrated by a patient, resourceful, structured adversary

Ø The Master is the adversary’s controlling computerØ The Agents and Slaves are computers - usually innocent - that have

been “Trojanized” by an adversary or other agentØ Current estimate of extant zombies exceeds hundreds of thousands

Ø Master assigns selected slaves against specific targets - patience is keyØ Individual probes are difficult to distinguish from noiseØ Correlation of probes is nearly impossibleØ Master is well-hidden behind layers of concealment

Ø Hierarchical structure is also ideal to initiate massive distributed denialof service (DDOS) attacks against Target Layer

The SuccessesØ Provided a formal framework for defining the intrusion detection problemØ Performed simple, single-packet, network-based ID in the context of a CDISØ Warthog can separate self from non-selfØ Detects unknown attacks - attacks that were not part of the training dataØ In one test, detected over 98% of 2600+ attacks covering a large number

of protocols and techniques

Ø Defined a search process that couples the skills of human analysts with theraw searching power of an evolutionary algorithmØ Developed prototype user interface to display and guide search progress

Ø Provided a means of determining which features are importantØ The collection of successful antibodies will contain a variety of features

Ø Induction over those antibodies should extract those features most useful

Ø Focusing on those features should improve search and reduce data storage

Ove

rt A

ttack

s

Low and Slow

Covert A

ttacks

Enterprise Information Systems

Data Storage Multiple AgentsConcepts fromBiological Immunology

Virus Protection Network Based ID

InteractiveEvolutionary

Searcher

Hie

rarc

hica

l Dis

trib

uted

Str

uctu

re

Host B

ased ID

CDIS

Preliminary ObservationsØ Which features are important?Ø IP src, dest addressesØ IP IDØ IP TTLØ TCP Sequence numbersØ TCP Push, Ack, Syn flagsØ TCP src, dest ports

Biggest Contribution

SOLID Foundation for

Continued Research