skip to main content
article

Abstraction-based intrusion detection in distributed environments

Published:01 November 2001Publication History
Skip Abstract Section

Abstract

Abstraction is an important issue in intrusion detection, since it not only hides the difference between heterogeneous systems, but also allows generic intrusion-detection models. However, abstraction is an error-prone process and is not well supported in current intrusion-detection systems (IDSs). This article presents a hierarchical model to support attack specification and event abstraction in distributed intrusion detection. The model involves three concepts: system view, signature, and view definition. A system view provides an abstract interface of a particular type of information; defined on the instances of system views, a signature specifies certain distributed attacks or events to be monitored; a view definition is then used to derive information from the matches of a signature and presents it through a system view. With the three elements, the model provides a hierarchical framework for maintaining signatures, system views, as well as event abstraction. As a benefit, the model allows generic signatures that can accommodate unknown variants of known attacks. Moreover, abstraction represented by a system view can be updated without changing either its specification or the signatures specified on its basis. This article then presents a decentralized method for autonomous but cooperative component systems to detect distributed attacks specified by signatures. Specifically, a signature is decomposed into finer units, called detection tasks, each of which represents the activity to be monitored on a component system. The component systems (involved in a signature) then perform the detection tasks cooperatively according to the "dependency" relationships among these tasks. An experimental system called CARDS has been implemented to test the feasibility of the proposed approach.

References

  1. ALLEN, J. F. 1983. Maintaining Knowledge about Temporal Intervals. Commun. ACM, 26, 11: 832-843, November 1983.]] Google ScholarGoogle Scholar
  2. ANDERSON, J. P. 1980. Computer security threat monitoring and surveillance. Tech. Rep. Anderson Co. Fort Washington, PA.]]Google ScholarGoogle Scholar
  3. BACE, R. G. 2000. Intrusion Detection. Macmillan Technology, 2000.]] Google ScholarGoogle Scholar
  4. BARBARA, D., WU,N.,AND JAJODIA, S. 2001. Detecting novel network intrusion using bayes estimators. In Proceedings of the First SIAM Conference on Data Mining, April 2001.]]Google ScholarGoogle Scholar
  5. BISHOP, M. 1990. A security analysis of the NTP protocol version 2. In Proceedings of the 6th Annual Computer Security Applications Conference, pp. 20-29.]]Google ScholarGoogle Scholar
  6. CHANG, H., WU,S.F.,AND JOU, Y. F. 2001. Real-time protocol analysis for detecting link-state routing protocol. ACM Trans. Inf. Syst. Secu, 4, 1, Feb. 2001.]] Google ScholarGoogle Scholar
  7. CHANG,H.Y.,NARAYAN, R., SARGOR, C., JOU, F., WU,S.F.,VETTER, B. M., GONG, F., WANG, X., BROWN, M., AND YUILL, J. J. 1999. DECIDUOUS: Decentralized source identification for networkbased intrusions. In Proceedings of the 6th IFIP/IEEE International Symposium on Integrated Network Management. IEEE.]]Google ScholarGoogle Scholar
  8. CHANG,H.Y.,WU,S.F.,SARGOR,C.,AND WU, X. 2000. Towards tracing hidden attackers on untrusted IP networks. submitted for publication, 2000.]]Google ScholarGoogle Scholar
  9. CURRY,D.AND DEBAR, H. 2001. Intrusion detection message exchange format data model and extensible markup language (xml) document type definition. Internet draft, draft-ietf-idwg-idmefxml- 03.txt, Feb.]]Google ScholarGoogle Scholar
  10. DEWITT,D.J.,KATZ, R. H., OLKEN, F., SHAPIRO,L.D.,STONEBRAKER,M.R.,AND WOOD, D. 1984. Implementation techniques for main memory database systems. SIGMOD Rec. 14, 2, 1-8.]] Google ScholarGoogle Scholar
  11. FEIERTAG, R., KAHN, C., PORRAS, P., SCHNACKENBERG, D., STANIFORD-CHEN,S.,AND TUNG, B. 2000. A common intrusion specification language. http://www.gidos.org/drafts/language.txt.]]Google ScholarGoogle Scholar
  12. FEIERTAG, R., RHO, S., BENZINGER, L., WU, S., REDMOND, T., ZHANG, C., LEVITT, K., PETICOLAS, D., HECKMAN, M., STANIFORD,S.,AND MCALERNEY, J. Intrusion detection inter-component adaptive negotiation. Comput. Netw. 34, 605-621.]] Google ScholarGoogle Scholar
  13. FEINSTEIN, B. S., MATTHEWS, G. A., AND WHITE, J. C. C. 2001. The intrusion detection exchange protocol (IDXP). Internet Draft. draft-ietf-idwg-beep-idxp-02.txt. March.]]Google ScholarGoogle Scholar
  14. FREKSA, C. 1992. Temporal reasoning based on semi-intervals. Artifi. Intell. 54, 199-227.]] Google ScholarGoogle Scholar
  15. FRINCKE, D., TOBIN, D., MCCONNELL, J., MARCONI,J.,AND POLLA, D. 1998. A framework for cooperative intrusion detection. In Proceedings of the 21st National Information Systems Security Conference (Crystal City, VA, Oct).]]Google ScholarGoogle Scholar
  16. HEBERLEIN,L.T.,MUKHERJEE,B.,AND LEVITT, K. N. 1992. Internetwork security monitor: An intrusion-detection system for large-scale networks. In Proceedings of 15th National Computer Security Conference (Baltimore, MD, Oct.), 262-271.]]Google ScholarGoogle Scholar
  17. FRINCKE, Y., HO.D.,AND TOBIN,D.JR. 1998. Planning, petri nets, and intrusion detection. In Proceedings of the 21st National Information Systems Security Conference (Crystal City, VA, Oct.).]]Google ScholarGoogle Scholar
  18. HOCHBERG, J., JACKSON, K., STALLINGS, C., MCCLARY,J.F.,DUBOIS,D.,AND FORD, J. NADIR: An automated system for detecting network intrusion and misuse. Computers & Security, 12, 3, (May), 235-48.]] Google ScholarGoogle Scholar
  19. IETF, 2001. Secure network time protocol (stime). http://www.ietf.org/html.charters/stimecharter. html.]]Google ScholarGoogle Scholar
  20. ILGUN, K. 1993. USTAT: A real-time intrusion detection system for UNIX. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, May), 16-28.]] Google ScholarGoogle Scholar
  21. ILGUN, K., KEMMERER,R.A.,AND PORRAS, P. A. 1995. State transition analysis: A rule-based intrusion detection approach. IEEE Trans. Soft. Eng. 21, 3, 181-199.]] Google ScholarGoogle Scholar
  22. JAVITS,H.S.AND VALDES, A. 1993. The NIDES statistical component: Description and justification. Technical Rep. SRI International, Computer Science Laboratory.]]Google ScholarGoogle Scholar
  23. JOU,Y.F.,GONG, F., SARGOR, C., WU, X., WU, S. F., CHANG,H.C.,AND WANG, F. 2000. Design and implementation of a scalable intrusion detection system for the protection of network infrastructure. In DARPA Information Survivability Conference and Exposition.]]Google ScholarGoogle Scholar
  24. KAHN, C., BOLINGER,D.,AND SCHNACKENBERG, D. 1998 Communication in the common intrusion detection framework. http://www.gidos.org/drafts/communication.txt.]]Google ScholarGoogle Scholar
  25. KAHN, C., PORRAS, P. A., STANIFORD-CHEN,S.,AND TUNG, B. 1998 A common intrusion detection framework. Submitted to Journal of Computer Security.]]Google ScholarGoogle Scholar
  26. KEMMERER, R. A. 1997 NSTAT: A model-based real-time network intrusion detection system. Tech. Rep. TRCS97-18, Reliable Software Group, Dept. of Computer Science, University of California at Santa Barbara.]] Google ScholarGoogle Scholar
  27. KENDALL, K. 1999 A database of computer attacks for the evaluation of intrusion detection systems. Master's thesis, Dept. EECS, MIT, June.]]Google ScholarGoogle Scholar
  28. KERSCHBAUM, F., SPAFFORD,E.H.,AND ZAMBONI, D. 2000 Using embedded sensors for detecting network attacks. In Proceedings of the 1st ACM Workshop on Intrusion Detection Systems (Nov.), ACM Press, New York, NY.]]Google ScholarGoogle Scholar
  29. KUMAR, S. 1995 Classification and detection of computer intrusions. Ph.D. dissertation, Purdue University, Aug.]] Google ScholarGoogle Scholar
  30. KUMAR,S.AND SPAFFORD, E. H. 1994 A pattern matching model for misuse intrusion detection. In Proceedings of the 17th National Computer Security Conference (Oct.), 11-21.]]Google ScholarGoogle Scholar
  31. LEE, W., NIMBALKAR, R. A., YEE, K. K., PATIL,S.B.,DESAI, P. H., TRAN,T.T.,AND STOLFO, S. J. 2000. A data mining and CIDF based approach for detecting novel and distributed intrusions. In Proceedings of the 3rd International Workshop on the Recent Advances in Intrusion Detection (Oct.).]] Google ScholarGoogle Scholar
  32. LEE, W., STOLFO,S.J.,AND MOK, K. W. 1999 A data mining framework for building intrusion detection models. In Proceedings of the 1999 IEEE Symposium on Security and Privacy (Oakland, CA, May). To appear.]]Google ScholarGoogle Scholar
  33. LEE,W.AND STOLFO, S. J. 2000. A framework for constructing features and models for intrusion detection systems. ACM Trans. Info. Syst. Secu. 3, 4 (Nov.), 227-261.]] Google ScholarGoogle Scholar
  34. LIN, J. 1998 Abstraction-based misuse detection: High-level specifications and adaptable strategies. Ph.D. dissertation, George Mason University, Fairfax VA. Dec.]] Google ScholarGoogle Scholar
  35. LIN, J., WANG,X.S.,AND JAJODIA, S. 1998. Abstraction-based misuse detection: High-level specifications and adaptable strategies. In Proceedings of the 11th Computer Security Foundations Workshop (Rockport, MA, June), 190-201.]] Google ScholarGoogle Scholar
  36. LINDQVIST,U.AND PORRAS, P. A. 1999 Detecting computer and network misuse through the production-based expert system toolset (P-BEST). In Proceedings of the 1999 IEEE Symposium on Security and Privacy (Oakland, CA, May), IEEE, 146-161.]]Google ScholarGoogle Scholar
  37. MOUNJI, A. 1997 Languages and tools for rule-based distributed intrusion detection. Ph.D. dissertation, University of (Namur, Belgium, Sept.).]]Google ScholarGoogle Scholar
  38. MOUNJI, A., CHARLIER, B. L., ZAMPUNIERIS,D.,AND HABRA, N. 1995. Distributed audit trail analysis. In Proceedings of the ISOC '95 Symposium on Network and Distributed System Security. 102-112.]] Google ScholarGoogle Scholar
  39. MUKHERJEE, B., HEBERLEIN,L.T.,AND LEVITT, K. N. 1994. Network intrusion detection. IEEE Network, 8, 3 (May), 26-41.]]Google ScholarGoogle Scholar
  40. NEUFELDT, V. Ed. 1988 Webster's New World Dictionary of American English. Webster's New World, 3rd college Ed.]]Google ScholarGoogle Scholar
  41. NEW, D. 2001. The TUNNEL Profile. Internet draft. draft-ietf-idwg-beep-tunnel-01.txt, Feb.]] Google ScholarGoogle Scholar
  42. NING, P., WANG,X.S.,AND JAJODIA, S. 2000a. Modeling requests among cooperating intrusion detection systems. Comput. Commun. 23, 17, 1702-1716.]]Google ScholarGoogle Scholar
  43. NING, P., WANG,X.S.,AND JAJODIA, S. 2000b. A query facility for common intrusion detection framework. In Proceedings of the 23rd National Information Systems Security Conference (Baltimore, MD), 317-328.]]Google ScholarGoogle Scholar
  44. NORTHCUTT, S. 1999. Network Intrusion Detection: An Analyst's Handbook. New Riders.]] Google ScholarGoogle Scholar
  45. PORRAS, P., SCHNACKENBERG, D., STANIFORD-CHEN, S., STILLMAN, M., AND WU, F. 1998. The common intrusion detection framework architecture. http://www.gidos.org/drafts/architecture.txt.]]Google ScholarGoogle Scholar
  46. PORRAS,P.A.AND NEUMANN, P. G. 1997. EMERALD: Event monitoring enabling response to anomalous live disturbances. In Proceedings of the 20th National Information Systems Security Conference, National Institute of Standards and Technology, Galthersburg, MD.]]Google ScholarGoogle Scholar
  47. ROSE, M. 2001. The blocks extensible exchange protocol core. IETF RFC 3080. March.]] Google ScholarGoogle Scholar
  48. SCHUBA, C. L., KRSUL,I.V.,KUHN, M. G., SPAFFORD, E. H., SUNDARAM, A., AND ZAMBONI, D. 1997. Analysis of a denial of service attack on TCP. In Proceeding of the 1997 IEEE Symposium on Security and Privacy (Oakland, CA, May), 208-223.]] Google ScholarGoogle Scholar
  49. SMAHA, S. E. 1988. Haystack: An intrusion detection system. In Proceedings of the Fourth Aerospace Computer Security Applications Conference (Dec.).]]Google ScholarGoogle Scholar
  50. SNAPP, S. R., BRENTANO, J., DIAS, G. V., GOAN, T. L., HEBERLEIN,L.T.,HO, C., LEVITT, K. N., MUKHERJEE, B., SMAHA, S. E., GRANCE, T., TEAL,D.M.,AND MANSUR, D. 1991. DIDS (distributed intrusion detection system) motivation, architecture, and an early prototype. In Proceedings of the 14th National Computer Security Conference (Washington, D.C., Oct.), 167-176.]]Google ScholarGoogle Scholar
  51. TIMESTEN PERFORMANCE SOFTWARE 2001. Architecture for real-time data management: Timesten's core in-memory database technology. White paper.]]Google ScholarGoogle Scholar
  52. SPAFFORD,E.H.AND ZAMBONI, D. 2000. Intrusion detection using autonomous agents. Comput. Netw. 34, 547-570.]] Google ScholarGoogle Scholar
  53. STANIFORD-CHEN, S., CHEUNG, S., CRAWFORD, R., DILGER, M., FRANK, J., HOAGLAND, J., LEVITT, K., WEE, C., YIP, R., AND ZERKLE, D. 1996. GrIDSA graph based intrusion detection system for large networks. In Proceedings of the 19th National Information Systems Security Conference, vol. 1 (Oct.), 361-370.]]Google ScholarGoogle Scholar
  54. STANIFORD-CHEN,S.AND HEBERLEIN, L. 1995. Holding intruders accountable on the internet. In Proceedings of the 1995 IEEE Symposium on Security and Privacy (Oakland, May), IEEE, 39- 49.]] Google ScholarGoogle Scholar
  55. SMITH,S.W.AND TYGAR, J. D. 1994. Security and privacy for partial order time. In ISCA Seventh International Conference on Parallel and Distributed Computing Systems (Oct.).]]Google ScholarGoogle Scholar
  56. ULLMAN,J.AND WIDOM, J. 1997. A First Course in Database Systems. Prentice Hall, Englewood Cliffs, NJ.]] Google ScholarGoogle Scholar
  57. VIGNA,G.AND KEMMERER, R. A. 1999. NetSTAT: A Network-based intrusion detection system. Comput. Secur. 7, 1, 37-71.]] Google ScholarGoogle Scholar
  58. VIGNA,G.AND KERMMERER, R. A. 1998. NetSTAT: A Network-based intrusion detection approach. In Proceedings of the 14th Annual Security Applications Conference (Dec.).]] Google ScholarGoogle Scholar
  59. WHITE,G.B.,FISCH,E.A.,AND POOCH, U. W. 1996. Cooperating security managers: A peer-based intrusion detection system. IEEE Network (Jan.), 20-23.]]Google ScholarGoogle Scholar
  60. WU,S.F.,CHANG, H. C., JOU, F., WANG, F., GONG, F., SARGOR, C., QU,D.,AND CLEAVELAND, R. 2001. JiNao: Design and implementation of a scalable intrusion detection system for the OSPF routing protocol. To appear in Journal of Computer Networks and ISDN Systems.]]Google ScholarGoogle Scholar
  61. YANG, J., NING, P., WANG,X.S.,AND JAJODIA, S. 2000. CARDS: A distributed system for detecting coordinated attacks. In Proceedings of IFIP TC11 Sixteenth Annual Working Conference on Information Security (SEC 2000), Sihan Qing and J. H. P. Elof, editors. Kluwer Academic Publishers, August 2000.]] Google ScholarGoogle Scholar

Index Terms

  1. Abstraction-based intrusion detection in distributed environments

          Recommendations

          Reviews

          Anthony Donald Vanker

          A new model for creating distributed intrusion detection systems is presented in this paper. The model uses three concepts: system views, signatures, and view definitions. The system view provides an abstract representation of a specific kind of information about events, and of the relationships among components of a system. The signature is a representation of a distributed event pattern on an instantiation of a system view. The view definition derives useful information from signatures presented through a system view (an extension of earlier work). The authors’ model uses abstraction to hide heterogeneity and irrelevant details. It also uses hierarchical concepts to embody distributed attack and event abstraction. The signatures represent known misuse attacks, and not anomalies. The goal is to analyze events locally, in a distributed manner, and to build a hierarchy of views and signatures that result in the identification of a known misuse pattern. This paper describes a research effort to build intrusion detection systems that can be effectively deployed in large networks. The authors indicate that abstraction, hierarchical modeling based on local analysis, and the use of view definitions make their model unique. They have built a small system as proof of concept for signature decomposition, and for the distribution and execution of detection tasks. Hopefully, their next paper will reveal whether or not this model works in the real world. Online Computing Reviews Service

          Access critical reviews of Computing literature here

          Become a reviewer for Computing Reviews.

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader