Service Behavior Profiling and Probabilistic Inference for Anomaly Detection

博士 === 國立臺灣大學 === 資訊管理學研究所 === 100 === Network attacks that exploit network service vulnerabilities become popular in recent years. An attacker can remotely send malicious messages to a vulnerable service and gain the execution right to control the victim. Most of the Internet worms and part of the...

Full description

Bibliographic Details
Main Authors: Shun-Wen Hsiao, 蕭舜文
Other Authors: Yeali S. Sun
Format: Others
Language:en_US
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/37434761568581780626
id ndltd-TW-100NTU05396016
record_format oai_dc
collection NDLTD
language en_US
format Others
sources NDLTD
description 博士 === 國立臺灣大學 === 資訊管理學研究所 === 100 === Network attacks that exploit network service vulnerabilities become popular in recent years. An attacker can remotely send malicious messages to a vulnerable service and gain the execution right to control the victim. Most of the Internet worms and part of the Botnet fall into this attack category, and such attacks often cause severe damages to our computers and network systems. As we know, benign software would perform normal procedure to communication with a server to accomplish a network task collaboratively via predefined network protocols. Although malware takes similar actions to communicate with the server that it intends to compromise, malware behavior is not exactly the same as normal behavior. In our work, we design a novel anomaly detection framework targets on the attack vector of vulnerability exploitation on network service. The key hypothesis to anomaly detection assumes anomalous behaviors are suspicious from a normality point of view. We focus on defining the notion of normality in a new perspective – network service – to detect anomalies. Once the definition of normality is specified, the violation of the normality (i.e., anomaly) is determined. We found certain abnormal communication procedures can be used to profile anomaly behavior. They are considered as the sign of an attack (i.e., attack symptom) when the attacker and the victim undergo sequences of compromising actions. Past models often suffer from lacking of model normality verification, and they only focus on individual model. To confront the first issue, we show how to construct underlying protocol models by static and dynamic approach to guarantee the normality. For the latter issue, we combine multiple protocol/service models to construct a composite model for complex network services. We propose a method to construct composite service model with protocol interaction and correlation. To build the normal protocol models for anomaly detection, we adopt the Principal Component Analysis (PCA) to analysis the normal behavior of a network protocol and extract the significant communication states. The PCA analyzes the real world network traffic traces and perform data classification to cluster different communication behaviors. Normal and significant behavior will be chosen to build the normal behavior model that is a form of finite state machine. Our prototype system can statefully capture and monitor activities between hosts, and it progressively assesses possible network anomalies by multi-level behavior tracking, cross-level behavior triggering, and correlation of different network protocols and services. To increase the confidence level of assessing attacks, we develop a probabilistic inference model to infer and compute the belief score of possible attacks based on the observation of the attack symptoms. In our observation, each attack symptom has a different degree of significance in the attack evaluation so that probability is an appropriate mathematical tool for attack inference. We collect several real world attacks and build the normal protocol models that they use. Several anomalies and attack symptoms are detected by our system; no matter the attack is known, unknown, or a variant; even they do not exploit the same vulnerability. The work has several novel research concepts. We focus on the network protocol and service as a basis to detect anomalies. We both adopt static and dynamic approach to build normal models. Using PCA to build normal model has not been seen in the past. Developing a cross-level monitoring system and composite service model are also new to this research field. The result shows our system can detect anomalies and is a good solution for intrusion detection. Keyword: Anomaly detection, network service, behavior profiling, principal component analysis, inference model, finite state machine.
author2 Yeali S. Sun
author_facet Yeali S. Sun
Shun-Wen Hsiao
蕭舜文
author Shun-Wen Hsiao
蕭舜文
spellingShingle Shun-Wen Hsiao
蕭舜文
Service Behavior Profiling and Probabilistic Inference for Anomaly Detection
author_sort Shun-Wen Hsiao
title Service Behavior Profiling and Probabilistic Inference for Anomaly Detection
title_short Service Behavior Profiling and Probabilistic Inference for Anomaly Detection
title_full Service Behavior Profiling and Probabilistic Inference for Anomaly Detection
title_fullStr Service Behavior Profiling and Probabilistic Inference for Anomaly Detection
title_full_unstemmed Service Behavior Profiling and Probabilistic Inference for Anomaly Detection
title_sort service behavior profiling and probabilistic inference for anomaly detection
publishDate 2012
url http://ndltd.ncl.edu.tw/handle/37434761568581780626
work_keys_str_mv AT shunwenhsiao servicebehaviorprofilingandprobabilisticinferenceforanomalydetection
AT xiāoshùnwén servicebehaviorprofilingandprobabilisticinferenceforanomalydetection
AT shunwenhsiao jīyúwǎnglùfúwùxíngwèicèxiěyǔjīlǜtuīlùnmóxíngzhīwǎnglùyìchángzhēncèfāngfǎ
AT xiāoshùnwén jīyúwǎnglùfúwùxíngwèicèxiěyǔjīlǜtuīlùnmóxíngzhīwǎnglùyìchángzhēncèfāngfǎ
_version_ 1718068244921712640
spelling ndltd-TW-100NTU053960162015-10-13T21:45:45Z http://ndltd.ncl.edu.tw/handle/37434761568581780626 Service Behavior Profiling and Probabilistic Inference for Anomaly Detection 基於網路服務行為側寫與機率推論模型之網路異常偵測方法 Shun-Wen Hsiao 蕭舜文 博士 國立臺灣大學 資訊管理學研究所 100 Network attacks that exploit network service vulnerabilities become popular in recent years. An attacker can remotely send malicious messages to a vulnerable service and gain the execution right to control the victim. Most of the Internet worms and part of the Botnet fall into this attack category, and such attacks often cause severe damages to our computers and network systems. As we know, benign software would perform normal procedure to communication with a server to accomplish a network task collaboratively via predefined network protocols. Although malware takes similar actions to communicate with the server that it intends to compromise, malware behavior is not exactly the same as normal behavior. In our work, we design a novel anomaly detection framework targets on the attack vector of vulnerability exploitation on network service. The key hypothesis to anomaly detection assumes anomalous behaviors are suspicious from a normality point of view. We focus on defining the notion of normality in a new perspective – network service – to detect anomalies. Once the definition of normality is specified, the violation of the normality (i.e., anomaly) is determined. We found certain abnormal communication procedures can be used to profile anomaly behavior. They are considered as the sign of an attack (i.e., attack symptom) when the attacker and the victim undergo sequences of compromising actions. Past models often suffer from lacking of model normality verification, and they only focus on individual model. To confront the first issue, we show how to construct underlying protocol models by static and dynamic approach to guarantee the normality. For the latter issue, we combine multiple protocol/service models to construct a composite model for complex network services. We propose a method to construct composite service model with protocol interaction and correlation. To build the normal protocol models for anomaly detection, we adopt the Principal Component Analysis (PCA) to analysis the normal behavior of a network protocol and extract the significant communication states. The PCA analyzes the real world network traffic traces and perform data classification to cluster different communication behaviors. Normal and significant behavior will be chosen to build the normal behavior model that is a form of finite state machine. Our prototype system can statefully capture and monitor activities between hosts, and it progressively assesses possible network anomalies by multi-level behavior tracking, cross-level behavior triggering, and correlation of different network protocols and services. To increase the confidence level of assessing attacks, we develop a probabilistic inference model to infer and compute the belief score of possible attacks based on the observation of the attack symptoms. In our observation, each attack symptom has a different degree of significance in the attack evaluation so that probability is an appropriate mathematical tool for attack inference. We collect several real world attacks and build the normal protocol models that they use. Several anomalies and attack symptoms are detected by our system; no matter the attack is known, unknown, or a variant; even they do not exploit the same vulnerability. The work has several novel research concepts. We focus on the network protocol and service as a basis to detect anomalies. We both adopt static and dynamic approach to build normal models. Using PCA to build normal model has not been seen in the past. Developing a cross-level monitoring system and composite service model are also new to this research field. The result shows our system can detect anomalies and is a good solution for intrusion detection. Keyword: Anomaly detection, network service, behavior profiling, principal component analysis, inference model, finite state machine. Yeali S. Sun 孫雅麗 2012 學位論文 ; thesis 138 en_US