/
Towards a Masquerade Detection System Based on User’s Tasks Towards a Masquerade Detection System Based on User’s Tasks

Towards a Masquerade Detection System Based on User’s Tasks - PowerPoint Presentation

alida-meadow
alida-meadow . @alida-meadow
Follow
344 views
Uploaded On 2019-11-20

Towards a Masquerade Detection System Based on User’s Tasks - PPT Presentation

Towards a Masquerade Detection System Based on Users Tasks J Benito Camiña Jorge Rodr íguez and Raúl Monroy Presentation by Calvin Raines What is a masquerade attack password123 Hello ltYour Name Heregt ID: 765895

school fun task object fun school object task markov chains bayes normal attack windows attacks system detection

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Towards a Masquerade Detection System Ba..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Towards a Masquerade Detection System Based on User’s Tasks J. Benito Camiña, Jorge Rodríguez, and Raúl Monroy Presentation by Calvin Raines

What is a masquerade attack? password123 Hello <Your Name Here>

How can masquerades be detected? Audit dataCommandsI/O devicesSearch patternsFile system navigation User “Tasks”

What were some previous approaches? Intrusion detection expert system (IDES) Earliest form of masquerade detection system (MDS)Used audit dataLooked at sequences of actions Shonalu et al. (Unix commands)First general MDS test setLogs of user commands broken into chunks Jack ls cd ls… get open… open close… … get get ... g++ vi vi … get close… Jill cd vi…vi g++…./pgm vi……ls vi close…get open…cd ls vi… Normal Attack

What were some previous approaches? MouseAngle/speed of movementClick/dragKeyboard Static or Free textRUU (Are You You?)Search patterns; 22 featuresFile access, process creation, browsing, etc.

What weaknesses do the old ways have? Intrusive recordingStatic keyboard recording discourages new passwordsSpecificity of resultsUnix commands specific to OS One versus the others (OVTO)No true attacks in test setRUU simulated attacks, but these were not faithfulData sets are static

What new dataset is used? Critical concept: objects, not actionsWhich file system objects accessed and how used Navigation SystemAccess Graph C Desktop Misc Work CV C Desktop PDF.pdf CV 10 PDF 8 Cat 3 C Documents Funny Cat.gif Directory Graph C Desktop Docs Music Work School Temp

What is WUIL? Windows Users and Intruder simulations Logs dataset20 Windows users normal activityMS Windows audit tool3 levels of attacks carried out on each user computer Data theft attacksLimited to 5 minute windowCarried out by same person

What attacks were simulated? Basic – OpportunitySearches My Documents for interesting looking names, opens the file, sends to self via email, and closes fileIntermediate – PreparedBrings USB to copy files to, uses MS Windows’ search tool to find files with specific strings (e.g. *password*.*), remove USB and remove tracks Advanced – PlottedUses .bat file to automatically copy files the intermediate attack found

What is task abstraction? Assumption: Files in the same folder are related to each other, and thus using any file in a certain folder can be viewed as working on a task. Subdirectory B Subdirectory A Directory Object 1 Object 3 Object 2 Object 4 Object 5 Object 7 Object 6 Supertask Task 1 Task 2 Task 3

Depth Cut PointDeepest level for which >70% of task rate is underneath it < 100 Tasks 3 < DCP < 10 What is task abstraction?

What are the benefits of task abstraction? Less required storageResilient to changeFiles added and deleted frequently

What experiments were performed? Testing for:Objects v. TasksHow much information needed to detect attacks? Different percentages of construction/validationApproach:Window based approach (unmixed, size 20)Naïve Bayes and Markov ChainsFive-fold cross validation on best const/valid ratio

What is Naïve Bayes? Frequency probability ? http://sebastianraschka.com/Articles/2014_naive_bayes_1.html Subset + - squares 5/8 3/8 blue 3/6 3/6 all 7/12 5/12

How was Naïve Bayes implemented? Calculated Combined Symbol Explanation f uc number of times user (u) acceced resource (c) a 0 < a << 1 to prevent 0 probabilities K Total number of resources n u Length of u’s training set cispecific resourceWindow size n = 20

What are Markov Chains? Sequence probability Sequence Probabilities Total SSSCRRRCS .5x.5x.4x.5x.6x.6x.3x.4 0.00216 SRSRCCCSR .1x.1x.1x.3x.1x.1x.4x.10.00000012 http://techeffigytutorials.blogspot.com/2015/01/markov-chains-explained.html

Consider each day as an independent traceAttack and normal traces separatedDetermine n-gram size using divergence Divergence – largest difference between normal and attackTreat each n-gram within a trace as a stateSum up 1-Probability of each state transition, divide by number of eventsPenalty: if state transition nonexistent, add 5 If higher than threshold classify as an attackHow were Markov Chains implemented?

Day 1 Fun School Fun School Fun Fun Day 2 School Fun School Fun Fun School F S SF FS SFS FSF SFF FFS 1 1 1 1 0.33 1 0.66 1 N-gram size 3 How were Markov Chains implemented? - 0.5 0.5

Normal School Fun School Fun School Fun Attack School School School Fun Fun Fun Sum (1- Pr ) / #events Penalty: If Pr = 0, (1-Pr) = 5(0.5+0+0+0+0.66+0)/60.19(0.5+5+5+5+5+5)/64.25 How were Markov Chains implemented?

How were results presented? AUC

What were the Naïve Bayes results?

What were the Markov Chains results?

What is Mean-Windows-to-First-Alarm? Average amount of windows needed to classify a trace as an attack

What can be concluded? Markov Chain model more accurateAlthough, slower at detecting strong attacksTask based detection comparable (slightly better) than object based detection