artificial neural network for misuse detection

32

Upload: likan-patra

Post on 25-May-2015

1.952 views

Category:

Technology


5 download

TRANSCRIPT

Page 1: Artificial neural network for misuse detection
Page 2: Artificial neural network for misuse detection

INTRUSION DETECTION SYSTEMS (IDS)

• Host-based IDS• Network-based IDS• Vulnerability-assessment IDS

COMPONENT OF Of IDS

• An information source that provides a stream of event records• An analysis engine that identifies signs of intrusions• A response component that gene rates reactions based on the outcome of the analysis engine.

Page 3: Artificial neural network for misuse detection

NEURAL NETWORKS

Page 4: Artificial neural network for misuse detection

NEURAL NETWORK IDS PROTOTYPES

1. Percetron Model:

A single neuron with adjustable synapses and threshold.

Page 5: Artificial neural network for misuse detection

2. Backpropagation Model

3. Perceptron-Backpropagation Hybrid Model

Page 6: Artificial neural network for misuse detection

Neural Network Intrusion Detection Systems

• Computer attack

• Typical characteristics of User

• Computer Viruses

• Malicious Software in Computer Network

Page 7: Artificial neural network for misuse detection

NEGPAIM MODEL

Page 8: Artificial neural network for misuse detection

NEURAL ENGINE• Based Anomaly intrusion detection

• Establish profiles of normal user and compare user behaviors to those profiles

• Investigation of total behaviors of the user

Disadvantages

• A statistical assumption is required

Page 9: Artificial neural network for misuse detection

IMPLEMENTATION

• Uses Multi-layer Pecptron Network

First Stage :

1. Training a set of historical Data

2. Only once for each user

Second Stage:

1. Engine accept input Data

2. Compare with the historical Data

Page 10: Artificial neural network for misuse detection

IMPLEMENTATION OF ANN

1. Incorporating into Modified or Existing Expert system

• The incoming Data is Filtered by Neural Network for suspicious event

• The False alarm should be reduced

Disadvantages:

• Need for update to recognize the new attack

Page 11: Artificial neural network for misuse detection

2. Neural Network as Stand alone System

• Data is received from Network Stream and analyzed for misuse

• Indicative of data is forwarded to automated intrusion response system

Page 12: Artificial neural network for misuse detection

LEVEL OF PROCESSING OF DATA

LEVEL 1: The element of data is selected from packet as Protocol ID, Source Port, Destination Port, Source Address, Destination Address, ICMP type, ICMP Code, Raw data length, Raw.

LEVEEL 2: Converting the nine element data to a standardized numeric representation.

LEVEL 3: Conversion of result data into ASCII coma delimited format that could be used by Neural Network.

Page 13: Artificial neural network for misuse detection

ADVANTAGES OF ANN BASED MISUSE DETECTION

• Analyzing the Data which is incomplete of distorted

• Speed of neural Network

• A particular event was indicative attack can be known

• To Learn the characteristics of Misuse attack

Page 14: Artificial neural network for misuse detection

DISADVANTAGES OF ANN BASED MISUSE DETECTION

• Need accurate training of the system

• Black Box nature of the neural network

• The weight and transfer function of various network nodes are Frozen after a network has achieved a level of success in identification of event

Page 15: Artificial neural network for misuse detection

The early results of tests of these technologies show significant promise, and our future work will involve the refinement of the approach and the development of a full-scale demonstration system

Page 16: Artificial neural network for misuse detection

THANK YOU

Page 17: Artificial neural network for misuse detection
Page 18: Artificial neural network for misuse detection

INTRUSION DETECTION SYSTEMS (IDS)

• Host-based IDS• Network-based IDS• Vulnerability-assessment IDS

COMPONENT OF Of IDS

• An information source that provides a stream of event records• An analysis engine that identifies signs of intrusions• A response component that gene rates reactions based on the outcome of the analysis engine.

Page 19: Artificial neural network for misuse detection

NEURAL NETWORKS

Page 20: Artificial neural network for misuse detection

NEURAL NETWORK IDS PROTOTYPES

1. Percetron Model:

A single neuron with adjustable synapses and threshold.

Page 21: Artificial neural network for misuse detection

2. Backpropagation Model

3. Perceptron-Backpropagation Hybrid Model

Page 22: Artificial neural network for misuse detection

Neural Network Intrusion Detection Systems

• Computer attack

• Typical characteristics of User

• Computer Viruses

• Malicious Software in Computer Network

Page 23: Artificial neural network for misuse detection

NEGPAIM MODEL

Page 24: Artificial neural network for misuse detection

NEURAL ENGINE• Based Anomaly intrusion detection

• Establish profiles of normal user and compare user behaviors to those profiles

• Investigation of total behaviors of the user

Disadvantages

• A statistical assumption is required

Page 25: Artificial neural network for misuse detection

IMPLEMENTATION

• Uses Multi-layer Pecptron Network

First Stage :

1. Training a set of historical Data

2. Only once for each user

Second Stage:

1. Engine accept input Data

2. Compare with the historical Data

Page 26: Artificial neural network for misuse detection

IMPLEMENTATION OF ANN

1. Incorporating into Modified or Existing Expert system

• The incoming Data is Filtered by Neural Network for suspicious event

• The False alarm should be reduced

Disadvantages:

• Need for update to recognize the new attack

Page 27: Artificial neural network for misuse detection

2. Neural Network as Stand alone System

• Data is received from Network Stream and analyzed for misuse

• Indicative of data is forwarded to automated intrusion response system

Page 28: Artificial neural network for misuse detection

LEVEL OF PROCESSING OF DATA

LEVEL 1: The element of data is selected from packet as Protocol ID, Source Port, Destination Port, Source Address, Destination Address, ICMP type, ICMP Code, Raw data length, Raw.

LEVEEL 2: Converting the nine element data to a standardized numeric representation.

LEVEL 3: Conversion of result data into ASCII coma delimited format that could be used by Neural Network.

Page 29: Artificial neural network for misuse detection

ADVANTAGES OF ANN BASED MISUSE DETECTION

• Analyzing the Data which is incomplete of distorted

• Speed of neural Network

• A particular event was indicative attack can be known

• To Learn the characteristics of Misuse attack

Page 30: Artificial neural network for misuse detection

DISADVANTAGES OF ANN BASED MISUSE DETECTION

• Need accurate training of the system

• Black Box nature of the neural network

• The weight and transfer function of various network nodes are Frozen after a network has achieved a level of success in identification of event

Page 31: Artificial neural network for misuse detection

The early results of tests of these technologies show significant promise, and our future work will involve the refinement of the approach and the development of a full-scale demonstration system

Page 32: Artificial neural network for misuse detection

THANK YOU