Skip to main content

Recognizing Unexplained Behavior in Network Traffic

  • Chapter
  • First Online:
Network Science and Cybersecurity

Abstract

Intrusion detection and alert correlation are valuable and complementary techniques for identifying security threats in complex networks. Intrusion detection systems monitor network traffic for suspicious behavior, and trigger security alerts. Alert correlation methods can aggregate such alerts into multi-step attacks scenarios. However, both methods rely on models encoding a priori knowledge of either normal or malicious behavior. As a result, these methods are incapable of quantifying how well the underlying models explain what is observed on the network. To overcome this limitation, we present a framework for evaluating the probability that a sequence of events is not explained by a given a set of models. We leverage important properties of this framework to estimate such probabilities efficiently, and design fast algorithms for identifying sequences of events that are unexplained with a probability above a given threshold. Our framework can operate both at the intrusion detection level and at the alert correlation level. Experiments on a prototype implementation of the framework show that our approach scales well and provides accurate results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    At the intrusion detection level, observable events may simply be observable packet features. At the alert correlation level, observable events are alerts generated by the underlying intrusion detection system.

  2. 2.

    At the intrusion detection level, \( \fancyscript{A} \) is a set of IDS rules. At the alert correlation level, \( \fancyscript{A} \) is a set of attack models, such as attack graphs.

  3. 3.

    http://www.snort.org/.

  4. 4.

    Probabilities of occurrences must be normalized in order to enable comparison of occurrences of different behavior models.

  5. 5.

    This assumption makes modeling simpler, but it can be removed or modified in situations where certain atomic events are shared among multiple attack patterns.

  6. 6.

    For instance, highly threatening behaviors may be assigned a high weight.

  7. 7.

    We do not list all the worlds for reason of space.

  8. 8.

    This objective function is the sum of 34 variables and is not shown for reasons of space.

  9. 9.

    Indeed, the set of constraints becomes non-linear with the addition of the constraints reflecting the independence assumption.

  10. 10.

    The problem of finding all the maximal intersecting sets of occurrences is a generalization of the problem of finding maximal intersecting families of \( k \)-sets, but it is more general as occurrences are not required to have the same length \( k \). As we need to compute maximal intersecting sets for small sets \( \fancyscript{O}^{*} \) of occurrences, complexity of this problem is not an issue.

  11. 11.

    This is a variant of the set cover problem. This is known to be NP-complete, however we need to solve only small instances of this problem, so complexity is not an issue.

References

  1. P. García-Teodoro, J. Díaz-Verdejo, G. Maciá-Fernández, E. Vázquez, Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009)

    Google Scholar 

  2. A. Jones, S. Li, Temporal signatures for intrusion detection, in Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001) (IEEE Computer Society, 2001), New Orleans, pp. 252–261

    Google Scholar 

  3. B. Mukherjee, L.T. Heberlein, K.N. Levitt, Network intrusion detection. IEEE Netw. 8(3), 26–41 (1994)

    Google Scholar 

  4. S.O. Al-Mamory, H. Zhang, Ids alerts correlation using grammar-based approach. J. Comput. Virol. 5(4), 271–282 (2009)

    Article  Google Scholar 

  5. H. Debar, A. Wespi, Aggregation and correlation of intrusion-detection alerts, in Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), eds. W. Lee, L. Mé, A. Wespi. Lecture Notes in Computer Science, vol. 2212 (Springer, 2001), Davis, pp. 85–103

    Google Scholar 

  6. P. Ning, Y. Cui, D.S. Reeves, Constructing attack scenarios through correlation of in- trusion alerts, in Proceedings of the 9th ACM Conference on Computer and Communications Security(CCS 2002) (ACM, 2002), Washington, pp. 245–254

    Google Scholar 

  7. S. Noel, E. Robertson, S. Jajodia, Correlating intrusion events and building attack scenarios through attack graph distances, in Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004) (2004), Tucson, pp. 350–359

    Google Scholar 

  8. L. Wang, A. Liu, S. Jajodia, Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Comput. Commun. 29(15), 2917–2933 (2006)

    Article  Google Scholar 

  9. J.P. Anderson, Computer security threat monitoring and surveillance. Technical report, James Anderson Co., Fort Washington, Apr 1980

    Google Scholar 

  10. O. Sheyner, J. Haines, S. Jha, R. Lippmann, J.M. Wing, Automated generation and analysis of attack graphs, in Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P 2002), Berkeley, 2002, pp. 273–284

    Google Scholar 

  11. X. Qin, A probabilistic-based framework for INFOSEC alert correlation. Ph.D. thesis, Georgia Institute of Technology, 2005

    Google Scholar 

  12. X. Qin, W. Lee, Statistical causality analysis of INFOSEC alert data, in Proceedings of the 6th International Symposium on Re- cent Advances in Intrusion Detection (RAID 2003), eds. G. Vigna, C. Kruegel, E. Jonsson. Lecture Notes in Computer Science, vol. 2820 (Springer, 2003), Pittsburgh pp. 73–93

    Google Scholar 

  13. A.J. Oliner, A.V. Kulkarni, A. Aiken, Community epidemic detection using time- correlated anomalies, in Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), eds. S. Jha, R. Sommer, C. Kreibich. Lecture Notes in Computer Science, vol. 6307 (Springer, 2010), Ottawa, pp. 360–381

    Google Scholar 

  14. M. Albanese, C. Molinaro, F. Persia, A. Picariello, V.S. Subrahmanian, Finding “un- explained” activities in video, in Proceedings of the 22nd International Joint Conference on Artificial Intelligence (IJCAI 2011), Barcelona, 2011, pp. 1628–1634

    Google Scholar 

  15. M. Albanese, S. Jajodia, A. Pugliese, V.S. Subrahmanian, Scalable analysis of attack scenarios, in Proceedings of the 16th European Symposium on Research in Computer Security (ESORICS 2011) (Springer, 2011), Leuven, pp. 416–433

    Google Scholar 

Download references

Acknowledgments

The work presented in this chapter is supported in part by the Army Research Office under MURI award number W911NF-09-1-05250525, and by the Office of Naval Research under award number N00014-12-1-0461. Part of the work was performed while Sushil Jajodia was a Visiting Researcher at the US Army Research Laboratory.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Massimiliano Albanese .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

Albanese, M. et al. (2014). Recognizing Unexplained Behavior in Network Traffic. In: Pino, R. (eds) Network Science and Cybersecurity. Advances in Information Security, vol 55. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7597-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-7597-2_3

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-7596-5

  • Online ISBN: 978-1-4614-7597-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics