Project Overview
Download
Report
Transcript Project Overview
Fuzzy Intrusion Detection
Fuzzy Systems
Alireza Shakibaee
June 7, 2005
Agenda
Introduction
IDS functional components
– Information source
– Analysis engine
– Decision maker
Artificial intelligence techniques
Dynamic fuzzy boundary
– Fuzzy logic
– Support vector machine
Conclusion
2
Introduction
Intrusion detection systems focus on
discovering abnormal system events in
computer networks and distributed
communication systems
Uncertainty nature of intrusions => Fuzzy Set
Different levels of security needs => Dynamic
fuzzy boundary
3
Introduction (Cont.)
Intrusion detection systems are important in
maintaining proper network security
People use intrusion detection systems to:
– Monitor the events occurring in a computer
system or network
– Analyze the system events
– Detect suspected intrusion
– Raise an alarm
4
IDS functional components
A typical IDS consists of three functional
components:
– An information source
• Provides a stream of event records (event generator)
– Data sources related to operating systems (system calls)
– Network traffic monitors (generate raw network packets)
– Data collectors of different applications
– An analysis engine
– A decision maker
5
Analysis engine
The analysis engine finds signs of intrusions
There are two basic approaches used to
detect intrusions:
– Misuse detection
• Detects intrusions which follow well-known
patterns
– Anomaly detection
• Recognizes patterns of activities that appear to be
normal
6
Decision maker
Applies some rules on the outcomes of the
analysis engine
Decides what reactions should be done on
the outcomes of the analysis engine
Major function:
– Increase the usability of an intrusion
detection system
7
Artificial intelligence techniques
For a misuse detection system:
– An expert system can be used to store a set of
rules designed to detect the known intrusion
activities
– Pattern matching (Kumar et. al.)
• Known intrusion signatures are encoded as patterns
• Then matched against the audit data introduced by
the analysis component
8
Artificial intelligence techniques (Cont.)
Anomaly intrusion detection consists of two
processes (from the viewpoint of classification):
– Training the parameters of a classifier from a training data set
– Using the classifier to classify a data set
Some approaches:
– Using Hidden Markov Model to analyze the trace of system calls
coming from a UNIX system (Qiao)
– Combining neural networks and fuzzy logic
– Using genetic algorithms to optimize the membership function for
mining fuzzy association rules (Wang)
9
Artificial intelligence techniques (Cont.)
All the methods mentioned use static classifier or
static decision boundary to classify data, then
detect possible intrusions
However,
The security needs may differ for various
applications
There are some connections between:
detection accuracy & computation complexity
10
Fuzzy logic
Fuzzy logic is very appropriate for using on
intrusion detection:
– Usually there is no clear boundary between
normal and anomaly events
• Use of fuzziness to smooth the abrupt separation of
normality and abnormality
– When to raise an alarm is fuzzy
• At what degree of intrusion we should raise an
alarm?
11
Support vector machine
SVM in short is a machine learning method based
on statistical learning theory
SVM classifies data by determining a set of
support vectors, which are members of a set of
training inputs
SVM has two unique features:
– Based on Structural Risk Minimization principal, SVM
minimizes the generalization error
– The ability to overcome the curse of dimensionality
12
Support vector machine (Cont.)
SVM constructs the classifier by evaluating
a kernel function between two vectors of the
training data instead of explicitly mapping
the training data into the high dimensional
feature space
So,
SVM is capable of handling a large
number of features
13
Support vector machine (Cont.)
The nonlinear discrimination function of SVM is:
l
f ( x ) sgn( i yi K ( xi , xi ) b)
i 1
The Radial Basis Function is used as the kernel
function so, the final discrimination function is:
l
2
xi x .
f ( x ) sgn( i yi e
b)
i 1
14
Dynamic fuzzy boundary
A hybrid method consisting SVM & fuzzy logic
techniques is used to develop a dynamic and fuzzy
decision boundary
The dynamic decision boundary is based on a set
of support vectors generated by SVM and fuzzed
with fuzzy logic technique
With the hope of two features:
High generalization from SVM &
flexibility from fuzzy logic
15
Dynamic fuzzy boundary (Cont.)
The basic thought of our method is extracting a
fuzzy rule set from support vectors which are the
training result of a SVM
To make the decision boundary dynamic, we train
a SVM several times using different values of
parameters, extract different fuzzy rule sets, and at
last build a dynamic decision boundary according
to the fuzzy rule sets
16
Dynamic fuzzy boundary (Cont.)
The fuzzy rule set would be like:
where
b0 b, A0k a k (0),
bi i yi , Aik a k ( zik ),
k 1,...,n, i 1,...,m.
17
Dynamic fuzzy boundary (Cont.)
From the fuzzy rule set, the binary
discrimination function can be written as
the following form:
m
f ( x ) sgn(
(b0 t ) (bi t )k 1 aik ( xk z ik )
n
i 1
m
1 (bi t )k 1 aik ( xk z ik )
)
n
i 1
18
Conclusion
Using the proposed method, the decision boundary
can be adjusted easily, and the computing costs
corresponding to different decision boundaries are
different
Larger value of => higher detection rate & high
computation cost
Adjusting the decision boundary must be within a
range (when the accuracy is above some level,
increasing the accuracy becomes more difficult)
19
Conclusion (Cont.)
Users may decrease the computation cost
with only a small accuracy sacrifice
It is also possible to build a dynamic
decision boundary using other popular
artificial intelligence techniques such as,
neural networks, decision tree and Bayesian
Networks
20
Any Question?
21