SlideShare a Scribd company logo
A Testbed for Quantitative and Metrics Based Assessment of IDS By Farhan Mirza 60-520
Contents Introduction Intrusion Detection System Air Force Evaluation Environment LARIAT TIDeS Tests and Results Conclusion
Core Papers Gautam Singaraju, Lawrence Teo, Yuliang Zheng, “ A Testbed for Quantitative Assessment of IDS using Fuzzy Logic ”,  Laboratory of Information Integration Security and Privacy (LIISP), University of North Carolina at Charlotte Calpytix Security Corporation, USA, Appears in Proceeding of the Second IEEE International Information Assurance Workshop (IWIA ‘04) P. Mell, V. Hu, R. Lippmann. J. Haines, and M. Zissman. “ An overview of issues in testing intrusion detection systems” . NIST Interagency Report NIST IR 7007, NIST,  http://csrc.nist.gov/publications/nistir/nistir-7007.pdf , June 2003 E. Biermann, E. Clote, and L. Venter; “ A comparison of Intrusion Detection Systems”;  Computers and Security, Pages 676-683, 2001 R. Lippman, J. W. Haines, D. J. Fried, J. Korba, and K. Das; “ The 1999 DARPA Off-line Intrusion Detection Evaluation ”;  http://www.ll.mit.edu/IST/ideval/pubs/2000/1999EvalComputerNeworks2000.pdf L. M. Rossey., R. K. Cunnigham, D. J. Fried, Jl C. Rabek, R. P. Lippmann, and J. W. Haines.  Lariat: Lincoln adaptable real-time information assurance testbed . Fourth International Workshop on Recent Advances in Intrusion Detection, 2001 T. G. Champion and R. S. Durst.  Air force intrusion detection system evaluation environment .  RAID Symposium , 1999
Introduction Intrusion Detection System Major investment for a firm Common component in the corporate and home network Growing in popularity Commercial IDS are costly Few are free, but effectiveness is doubtful
Introduction  (Cont..) IDSs employ different technologies Claim to effectively detect an intrusion In specific test environment - Technologies evokes question about their effectiveness and performance Under scrutiny are network parameters – network bandwidth conditions, out-of-order packet sequence etc Careful evaluations of IDSs are desired to check its effectiveness by varying network parameters [2]
IDS Testbeds Testbed Development - Defense Advanced Research Projects Agency (DARPA) and Air Force in association with Lincoln Lab Unavailable to public for evaluation Air Force Evaluation Environment [7] Lincoln Adaptable Real-Time Information Assurance Testbed (LARIAT) [3]
Metrics to quantify an IDS Apart from strong testing scenario – required a robust and reliable metrics to quantify an IDS One of the metrics suggested by National Institute of Standards and Technology (NIST) [4] Based on quantitative analysis of IDS by varying network parameters Legitimate and illegitimate traffic can easily be included  for system testing User should be able to customize the testbed Other words - testbed should be built with plug-n-play architecture and be scalable
Air Force Evaluation Environment Simulates the complexity of MAN found at military bases Theoretically top-level firewall protect single entry point into base MAN Size and diversity is simulated using software to dynamically assign arbitrary source protocol addresses Uses two traffic generators Outside machine – ran network sessions between the model base and simulated Internet Inside machine – ran network sessions within the model base’s address space and simulated in presence of larger network Entire testbed was completely isolated in AFRL’s laboratory
AFRL Virtual Test Network Architecture
AFRL Actual Physical Network
AFRL Traffic Generator Architecture Five layers to design The scheduler The master controller The slave layer The automata layer The virtual networking layer
Full-Time traffic generation system architecture
LARIAT – Lincoln Adaptable Real-Time Information Assurance Testbed An extension of testbed created for DARPA 1998 & 1999 intrusion detection evaluations Two design goals Supports real-time evaluations Create a deployable, configurable and easy-to-use testbed Supports automated and quantitative evaluations Components – generate realistic background user traffic and real network attacks, verify attack success or failure, score ID system performance Provides graphical user interface to control and monitoring Currently being exercised at four sites
LARIAT Experiment Steps Initialize Network Distribute Configuration Pre-Conditions Run Traffic Verify and Score Clean Up
Automated Run Sequence
LARIAT GUI
Software Components
Sample Attack Scenario available with LARIAT
Testbed for evaluating Intrusion Detection Systems (TIDeS) Scalable architecture with rigid matrices for evaluation, that forms the foundation for the TIDeS framework Evaluates IDSs on a common Platform Based on Fuzzy Logic User can customize the testing scenarios by being able to add or remove attacks from attack database Allows a set of IDSs to determine the best IDS amongst them in specific environment
Testbed Architecture
Capabilities of TIDeS To add new protocols To add new scripts Default protocols – HTTP, SMTP, POP3, TELNET, FTP and SSH Depend on scenario - Data is captured from short time  to 24/7
Testing Scenarios Non-environmental based testing scenario Does not depend on data that has been collected on the network Test Conducted in this Scenario All-legitimate traffic testing Launches only legitimate traffic Network traffic is increased till network breaks down # of false alarms determined and classified as false positives All-illegitimate traffic testing Launches only attacks from attack database Network traffic is increased till network breaks down If attack is not detected by IDS, it could be classified as false negative Mixed traffic testing Launches both legitimate and illegitimate traffic Traffic generated randomly and launched traffic is logged Network traffic is increased till network breaks down IDS output and logged launch traffic profile determine false alarms
Testing Scenarios   (Cont…) Environmental based testing scenario Depends upon the traffic that has been captured from the user’s network Important as the IDS evaluation performed under the actual network condition  Such a testing of entire spectrum of conditions leads to the effective evaluation of IDSs The results from testing is provided to Fuzzy Logic evaluation Framework
Components of TIDeS Architecture Handler Virtual Machine Emulator Launcher Environment Profile Generator Scripts Evaluation Framework
Handler Main Controller An Interface to the testbed Provides capability of monitoring the tests
Virtual Machine Emulator Emulates numerous virtual machines with unique IP addresses Maps entire network into a single computer Capability to emulate routers and each virtual machine can have a different OS Virtual network setup is created Honeyd is used
Launcher Launcher generates traffic when a control signal is received from handler through the agent and then to virtual machine emulator Launcher in turn activates the scripts that generate traffic Launcher then launch environment profile Handler activates the launcher Accessing the different services – the scripts create the traffic on the network
Environment Profile Generator Used to generate the environmental traffic patterns of the user’s network Generated from the real-time condition by analyzing networks Environment profile is exported to the machine that hosts the virtual machine emulator Traffic generator generates different environment profiles for each of the IP address
Environment Profiles in TIDeS framework University Environment Profile Stand-alone Environment Profile Home Environment Profile
University Environment Profile Number of Server used – 4 All servers used in University environment Server 1 – Accepts HTTP connections Server 2 – Interactive server that accepts SSH, TELNET and FTP connections Server 3 – One of 2 mail servers, accepts SMTP connections Server 4 – Other mail server, accepts POP and IMAP connections Both mail servers also accept SSH connections only for management staff Servers run on Sun Solaris OS Snoop is used as packet capturing application developed by Sun Microsystems Servers are working for working day period of a day
Home Environment Profile Generated by monitoring a Home system Exposed  to many attacks from the Internet for short duration Typically connect using modems, over slow connection usually at  56kbps Profile need not be monitored for longer period and hence have different evaluation scenario Connections and data throughput is measured for 3-hours period
Stand-alone Environment Profile Generated to monitor a Stand-alone system Connected to the system and is not disconnected from the system for long periods of time Connected to broadband Vulnerable to attacks from Internet and also from insider attacks Monitored for 24 hours a day for 7 days a week
Scripts Operating system independent and activated by launcher Connect the server and interact with there service on the server 6 legitimate scripts and 40 attack scripts used in TIDeS
Few of Default Attack Scripts with TIDeS
Evaluation Framework TIDeS - many parameters for IDS evaluation Depth – defined as number of attacks detected by the system to the total number of known attacks Breadth – defined as the number of unknown attacks to the attacks detected that fall outside the framework of system’s attack database False alarms – performance under stress, reliability and accuracy of detecting individual attacks Evaluation - based on error rate and network load parameters Decision making process – Based on fuzzy logic and fuzzy rules Performance evaluation are performed using false positives, false negatives, and cumulative false alarms
Evaluation Metrics Managerial and architectural Metrics Performance Metrics Analytical Metrics Interactivity Metrics
Managerial and Architectural Metrics Evaluate the architecture efficiency of an IDS Matrics are: Distributed Management Determines the distribution capabilities among different analyzers Configuration Difficulty How well a user understands the deployment of an IDS would enable a correct deployment of the IDS Ease of Policy and License Management Ease of setting security and intrusion detection policies as well as the difficulty in obtaining, updating and extending licenses Availability of Updates Availability and cost of updates of signature and/or behavior profiles as well as the availability and cost of product upgrades
Managerial and Architectural Metrics  (Cont…) Adjustable Sensitivity Ease of altering the sensitivity of IDS at various times and for different environments in order to achieve a balance between false positive and false negative error rates Data Storage Capacity Needs Amount of disk space consumed for storing the signature profiles, logs and other application data. Scalable Load Balancing Measures the ability of an IDS to partition traffic into independent, balanced sensor loads, and the ability of load-balancing sub process to scale upwards and downwards
Performance Metrics Measure and evaluate the parameters that impact the performance of the IDS Metrics are: Observed False Positive Ratio This is the ratio of alarms wrongly raised by the IDS to the total number of transactions. The  False Positive Ratio  is given by False Negative Ratio This is the ratio of actual attacks that are not detected by the IDS to the total number of transactions. This is given by  1 2
Performance Metrics  (Cont..) Cumulative False Alarm Rate The weighted average of False Positive and False Negative ratios Induced Traffic Latency Given by the delay measured in the arrival of the packets at the target network in the presence and absence of an IDS. Stress Handling and Point of Breakdown Point of breakdown of an IDS is defined as the level of network or host traffic that results in a shutdown or malfunction of IDS. It is measured as packets/sec or number of simultaneous TCP streams IDS Throughput Defined as the observed level of traffic up to which the IDS performs without dropping any packets.
Analytical Metrics Depth and Breath of System’s Detection Capability Depth:  defined as the number of attack signature patterns and/or behavior models known to it.  Breadth:  given by the number of attacks and intrusions recognized by the IDS that lie outside its knowledge domain Reliability of Attack Detection Defined as the ratio of false positives to total alarms raised. Reliability of attack detection is given by 3
Analytical Metrics  (Cont..) Possibility of Attack Defined as the ratio of false negatives to true negatives.  Possibility of attack is given by Consistency Given by the variation in the performance (false positive and false negative measurement) of an IDS under varying network load and traffic environments Error Reporting and Recovery Extent of event notification and logging. This is again a subjective criteria requiring user discretion 4
Interactivity Metrics These are again a set of subjective metrics demanding user analysis These metrics are: Firewall Interaction : Ability to interact with the Firewall systems Router Interaction : Degree to which an IDS interacts with the router and redirects attacker’s traffic to a Honeypot SNMP interaction : Ability of an IDS to send an SNMP trap to one or more network devices in response to a detected attack User friendliness : The ease to set up and configure an IDS in users’ environment
Fuzzy Logic Basics Fuzzy Set  extension of classical set theory and are used in fuzzy logic  involve in capturing, representing and working with linguistic notations objects with unclear boundaries Fuzzy Systems  knowledge-based or rule-based systems at the heart of which is a knowledge-base system consisting of so-called fuzzy IF-THEN rules A fuzzy IF-THEN rule is an IF-THEN statement  Example: Fuzzy IF-THEN rule: IF the false alarm rate of the IDS is high, THENlesserscoreisawardedtotheIDS
Fuzzy Logic with IDS Fuzzy Logic – provides simple non-linear logical solution to the problem of measuring IDS capabilities Fuzzy set approach – starts off by encapsulating all available domain knowledge and organizing it into a manageable format Collection of IF-THEN rules forms a suitable control and decision making protocol These rules include linguistic terms given in above equation
IDS testing and evaluation Basic Tests - Test 1: Testing for False Alarms Case 1: False Positive Only attack traffic launched Network load is measured as % of total network bandwidth % false positive alarms are measure as per equation 1 Mapping the %FP and average network loads during the testing phase, onto their respective fuzzy sets Testing is carried out until system breaks down
Test 1: Testing for False Alarms   Case 2: False Negative Similar process is repeated for false negatives with only legitimate traffic launched the IDS Amount of traffic predicted as attacks now become the false negatives  Similar calculations are made for false negatives giving us the output false negative performance set Case 3: Cumulative False Alarms Output sets obtained in the above tests are fed back to the fuzzy evaluator to obtain a cumulative performance report for the system.  This process is known as forward chaining, where the fuzzy result of one test is forwarded for further evaluation The evaluation process would be similar to the above discussed method, giving us a precise grade for the system’s error rate performance on a fuzzy scale
Test 2: Consistency and Reliability   Error consistency test The test is similar to test 1  However, network traffic is a mixture of legitimate as well as attack traffic The %error in this case is measured as follows: The performance of the IDS tested at various network loads and its consistency checked against the results of test 1 Besides error consistency, also measure the ratio of %FP to %FN. The possibility of attack given by  Percentage possibility of Attack = 5 6
Results Various quantitative analysis is performed on the IDS during the testing phase with the TIDeS framework Evaluations performed on the working of well-known IDS  Preliminary results Alerts generated by an IDS when there was no illegitimate traffic launched on the network  Testing launched 897 legitimate traffic transactions Total 170 attacks were detected under a network load of 10% of a T1 LAN connection Indicates an 18.5% error in the detection capabilities
Conclusion  Testing and Selecting an IDS is a major challenge TIDeS Testbed – allows users to select best IDS for specific customized environment Based on reliable and robust metrics Development of traffic profiles and evaluation framework allows TIDeS to be built to evaluate systems in users environment Fuzzy logic Evaluation Framework can also be used to evaluate an IDS
Future Work The output of IDS are not conforming to a standard format – can be achieved using IDMEF IDMEF – converts the output of a system into XML format - need to be tested with TIDeS As many attacks are discovered everyday – incorporating more scripts are required
References [1] E. Biermann, E. Clote, and L. Venter. A cpmparison of Intrusion Detection Systems. Computers and Security, Pages 676-683, 2001 [2] C. Iheagwara and A. Blyth. Evaluation of the performance of ID systems in a switched and distributed environment: The International Journal of Computer and Telecommunications Networking, 39(2): 93-112, June 2002 [3] L. M. Rossey., R. K. Cunnigham, D. J. Fried, Jl C. Rabek, R. P. Lippmann, and J. W. Haines. Lariat: Lincoln adaptable real-time information assurance testbed. Fourth International Workshop on Recent Advances in Intrusion Detection, 2001 [4] P. Mell, V. Hu, R. Lippmann. J. Haines, and M. Zissman. An overview of issues in testing intrusion detection systems. NIST Interagency Report NIST IR 7007, NIST,  http://csrc.nist.gov/publications/nistir/nistir-7007.pdf , June 2003 [5] N. Provos. Honeyd - a virtual honeypot daemon (extended abstract).  10th DFN-CERT Workshop, Hamburg, Germany , February 2003.  www.citi.umich.edu/u/provos/papers/honeyd-eabstract.pdf [6] Gautam Singaraju, Lawrence Teo, Yuliang Zheng, “A Testbed for Quantitative Assessment of IDS using Fuzzy Logic”,  Laboratory of Information Integration Security and Privacy (LIISP), University of North Carolina at Charlotte Calpytix Security Corporation, USA  http:// www.calpytix.com , Appears in Proceeding of the Second IEEE International Information Assurance Workshop (IWIA ‘04) [7] T. G. Champion and R. S. Durst. Air force intrusion detection system evaluation environment.  RAID Symposium , 1999 [8] R. Lippman, J. W. Haines, D. J. Fried, J. Korba, and K. Das; “The 1999 DARPA Off-line Intrusion Detection Evaluation”; http://www.ll.mit.edu/IST/ideval/pubs/2000/1999EvalComputerNeworks2000.pdf
Questions Ask now, or e-mail me [email_address]
Thanks!

More Related Content

PDF
IDS - Fact, Challenges and Future
PPT
Finding Diversity In Remote Code Injection Exploits
PDF
Intrusion Alert Correlation
PPTX
Intrusion detection using data mining
PDF
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
PPTX
Databse Intrusion Detection Using Data Mining Approach
PPT
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
PPT
Intrusion Detection Techniques for Mobile Wireless Networks
IDS - Fact, Challenges and Future
Finding Diversity In Remote Code Injection Exploits
Intrusion Alert Correlation
Intrusion detection using data mining
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
Databse Intrusion Detection Using Data Mining Approach
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Intrusion Detection Techniques for Mobile Wireless Networks

What's hot (20)

PPTX
Intrusion Detection with Neural Networks
PDF
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
PDF
A Study on Data Mining Based Intrusion Detection System
PDF
Layered approach
PPT
IDS Network security - Bouvry
PPSX
Practical real-time intrusion detection using machine learning approaches
DOC
A wireless intrusion detection system and a new attack model (synopsis)
PDF
Deep Learning based Threat / Intrusion detection system
PPTX
Understand How Machine Learning Defends Against Zero-Day Threats
PDF
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
PDF
Optimized Intrusion Detection System using Deep Learning Algorithm
PPT
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
PDF
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
PPTX
DM for IDS
PPTX
Network Intrusion Detection and Countermeasure Selection
PPTX
Deep learning approach for network intrusion detection system
PPTX
Network security using data mining concepts
PPTX
Cyber intrusion
PPTX
Cybersecurity - Jim Butterworth
PDF
Malware classification and detection
Intrusion Detection with Neural Networks
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
A Study on Data Mining Based Intrusion Detection System
Layered approach
IDS Network security - Bouvry
Practical real-time intrusion detection using machine learning approaches
A wireless intrusion detection system and a new attack model (synopsis)
Deep Learning based Threat / Intrusion detection system
Understand How Machine Learning Defends Against Zero-Day Threats
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
Optimized Intrusion Detection System using Deep Learning Algorithm
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
DM for IDS
Network Intrusion Detection and Countermeasure Selection
Deep learning approach for network intrusion detection system
Network security using data mining concepts
Cyber intrusion
Cybersecurity - Jim Butterworth
Malware classification and detection
Ad

Similar to Testbed For Ids (20)

PPTX
Understanding Intrusion Detection & Prevention Systems (1).pptx
PDF
Intrusion detection
PPT
CyberCrime in the Cloud and How to defend Yourself
PDF
IRJET - IDS for Wifi Security
PDF
NSA and PT
PDF
Ijnsa050214
PPTX
Security and-visibility
PPT
Day4
PDF
Denial of Service Attack Defense Techniques
PDF
Why Penetration Testing Services Cyber51
PDF
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
PPTX
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
PPTX
Intrusion Detection Systems Pedagogy.pptx
PDF
Cyber Security Notes Unit 4 for Engineering
PDF
Survey of Clustering Based Detection using IDS Technique
PDF
Security Operation Center : Le Centre des Opérations de Sécurité est une div...
PDF
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
PPTX
Understanding Intrusion Detection & Prevention Systems (1).pptx
Intrusion detection
CyberCrime in the Cloud and How to defend Yourself
IRJET - IDS for Wifi Security
NSA and PT
Ijnsa050214
Security and-visibility
Day4
Denial of Service Attack Defense Techniques
Why Penetration Testing Services Cyber51
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Intrusion Detection Systems Pedagogy.pptx
Cyber Security Notes Unit 4 for Engineering
Survey of Clustering Based Detection using IDS Technique
Security Operation Center : Le Centre des Opérations de Sécurité est une div...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
Ad

More from amiable_indian (20)

PDF
Phishing As Tragedy of the Commons
PDF
Cisco IOS Attack & Defense - The State of the Art
PDF
Secrets of Top Pentesters
PPS
Workshop on Wireless Security
PDF
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
PPS
Workshop on BackTrack live CD
PPS
Reverse Engineering for exploit writers
PPS
State of Cyber Law in India
PPS
AntiSpam - Understanding the good, the bad and the ugly
PPS
Reverse Engineering v/s Secure Coding
PPS
Network Vulnerability Assessments: Lessons Learned
PPS
Economic offenses through Credit Card Frauds Dissected
PPS
Immune IT: Moving from Security to Immunity
PPS
Reverse Engineering for exploit writers
PPS
Hacking Client Side Insecurities
PDF
Web Exploit Finder Presentation
PPT
Network Security Data Visualization
PPT
Enhancing Computer Security via End-to-End Communication Visualization
PDF
Top Network Vulnerabilities Over Time
PDF
What are the Business Security Metrics?
Phishing As Tragedy of the Commons
Cisco IOS Attack & Defense - The State of the Art
Secrets of Top Pentesters
Workshop on Wireless Security
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Workshop on BackTrack live CD
Reverse Engineering for exploit writers
State of Cyber Law in India
AntiSpam - Understanding the good, the bad and the ugly
Reverse Engineering v/s Secure Coding
Network Vulnerability Assessments: Lessons Learned
Economic offenses through Credit Card Frauds Dissected
Immune IT: Moving from Security to Immunity
Reverse Engineering for exploit writers
Hacking Client Side Insecurities
Web Exploit Finder Presentation
Network Security Data Visualization
Enhancing Computer Security via End-to-End Communication Visualization
Top Network Vulnerabilities Over Time
What are the Business Security Metrics?

Recently uploaded (20)

PPTX
Introduction to Customs (June 2025) v1.pptx
PDF
Why Ignoring Passive Income for Retirees Could Cost You Big.pdf
PDF
Copia de Minimal 3D Technology Consulting Presentation.pdf
PDF
ECONOMICS AND ENTREPRENEURS LESSONSS AND
PDF
ABriefOverviewComparisonUCP600_ISP8_URDG_758.pdf
PDF
discourse-2025-02-building-a-trillion-dollar-dream.pdf
PPTX
Session 3. Time Value of Money.pptx_finance
PDF
financing insitute rbi nabard adb imf world bank insurance and credit gurantee
PDF
Bitcoin Layer August 2025: Power Laws of Bitcoin: The Core and Bubbles
PPTX
FL INTRODUCTION TO AGRIBUSINESS CHAPTER 1
PPTX
Unilever_Financial_Analysis_Presentation.pptx
PPT
E commerce busin and some important issues
PPTX
social-studies-subject-for-high-school-globalization.pptx
PPT
KPMG FA Benefits Report_FINAL_Jan 27_2010.ppt
PPTX
Antihypertensive_Drugs_Presentation_Poonam_Painkra.pptx
PDF
5a An Age-Based, Three-Dimensional Distribution Model Incorporating Sequence ...
PPTX
Who’s winning the race to be the world’s first trillionaire.pptx
PDF
Dr Tran Quoc Bao the first Vietnamese speaker at GITEX DigiHealth Conference ...
PDF
Corporate Finance Fundamentals - Course Presentation.pdf
PDF
Chapter 9 IFRS Ed-Ed4_2020 Intermediate Accounting
Introduction to Customs (June 2025) v1.pptx
Why Ignoring Passive Income for Retirees Could Cost You Big.pdf
Copia de Minimal 3D Technology Consulting Presentation.pdf
ECONOMICS AND ENTREPRENEURS LESSONSS AND
ABriefOverviewComparisonUCP600_ISP8_URDG_758.pdf
discourse-2025-02-building-a-trillion-dollar-dream.pdf
Session 3. Time Value of Money.pptx_finance
financing insitute rbi nabard adb imf world bank insurance and credit gurantee
Bitcoin Layer August 2025: Power Laws of Bitcoin: The Core and Bubbles
FL INTRODUCTION TO AGRIBUSINESS CHAPTER 1
Unilever_Financial_Analysis_Presentation.pptx
E commerce busin and some important issues
social-studies-subject-for-high-school-globalization.pptx
KPMG FA Benefits Report_FINAL_Jan 27_2010.ppt
Antihypertensive_Drugs_Presentation_Poonam_Painkra.pptx
5a An Age-Based, Three-Dimensional Distribution Model Incorporating Sequence ...
Who’s winning the race to be the world’s first trillionaire.pptx
Dr Tran Quoc Bao the first Vietnamese speaker at GITEX DigiHealth Conference ...
Corporate Finance Fundamentals - Course Presentation.pdf
Chapter 9 IFRS Ed-Ed4_2020 Intermediate Accounting

Testbed For Ids

  • 1. A Testbed for Quantitative and Metrics Based Assessment of IDS By Farhan Mirza 60-520
  • 2. Contents Introduction Intrusion Detection System Air Force Evaluation Environment LARIAT TIDeS Tests and Results Conclusion
  • 3. Core Papers Gautam Singaraju, Lawrence Teo, Yuliang Zheng, “ A Testbed for Quantitative Assessment of IDS using Fuzzy Logic ”, Laboratory of Information Integration Security and Privacy (LIISP), University of North Carolina at Charlotte Calpytix Security Corporation, USA, Appears in Proceeding of the Second IEEE International Information Assurance Workshop (IWIA ‘04) P. Mell, V. Hu, R. Lippmann. J. Haines, and M. Zissman. “ An overview of issues in testing intrusion detection systems” . NIST Interagency Report NIST IR 7007, NIST, http://csrc.nist.gov/publications/nistir/nistir-7007.pdf , June 2003 E. Biermann, E. Clote, and L. Venter; “ A comparison of Intrusion Detection Systems”; Computers and Security, Pages 676-683, 2001 R. Lippman, J. W. Haines, D. J. Fried, J. Korba, and K. Das; “ The 1999 DARPA Off-line Intrusion Detection Evaluation ”; http://www.ll.mit.edu/IST/ideval/pubs/2000/1999EvalComputerNeworks2000.pdf L. M. Rossey., R. K. Cunnigham, D. J. Fried, Jl C. Rabek, R. P. Lippmann, and J. W. Haines. Lariat: Lincoln adaptable real-time information assurance testbed . Fourth International Workshop on Recent Advances in Intrusion Detection, 2001 T. G. Champion and R. S. Durst. Air force intrusion detection system evaluation environment . RAID Symposium , 1999
  • 4. Introduction Intrusion Detection System Major investment for a firm Common component in the corporate and home network Growing in popularity Commercial IDS are costly Few are free, but effectiveness is doubtful
  • 5. Introduction (Cont..) IDSs employ different technologies Claim to effectively detect an intrusion In specific test environment - Technologies evokes question about their effectiveness and performance Under scrutiny are network parameters – network bandwidth conditions, out-of-order packet sequence etc Careful evaluations of IDSs are desired to check its effectiveness by varying network parameters [2]
  • 6. IDS Testbeds Testbed Development - Defense Advanced Research Projects Agency (DARPA) and Air Force in association with Lincoln Lab Unavailable to public for evaluation Air Force Evaluation Environment [7] Lincoln Adaptable Real-Time Information Assurance Testbed (LARIAT) [3]
  • 7. Metrics to quantify an IDS Apart from strong testing scenario – required a robust and reliable metrics to quantify an IDS One of the metrics suggested by National Institute of Standards and Technology (NIST) [4] Based on quantitative analysis of IDS by varying network parameters Legitimate and illegitimate traffic can easily be included for system testing User should be able to customize the testbed Other words - testbed should be built with plug-n-play architecture and be scalable
  • 8. Air Force Evaluation Environment Simulates the complexity of MAN found at military bases Theoretically top-level firewall protect single entry point into base MAN Size and diversity is simulated using software to dynamically assign arbitrary source protocol addresses Uses two traffic generators Outside machine – ran network sessions between the model base and simulated Internet Inside machine – ran network sessions within the model base’s address space and simulated in presence of larger network Entire testbed was completely isolated in AFRL’s laboratory
  • 9. AFRL Virtual Test Network Architecture
  • 11. AFRL Traffic Generator Architecture Five layers to design The scheduler The master controller The slave layer The automata layer The virtual networking layer
  • 12. Full-Time traffic generation system architecture
  • 13. LARIAT – Lincoln Adaptable Real-Time Information Assurance Testbed An extension of testbed created for DARPA 1998 & 1999 intrusion detection evaluations Two design goals Supports real-time evaluations Create a deployable, configurable and easy-to-use testbed Supports automated and quantitative evaluations Components – generate realistic background user traffic and real network attacks, verify attack success or failure, score ID system performance Provides graphical user interface to control and monitoring Currently being exercised at four sites
  • 14. LARIAT Experiment Steps Initialize Network Distribute Configuration Pre-Conditions Run Traffic Verify and Score Clean Up
  • 18. Sample Attack Scenario available with LARIAT
  • 19. Testbed for evaluating Intrusion Detection Systems (TIDeS) Scalable architecture with rigid matrices for evaluation, that forms the foundation for the TIDeS framework Evaluates IDSs on a common Platform Based on Fuzzy Logic User can customize the testing scenarios by being able to add or remove attacks from attack database Allows a set of IDSs to determine the best IDS amongst them in specific environment
  • 21. Capabilities of TIDeS To add new protocols To add new scripts Default protocols – HTTP, SMTP, POP3, TELNET, FTP and SSH Depend on scenario - Data is captured from short time to 24/7
  • 22. Testing Scenarios Non-environmental based testing scenario Does not depend on data that has been collected on the network Test Conducted in this Scenario All-legitimate traffic testing Launches only legitimate traffic Network traffic is increased till network breaks down # of false alarms determined and classified as false positives All-illegitimate traffic testing Launches only attacks from attack database Network traffic is increased till network breaks down If attack is not detected by IDS, it could be classified as false negative Mixed traffic testing Launches both legitimate and illegitimate traffic Traffic generated randomly and launched traffic is logged Network traffic is increased till network breaks down IDS output and logged launch traffic profile determine false alarms
  • 23. Testing Scenarios (Cont…) Environmental based testing scenario Depends upon the traffic that has been captured from the user’s network Important as the IDS evaluation performed under the actual network condition Such a testing of entire spectrum of conditions leads to the effective evaluation of IDSs The results from testing is provided to Fuzzy Logic evaluation Framework
  • 24. Components of TIDeS Architecture Handler Virtual Machine Emulator Launcher Environment Profile Generator Scripts Evaluation Framework
  • 25. Handler Main Controller An Interface to the testbed Provides capability of monitoring the tests
  • 26. Virtual Machine Emulator Emulates numerous virtual machines with unique IP addresses Maps entire network into a single computer Capability to emulate routers and each virtual machine can have a different OS Virtual network setup is created Honeyd is used
  • 27. Launcher Launcher generates traffic when a control signal is received from handler through the agent and then to virtual machine emulator Launcher in turn activates the scripts that generate traffic Launcher then launch environment profile Handler activates the launcher Accessing the different services – the scripts create the traffic on the network
  • 28. Environment Profile Generator Used to generate the environmental traffic patterns of the user’s network Generated from the real-time condition by analyzing networks Environment profile is exported to the machine that hosts the virtual machine emulator Traffic generator generates different environment profiles for each of the IP address
  • 29. Environment Profiles in TIDeS framework University Environment Profile Stand-alone Environment Profile Home Environment Profile
  • 30. University Environment Profile Number of Server used – 4 All servers used in University environment Server 1 – Accepts HTTP connections Server 2 – Interactive server that accepts SSH, TELNET and FTP connections Server 3 – One of 2 mail servers, accepts SMTP connections Server 4 – Other mail server, accepts POP and IMAP connections Both mail servers also accept SSH connections only for management staff Servers run on Sun Solaris OS Snoop is used as packet capturing application developed by Sun Microsystems Servers are working for working day period of a day
  • 31. Home Environment Profile Generated by monitoring a Home system Exposed to many attacks from the Internet for short duration Typically connect using modems, over slow connection usually at 56kbps Profile need not be monitored for longer period and hence have different evaluation scenario Connections and data throughput is measured for 3-hours period
  • 32. Stand-alone Environment Profile Generated to monitor a Stand-alone system Connected to the system and is not disconnected from the system for long periods of time Connected to broadband Vulnerable to attacks from Internet and also from insider attacks Monitored for 24 hours a day for 7 days a week
  • 33. Scripts Operating system independent and activated by launcher Connect the server and interact with there service on the server 6 legitimate scripts and 40 attack scripts used in TIDeS
  • 34. Few of Default Attack Scripts with TIDeS
  • 35. Evaluation Framework TIDeS - many parameters for IDS evaluation Depth – defined as number of attacks detected by the system to the total number of known attacks Breadth – defined as the number of unknown attacks to the attacks detected that fall outside the framework of system’s attack database False alarms – performance under stress, reliability and accuracy of detecting individual attacks Evaluation - based on error rate and network load parameters Decision making process – Based on fuzzy logic and fuzzy rules Performance evaluation are performed using false positives, false negatives, and cumulative false alarms
  • 36. Evaluation Metrics Managerial and architectural Metrics Performance Metrics Analytical Metrics Interactivity Metrics
  • 37. Managerial and Architectural Metrics Evaluate the architecture efficiency of an IDS Matrics are: Distributed Management Determines the distribution capabilities among different analyzers Configuration Difficulty How well a user understands the deployment of an IDS would enable a correct deployment of the IDS Ease of Policy and License Management Ease of setting security and intrusion detection policies as well as the difficulty in obtaining, updating and extending licenses Availability of Updates Availability and cost of updates of signature and/or behavior profiles as well as the availability and cost of product upgrades
  • 38. Managerial and Architectural Metrics (Cont…) Adjustable Sensitivity Ease of altering the sensitivity of IDS at various times and for different environments in order to achieve a balance between false positive and false negative error rates Data Storage Capacity Needs Amount of disk space consumed for storing the signature profiles, logs and other application data. Scalable Load Balancing Measures the ability of an IDS to partition traffic into independent, balanced sensor loads, and the ability of load-balancing sub process to scale upwards and downwards
  • 39. Performance Metrics Measure and evaluate the parameters that impact the performance of the IDS Metrics are: Observed False Positive Ratio This is the ratio of alarms wrongly raised by the IDS to the total number of transactions. The False Positive Ratio is given by False Negative Ratio This is the ratio of actual attacks that are not detected by the IDS to the total number of transactions. This is given by 1 2
  • 40. Performance Metrics (Cont..) Cumulative False Alarm Rate The weighted average of False Positive and False Negative ratios Induced Traffic Latency Given by the delay measured in the arrival of the packets at the target network in the presence and absence of an IDS. Stress Handling and Point of Breakdown Point of breakdown of an IDS is defined as the level of network or host traffic that results in a shutdown or malfunction of IDS. It is measured as packets/sec or number of simultaneous TCP streams IDS Throughput Defined as the observed level of traffic up to which the IDS performs without dropping any packets.
  • 41. Analytical Metrics Depth and Breath of System’s Detection Capability Depth: defined as the number of attack signature patterns and/or behavior models known to it. Breadth: given by the number of attacks and intrusions recognized by the IDS that lie outside its knowledge domain Reliability of Attack Detection Defined as the ratio of false positives to total alarms raised. Reliability of attack detection is given by 3
  • 42. Analytical Metrics (Cont..) Possibility of Attack Defined as the ratio of false negatives to true negatives. Possibility of attack is given by Consistency Given by the variation in the performance (false positive and false negative measurement) of an IDS under varying network load and traffic environments Error Reporting and Recovery Extent of event notification and logging. This is again a subjective criteria requiring user discretion 4
  • 43. Interactivity Metrics These are again a set of subjective metrics demanding user analysis These metrics are: Firewall Interaction : Ability to interact with the Firewall systems Router Interaction : Degree to which an IDS interacts with the router and redirects attacker’s traffic to a Honeypot SNMP interaction : Ability of an IDS to send an SNMP trap to one or more network devices in response to a detected attack User friendliness : The ease to set up and configure an IDS in users’ environment
  • 44. Fuzzy Logic Basics Fuzzy Set extension of classical set theory and are used in fuzzy logic involve in capturing, representing and working with linguistic notations objects with unclear boundaries Fuzzy Systems knowledge-based or rule-based systems at the heart of which is a knowledge-base system consisting of so-called fuzzy IF-THEN rules A fuzzy IF-THEN rule is an IF-THEN statement Example: Fuzzy IF-THEN rule: IF the false alarm rate of the IDS is high, THENlesserscoreisawardedtotheIDS
  • 45. Fuzzy Logic with IDS Fuzzy Logic – provides simple non-linear logical solution to the problem of measuring IDS capabilities Fuzzy set approach – starts off by encapsulating all available domain knowledge and organizing it into a manageable format Collection of IF-THEN rules forms a suitable control and decision making protocol These rules include linguistic terms given in above equation
  • 46. IDS testing and evaluation Basic Tests - Test 1: Testing for False Alarms Case 1: False Positive Only attack traffic launched Network load is measured as % of total network bandwidth % false positive alarms are measure as per equation 1 Mapping the %FP and average network loads during the testing phase, onto their respective fuzzy sets Testing is carried out until system breaks down
  • 47. Test 1: Testing for False Alarms Case 2: False Negative Similar process is repeated for false negatives with only legitimate traffic launched the IDS Amount of traffic predicted as attacks now become the false negatives Similar calculations are made for false negatives giving us the output false negative performance set Case 3: Cumulative False Alarms Output sets obtained in the above tests are fed back to the fuzzy evaluator to obtain a cumulative performance report for the system. This process is known as forward chaining, where the fuzzy result of one test is forwarded for further evaluation The evaluation process would be similar to the above discussed method, giving us a precise grade for the system’s error rate performance on a fuzzy scale
  • 48. Test 2: Consistency and Reliability Error consistency test The test is similar to test 1 However, network traffic is a mixture of legitimate as well as attack traffic The %error in this case is measured as follows: The performance of the IDS tested at various network loads and its consistency checked against the results of test 1 Besides error consistency, also measure the ratio of %FP to %FN. The possibility of attack given by Percentage possibility of Attack = 5 6
  • 49. Results Various quantitative analysis is performed on the IDS during the testing phase with the TIDeS framework Evaluations performed on the working of well-known IDS Preliminary results Alerts generated by an IDS when there was no illegitimate traffic launched on the network Testing launched 897 legitimate traffic transactions Total 170 attacks were detected under a network load of 10% of a T1 LAN connection Indicates an 18.5% error in the detection capabilities
  • 50. Conclusion Testing and Selecting an IDS is a major challenge TIDeS Testbed – allows users to select best IDS for specific customized environment Based on reliable and robust metrics Development of traffic profiles and evaluation framework allows TIDeS to be built to evaluate systems in users environment Fuzzy logic Evaluation Framework can also be used to evaluate an IDS
  • 51. Future Work The output of IDS are not conforming to a standard format – can be achieved using IDMEF IDMEF – converts the output of a system into XML format - need to be tested with TIDeS As many attacks are discovered everyday – incorporating more scripts are required
  • 52. References [1] E. Biermann, E. Clote, and L. Venter. A cpmparison of Intrusion Detection Systems. Computers and Security, Pages 676-683, 2001 [2] C. Iheagwara and A. Blyth. Evaluation of the performance of ID systems in a switched and distributed environment: The International Journal of Computer and Telecommunications Networking, 39(2): 93-112, June 2002 [3] L. M. Rossey., R. K. Cunnigham, D. J. Fried, Jl C. Rabek, R. P. Lippmann, and J. W. Haines. Lariat: Lincoln adaptable real-time information assurance testbed. Fourth International Workshop on Recent Advances in Intrusion Detection, 2001 [4] P. Mell, V. Hu, R. Lippmann. J. Haines, and M. Zissman. An overview of issues in testing intrusion detection systems. NIST Interagency Report NIST IR 7007, NIST, http://csrc.nist.gov/publications/nistir/nistir-7007.pdf , June 2003 [5] N. Provos. Honeyd - a virtual honeypot daemon (extended abstract). 10th DFN-CERT Workshop, Hamburg, Germany , February 2003. www.citi.umich.edu/u/provos/papers/honeyd-eabstract.pdf [6] Gautam Singaraju, Lawrence Teo, Yuliang Zheng, “A Testbed for Quantitative Assessment of IDS using Fuzzy Logic”, Laboratory of Information Integration Security and Privacy (LIISP), University of North Carolina at Charlotte Calpytix Security Corporation, USA http:// www.calpytix.com , Appears in Proceeding of the Second IEEE International Information Assurance Workshop (IWIA ‘04) [7] T. G. Champion and R. S. Durst. Air force intrusion detection system evaluation environment. RAID Symposium , 1999 [8] R. Lippman, J. W. Haines, D. J. Fried, J. Korba, and K. Das; “The 1999 DARPA Off-line Intrusion Detection Evaluation”; http://www.ll.mit.edu/IST/ideval/pubs/2000/1999EvalComputerNeworks2000.pdf
  • 53. Questions Ask now, or e-mail me [email_address]