An Architecture Of Hybrid Intrusion Detection System

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Intrusion Detection System (IDS) is renowned and widely-deployed security tool to detect attacks and malicious activities in information system. It is generally deployed as a second line of defense along with other defensive security mechanisms, such as firewall, vulnerability monitor, access control and authentication that protects information system. Intrusion detection involves monitoring network traffic, detecting attempts to gain unauthorized access to a system or resources, and alerting the appropriate persons so that countermeasures can be taken. It also involves developing an understanding of how attacks occur. IDS is an essential element of any modern information system. It is a necessary part of the entire defense system because of following reasons:

-- Numerous long-established systems and applications were developed without security in mind.

-- Systems and applications were developed to work in a different environment and may become vulnerable when deployed in the current environment (for example, a system may be perfectly secure when it is isolated but become vulnerable when it is connected to the Internet). Intrusion detection provides a way to identify, and thus allow responses to, attacks against these systems.

-- Due to the limitations of information security and software engineering practice, computer systems and applications may have design flaws or bugs (e.g., protocol flows) that could be used by an intruder to attack the systems or applications. As a result, certain preventive mechanisms (e.g., firewalls, access control, and authentication) may not be as effective as expected.

We have designed a Hybrid IDS to detect attacks on information system. In this paper, we have presented an architecture and implementation details of our hybrid IDS. The rest of the paper is structured as follows. Section 2 describes various types of intrusion detection techniques along with their advantages and disadvantages. Section 3 differentiates host-based and network-based IDS. Section 4 presents an architecture of our hybrid IDS. While section 5 presents unique characteristics of our hybrid IDS. Section 6 reviews literature of related works. And Section 7 concludes the paper with future research directions and challenges in IDS.

Types of Intrusion Detection Techniques

There are mainly two techniques for intrusion detections: i) signature-based (misuse) detection and ii) anomaly-based (profile-based) detection [4]. Purpose of both techniques is in attempting to detect any attacks or intrusions in a system.

2.1. Signature-based Detection Technique

Signature-based (misuse) detection is normally used for detecting known attacks. It requires that all known threats will be defined first, and the information regarding these threats to be submitted to the IDS. Thus, the IDS is able to then compare all incoming or outgoing activity against all known threats in its knowledge base and raise an alarm if any activity matches information in the knowledge base. The information stored in this knowledge base is usually known as signatures [4]. The process for actually comparing a signature with an attack include simple string matching – which involves looking for unique key words in network traffic to identify attacks – to more complex approaches such as rule-based matching which defines the behaviour of an attack as a signature [4]. Various string-matching (or pattern-matching) algorithms are used to inspect the content of packets and identify the attacks signature in IDS. There are mainly two kinds of algorithms, viz. i) Single-keyword pattern matching algorithms viz., Brute force algorithm, Knuth-Morris-Pratt Algorithm [16], and Boyer-Moore algorithm [7]; and (ii) Multiple-keyword pattern matching algorithms viz., Aho-Corasick [1], Wu-Manber Algorithm [31], Horspool Algorithm [15], Quick search algorithm [29], Piranha [3], and E2xb [2]. Following are the advantages of signature-based detection technique:

-- Signatures are very easy to develop and understand, if we know what network behavior we are trying to identify. For instance, we might use a signature that looks for particular strings within exploit particular buffer overflow vulnerability. The events generated by signature-based IDS (SIDS) can communicate the cause of the alert.

-- It has a relatively low rate of false alarms [28], which means that the SIDS has a relatively high precision. This high precision is caused by the fact that a SIDS is explicitly programmed to detect certain known kinds of attacks [28].

One big challenge of SIDS is that every signature requires an entry in the database, and so a complete database might contain hundreds or even thousands of entries. Each packet is to be compared with all the entries in the database. This can be very resource consuming and doing so will slow down the throughput and making the IDS vulnerable to DoS attacks. Some of the IDS evasion tools use this vulnerability and flood the IDS systems with too many packets to the point that the IDS cannot keep up with the traffic, thus making the IDS time out and drop packets and as a result, possibly miss attacks [26]. On modern systems, string-matching can be done more efficiently, so the amount of power needed to perform this matching is minimal for a rule set. For example if the system that is to be protected only communicate via DNS, ICMP and SMTP, all other signatures can be ignored.

Following are the disadvantages of signature-based intrusion detection system (SIDS):

-- The detection rate of attacks is relatively low [28].

-- There is a lower recall for new types of intrusions.

-- An attacker will try to modify a basic attack in such a way that it will not match the known signatures of that attack. The attacker may insert malformed packets that the IDS will see, to intentionally cause a pattern mismatch; the protocol handler stack will then discard the packets because of the malformation. Each of these variations could be detected by an IDS, but more different signatures require additional work for the IDS, which reduces performance [23].

-- It cannot detect a new attack for which a signature is not yet installed in the database. Ideally, signatures should match every instance of an attack, match subtle variations of the attack, but not match traffic that is not part of an attack. However, this goal is difficult to accomplish in current IDSs [23].

-- The efficiency of the SIDS is greatly decreased, as it has to create a new signature for every variation. As the signatures keep on increasing, the system performance deteriorates. Due to this, many SIDS are deployed on systems with multi processors and multi Gigabit network cards. IDS developers develop the new signatures before the attacker does, so as to prevent the novel attacks on the system. The difference of speed of creation of the new signatures between the developers and attackers determine the efficiency of the system.

2.2. Anomaly-based (Heuristic) Detection Technique

The anomaly-based (heuristic) detection is based on defining the network behavior. Instead of looking for matches, anomaly-based intrusion detection looks for behaviour that is suspicious [23]. Anomaly-based IDS attempt to characterize normal operation, and try to detect any deviation from normal behaviour [28]. The network behavior is in accordance with the predefined behavior, then it is accepted or else it triggers the event in the anomaly-based detection. The accepted network behavior is prepared or learned by the specifications of the network administrators. It builds a model of acceptable behaviour and flag (i.e. label) exceptions to that model; for the future, the administrator can mark a flagged behaviour as acceptable so that the anomaly-based IDS will now treat that previously unclassified behaviour as acceptable [23].

An anomaly-based detection technique compares normal behaviour against the current pattern of behaviour in a system. In order to achieve this task, the main challenge in anomaly-based detection technique is in learning what is considered "normal" behaviour. The work by Axelsson [4] describes the two main approaches which are used to achieve this goal: self-learning or programmed anomaly-based detection.

In the self-learning approach, the anomaly-based detection system will begin to automatically monitor events, such as live network traffic, on the environment it has been implemented on and attempt to build information on what is considered normal behaviour [4]. This is otherwise known as online learning [14].

In the programmed approach, the anomaly-based IDS must manually learn what is considered normal behaviour by having a user or some form of function "teaching" the system through input of information [4]. This is otherwise known as offline learning, and may involve feeding the system a network traffic data set which contains normal network traffic [14].

The major advantage of anomaly-based detection over signature-based technique is that a novel attack for which a signature does not exist can be detected if it falls out of the normal traffic patterns. This is observed when the systems detect new automated worms. If the new system is infected with a worm, it usually starts scanning for other vulnerable systems at an accelerated rate filling the network with malicious traffic, thus causing the event of a TCP connection or bandwidth abnormality rule. Following are the disadvantages of anomaly-based intrusion detection:

-- There is a higher rate of false alarms, which means a lower precision [28].

-- It also needs periodic online retraining of the behavior profile.

-- It tends to be computationally expensive because several metrics are often maintained that need to be updated against every system activity and, due to insufficient data, they may gradually be trained incorrectly to recognize an intrusive behaviour as normal due to insufficient data [6].

Host-based vs Network-based IDS

Intrusion detection can be implemented either on the hosts that need to be protected or on a network device that can sniff the traffic for all the hosts on the network. Based on the implementation locations, there are two common types of IDS, viz., i) host-based IDS, and ii) network-based IDS.

Host-based IDS (HIDS) examines information at the local host or operating system on which it is installed. It examines actual system calls and system log files. While network-based IDS (NIDS) examines the actual network packets that are traveling across the network. It examines this traffic for known signs of instructive activity. Because NIDS is watching network traffic, any attack signatures detected may succeed or fail. It is usually difficult if not impossible for NIDS to assess the success or failure or the actual attacks. It only indicates the presence of intrusive activity.

Figure 1. Schematic diagram of Hybrid IDS

Architecture of our Hybrid IDS

Our Hybrid IDS consists of six components viz., i) Data acquisition module, ii) Signature database, iii) Analyzer, iv) Anomaly detector, v) Signature generator, and vi) Counter-measure module (see Fig-1).

The Signature database records enable the IDS to have a set of signature, criteria or rules against which they can compare packets as they pass through the sensor. The database of signatures needs to be installed along with the IDS software and hardware itself. After the Signature database is in place, sensors of the Data acquisition module gather data by reading packets from the network and reassemble them. As packets from network can arrive out of order, or can be duplicated. Moreover, packets arrive at a high speed therefore the Data storage is required to store the packets.

Sensors can be placed either on individual host or in particular network segment. Sensors that are placed on individual hosts observe packets as they enter and leave that host. Sensors that are placed on a particular network segment read packets as they pass into and out of each segment. The sensors need to be positioned in locations where they will be able to capture all of the packets entering and leaving a host or network segment. Sensors that are placed on network segments do not always have the ability, if the traffic level becomes too heavy, to capture every packet. Repositioning the sensors on each network host will improve accuracy even though the effort of installing them can be considerable. The important thing is to be able to capture all packets so that none can potentially circumvent the IDS. For our purposes we use Snort on the Windows operating system using WinPcap.

The Analyzer module compares the packets it observes with the signatures or rules of normal patterns of behaviour stored in Signature database using pattern-matching algorithm. We use the well-known Aho-Corasick algorithm [1] for performing pattern matching. If analyzer finds any match then sends appropriate alert message for known attack to the Counter-measure module. Also it enters entry in log file about the event that caused the alert. If analyzer does not find any match then sends data to Anomaly detector for finding anomaly using pattern mining technique. If Anomaly detector finds any anomaly then send appropriate message to Signature generator. Here Signature generator creates new entry in Signature database.

When Counter-measure module receives the alert message of known attack from Analyzer, it notifies the administrator in one of several ways that the administrator has configured beforehand. The module might display a pop-up window or sends an e-mail message to the designated individual, for example. Besides the automated response sent to the administrator, this module can be configured to take action at the same time that an alert message is received. Typical actions are: i) Alarm, in which an alarm is sent to the administrator, ii) Drop, in which the packet is dropped without an error message being sent to the originating computer; and iii) Reset, which instructs the IDS to stop and restart network traffic and thus stop especially severe attacks. This module is also used by network administrator to evaluate the alert message and to take proper actions such as dropping a packet or closing a connection. The administrator can anticipate having to fine-tune the signature database to account for situations that seem to the IDS to be intrusions but that are actually legitimate traffic. For example, an adjustment might be made to enable traffic that might otherwise be seen by the firewall as suspicious, such as a vulnerability scan performed by a scanning device located at a particular IP address. The IDS could be configured to add a rule that changes the action performed by the IDS in response to traffic from that IP address from Alarm to Drop.

Unique characteristics of our hybrid IDS

The following are the list of unique characteristics of our hybrid IDS.

It will be easy to install and configure.

It will be adaptive in nature and adapts the changes in user and system behavior.

It will run constantly with minimal human supervision. It will create signatures of new attacks.

Design of our hybrid IDS makes it fault tolerant, so that it will be able to recover from crashes. It will be able to get its prior state and resume its operation with out any adverse effect.

It will be able to monitor itself and detect attacks on it.

It will consume less memory to operate. It can be run with less overhead on the systems where it is installed.

It will be accurate and thereby there will be less number of false positives and false negatives.

Related Work

Some of the well known IDSs that employ signature-based (misuse) detection technique are Snort [9], [27], Bro [22], Tipping Point (http://www.hpenterprisesecurity.com/), NFR NID-200 (NFR Security, Inc. www.nfr.com), RealSecure (http://www.iss.net/), and Cisco Secure IDS (www.cisco.com). Snort is the most popular open source NIDS created by Martin Roesch. It is the most flexible and powerful solution for intrusion detection and also for intrusion prevention. Other attempts to solve the intrusion detection and response problem can be found in [8], [10], [20], [24].

Mannila and Toivonen [21] have proposed the concept of frequent episode rules (FERs) first for anomaly-based IDS (AIDS). Subsequently, Lee et al. [19], [18], and Fan et al. [13] have suggested a framework to specify FERs for anomaly detection against normal traffic profiles. Qin and Hwang [24] have refined the rule formulation procedure with an adaptive base-support algorithm to mine normal traffic records. Different axis attribute values apply different thresholds. Many other researchers have studied supervised AIDS by training over attack-free traffic [5], [11], [12], [13], [17], [32]. AIDS is designed by mining FERs [19], [24] over Internet connections. They developed a new weighted signature generation algorithm to characterize anomalous attacks and extract their signatures. The new signatures are generated from anomalies detected by AIDS. This idea was inspired by former works on weighted association rules [25], [30]. This new approach automatically enables HIDS to detect similar anomalous attacks in the future. We have considered close cooperation between the two types of intrusion detection techniques. We have proposed the architecture of HIDS. Our HIDS integrates the flexibility of anomaly-based IDS with the accuracy of signature-based IDS.

Conclusion

The main characteristic of signature-based (misuse) intrusion detection technique is in comparing incoming threats against a predefined knowledge base in order to decide whether the threat is considered an attack or intrusion whilst anomaly-based detection technique involves looking for any unexpected changes in behaviour of a system against what is considered normal behaviour. Both signature-based (misuse) and anomaly-based detection techniques have their own advantages and disadvantages. We have used features of both the intrusion detection techniques in our Hybrid IDS. This paper presents research from an ongoing study on the use of features of both the intrusion detection techniques to design a novel and efficient hybrid IDS. An architecture and implementation details of our Hybrid IDS are presented. The proposed design of HIDS, however, aims to be more accurate and it does not require more processing resources, thus offering both speed and accuracy to detect the intrusions. We are encouraged by this pilot design, which suggests that such systems would help network administrators to get effectively secure the information systems. We have planned to evaluate this design both as offline using available dataset, and as online in real environment in our organization.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now