SlideShare a Scribd company logo
1 of 14
User Profiling For Host Based Anomaly
 Intrusion Detection In Windows NT


       Debapriyay Mukhopadhyay
           Satyajit Banerjee
Definition of IDS: Intrusion is defined as the set of
 unauthorized activities that violate the security policy
 of the system and intrusion detection is the act of
 tracing those unauthorized users or activities on the
 system.

• Two kinds of IDS:
 1) Misuse Detection:- Previous attacks are captured
  in attack signatures and this approach looks for
  any of these known signatures in the data under
  test.
 2) Anomaly Detection:- Data that strongly deviates
  from the normal behavioral profile are considered
  as intrusive. So, mechanism involves learning the
  normal behavioral profile of an user/system.
Motivation:
1) Prior work on IDS have mainly targeted UNIX machines.
But, majority of world’s computer while is running
WINDOWS OS.

2) A major fraction of intrusive activities is actually
launched from the inside host machines.

Problem Definition:
1) In this paper, we have tried to address the problem of host
based anomaly intrusion detection running Windows OS.

2) Problem can be seen as of learning the “normal behavior”
 of an user and then scoring new activities against this model
to identify malicious insiders.
Issues

How to model “normal behavior” of an user is a
highly non-trivial problem.

How to ensure a significant coverage of the space of
user’s “normal behavior” – as otherwise there will be
increase in false alarms.

How to utilize the model characterizing “normal
behavior” of an user to detect anomaly intrusions
from an inside host.
What we have achieved?

• We have identified and categorized data that are
  truly reflective of user’s normal behavior.

• We have taken a User Profiling based approach to
  learn and model the “normal behavior” of an user.

• Bayesian Network has been used to profile an user
  and also to detect host based anomaly intrusions.
Source Data and Feature Selection
• System Processes : - set of processes or services that
  starts running when system starts up. These system
  processes provide us with a top level profile of an user.

• Application Processes :- launched by the user shell
  explorer.exe. One application (user ) process is
  launched by another application (user) process.
  Exploiting this dependency a DAG can be learnt.

• Window Title Bars :- capture a huge amount of
  information related to user’s behavior. Per process
  visible window titles can be text mined to gain
  valuable information.
   e.g. – iexplorer.exe can be related to one’s browsing
  profile.
Source Data and Feature Selection
• Application Usage Profile: capturing how a user browses
  through the different features of an application. For each
  application, we need to track both user key strokes and
  mouse click events. A nearly related concept is Program
  profiling.

• For each user and for each session, the following features
  can also be collected.
  i) max. number of instances of each application in each user
  session;
  ii) average time spent on each instance of this application
  (normalized by session length);
  iii) percentage of the session length being spent on this
  application;
  iv) average waiting time for an instance of an application
  being active (normalized by session length).
User Profiling
• Bayesian Network – used to capture the mutual
  influence of different domain variables on target
  attributes. Its an effective tool to be applied for
  reasoning in uncertain situations.

• Categories 1 and 2 data both have a kind of causal
  relationship between themselves in a sense that one
  process has generated the other.

• Each process is considered as a domain variable and
  “normal behavior” as target attribute.

• Detection of intrusion is done by evaluating
  Prob(Normal | Evidences), by evidence we mean the
  set of domain variables that are true at the time of
  evaluation.
Learning the Bayesian Network
• Each process exe corresponds to a node in the DAG
  and also as a random variable of the underlying
  probability model.

• Exploit the parent-child relationship to construct the
  DAG.

• For each random variable N, and for each distinct
  state S of values of its parents, count the frequency of
  N happening in association with S.

• Calculate Prob (N | S) – entries of the Conditional
  Probability Table.
  For root nodes, these conditional probabilities are
  simply the a priori probabilities.
An Example Bayesian Net (Applications)
An Example Bayesian Net (System Services)
Inferencing
• Polytree algorithm is not applicable – we can have
  more than one path between two nodes.

• We apply Junction Tree algorithm for inferencing
  and calculate the following.

• P1 = Prob (Normal| Evidence of category 1).
• P2 = Prob (Normal| Evidence of category 2).

• If P1 < T1 and P2 < T2, then the data can be a
  case of intrusion.

• T1 and T2 are pre-determined thresholds for
  Category 1 and 2 data respectively.
Conclusions
• This is a work in progress.

• We have identified five categories of data, but only
  have provided means of how to use the first two
  categories of data.

• Different types of data can be used hierarchically
  or parallelly to help in detecting an anomaly
  intrusion.

• We have planned to use Probabilistic Temporal
  Network to unify temporal information of (5) with
  the atemporal information of (1 or 2).
Thank You.

More Related Content

Similar to P47 Eait06

Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
smile790243
 
A sense of self for unix processes
A sense of self for unix processesA sense of self for unix processes
A sense of self for unix processes
UltraUploader
 
Automatically generated win32 heuristic virus detection
Automatically generated win32 heuristic virus detectionAutomatically generated win32 heuristic virus detection
Automatically generated win32 heuristic virus detection
UltraUploader
 

Similar to P47 Eait06 (20)

A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODSA STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
 
C3602021025
C3602021025C3602021025
C3602021025
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
 
A Study of Intrusion Detection System Methods in Computer Networks
A Study of Intrusion Detection System Methods in Computer NetworksA Study of Intrusion Detection System Methods in Computer Networks
A Study of Intrusion Detection System Methods in Computer Networks
 
DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1
 
Ids 014 anomaly detection
Ids 014 anomaly detectionIds 014 anomaly detection
Ids 014 anomaly detection
 
WS97-07-013
WS97-07-013WS97-07-013
WS97-07-013
 
Enchaning system effiency through process scanning
Enchaning system effiency through process scanningEnchaning system effiency through process scanning
Enchaning system effiency through process scanning
 
Ids 013 detection approaches
Ids 013 detection approachesIds 013 detection approaches
Ids 013 detection approaches
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
 
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
 
A sense of self for unix processes
A sense of self for unix processesA sense of self for unix processes
A sense of self for unix processes
 
Automatically generated win32 heuristic virus detection
Automatically generated win32 heuristic virus detectionAutomatically generated win32 heuristic virus detection
Automatically generated win32 heuristic virus detection
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

P47 Eait06

  • 1. User Profiling For Host Based Anomaly Intrusion Detection In Windows NT Debapriyay Mukhopadhyay Satyajit Banerjee
  • 2. Definition of IDS: Intrusion is defined as the set of unauthorized activities that violate the security policy of the system and intrusion detection is the act of tracing those unauthorized users or activities on the system. • Two kinds of IDS: 1) Misuse Detection:- Previous attacks are captured in attack signatures and this approach looks for any of these known signatures in the data under test. 2) Anomaly Detection:- Data that strongly deviates from the normal behavioral profile are considered as intrusive. So, mechanism involves learning the normal behavioral profile of an user/system.
  • 3. Motivation: 1) Prior work on IDS have mainly targeted UNIX machines. But, majority of world’s computer while is running WINDOWS OS. 2) A major fraction of intrusive activities is actually launched from the inside host machines. Problem Definition: 1) In this paper, we have tried to address the problem of host based anomaly intrusion detection running Windows OS. 2) Problem can be seen as of learning the “normal behavior” of an user and then scoring new activities against this model to identify malicious insiders.
  • 4. Issues How to model “normal behavior” of an user is a highly non-trivial problem. How to ensure a significant coverage of the space of user’s “normal behavior” – as otherwise there will be increase in false alarms. How to utilize the model characterizing “normal behavior” of an user to detect anomaly intrusions from an inside host.
  • 5. What we have achieved? • We have identified and categorized data that are truly reflective of user’s normal behavior. • We have taken a User Profiling based approach to learn and model the “normal behavior” of an user. • Bayesian Network has been used to profile an user and also to detect host based anomaly intrusions.
  • 6. Source Data and Feature Selection • System Processes : - set of processes or services that starts running when system starts up. These system processes provide us with a top level profile of an user. • Application Processes :- launched by the user shell explorer.exe. One application (user ) process is launched by another application (user) process. Exploiting this dependency a DAG can be learnt. • Window Title Bars :- capture a huge amount of information related to user’s behavior. Per process visible window titles can be text mined to gain valuable information. e.g. – iexplorer.exe can be related to one’s browsing profile.
  • 7. Source Data and Feature Selection • Application Usage Profile: capturing how a user browses through the different features of an application. For each application, we need to track both user key strokes and mouse click events. A nearly related concept is Program profiling. • For each user and for each session, the following features can also be collected. i) max. number of instances of each application in each user session; ii) average time spent on each instance of this application (normalized by session length); iii) percentage of the session length being spent on this application; iv) average waiting time for an instance of an application being active (normalized by session length).
  • 8. User Profiling • Bayesian Network – used to capture the mutual influence of different domain variables on target attributes. Its an effective tool to be applied for reasoning in uncertain situations. • Categories 1 and 2 data both have a kind of causal relationship between themselves in a sense that one process has generated the other. • Each process is considered as a domain variable and “normal behavior” as target attribute. • Detection of intrusion is done by evaluating Prob(Normal | Evidences), by evidence we mean the set of domain variables that are true at the time of evaluation.
  • 9. Learning the Bayesian Network • Each process exe corresponds to a node in the DAG and also as a random variable of the underlying probability model. • Exploit the parent-child relationship to construct the DAG. • For each random variable N, and for each distinct state S of values of its parents, count the frequency of N happening in association with S. • Calculate Prob (N | S) – entries of the Conditional Probability Table. For root nodes, these conditional probabilities are simply the a priori probabilities.
  • 10. An Example Bayesian Net (Applications)
  • 11. An Example Bayesian Net (System Services)
  • 12. Inferencing • Polytree algorithm is not applicable – we can have more than one path between two nodes. • We apply Junction Tree algorithm for inferencing and calculate the following. • P1 = Prob (Normal| Evidence of category 1). • P2 = Prob (Normal| Evidence of category 2). • If P1 < T1 and P2 < T2, then the data can be a case of intrusion. • T1 and T2 are pre-determined thresholds for Category 1 and 2 data respectively.
  • 13. Conclusions • This is a work in progress. • We have identified five categories of data, but only have provided means of how to use the first two categories of data. • Different types of data can be used hierarchically or parallelly to help in detecting an anomaly intrusion. • We have planned to use Probabilistic Temporal Network to unify temporal information of (5) with the atemporal information of (1 or 2).