I. Introduction - Academic Science

advertisement
Survey on a PTP approach to provide trust in
network security for misbehavior detection
Neha Pathak
R. S. Apare
Student in Department of Information technology,
Smt.Kashibai Navale College of Engineering
Pune, India
Assistant Professor in Department of Information
Technology, Smt. Kashibai Navale College of Engineering
Pune, India
Neha.pathak59@gmail.com
ABSTRACT— Previous techniques used for analysis of
network security have focused on the action of host node.
Only some has been consider for the detection of malicious
node based on their association with the known malicious
nodes. This method is mostly used in graph analysis and is
known as community detection. This project proposes a
PTP methodology to propagate trust across network. It
also measures the trustworthiness of incoming connection
request. The proposed system gains the prior community
detection and graphical modeling issue with the use of
propagation threat probabilities across the network node.
Method used in this paper enhances previous work by
using constraints that remove the adverse effect of cyclic
propagation. To demonstrate the effectiveness of
probabilistic threat propagation botnet detection,
community detection and malicious web destination has
considered.
Keywords: botnet, blacklist, community detection, graph
algorithms, Network security.
I.
INTRODUCTION
Network Security is a special field of computer networking. It
secures a computer network infrastructure. In Network
security network administrator or system administrator handle
the network operation. They are also responsible for
implementations of the security policy for network
software and hardware. They protect a network and the
resources accessed from unauthorized access. So it secures the
network by protecting and overseeing the network operation.
Network inference is a topology which shows the wiring
diagram of the network. Community detection is an important
application in the field of network inference. It explores the
structure of static association between entities. Example of
community based system is email traffic between employees
of a company, vehicle traffic between physical locations.
In network security, it is critical for the defender to analysis
and detection of malicious node activity. Methods for
detecting unwanted network traffic can be categorized as
signature based intrusion detection system [9] or anomaly
based detection system [3]. Both of the system is based to
analyze the activity of the individual network node rather than
the interaction between nodes. Due to the increase of botnets a
newer detection technique have developed which view the
network host activity to detect the infective behavior of nodes.
The behaviors of multiple nodes can be aggregate to perform
ravi.apare@gmail.com
spatial anomaly [3] detection which considers the relationship
of a node with other nodes.
In many situations network defenders were able to identify
known malicious nodes, either the use of previous detection
methods in internal network or from blacklists in external
nodes [6]. Using these methods an analysis can be performed
to identify host communication with the known malicious
nodes on network traffic. Previous work has shown that
malicious activity is local in the network space and form
communities of maliciousness. By using locality of host that
communicate with each other or share common resources, it
can be leveraged for the detection of malicious nodes. For
example botnet try to leverage a common command and
control infrastructure while malicious web websites try to host
by service providers.
Method for the detection of malicious nodes on a network,
independent of their own activities, by leveraging the fact that
malicious activity tries to be localized. If a tip node of known
maliciousness or their collection is given then proposed
system perform graph analysis to compute the threat
probability of neighboring nodes. Method work iterative until
a Statistical probability of threat is not computed for each
node of a graph. In the probabilistic threat propagation (PTP)
the probability of a node being malicious is proportional to the
level of maliciousness of its neighbor nodes.
II.
RELATED WORK
Paper [1] presents method to detect malicious and infected
node in the monitored and external Internet. In this paper a
probabilistic threat propagation (PTP) method is used which
detect botnets and malicious web destination. A Method
present in this paper produces statistical probabilities rather
than rank ordered lists. An iterative propagation is used which
allows for asymmetric weighting factors. Paper apply threat
propagation to the application of detecting malicious web
domains and proactively expanding blacklists, strictly through
DNS resolutions. Now it’s not relying on registration
properties or URL analysis. The intuition behind PTP method
is to accurately calculate the thread level at each node and also
provenance of the threat also needs to be tracked. So the level
of threat at each node is equal to weighted sum of threat of
neighboring nodes. The level of threat discounted those nodes
received from the nodes of interest.
Paper [2] shows that by using a single peer to peer method if a
bot is detected in a network then it is possible to detect other
member of the same network. In a paper a simple method is
presented to identify member host from known peer nodes, of
an unstructured P2P botnet in a network. Method provides a
list of hosts ordered by a degree of certainty that belong to the
same P2P botnet as discovered node belong. Method
represents that peers of a P2P botnet communicate with other
peers to receive command and update. In spite of some
different bots may communicate with other peer bot. Paper
shows that for P2P botnets in unstructured topology where
bots randomly select peers for communication it is rarely high
probability that bots communicate with external bot during a
given time window. In other words there is a significant
probability a pair of bots within a network have a mutual
contact.
In this Paper [3] a Botnet Sniffer method is given to detect
botnet C&C problem. A proposed approach uses network
based anomaly detection to identify botnet C&C channels in a
local area network without the knowledge of signature or
C&C server addresses. This detection approach can identify
both the C&C servers and infected hosts or bots in the
network. This approach is based on the observation of the preprogrammed activities related to C&C. a bots within the same
botnet will likely show the spatial-temporal correlation and
similarity.
Paper [4] presents conditional random fields method to build
probabilistic models to segment and label sequence data.
Methods provide several advantages over Markov models [5]
and stochastic grammars for such tasks. Conditional random
fields also avoid a limitation of label biased problem present
in maximum entropy Markov models (MEMMs) and other
Markov models using directed graphical models. Paper used
iterative estimation algorithms for conditional random fields.
In paper [6] a novel approach is present to detect activity
based communities by propagating membership in between
the neighboring nodes. To show utility of a method a local
implementation is used. These local implementations are
checked for community detection by given starting node and
then apply it to on two varied data set. There are two methods
were used for membership propagation: Static membership
and dynamic membership. Static membership utilizes
information of tip node into a community which demonstrates
the improvement over baseline method. In Dynamic
membership propagation method nodes membership
probability vary over time.
In this Paper [7] a method is used which constructs the
blacklists for large scale security log sharing infrastructure.
Method Used in this paper uses Page ranking scheme. The
ranking scheme measures how closely related an attack source
is to a contributor. This is using the attacker’s history and the
contributor’s recent log production patterns. This method
works in three stages. First stage which is called prefiltering
stage where the security alerts supplied by sensors across the
Internet are preprocessed. This removes known noises in the
alert collection. The preprocessed data are then fed into two
parallel engines. One rank is used for each contributor, the
attack sources according to their relevance to that contributor.
The second stage scores the sources using a severity that
measures their maliciousness. The relevance ranking and the
severity score are combined at the last stage to generate a final
blacklist for each contributor.
In Paper [8] an Intrusion Detection System is presented for a
network. According to paper the problem of IDS can be
addressed by scanning and harvesting attack. A harvesting
attack is exploitation where an attacker initiates
communications with multiple hosts to control and reconfigure
them. While in a scanning attack, the attacker’s
communication with multiple hosts is an attempt to determine
what services they are running. In this paper an alternative
method is used to evaluate IDS focus to frustrate the attacker
goals. In order to do this, model captures the attacker’s payoff
over an observable attack space. The observable attack spaces
represent a set of Attacks an attacker can conduct. An
observable attack spaces can be defined the number of
addresses to which they (nodes) communicate in a sample
period. After evaluation of OAS a payoff function is applied to
this detection surface.
This paper [9] presents a method called EMBER (Extreme
Malicious Behavior view ER). Which analysis and display a
malicious activity at the city level. This system uses a metric
called Standardized Incidence Rate (SIR) which is the number
of host’s show malicious behavior per 100,000 present hosts.
These metrics were relies on available data that (1) Maps IP
addresses to geographic locations (2) Provides current city
populations and (3) Provides computer usage penetration
rates.
In this Paper [10] a Snort system is presented which is used to
detect Network Intrusion Detection in small and large network
system. This tool can be deploying to monitor small TCP/IP
networks and detect suspicious network traffic an attacks
present in network. It can also provide administrators to
enough data to make decisions on the action of suspicious
activity. Snort is a cost efficient tool.
In this Paper [11] a Probabilistic Misbehavior Detection
Scheme (iTrust) were presented which could reduce the
detection overhead effectively. Method firstly introduced data
forwarding evidences for general misbehavior detection. The
proposed framework is not only detect various misbehaviors
But also a compatible to other routing protocols. Secondly it
introduced a probabilistic misbehavior detection scheme by
adopting the Inspection Game. This game theoretical analysis
demonstrates that the cost of misbehavior detection could be
significantly reduced without compromising performance.
Paper also discussed how to correlate a user’s trust level to the
detection probability. Thirdly it uses extensive analysis to
demonstrate the effectiveness and the efficiency of the iTrust.
In this Paper to represent data Security the RSA algorithm and
Hash function were used for User Authentication.
TABLE I
ANALYSIS OF EXISTING SYSTEMS
Sr. No.
Paper Name
1.
Probabilistic Threat
Propagation
for Network Security
Friends of an enemy:
Identifying local members of
peer-to-peer botnets using
mutual contacts
BotSniffer: Detecting Botnet
Command and Control
Channels in Network Traffic
Conditional random fields:
Probabilistic models for
segmenting and labeling
sequence data
Detecting activity-based
communities using dynamic
membership
Propagation
Highly Predictive
Blacklisting
On the Limits of PayloadOblivious
Network Attack Detection
EMBER: A global
perspective on extreme
malicious behavior
Snort:light weight intrusion
Detection for network
A Probabilistic Misbehavior
Detection Scheme toward
Efficient Trust Establishment
in Delay-Tolerant Networks
2
3.
4
5.
6.
7.
8.
9.
10.
III.
Algorithm Used
Attack Type Addressed
Detection
technique
Statistical
probabilities
Malicious and infected
node
Probabilistic threat
propagation
Low
Iterative algorithm
Bot net
Mutual Contacts
Low
Statistical
algorithm
Botnet C&C
Anomaly based
detection
Very low
Iterative parameter
estimation
algorithm
Label bias problem
Conditional
random field
probabilities
Static membership
and dynamic
membership
propagation
Relevance page
ranking
Activity based
Community detection
Temporal analysis
Page ranking
Observable attack
space
Blacklist
Communication in
internet community
Intrusion Detection
System
Not Specified
Malicious misbehavior
Intrusion Detection
EMBER and
visualization
technique
Snort
_
No
Misbehavior of nodes
iTrust system
low
_
Signature Based
analysis
Probabilistic
approach
CONCLUSION
Probabilistic Threat Propagation is an iterative approach
for graph analytic. It determines malicious node in an
observed network by statistical probability. It is difficult
to find threat origin to avoid node threat levels being
increased uniquely depend on their network presence.
PTP outputs approximations of true statistical
probabilities that are easily interpretable by an analyst.
PTP can use in network security for botnet detection and
prediction of malicious domains.
ACKNOWLEDGMENT
I am extremely thankful to my Project guide Prof. R. S.
Apare for suggesting the topic for literature survey and
providing all the assistance needed to complete the
work. He inspired me greatly to work in this area.
False
positive rate
_
Approaches
Consider
association of
node with others
node
Yes
No
Yes
_
Yes
_
Payoff function
_
_
High
No
Yes
_
REFERENCES
[1] Kevin M. Carter, Nwokedi Idika, and William W. Streilein
“Probabilistic Threat Propagation for Network Security”,
IEEE Transactions on Information Forensics and Security,
Sep 2014.
[2] B. Coskun, S. Dietrich, and N. Memon, “Friends of an
enemy: Identifying local members of peer-to-peer botnets
using mutual contacts,” in Proc. 26th Annu. Comput. Security
Appl. Conf., Dec. 2010.
[3]G. Gu, J. Zhang, and W. Lee, “BotSniffer: Detecting botnet
command and control channels in network traffic,” in Proc.
15th Annu. Network. Distributed. System. Security. (NDSS),
Feb. 2008.
[4] J. D. Lafferty, A. McCallum, and F. C. N. Pereira,
“Conditional random fields: Probabilistic models for
segmenting and labeling sequence data,” in Proc. 8th Int.
Conf. Mach. Learn. (ICML), 2001.
[5] S. Philips, E. Kao, M. Yee, and C. Anderson, “Detecting
activity-based communities using dynamic membership
propagation,” in Proc. IEEE Int. Conf. Acoust., Speech Signal
Process., Mar. 2012.
[6] J. Zhang, P. Porras, and J. Ullrich, “Highly predictive
blacklisting,” in Proc. 17th Conf. Security Symp., 2008
[7] M. P. Collins and M. K. Reiter, “On the limits of payloadoblivious network attack detection,” in Proc. 11th Int. Symp.
Recent Adv. Intrusion Detection (RAID), 2008.
[8] T. Yu, R. Lippmann, J. Riordan, and S. Boyer, “EMBER:
A global perspective on extreme malicious behavior,” in Proc.
7th Int. Symp. Vis. Cyber Security, 2010.
[9] M. Roesch, “SNORT—Lightweight intrusion detection for
networks,” in Proc. 13th LISA Conf., 1999.
[10] Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong Dong
and Zhenfu Cao, “A Probabilistic Misbehavior Detection
Scheme toward Efficient Trust Establishment in DelayTolerant Networks” , IEEE Transactions on Parallel and
Distributed Systems, vol. 25, no. 1, JANUARY 2014
[11] K. M. Carter, N. Idika, and W. W. Streilein,
“Probabilistic threat propagation for malicious activity
detection,” in Proc. IEEE Int. Conf. Acoust., Speech Signal
Process., May 2013.
[12] S. Brin and L. Page, “The anatomy of a large-scale hyper
textual web search engine,” in Proc. 7th Int. Conf. World Wide
Web (WWW), Brisbane, Australia, 1998.
Download