Topic: Alarm Reduction and Correlation in IDS

Similar documents
Alarm setup and definitions in Cisco Unified Serviceability

Monitor Alarms and Events

Managing Network Alarms and Events

Using ANM Mobile CHAPTER

Monitor Alarms and Events

Intrusion Detection System: Facts, Challenges and Futures. By Gina Tjhai 13 th March 2007 Network Research Group

Veritas Storage Foundation and High Availability Solutions Oracle Support Matrix

Improved Lifecycle Management for BI. David Brockington SAP Business Objects, Product Management June, 2009

Intrusion Detection: Eliminating False Alarms

Setting up and Managing Alarms in McAfee ESM 10.x

Intelligent alarm management

Managing Network Alarms and Events

Public Services. NewVoice. San Francisco Paris Geneva Zurich Linz Mainz Shanghai Brisbane Hong Kong São Paulo Dubai

IDS RainStorm: Visualizing IDS Alarms. Kulsoom Abdullah, Chris Lee, Gregory Conti, John A. Copeland, John Stasko

Bosch TCU Integration Module Administrator's Guide

P2000 and Metasys System Integration

Getting Started with Live Exceptions

An Alarm Correlation Algorithm for Network Management Based on Root Cause Analysis

the Comprehensive Control Solution

NeXT is a powerful stand-alone application running fully embedded in network cameras to perform an intelligent video surveillance for ATM devices.

TPS Virtualization and Future Virtual Developments Paul Hodge, Honeywell

Weigh In Motion (WIM) Wheel Impact Load Detector (WILD)

Yokogawa DX Ethernet Driver Help Kepware Technologies

Making the Most of Alarms

Based on years of Industry experience it s ready to run right out of the box, simply assign the IP address and connect to the embedded web server.

Oracle Communications Performance Intelligence Center

FIMD: Fine-grained Device-free Motion Detection

Oracle Real Application Clusters (RAC) 12c Release 2 What s Next?

Martin Huber 26September 2017 F&G SOLUTIONS FOR THE PROCESS INDUSTRY

University. NewVoice. San Francisco Paris Geneva Zurich Linz Mainz Shanghai Brisbane Hong Kong São Paulo Dubai

Avaya Proactive Contact Release 5.x

Securing optical network physical layer with Fiber Monitoring and Management Vratislav Blažek Regional Sales Manager

Improving rail network velocity: A machine learning approach to predictive maintenance

CAN unit for Analog Sensors

Protecting Network Data

Before you install ProSeries Express Edition software for network use

Health Care. NewVoice. San Francisco Paris Geneva Zurich Linz Mainz Shanghai Brisbane Hong Kong São Paulo Dubai

Alarm Monitoring and Management

RADview-EMS/TDM. Element Management System for TDM Applications Optimux RAD Data Communications Publication 07/04

SensorHawk 4 PoE. For more information please visit us at or call us at 1 (800)

Welcome. Challenges in Multi-Site Environmental Monitoring. Balancing Standardization and Localization for Costs, Risks, and Best Fit

Skyresponse ThingWorx Extension. Version 1.0. User Guide

SimpleComTools, LLC 1

Local Process Bus LPB

Avigilon Control Center 5 System Integration Guide

Continuous, real-time detection, alarming and analysis of partial discharge events

This is your cloud. Paris OpenStack Summit

Doctor - Fault Management

EE04 804(B) Soft Computing Ver. 1.2 Class 1. Introduction February 21st,2012. Sasidharan Sreedharan

Innovative Security Solutions That Increase Force Protection Effectiveness

AirFlow Sensor for Dry Contact connection

Milestone SMI Intrepid II Perimeter Module 1.1 User s Manual

Outdoor Temperature Sensor

Alarm Monitoring and Management

Healthy. Atmosphere. for Pigs and Poultry. for a

Configuring and Monitoring Alarm

Combined CAN Sensor Unit Temperature, Humidity and Smoke

NFPA Siemens Industry, Inc. All rights reserved. usa.siemens.com/infrastructure-cities

X-dock Software History

ALCATEL-LUCENT OPENTOUCH NOTIFICATION SERVICE IMPROVE REAL-TIME SITUATIONAL AWARENESS AND PERSONAL SAFETY

TD flex is an award-winning tailgate detection solution that prevents unauthorized access at: Doors Turnstiles Transfer gates Mantraps Airlocks

1 Application Note Bosch Security Sys Sy tems m Bosch Security Systems Smart Safety Link -

Remote / Network Control for Rack Cabinet Access - DL Series

IndigoVision Alarm Panel. User Guide

>WIRELESS> ALARM SYSTEM CR200

To appear in the IEEE/IFIP 1996 Network Operations and Management. Symposium (NOMS'96), Kyoto, Japan, April TASA: Telecommunication

YOUR PARTNER IN FIRE & GAS DETECTION

The WAVE Plus Instant Notification System for Schools and Colleges

Remote fiber testing to improve SLA s

Alarm Hot Backup Manager can use InTouch, Galaxy, or Galaxy_ as alarm providers when configuring an alarm Hot Backup Pair.

NGC-40 Bridge. Modbus Overview. Raychem-AR-H58862-NGC40BridgeModbusOV-EN-1805 nvent.com 1

Protecting Station Platform & Rail Perimeters. TransitVUE IDS The Latest in Fiber Optic Station Platform & Rail Perimeter Security Sensor Systems

Trident User s Manual

EnergyMaster. ENEC Monitoring System. An on-site supervision and remote monitoring solution

FortiNAC. Lightspeed Single Sign-On Integration. Version: 8.x Date: 8/29/2018. Rev: B

Common Alarms CHAPTER

D Implementation of a DEMO system related to Smart Fault Management in LV network (normal/storm conditions)

ONYXWORKS AND FIRSTVISION. Version 4

Aquarius - Spectrum. multi-layer acoustic water pipe monitoring solutions. Game changer in water network management

This section describes how Prime Central locates, diagnoses, and reports network problems.

Typical applications include the vibration detector. Detection of vibrations and shocks

FCD-wire Contents. List of Figures

Alarm Notification Manager

Customer Training Catalog Course Descriptions Network OSS Training

ArchestrA Direct Connect

White Paper: Video/Audio Analysis Technology. hanwhasecurity.com

Re: ENSC440 Functional Specification for a License Plate Recognition Auto-gate System

Fig.: A fire in a server room or data center may cause devastating damage. Protect your infrastructure.

Samsung SDS BMS Ver.2.0. Technical Specification

DATA SHEET BENEFITS CURRENT CHALLENGES SSM INFOTECH S X-FORCE AMS - THE IDEAL SOLUTION

Alarm Monitoring and Management

TrueAllele Technology Computer interpretation of DNA evidence

DC Voltage Sensor. Specifications Didactum DC sensor: The sensor is automatically detected by the Didactum base unit. Accuracy: 1%

idware Idware Remote Site Monitoring Solution

ARGUS SERVER SYSTEM. Inspired Systems Pty Ltd 70 Mordaunt Circuit, Canning Vale, Western Australia Ph Fax

Operating instructions SENTRI4 Control panel based Fire detection and alarm system

IndigoVision. GAI-Tronics Integration Module. Administrator's Guide

THE VALUE IS IN THE SOFTWARE

SEC 3500 OI- StatCast RS232 Gas Status Text Broadcast Configuration Manual

Applied Data Science: Using Machine Learning for Alarm Verification

Transcription:

Electrical & Telecom Dependability & Security Partners: ENEA, LIU, QMUL, AIA EU-IST-2001-32685; Dec 2001 May 2004 Topic: Alarm Reduction and Correlation in IDS Authors: Tobias Chyssler, Kalle Burbeck (LIU) Stefan Burschka, Michael Semling, Tomas Lingval (INO)

Contents Safeguard Project Our Situation: Network operations Our Approach Normalisation, static and adaptive Filtering Aggregation Correlation Future Summary 2

Safeguard IST Project Protection of Large Critical Infrastructures (LCCI) Automatic detection of and defence against known and unknown attacks, misconfigurations and failures Support of administrators using IDS Information Overload in IDS o Filtering, Aggregaton, Correlation o Enhancing time critical decision support & reactive capabilities Network and component failures as well as their prevention Selfhealing, graceful degradation 3

Situation: Network operations Appropriate perimeter defence exists: Attacks < 0.1%, Misconfigs = 70%, Failures = 30% Loss of time and money Dynamic Environment Machines, services and responsibles change Huge number of network elements and machines Various and sometimes unkown network interconnections Fragmentation of knowledge Lacking control of policy compliance Too complex human decision chains Information overload, meaningless IDS Alarms Reaction time too high breakdown 4

Approach appropriate steps in critical situations Preprocessing of Alarms: Filtering, feature extraction, aggregation Support for data analyist: (Un-)Interesting alarms Appropriate reactions Information extraction of alarm data Good features Up-to-date topology and policy infomation Automatic response to confine damage Auto immune reactions 5

Our Approach: Admin Task 6

Our Approach: Human Inference Methods Classify and filter unknown alarms first Filter known and suspicious alarms first Faster for unknown Attacks FP elimination better Faster for TP FP elimination slower Basic Alarm features: Severity Variety Number Uniqueness (Unusual Alarms) Frequency (Alerts / Minute) Payload (Alert, critical, debug, error, warning, info, notice) (hosts with a lot of Alarms) (hosts with many alarms) (Strange Payload in normal Alarms) Vulnerability state of the network 7

Process Diagram 8

Existing Alarm Sources (NTP synched) NIDS, HID, central logging Vulnerability scanner Host Health function Anomaly detection (Birch clustering) Sources WAFAD ARCA TACA 9

Information Sources Static Information Location, responsible Policies Vulnerability scans SNMP info Diversity statistics Sources WAFAD ARCA TACA 10

Alarm Reduction Chain 1. WAFAD: Time synchrone normalization and data selection Ignore, delete filters with lifetime 2. ARCA: (filtering) White filters lists Automatic filter proposal 3. ARCA: (Aggregation) Aggregation of similar Alarms (FP, TP reduction) Sources WAFAD ARCA TACA 11

Wrapper Agent for Alarm Databases (WAFAD) Sources WAFAD ARCA TACA 12

Alarm Reduction & Correlation Agent (ARCA) Sources WAFAD ARCA TACA 13

Results: Static filtering, Aggregation Static filtering (WAFAD) in dynamic environment: 5-20% performance Aggregation on different elements for different sources: IP, message,... Method: Edit Distance for each word. Optimum: 70% similarity 96.5 % 99.8% Sources WAFAD ARCA TACA 14

Results: Naive Bayesian Network (Dynamic Rule Proposal, supervised training) Model trained on ca 60000 alarms (1/3 dataset) Performance enhancement with text classification tricks Classes: (Un-)Interesting, decision by human expert Cross validation against all other datasets Result: > 99% correct classification, but Rule proposals were accepted in 65%, edited 20%, discarded 15% by admin. Sources WAFAD ARCA TACA 15

Topology and Correlation Agent (TACA) Sources WAFAD ARCA TACA 16

Results: AI Correlators (Un-)known attack detector Method: Added Alarm Severities weighted by their frequency in a time window and over different sources Detection rate 1 0,8 0,6 0,4 0,2 0 0 0,05 0,1 0,15 0,2 False positive rate Additive correlator with threshold: 150-100-50-20-10-5-2 Neural network 1-NN Sources WAFAD ARCA TACA 17

How to create mess? Take 100 machines, several Admins, different HW, OS and SW 18

Alarm reduction in Testnet Safeguard first time on line (AFAD,ARCA, HDA) no DB cleaning ops, normal misconfig no additional training of ARCA, no attacks WAFAD in WAFAD out ARCA in ARCAout Alarm Flow 19

New Correlation Method: M-Brain-dump in our new test network Experiments showed insufficient alarm reduction Added topology and vulnerability info correlation Added anomaly detection (Birch Clustering) All this processed by M-Brain-Dump Correlator: Implements actions and workflow of an Admin Creation of alarms tickets. Total alarm reduction 10 3-10 5 20

Test net experiments: Many misconfigured machines DB Cleaning ops running, M-Brain-Dump Correlator 97 Tickets WAFAD in WAFAD out ARCA in ARCAout TACA Ticket Alarm Flow 21

Lessons Learned Humans are already anomaly detectors KISS works best in real environments Distributed systems are a must for a certain network size Changes in the systems have to be slow (Adaption of algorithms) Algorithmic performance: Processing time Classification performance The human has to be the final instance in the decision chain (UNDO Button) 22

Future Research Topics Prediction of system health Graceful degradation Complex resource regulation Anomaly detection in service content Handset and embedded systems security Automatic correlation tree learning, add in of ANN Improving our test network (+ 200 machines) Training & test data (annonym, available for everybody) 23

Summary We showed: An Architecture which mimics the human analysis process Alarm reduction 10 3-10 5 depending on data AI - Correlators for (un-)known Attacks Real time system confines effects of misconfigurations, failures and attacks in order to guarantee the entire system s survival 24

Questions / Remarks? Publications: http://www.ist-safeguard.org Test net mailing list: group.safeguard-tnet-ino@swisscom.com Contacts: stefan.burschka@swisscom.com michael.semling@swisscom.com thomas.dagonnier@swisscom.com 25

Alarm Aggregation Which Alarms have similar content Aggregation over an arbitrary window size. Forward: 1. Occurrence: The original alarm At end of window one alarm + # of occurences Threshold Sg = 0.65: Same messages recognized as identical Threshold Sg = 0.7 : Alarm Reduction Snort 96.5 %, Syslog 99.8% Sources WAFAD ARCA TACA 26

Alarm window size Influence on Ticket Appearance Aggregation can swallow important alarms for a whole time window Sg and time window has to be tuned for optimal reactivity, severity dependent Number of alarms 2500 2000 1500 1000 500 0 1 5 15 60 180 Tim e w indow (m inutes) Sources WAFAD ARCA TACA 27

Result: Frequency of messages as a filter? Test Data: Same as in Baysian experiment Sources WAFAD ARCA TACA 28

Test Network Results so far in a small network, so lets see how is performs without retraining in a realy big messy one HW Architectures SUN ULTRA 2,5, 10, Sparc 5,10,20 X86 Architecture HP Risc PA Embedded processors (Router, Switch) SW Architectures Solaris (2.6 2.10), all patch levels HP-UX 10.x Open BSD 3.x Windows (95,98,NT,2000,XP,2003), all patch levels Router, switches (IOS) 29

Alarm Reduction Attack tools & DB cleaning ops running WAFAD in WAFAD out ARCA in ARCAout Alarm Flow 30

Baysian filtering Tricks to enhance Baysian performance: Char garbage filter and Len filter Noise decorrelator Prior shifter Multinominal Kernel: Word Frequencies =1 Nonlinear function on posteriory probability Results: 31

AI Correlation in time slots Snort Samhain Syslog Added values Ping from 192.168.201.131. Severity 1 Snort: 1 Samhain: 0 Syslog: 0 Timeslot n-1 Portscan from 192.168.201.110. Severity 2 Buffer overflow attempt from 192.168.201.110. Severity 7 FTP-server error. Severity 5 Snort: 9 Samhain: 3 Syslog: 5 Timeslot n /etc accessed. Severity 3 Sources WAFAD ARCA TACA 32