Real Time Network Anomaly Detection Using Relative Entropy

54 downloads 255 Views 376KB Size Report
Currently, most widely-used malware detection software uses signature-based method to recognize threats . Signatures are sequences of bytes in the machine ...
Real Time Network Anomaly Detection Using Relative Entropy Altyeb Altaher

Sureswaran Ramadass, Ammar Almomani

National Advanced IPv6 Center of Excellence

National Advanced IPv6 Center of Excellence

Universiti Sains Malaysia,Malaysia

Universiti Sains Malaysia,Malaysia

Abstract-As

Penang,Malaysia

Penang,Malaysia

[email protected]

Sures,[email protected]

the computer networks continue to increase in size,

complexity and importance, the network security issue becomes more and more important. In this paper, we propose a real time anomaly detection system based on relative entropy. The proposed system captures the network traffic packets and then uses relative entropy and adaptive filter to dynamically determine the traffic changes and to examine anomaly.

The paper is organized as follows. Related work in section II . Section III

presents

the network traffic attributes and the

network entropy. Section IV presents the proposed anomaly detection method. Section V evaluates the effectiveness of our proposed scheme. Section VI concludes the paper.

whether the traffic change is normal or contains

II.

Our experimental results show that the proposed system is

RELATED WORK

efficient for on-line anomaly detection, using traffic trace collected in high-speed links.

The

Keywords- Network security ; anomaly detection; entropy

theory.

failure

of

traditional

signature-based

in

detecting

polymorphic and unseen malware, orients the research in network security to directions. The entropy of different packet attributes under normal and abnormal network conditions have been analyzed in [6-8,10]. The abnormal network traffic

I.

worms. Further work on As the computer networks continue to increase in size, complexity

and

importance,

the

network

is

affected by different attacks, such as DoS, port scanning and

INTRODUCTION

security

issue

becomes more and more important.

fmding out whether the entropy

values of different attributes are highly correlated is given in [6]. In our paper we also observe this phenomenon and verity the conclusion made in [6]. In [9], the authors make use of the concept of maximum entropy to build up a normal network

"Malware" is an abbreviation for 'malicious software' and is

distribution baseline and then use relative entropy to detect the

used to refer to any software designed to cause damage to a

anomalies. However, the baseline distribution in [9] is based on

single computer, server, or computer network[1].According to

the

Kaspersky labs in February 2011, 252,187,961 malicious

combination

TCP/IP

protocol of

field

different

they

only

attributes

which

attribute-values take

three

are

protocol

means very fields

the

large.

programs detected [2]. This worryingly high number is only

Subsequently,

likely to increase, especially as the malware author's incentives

consideration and their experiments showed that it would

into

for writing such software is now mainly a financial one.

generate a large

According to its propagation methods, malicious code is

should be ordered and labeled according to their features and

usually classified into the following categories

the complex preprocess will decrease the ability for detecting

[3][4][5]:

viruses, worms, Trojan horses, backdoors and spyware . Due to the

significant

loss

and

damages

induced

by

feature set. Moreover, the raw packet data

anomalies in real-time.

malicious

executables, the malware detection becomes one of the most

III.

critical issues in the field of computer security. Currently, most widely-used malware detection software uses signature-based method to recognize threats . Signatures are sequences of bytes in the machine code of the malware. The inability of traditional signature based malware detection approaches to catch polymorphic and new, previously unseen malwares has shifted the focus of malware detection research to find more generalized and scalable features that can identity malicious behavior as a process instead of a single static signature. In this paper, we propose a real time anomaly detection system

NETWORK TRAFFIC ATTRIBUTES AND NETWORK ENTROPY

In this section, we describe the important network traffic

attributes

for anomalies detection. We also describe the

computation on the entropy values of the network traffic attributes. A.

Network Traffic Attributes

After researching on customer service flows in an enterprise, we summarize the work flows of its customer service system are as follows:

based on relative entropy. The system uses the relative entropy to analyze the network traffic and detect the anomalies.

978-1-4577-1169-5/11/$26.00 ©2011 IEEE

258

Traffic attributes that are especially important (because their

adaptive filter to examine the traffic changes and determines

rapid change during typical attacks) and used during process of

whether the traffic is normal or contains anomaly.

anomaly detection are [11]: Source and destination IP address,



detect

anomalies, we

need

a

method

to

clearly

differentiate network anomalies from the normal behavior.

Number of bytes packets received by the local host,



Therefore we introduce an adaptive threshold to differentiate

TCP flags, especially SYN, RST and FIN flags



Adaptive Detection Threshold Setup To

Number of bytes and packets sent to the remote hosts,





B.

Source and destination port,



between steady

Duration of the connection

"normal"

network traffic behavior, and

non-steady network traffic behavior. We first compute entropy values of degree distributions in each time interval, and then

In our approach we take into consideration the following:

compute mean entropy in a particular time interval. We also

source/destination IP and port number,

use variance to reflect the deviation between normal and

Number of bytes sent/received.

abnormal behavior.

These attributes were selected because a significant number of worm attacks cause changes in the values of these attributes

Let us assume, the measured entropy Y be a random variable

and therefore could be recognized as an anomalous state [12].

with mean E( y)

=

!.I. and var( y)

=

cr2 . Then, the

Threshold is defined as follow Threshold

Network Entropy

B.

= Jl±3*0"

(2)

The entropy of normal network traffic behavior is less than

Entropy is a measurement of the disorder of a system. If the

equal the threshold

Beyond this normal region, the entropy

system tends to be in disorder, its entropy increases towards 1;

or

if the system tends to be in order, then its entropy decrease

represents traffic events as anomalous and assigns a severity

towards o.

level depending upon its deviation from the normal region.

We can view certain attributes of packets that we capture in a period of time as a set. The entropy of the packet attribute­ value can be defined as:

The processing engine in the proposed online detection system detect anomalies.

(1)

=

;=1

The anomaly detection system captures network traffic

Where in H(P), the P(x) is as follows:

(

XI

)

every time window (30 sec) and store the source and destination IP address of the all flows in the database, then it

Number· of . pkts· with· Xi as· certain· attribute •

=

Anomaly Detection Methodology

uses an efficient lightweight methodology based on entropy to

H(P) ip(xi)logP(xi)

p

C.

finds the number of flows sent to distinct destination IP

Total. number· of· pkts

address. Based on the number of total flows and the number of

It should be notes that the work in [6-8,10] takes this approach to check for the differences between the normal and abnormal network action.

flows sent to distinct destination the algorithm computes the entropy value for this time window. The algorithm calculates the detection threshold as entropy average value plus or minus the three standard deviations. If the entropy value of network traffic flow exceeds the threshold then the network traffic flow is considered as anomaly.

IV.

THE PROPOSED REAL TIME ANOMALY DETECTION

V.

SYSTEM In this section, we first give an overview of the proposed

anomaly detection System. Second, we describe our adaptive detection threshold setup. Then we present our methodology for computing the entropy and self-adjusting the threshold to raise an alert when abnormal traffic is detected.

A.

PERFORMANCE EVALUATION

The network topology for the experiment is shown in Fig.l. All the network traffic captured using the network interface card (NIC) on PC3 in Fig.3 and stored in database, the database design consists of one table and stores all information used and needed by our proposed system.

The proposed real time anomaly detection system description The proposed system captures the network traffic packets

and

then

uses

relative

entropy

and

adaptive

filter

to

dynamically determine the traffic changes. It then applies

259

entropy. To validate the efficiency of our online anomaly detection technique, we used real time network traffic from the National Advanced IPv6 Center of Excellence - University

Internet

Science Malaysia (USM). Next we injected the Witty Worm

AI nttwol'k tnf'Iicwu Cipwrtd using tht n.twort a«bpt.r on PC3and thin proc:ustd with the CAlDAdmnl bythl d.n�

dataset

of

CAIDA

into the

online network traffic.

Our

experimental results show that the proposed system is efficient

high spttd nttwo!' MlOClUIy d.ttction system

for on-line anomaly detection because it is based on the entropy which increases the sensitivity of the detection process to uncover well-known or unknown anomalies. Furthermore, the use of adaptive threshold results in lower false alarm rate. Our ongoing work further analyzes the traffic anomalous features, and extends the methodology proposed in this paper

pe3 High speed networt; anomaly detection system

to diagnose additional network-wide anomalies REFERENCES

Figure 1 : The network topology for the experiment [I]

P. Szor. The Art of Computer Virus Research and Defense. Addison Wesley for Symantec Press, New Jersey, 2005.

[2]

Zakorzhevsky, 2011. Monthly Malware S tatistics. Available from: http://www.securelist.comlen/analysis/2047921821M0nthly_Malware_St atistics_June_2011 [Accessed 2 July 2011).

[3]

Adleman, L.: An abstract theory of computer viruses (invitedtalk). In: CRYPTO '88: Proceedings on Advances in Cryptology, pp. 354-374, 1990.

[4]

Filiol, E: Computer Viruses: from Theory to Applications.Springer, Heidelberg ,2005.

[5]

McGraw, G., Morrisett, G.: Attacking malicious code: report to the infosec research council. IEEE Softw. 17(5, pp. 33-41), 2002.

[6]

G. NychisOV. Sekar, D. G. Anderson, etc. "An Empirical Evaluation of Entropy-based Anomaly Detection" Proceedings of the 8th ACM SIGCOMM conference on Internet measurement" ACM Press, 2008,pp151-156.

[7]

D.Brauckhoff, B. Tellenbach, A Wagner, etc. "Impact of traffic sampling on anomaly detection metrics." Proceedings of the 6th ACM SIGCOMM conference on Internet measurement. ACM Press, 2006, ppI59-164.

We used real time network traffic from National Advanced IPv6 Center of Excellence at the University Science Malaysia (USM).

Throughout

measurements remarkable

of

our

the

similarity

experimentation,

high

speed

except

for

network a

few

the

entropy

traffic peaks.

show These

exceptional entropy values represent the magnitude of traffic features'

distributional variations during the measurement

period. We picked sample snapshots of time where peaks are observed, and investigated the network traffic measurements. To validate the efficiency of our high speed network anomalies detection, we have injected anomaly network traffic which is Witty Worm dataset of CAIDA [15] in the online network traffic.

-[,..ropy

[8]

ALakhina, M. Crovella, and C. Diot. "Mining anomalies using traffic feature distributions". Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer.

-U�Ttorehold -lO'W�th,fthokt

communications.ACM Press, 2005, pp217-218 [9] Time

h«on

Suggest Documents