12.07.2015 Views

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Dependable Anomaly D<strong>et</strong>ection with DiagnosisResearch Staff : Frédéric Cuppens, Sylvain Gombault, Jean-Pierre Le Narzul –Post. Doc.: Wei WangKeywords : Dependability, Agreement Services, Intrusion d<strong>et</strong>ection, Anomaly d<strong>et</strong>ectionApplications : Dependable Web Servers, Anomaly D<strong>et</strong>ection SystemPartners & Funding : partially funded by ANR in the framework of the ACI DADDi (Action ConcertéeIncitative)IntroductionMost current intrusion d<strong>et</strong>ection systems aresignature-based. The major limitation of thistechnique is its incapacity to d<strong>et</strong>ect newattacks, which by definition cannot be in thedatabase of signatures. Facing this problem,anomaly d<strong>et</strong>ection is particularly interesting.The main principle of anomaly d<strong>et</strong>ection is tobuild a reference model of a given entitybehavior (user, machine, service, orapplication). A deviation from this model isconsidered as an attack attempt.DADDi (Dependable Anomaly D<strong>et</strong>ection withDiagnosis) is an ACI project funded by theANR (2004-2007) that deals with intrusiond<strong>et</strong>ection techniques. The project consortiumincludes 4 academic institutes (Supélec, CRIL,TELECOM Br<strong>et</strong>agne, IRISA) and one industrialpartner (Orange Labs).The first objective of this ACI is to proposenew anomaly d<strong>et</strong>ection explicit approaches.Such approach exhibits several problems. First,it is difficult to define what is explicitlysignificant in the modeled behavior. Then, it isnecessary to take into account the normalevolutions of the observed behavior.Enhancing the explicit approach is thus a firstobjective of this project.As a second objective, DADDi suggests tointroduce an implicit approach based on aclassical approach of the dependabilitydomain: the design diversity. The goal is toforward any request to several modulesimplementing the same functionality, butthrough diverse designs (diversified COTSservers). Any difference b<strong>et</strong>ween the resultsobtained can be interpr<strong>et</strong>ed as a possiblecorruption of one or several modules. In bothcases (explicit and implicit), the dependabilityproperties of the Intrusion D<strong>et</strong>ection System(IDS) are also a main concern. Studying theseproperties is the third objective of this project,in order to bring intrusion tolerance propertiesto the anomaly d<strong>et</strong>ector.RealizationFig 1: New attack d<strong>et</strong>ection with explicit approachA first part of our work focused on anomalyd<strong>et</strong>ection with explicit reference model. Wehave investigated new m<strong>et</strong>hods and testedthem over the DARPA 98 traffic database. Wehave proven their efficiency and theirapplication have exceeded the wining entry ofthe KDD 99 data intrusion d<strong>et</strong>ection contest.Our contribution in this project is threefold.The first is the necessity to improve machinelearningm<strong>et</strong>hods by adding a new class. Newinstances should be classified since theyshould not be classified as any of the knownclasses present in the learning data s<strong>et</strong> [2].The second contribution consists in introducingsome necessary conditions that should beverified by a rich transformation function. Thislast point was not taken into account duringthe transformation of the DARPA98 into KDD99data s<strong>et</strong>s. As a result, many attacks trafficbecame identical to normal traffic aftertransformation. We have shown that SNMPattacks were classified as normal traffic for thisreason [2]. We have then modified th<strong>et</strong>ransformation function to d<strong>et</strong>ect attacks onSNMP traffic, to match the necessaryconditions for this service. By modifying onlythe m<strong>et</strong>hod of calculation of two attributes, weimproved in a considerable way the rate ofd<strong>et</strong>ection of the attacks on this service. But inspite of these good results the transformationPracom’s Annual Report <strong>2008</strong> 45

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!