Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Statistics and Probability Expert

1. Purpose

This homework implements algorithms for anomaly detection.

2. Description

Introduction

Comparing with signature based IDS, statistical based IDS uses the statistical metrics and algorithms to differentiate the anomaly traffic from benign traffic, and to differentiate different types of attacks. The advantage of statistical based IDS is that it can detect the unknown attacks. As we know, DOS attacks happen frequently in the Internet. SYN flooding attack is an important form of DOS attacks. Port scan is another main category of malicious intrusions. However, some kinds of port scan can be easily hidden in the SYN flooding attacks, and this noise always confuses the administrator and causes the wrong responses. How to differentiate the SYN flooding from port scan is a hot research topic in the intrusion detection research. In this project, you will be asked to develop some key parts of a tiny statistical based IDS system to differentiate the SYN flooding attacks and port scan attacks from benign traffic, and further differentiate the SYN flooding from port scan. We will supply you the main framework, and the statistical model for automatically inferring the threshold for detection. You will be asked to find the best statistical metrics which can easily characterize and classify the traffic into three categories: normal, SYN flooding, port scan, and calculate the metrics from the raw network traffic trace. Also, based on the statistical models, you should be able to detect the SYN flooding attacks and port scan attacks.

This tiny IDS project includes the following steps:

1) Obtain the data set from [1], or http://www.ll.mit.edu/ideval/data/1998data.html, which is the network traffic trace of the DARPA98 IDS evaluation data set.

2) Calculate the metrics you selected

3) Use the statistical metrics calculated from the training data set to training the statistical model.

4) Use the model from (3) and the statistical metrics calculated from the test data set to detect the attacks in the test data set.

Do not copy the whole data set to your home directory, since it's too large, just read the data directly from that directory.

The DARPA98 IDS evaluation data set contains one training data set and one testing data set. For each detection trial, you select one to five statistical metrics and calculate for both training and testing data set.

The HMM model can accept up to 5 metrics to detect the attacks and the Gauss model can only use one. You need to figure out the best metrics combination to get the best detection result. And you can try as many different metric combinations as you like. Use the statistical metrics calculated for the training data set, which has annotated attacks, to train the statistical model. For the training phase, we give the ground truth of the attacks to the statistical model, which can automatically infer the threshold for differentiating three categories (normal, SYN flooding, and port scan) based on the different statistical characteristics of your metrics for the three categories. Next, you can use the trained statistical model and the statistical metrics calculated from the testing data set to detect the attacks in the testing data set.

In this assignment, you will use two classical statistical learning models: the k-means clustering algorithm and the Double Gaussian model. You can use the two models together or just use one model or design your own model.

For example, you can use the k-means clustering model to differentiate the abnormal (including SYN flooding and port scan) from normal, and use the Double Gaussian model to differentiate the SYN flooding from port scan; or you can just use k-means clustering model to classify to 3 categories (normal, SYN flooding and port scan).

For each detection, you can select 1 to 5 statistical metrics. For example, you can calculate the volume of SYN packet minus the volume of SYN ACK packet as a metrics, in every 5 minutes time interval.

Specification

You first need to write some C/C++ programs to calculate selected metrics of the training and testing data set, and then use the Matlab program to train the statistical model and do detection.

Basically you need to do the following:

A. You need to write the parsing C programs for both training and testing data. For training data sets, the output of your program should be a list of metrics plus the annotated flags. Each line presents the metrics calculated from the 5-minute network traffic packet data. The same output should be for the program of testing data sets, except which does not have the annotated flag in each line, instead, you need to put the time stamp in each line. You also need to add some metric specific code to it, for the metrics you select.

B. Based on the outputs of training and testing, you need to use the Matlab program (e.g., TinyIDS.m) to train the statistical model for detection. The Matlab programs allow you to compare your result with the ground truth to calculate your accuracy.
Getting familiar with DARPA98 data set

As mentioned before, DARPA98 data set includes two parts: the training data set and the testing data set. The training data set contains 7 week (35 days) Tcpdump data. The training data set is in plain text format and includes 35 data files. Each of the data files contain one day's network traffic data, which is in Tcpdump format.

In Tcpdump format, each line represents a packet transferred on the target network. e.g. 897048008.080700 172.16.114.169.1024 > 195.73.151.50.25: S 1055330111:1055330111(0) win 512

The first column 897048008.080700 is the time stamp of this packet, which is in an absolute time format. 897048008 is the number of seconds since 1970, and .0870700 is the microseconds.

The second column 172.16.114.169.1024 is the Source IP address 172.16.114.169 plus the source port 1024. The third column > presents the direction of the traffic, which means the traffic is from source IP.port column 2 to the destination IP.port column 4.
The fourth column 195.73.151.50.25 is the Destination IP address 195.73.151.50 plus the destination port 25. The fifth column S is TCP flag of the packet. S presents SYN.

The following columns are other TCP header fields. Note, ack flag may be in these fields. For more information about the format please man tcpdump

In the training data set, one column is added at the beginning of each line to annotate which categories this line belongs to. 1 presents normal, 2 presents SYN flooding, 3 presents port scan.

The testing data set contains 2 weeks (10 days) data, so you need to use your tiny IDS to detect the anomalies in it. Based on the ground truth* of testing data set, the TinyIDS.m program will output the error ratio of your detection program, so you can change or adjust your statistical metrics to get better detection result.

*Term: ground truth --- The real attacks in the data set. If your detection results equal to ground truth, you will get 100 percent accuracy.

Metric calculation

Because the data sets are quite large, we recommend you to use C/C++ language to write the calculation program for high efficiency. You should write 2 programs (cal_training and cal_testing), one for the training data set and the other for the testing data set. In this program, read the text Tcpdump trace data from stdin, and write the calculated metrics to stdout.

For the metrics calculation, we require you to calculate the metrics in every 5 minute traffic. For example, you may calculate the volume of SYN packets minus the volume of SYN ACK packets in every 5 minutes time interval. Use the time stamp to get the time.

For the metrics_training.txt file, we recommend the following format of each line:
Metric1 Metric2 ... Annotation flag

Put the metrics you select in column 1 - n, if you select n metrics. The HMM system currently can simultaneously consider at most 5 metrics. So make sure n is no larger than five. Put the annotation flag in the last column. Please use one whitespace character to separate the different columns.

Note: In each 5-minute data, if any packet record is annotated as SYN-flooding, this record for the 5 minutes data should be annotated as SYN-flooding, otherwise if one packet record is annotated as port scan, the record for the 5 minutes should be annotated as port scan. The other records which do not have any SYN-flooding or port scan packet, should be annotated as normal.

For the metrics_testing.txt file, we require the following format:
Metric1 Metric2 ... Timestamp

The timestamp can be used for comparing the ground truth with your detection results. Thus it is very important for grading. Please make sure you use the same form as the timestamp in Darpa98 data set.

Self-evaluation
After you finish the attack detection in the testing data set, based on the ground truth, your program will calculate the error ratio E.
Since most of your grade for this project will be based on your error ratio E result, you should try different metrics and combinations of the two statistical models to get as good results as you can. Try to minimize the error ratio E.

Note 1: Here we have 3 categories: Normal, SYN-flooding, and Portscan. If you count any time interval into the wrong category, you error should be increased by 1. The total errors divided the total time intervals you get the error ratio E.

Note 2: A more complicated metric may not be better than a simpler one. Just consider how the attacks will affect the characteristics of network traffic (packets) to select the metric. Also, it is up to you how to use the two classifiers. Maybe only one classifier is Okay, maybe you need to use both. Ponder on the characteristics of these network attacks, and try as much as you can.

Note 3: In this project, our detection is a preliminary one. From the result, we only can know for each time interval whether it belongs to Normal, or SYN-flooding, or Portscan. But some attacks may last for many time intervals. Thus we do not really know how many attacks we detect and how many we mis-detect. Therefore, here we use the error ratio E to evaluate you results. Another reason for such metric is that we have 3 categories to classify each interval to. It is not a simple normal/abnormal question.

Evaluation Report

You also need to write an evaluation report which includes the followings:

- Your comparative analysis about the statistical metrics chosen: why you decided to choose these metrics based on the characteristics of portscan and/or SYN-flooding?

- The best metrics and the detection results of the metrics.

- Some theoretical analysis, if possible, of why these metrics chosen by you are the best metrics.

- A list of some other metrics you tried but you do not think those are good ones. Please include the results of those metrics as well, and why you think theoretically they are not as good as your best ones.

- A description of any important design decisions you made.

Evaluation

The total points are 100.

A. The metric and the accuracy of your result of testing data set (we will test it separately)

B. Your evaluation report

You can enter the accuracy contest with your metrics and your implementation. Whoever has the highest detection accuracy will get 30 extra bonus points. If there are ties, then all the parties will get the 30 extra points plus gifts.

Submission
- Zip your entire project. Submit the zip and README file The ZIP should include the following:

1) The source code of the metric calculation C/C++ programs

2) The metrics calculation result: metrics_training.txt and metrics_testing.txt

3) Your evaluation report (make sure to include your detection results in your report)

Reference

[1] Richard P. Lippmann, Robert K. Cunningham, David J. Fried, Issac Graf, Kris R. Kendall, Seth E. Webster, Marc A. Zissman, "Results of the DARPA 1998 Offline Intrusion Detection Evaluation," slides presented at RAID 1999 Conference, September 7-9, 1999, West Lafayette, Indiana.

[2] Lawrence R. Rabinner, A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition," in Proceedings of the IEEE, Feb 1989.

Appendix
In order to enlighten you a little bit about the statistical metrics you can use, in this section we will supply some of them as examples. But feel free to use anything else which is not on the list. Note, the metrics in the list are just examples, which may or may not be good choices.
_ The traffic volume
_ The packet volume
_ The SYN packet volume
_ The unresponded flows (The SYN packet volume - The SYN ACK packet volume)
_ The mean or standard deviation of the packet volume per host/port in the target network
_ The number of peers that one host connect with in a time interval
_ The unresponeded flows/total packets in a time interval

Statistics and Probability, Statistics

  • Category:- Statistics and Probability
  • Reference No.:- M91960552

Have any Question?


Related Questions in Statistics and Probability

According to a pew research center poll 22 of adult

According to a Pew Research Center poll, 22% of adult Americans have contributed to an online fundraising project. A random sample of 100 adults is selected. Let the random variable X be the number of adult Americans who ...

You are the foreman of the bar-s cattle ranch in colorado a

You are the foreman of the Bar-S cattle ranch in Colorado. A neighboring ranch has calves for sale, and you are going to buy some calves to add to the Bar-S herd. How much should a healthy calf weigh? Let  x  be the age ...

Sppose a and b are collectively exhaustive in addition pa

Suppose A and B are collectively exhaustive. In addition, P(A) = 0.2 and P(B) = 0.8. Suppose C and D are both mutually exclusive and collectively exhaustive. Further, P(C|A) = 0.7 and P(D|B) = 0.5. What are P(C) and P(D) ...

Letnbspnmnbspv denote the normal random variable with

Let  N ( m ,  v ) denote the normal random variable with mean  m  and  variance   v . (a) If  X  is a  Standard Normal  variable, what is the distribution of the random variable 4 X  - 1? (b) If  X  ~  N (3,1) and  Y  ~  ...

Lt a and b be two events where pa 048 pb 022 and pbcac

Let A and B be two events where P(A) = 0.48, P(B) = 0.22, and P(BC|AC) = 0.91. What is the probability of A or B (a union b)?

You buy a mutual fund for 1000 it annually distributes 60

You buy a mutual fund for $1,000. It annually distributes $60 for seven years, after which you sell the shares for $775. What is the annualized return on your investment? Use Appendix B and Appendix D to answer the quest ...

A governments department of transportation reported that in

A? government's department of transportation reported that in? 2009, airline A led all domestic airlines in? on-time arrivals for domestic? flights, with a rate of 83?%. Complete parts a through e below. a. What is the p ...

What are the ways that it can help comply with legal

What are the ways that IT can help comply with legal requirements and social responsibilities surrounding the sales of alcohol?

Simone founded her company using 175000 of her own money

Simone founded her company using $175,000 of her own? money, issuing herself 200,000 shares of stock. An angel investor bought an additional 200,000 shares for $125,000. She now sells another450,000 shares of stock to a ...

If you know the percentile rank is 50 the mean is 50 and

If you know the percentile rank is 50. The mean is 50 and the standard deviation is 5. What is the raw score, z score, and t score?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As