1
An Architecture of Crowdsourced Intrusion Detection System Daniel Song, Kyung Hwa Kim, Henning Schulzrinne Dept. of CS, Columbia University in the City of New York Motivation Firewalls focus on intrusion from outside. What about the malicious attempt from the inside? It is difficult to detect whether an outgoing traffic is a malicious traffic, so we suggest a system that 1.asks the user about the traffic. 2.collects the data and learns from it. Collaborative method can strengthen the IDS but different people have different knowledge on computer. Collaborative Intrusion Detection Rule Engine Internet DYSWIS (Traffic Capture) Network Traffic Anomaly Detector User Goal Detect suspicious outbound traffic of a host to find out whether the host is compromised. Use users’ feedbacks as a training set of a supervised anomaly detection. Differentiate the user using Social Network services like linked-in. Different user will have different trust factor based on Social Network profile. (e.g network experts will have higher initial tf) Alert Rule Engine Future Work Experiment using simple linux program like nmap. Experiment using real malware. Deploy tools and gather real data. Supervised Machine Learning Social Network 1 3 5 7 9 11 13 15 17 19 21 0 20 40 60 80 100 120 140 Series1 Series2 Series3 Anomaly Detector Trust factor (tf) is first determined by social network profile. tf will change overtime based on the quality of the data. (e.g if the user continuously create noise data, lower the tf) Data from the network admin has higher tf. Gather user Feedbacks Data from different user have different trust factor Trust Factor Generate rule from the collected data Alert user for unusual traffic

An Architecture of Crowdsourced Intrusion Detection System

Embed Size (px)

DESCRIPTION

An Architecture of Crowdsourced Intrusion Detection System Daniel Song, Kyung Hwa Kim, Henning Schulzrinne Dept. of CS, Columbia University in the City of New York. Goal. Collaborative Intrusion Detection. Motivation. - PowerPoint PPT Presentation

Citation preview

Page 1: An  Architecture of  Crowdsourced  Intrusion Detection  System

An Architecture of Crowdsourced Intrusion Detection SystemDaniel Song, Kyung Hwa Kim, Henning Schulzrinne

Dept. of CS, Columbia University in the City of New York

Motivation

• Firewalls focus on intrusion from outside.• What about the malicious attempt from the inside?• It is difficult to detect whether an outgoing traffic is

a malicious traffic, so we suggest a system that1. asks the user about the traffic.2. collects the data and learns from it.

• Collaborative method can strengthen the IDS but different people have different knowledge on computer.

Collaborative Intrusion Detection

Rule Engine

Internet

DYSWIS (Traffic Capture)

Network Traffic

Anomaly Detector

User

Goal

• Detect suspicious outbound traffic of a host to find out whether the host is compromised.

• Use users’ feedbacks as a training set of a supervised anomaly detection.

• Differentiate the user using Social Network services like linked-in.

• Different user will have different trust factor based on Social Network profile. (e.g network experts will have higher initial tf)

Alert

Rule Engine

Future Work• Experiment using simple linux program like nmap.• Experiment using real malware.• Deploy tools and gather real data.

Supervised Machine Learning

Social Network

1 2 3 4 5 6 7 8 9 101112131415161718192021

0

20

40

60

80

100

120

140

Series1

Series2

Series3

Anomaly Detector

• Trust factor (tf) is first determined by social network profile.

• tf will change overtime based on the quality of the data. (e.g if the user continuously create noise data, lower the tf)

• Data from the network admin has higher tf.Gather userFeedbacks

Data from differentuser have different trust factor

Trust Factor

Generate rule from the collected data

Alert user for unusual traffic