05.06.2013 Views

PNNL-13501 - Pacific Northwest National Laboratory

PNNL-13501 - Pacific Northwest National Laboratory

PNNL-13501 - Pacific Northwest National Laboratory

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Study Control Number: PN00003/1410<br />

Advanced Anomaly Detection<br />

Brad Woodworth<br />

The Department of Energy needs technology to protect its computer networks and information systems. Neither current<br />

technology nor other options available from the computer security industry offers adequate protection levels for the<br />

security requirements of DOE.<br />

Project Description<br />

Most threats to a data center are from internal sources.<br />

Many commercial and public domain security products<br />

focus on the external threat and detect internal abuse only<br />

as it occurs. These products may indicate that a loss has<br />

occurred thus creating a gap between the internal threat<br />

detection and protection from the threat. This project<br />

explored new, more sensitive methods of anomaly<br />

detection that can decrease or eliminate the gap between<br />

the detection of the internal threat and protection from the<br />

threat. The particularly difficult problem of theft of<br />

sensitive data by “non-network” or “sneaker-net” means<br />

by those with legitimate access to the information has<br />

been viewed as the ultimate application of this work.<br />

This problem may not be solved, but it has been<br />

considered throughout the research process for any<br />

unexpected approaches that may be suited to this<br />

problem. Anomaly detection is a sub-field (CMAD IV<br />

1996; Dean) of intrusion detection. Although anomaly<br />

detection may detect malicious behavior, it may also<br />

detect valid anomalous behavior. This feature of false<br />

positives that has beleaguered prior research will actually<br />

be used as a feature in the design of the advanced<br />

anomaly detection engine described.<br />

Introduction<br />

The current state of commercial products still has a long<br />

way to go before they can adequately address the security<br />

concerns of DOE. The latest systems are now combining<br />

network and host-based intrusion detection techniques<br />

(Shipley 1999). No single system passed all the tests<br />

(Shipley 1999) that were given at the network computing<br />

laboratories. Some government and academic tools are<br />

available but these tools lack the broad coverage of<br />

detection capabilities desired. Insider threats are difficult<br />

to detect (Figure 1).<br />

Figure 1. Malicious activity detection solution spectrum<br />

Approach<br />

The solution proposed for advanced anomaly detection<br />

involves a three-step process.<br />

1. A general anomaly detection engine monitors system<br />

activities and detects when this activity deviates<br />

outside the normal range.<br />

2. Upon detection of anomalous behavior, the general<br />

anomaly detection engine signals an algorithm<br />

decision engine, which selects one or more enhanced<br />

anomaly detection engines for final analysis.<br />

3. The enhanced anomaly detection engine(s) monitor<br />

data harvested from memory and attempts to identify<br />

the type of activity that caused the alarm. The<br />

activities are then characterized as malevolent,<br />

benevolent, or inconclusive.<br />

If the activities are inconclusive, a human analyst will<br />

make the final decision. Once the decision has been<br />

made, this information can be fed back into the general<br />

algorithm and enhanced engines for accurate response in<br />

Computer Science and Information Technology 149

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!