05.06.2013 Views

PNNL-13501 - Pacific Northwest National Laboratory

PNNL-13501 - Pacific Northwest National Laboratory

PNNL-13501 - Pacific Northwest National Laboratory

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

the future. The process that the analyst used to make the<br />

final decision is recorded so that these processes can be<br />

used in an automated manner in future systems.<br />

Researchers have recently concluded that no single<br />

method or algorithm is able to detect all types of<br />

intrusions. Thus, research has shifted from single to<br />

multiple solution methods. This proposed design is<br />

modular and anticipates the required empirical testing for<br />

fine-tuning and expansion.<br />

Most researchers today are trying to directly reach the<br />

“malicious behavior” conclusion with limited success.<br />

Our proposed approach included a three-step process.<br />

The first step included a general-purpose anomaly<br />

detection engine that detects a wide variety of anomalous<br />

behaviors. Upon detection of these anomalous behaviors,<br />

this engine will signal an algorithm engine that will select<br />

one or more enhanced anomaly detection engines to<br />

interrogate new data being supplied based on the type and<br />

source of the first anomaly to discern the type and nature<br />

of the behavior and report the results. The following<br />

block diagram (Figure 2) illustrates this structure.<br />

Another new approach being used is the data metric<br />

selection and collection criteria. Typical anomaly and<br />

Figure 2. Block diagram<br />

150 FY 2000 <strong>Laboratory</strong> Directed Research and Development Annual Report<br />

intrusion detection systems use audit and system logs. It<br />

is the intent of this design to go directly to the source of<br />

the data—the system memory. In the system memory,<br />

one will have access to all activity on that host, including<br />

all network traffic. Both host and network information is<br />

readily available for analysis.<br />

General Anomaly Detection Engine<br />

The general anomaly detection engine can use algorithms<br />

that have been developed for anomaly detection and/or<br />

intrusion detection. These algorithms tend to produce a<br />

higher incidence of false positive signals, which is a<br />

desired feature in this application. Some of the<br />

algorithms considered are<br />

• artificial neural networks<br />

• SRI International Menlo Park, California, covariance<br />

algorithm<br />

• Carnegie Mellon University, Pittsburgh,<br />

Pennsylvania, algorithms.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!