簡易檢索 / 詳目顯示

研究生: 林育任
Yu-Ren Lin
論文名稱: 以基元攻擊為基礎作異質入侵偵測之基元攻擊樣版自動建構技術
Automatic Construction of Primitive Attack Templates for Primitive Attack-based Heterogeneous Intrusion Detection
指導教授: 何正信
Cheng-Seen Ho
口試委員: 簡志誠
Chih-Cheng Chien
李漢銘
Hahn-Ming Lee
許清琦
Ching-Chi Hsu
陳錫明
Shyi-Ming Chen
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2005
畢業學年度: 93
語文別: 中文
論文頁數: 67
中文關鍵詞: 警訊知識本體入侵偵測系統基元攻擊樣版基元攻擊攻擊知識本體
外文關鍵詞: Primitive attacks, Attack Ontology, Primitive Attack Templates, Alert Ontology, Intrusion Detection Systems
相關次數: 點閱:246下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 網路上電腦的安全問題,是網路應用系統能否成熟發展的關鍵。目前雖有防火牆、加解密等安全防護系統,但仍無法杜絕入侵事件之發生。具不同技術、特性的入侵偵測系統,因而被發展成為系統的第二層防護。目前入侵偵測系統主要遭遇下列問題:(1)入侵偵測系統常產生過多未經整合的低階警訊;(2)入侵偵測系統產生太多的錯誤警報;(3)異質的入侵偵測系統各自具偵測不同攻擊的能力,但偵測的範圍有限。為了解決上述問題,本實驗室提出一以基元攻擊為仲介的兩層式異質入侵警訊關聯系統,第一層為基元攻擊之自動建構與偵測,負責整合異質入侵警訊成為較少的基元攻擊,將各種入侵偵測系統的能力整合轉化成以基元攻擊為代表的較高層意義與可信度;第二層為以基元攻擊為基礎之攻擊腳本關聯,負責將基元攻擊關聯成攻擊腳本,以還原攻擊手段的全貌,供專家從較高層觀念來作網路安全的評估。
    本論文的研究重點在改善第一層的基元攻擊之自動建構與偵測子系統,加入了自動化建構基元攻擊樣版模組及提供完整的警訊知識本體。我們採取以下技術來達成有效自動化建構攻擊基元樣版的目標:(1)引進警訊規則挖掘器學習警訊間的互動關係;(2)從警訊間的互動關係自動建立基元攻擊樣版;(3)引進基元攻擊定位器將基元攻擊樣版定位進攻擊知識本體。本研究的貢獻如下:(1)引進自動建構基元攻擊樣版技術:基元攻擊樣版定義了異質警訊間的互動規則,並利用異質警訊的共通內容來描述基元攻擊的相關屬性,我們的自動產生基元攻擊樣版技術可以降低以人力方式來訂定基元攻擊樣版的困難。(2) 完成警訊知識本體(包含網路與主機警訊)之建構:網路警訊知識本體可整合同為網路型入侵偵測系統的警訊並予以分類,用來判斷警訊間的關聯性強度並提供警訊語意註解;主機警訊知識本體則針對各主機型入侵偵測系統的警訊分別予以分類,並提供警訊語意註解、警訊特徵及資源存取資訊。本本體除可支援基元攻擊樣版的自動產生過程,尚可支援入侵偵測系統的設計與分析,是網路安全研究的重要資訊。


    The security of networked computers strongly affects network applications. Although we already have firewalls and encryption systems, intrusion still happens often. IDSs (Intrusion Detection Systems) with different techniques and characteristics have thus been developed to serve as the second layer protection. Problems associated with IDS include: (1) IDSs often produce lots of low level alerts which aren’t integrated. (2) IDSs produce lots of false alerts. (3) Heterogeneous IDSs have their specific capabilities of detecting attacks; however, their detection scopes are limited. To cope with the problems, we proposed a two-layered heterogeneous intrusion detection architecture, which advocates primitive attacks to work as a mediator for correlating alerts. The first layer is the construction and detection of primitive attacks, responsible for integrating heterogeneous alerts into primitive attacks. This equivalently transforms low-level, different formats of alerts into a unified, higher-level representation. The second layer is the correlation of attack scenarios, responsible for correlating primitive attacks into attack scenarios and reporting their priorities.
    This thesis focuses on improving the first layer, the construction and detection of primitive attacks, mainly by introducing a module to automatically construct primitive attack templates. The module involves the following techniques. First, we apply the constrained data mining technique to learn interactive relationships among the alerts. Second based on the interaction relationships and the support of alert ontology, we automatically create primitive attack templates. Finally, we anchor the auto-generated primitive attack templates into attack ontology. Our experiments showed the auto-generated primitive attack templates successfully subsumed all manually constructed real primitive attack templates. The contributions of the work are as follows. First, the automatic construction technique of primitive attack templates can reduce the difficulties with manual construction of primitive attack templates by experts. Second, the constrained data mining technique can effectively discover interactive relationships among (heterogeneous) alerts and allows us to use their common contents to describe the relevant attributes of a primitive attack. Finally, the completed alert ontology (including network-based and host-based alerts) comprehensively classifies the alerts attached with annotated information, not only supporting the automatic construction of primitive attack templates in this thesis but also serving as a valuable resource for design and analysis of intrusion detection systems.

    中文摘要 I 英文摘要 II 致謝 IV 目次 V 圖表索引 VII 第一章 導論 1 1.1 研究動機 1 1.2 研究問題 3 1.3 研究方法 4 1.4 論文貢獻 7 1.5 論文架構 7 第二章 相關研究 8 2.1 入侵偵測系統 8 2.1.1 入侵偵測系統分類 8 2.1.2 SNORT 11 2.1.3 RealSecure Network Sensor 12 2.1.4 eXpert-BSM 12 2. 2 知識本體 12 2.3 入侵警訊聚合與關聯 14 2.3.1 ACC (Aggregation and Correlation Component) 14 2.3.2 EMERALD 16 2.3.3 M-Correlator (Mission Impact Intrusion Report Correlation System) 18 2.3.4 CRIM (Cooperation and Reconnaissance of the Intention Malicious) 19 2.3.5 M2D2 21 第三章 系統架構 23 3.1 系統概觀 23 3.2 基元攻擊樣版產生器 24 3.3 警訊知識本體 27 3.4 警訊規則挖掘器 30 3.4.1 警訊規則挖掘器的限制條件 31 3.4.2 警訊之間的關係 32 3.5 警訊規則濾除器 35 3.6 警訊規則分群器 36 3.7 基元攻擊樣版形成器 37 3.8 攻擊知識本體 39 3.9 基元攻擊樣版定位器 40 3.10 基元攻擊組成 41 第四章 系統評估 43 4.1 實驗環境 43 4.2入侵警訊測試資料 43 4.2.1 網路環境 43 4.2.2 攻擊手法 44 4.2.3 入侵偵測系統警訊 45 4.3 系統效能評估 47 4.3.1警訊規則挖掘器之效能 47 4.3.2基元攻擊樣版產生器之效能 48 4.3.3自動化產生基元攻擊樣版之效能 49 第五章 結論與未來 53 5.1 結論 53 5.2 貢獻 54 5.3 與[Yu04]系統比較 54 5.4 未來發展 56 參考文獻 57 中英對照表 61 作者簡介 67

    [Ales01] D. Alessandri (Ed.), Towards a Taxonomy of Intrusion Detection Systems and Attacks. Deliverable D3, Project MAFTIA IST-1999-11583, Research Report, RZ 3366, IBM Zurich Laboratory, also available at http://www.MAFTIA.org, 2001.

    [Ande02] D. Andersson, M. Fong, and A. Valdes, “Heterogeneous Sensor Correlation: A Case Study of Live Traffic Analysis,” Proc. of IEEE Information Assurance Workshop, United States Military Academy, West Point, NY, June 2002.

    [Axel00] S. Axelsson, Intrusion Detection Systems: A Taxomomy and Survey. Technical Report 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, March 2000.

    [Capo00] J. Capoulade, P. Carle, E. Cochevelou, F. Cuppens, M. Diop, S. Dubus, S. Gombault, L. Mé, C. Michel, B. Morin, “Mirador: A cooperative approach of IDS”, 6th European Symposium on Research in Computer Security (ESORICS), Toulouse, France, October 2000.

    [Cupp00] F. Cuppens, “LAMBDA: A Language to Model a Database for Detection of Attacks,” Proc. of the Third International Workshop on the Recent Advances in Intrusion Detection (RAID’2000), Toulouse, France, October 2001.

    [Cupp01] F. Cuppens, “Managing Alerts in Multi-Intrusion Detection Environments,” Proc. of 17th Annual Computer Security Applications Conference (ACSAC), pp. 22-31, New Orleans, Louisiana, 2001.

    [Cupp02] F. Cuppens and A. Miege, “Alert Correlation in a Cooperative Intrusion Detection Framework,” Proc. of 2002 IEEE Symposium on Security and Privacy, pp. 202-215, Oakland, CA, 2002.

    [Chang05] E. X. Chang, “An AutomaticAattack Plan Construction Technique for Attack Correlation and Prediction”, Master Thesis, Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taiwan, ROC, 2005.

    [Deba00] H. Debar, M. Dacier, and A. Wespi, “A Revised Taxonomy for Intrusion-Detection Systems,” Annales des Télécommunications, Vol. 55, No. 7/8, pp. 361-378, 2000.

    [Deba01] H. Debar and A. Wespi, “Aggregation and Correlation of Intrusion-Detection Alerts,” Proc. of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), LNCS (Lecture Notes In Computer Science), Vol. 2212, Springer-Verlag, pp. 85-103, Davis, CA, USA, October 2001.

    [Expe] eXpert-BSM, available at http://www.sdl.sri.com/projects/emerald/releases/eXpert-BSM/

    [Grub93] T. R. Gruber, “A Translation Approach to Portable Ontology Specifications,” Knowledge Acquisition, Vol. 5, No. 2, pp. 199-220, 1993.

    [ICAT] ICAT database, http://icat.nist.gov/icat.cfm

    [Lind01] U. Lindqvist and P. Porras, “eXpert-BSM: A Host-based Intrusion Detection Solution for Sun Solaris,” Proc. of 17th Annual Computer Security Applications Conference (ACSAC), pp. 240-251, New Orleans, Louisiana, 2001.

    [MIT99] MIT Lincoln Lab Intrusion Detection Attacks Database, available at http://www.ll.mit.edu/IST/ideval/docs/1999/attackDB.html

    [MIT00] 2000 DARPA Intrusion Detection Scenario Specific Data Sets, available at http://www.ll.mit.edu/IST/ideval/data/2000/2000_data_index.html

    [Mori02] B. Morin, L. M, H. Debar, and M. Ducass, “M2D2:a Formal Data Model for IDS Alert Correlation,” Proc. of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), LNCS (Lecture Notes In Computer Science), Vol. 2516, Zurich, Switzerland, pp. 115-137, October 2002.

    [Ning04] P. Ning, Y. Cui, D. S. Reeves, and D. Xu, “Tools and Techniques for Analyzing Intrusion Alerts,” ACM Transactions on Information and System Security, Vol. 7, No. 2, pp. 214-318, May 2004.

    [Porr02] P. A. Porras, M. W. Fong and A. Valdes, “A Mission-Impact-based Approach to INFOSEC Alarm Correlation,” Proc. of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), LNCS (Lecture Notes In Computer Science), Vol. 2516, pp. 95-114, Springer-Verlag, 2001.

    [Prot] Protégé, available at http://protege.stanford.edu/

    [Real] RealSecure Network Sensor, available at http://www.iss.net/

    [Roes99] M. Roesch, “Snort - lightweight intrusion detection for networks,” Proc. of LISA'99: 13th Systems Administration Conference, pp. 229-238, Seattle, Washington, November 1999.

    [Snor] Snort, available at http://www.snort.org/

    [Vald00] A. Valdes and K. Skinner, “Adaptive, Model-Based Monitoring for Cyber Attack Detection,” Proc. of the 3th International Symposium on Recent Advances in Intrusion Detection (RAID 2000), LNCS (Lecture Notes In Computer Science), Vol. 1907, Springer-Verlag, pp. 80-92, October 2000.

    [Vald01] A. Valdes and K. Skinner, “Probabilistic alert correlation,” Proc. of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), LNCS (Lecture Notes In Computer Science), Vol. 2212, Springer-Verlag, pp. 54-68, Davis, CA, USA, 2001.

    [Vign96] G. Vigna, “A Topological Characterization of TCP/IP Security,” Proc. of the 12th International FME Symposium, LNCS (Lecture Notes In Computer Science), Vol. 2805, Springer-Verlag, pp. 914-940, Pisa, Italy, September 2003.

    [Yu04] C. Y. Yu, “A Primitive Attack-based New Correlation Technique for Heterogeneous Intrusion Alert-Construction and Detection of Primitive Attack”, Master Thesis, Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taiwan, ROC, 2004.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE