A negative report is presented that the complete
implementation of our system and its evaluation in
real world could not be achieved before the
submission of this paper; nevertheless, our first
experiments show encouraging results.
REFERENCES
Dagorn, N., 2006. Intrusion Detection for Web
Applications. Proceedings of the 5
th
IADIS
International Conference on www/Internet (ICWI
2006). Murcia, Spain.
Dain, 0. and Cunningham, R.K., 2002. Fusing
heterogeneous alert streams into scenarios. In D.
Barbara and S. Jajodia (Eds.), Applications of Data
Mining in Computer Security. Kluwer Academic
Publishers, Boston, MA.
Debar, H. and Wespi, A., 2001. Aggregation and correla-
tion of intrusion-detection alerts. Proceedings of the
4thWorkshop on Recent Advances in Intrusion Detec-
tion (RAID). LNCS, Springer Verlag, pp. 85-103.
Julisch, K, 2003a. Clustering Intrusion Detection Alarms
to Support Root Cause Analysis. ACM Transactions
on Information and System Security 6(4).
Julisch, K., 2003b. Using Root Cause Analysis to Handle
Intrusion Detection Alarms. PhD Thesis, University of
Dortmund, Germany.
Kruegel, C., Toth, T., Kirda, E., 2002. Service Specific
Anomaly Detection for Network Intrusion Detection.
Proceedings of the 17th ACM Symposium on Applied
Computing (SAC). ACM Press, Madrid, Spain.
Kruegel, C., Vigna, G., 2003. Anomaly detection of Web-
based attacks. Proceedings of the 10th ACM
Conference on Computer and Communication Security
(CCS’03). Washington, DC. ACM Press, New York.
Kruegel, C., Mutz, D., Robertson, W., Valeur, F., 2003.
Bayesian Event Classification for Intrusion Detection.
Proceedings of the 19th Annual Computer Security
Applications Conference (ACSAC). IEEE Computer
Society Press, USA.
Kruegel, C., Vigna, G., Robertson, W., 2005. A multi-
model approach to the detection of web-based attacks.
Computer Networks, Vol. 48, Issue 5. Elsevier.
State, R., 2005. Intrusion Detection. Tutorial Master2.
Nancy1.
Valdes, A. and Skinner, K., 2000. Adaptive, Model-based
Monitoring for Cyber Attack Detection. Recent
Advances in Intrusion Detection (RAID 2000). Lecture
Notes in Computer Science, No. 1907, pp. 80–92.
Valdes, A. and Skinner, K., 2001. Probabilistic alert
correlation. Proceedings of the 4thWorkshop on
Recent Advances in Intrusion Detection (RAID).
LNCS, Springer Verlag, Berlin, pp. 54-68.
SMILE: Structural Modeling, Inference and Learning
Engine. http://genie.sis.pitt.edu/.
THC-Hydra: http://www.thc.org/thc-hydra/.
APPENDIX A: THEORETICAL
MOTIVATING EXAMPLE
Suppose the following request (assumed to have
been extracted from a monitored Web server log):
192.168.10.10 – username
[2/April/2006:19:36:25 -0800] “GET
/scripts/cmd.pl?id=524&name=dummystring
&country=passwd” 200 2122
Step 1: Analysis. The request is analyzed. The
query serving as input for the ten anomaly detection
models is:
id=524&name=dummystring&country=passwd.
For certain models, the complete query is analyzed;
for others the analysis only focuses on the attribute
values (
id, name, country). Let us develop the
case of the token finder model. The three attributes
are successively injected as input of the model. The
attributes
id and name being of random type (i.e.,
not part of an enumeration), the model returns the
value 0 (normal). Unlike this, the
country attribute
is a token of an enumeration and can contain only a
valid country name. The attribute value
passwd is
not an acceptable input; therefore, the model returns
the value 1 (anomalous) for this attribute.
Step 2: Decision. The request is evaluated as
normal or as an attack. During the training period,
the variance of the analyzed attributes was assumed
relatively low for the token finder model, so that the
confidence level now associated with the model in
the Bayesian network is high. We consider the
output value of the token finder model, provided by
the analysis of the
country attribute. The value 1
returned is injected as evidence into the Bayesian
network. The anomalous state is raised by the node
in the network. A message is propagated to the
classification node according to the conditional
probability tables, characterizing an attack on
authentication mechanisms; this message is only
very slightly decayed because of the high confidence
in the model. So, the classification node is updated
not only according to the weighted message
transmitted by the token finder model, but also
according to the observations resulting from the
other nodes in the network (weighted by their
respective confidence level). Once the complete
query treated, the probability of an anomalous state
at the classification node is calculated. If an
anomalous state (i.e., a specified attack) is detected
with a high enough probability value, the request is
considered as anomalous and an alarm is raised (the
raised alarm is also transmitted to one or more other
systems in case of a distributed intrusion detection
SECRYPT 2006 - INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
38