GLOBAL GUARD MEETING
February 2, 1999
3085 ENG II
1:00-2:00 p.m.
In attendance:
Karl Levitt (KL), David O’Brien (DOB), David Klotz (DK), Jason Schatz
(JS) and Steven Templeton (ST)
TOPICS
Course of action for Global Guard
Correlation
New Technology
Knowledge base
SMARTS
-
Course of action for Global Guard
-
Continuation of GrIDS – what can’t be done with GrIDS
-
GrIDS rules – ad hoc and arbitrary
-
Generalize, look at missing data
-
All generate something new
-
Feed into other projects – Jim Just’s Situation Assessment will be funded
-
Compare signatures of known attacks, develop signatures for multi-stage
attacks
-
Combine signatures of single attacks
-
Putting attacks together with pre and post conditions
-
Correlation
-
Putting sensor reports together
-
ST will do a library web search on sensor and data fusion.
-
Knowledge based for Aggregation
-
Attacks in General
-
Suspicious and Normal Activity
-
Correlation as deduction and induction
-
ST: Induction – general rules that describe data and infer good/bad
-
Why do aggregation?
-
Eliminate false positives – check to see if an attack goes anywhere (verify
from multiple sources)
-
Severity of attack – cost model approach to intrusion detection
-
How do you do correlation?
-
Technology basis of putting events together
-
Using that technology to do something about intrusion detection
-
Temporal Correlation
-
Prediction
-
DK: Ex. See signs of a worm, but don’t see the executable program
-
DOB: New Technology or Areas (techniques, algorithms etc.)
-
ST: With knowledge base, look at Fuzzy Clips version – assessment, general
rules
-
CYC – inference engine – commercial product
-
Code and Model everything you can – may do nothing useful
-
Knowledge Base – define related activities and unrelated activities
-
ST: Higher order rules – meta rules, interview experts
-
JS: Model language from Yemini
-
Model attacks with it and propagation of attacks
-
With Knowledge base, can’t do fundamental things
-
Have to organize it and determine what to put in it, understand what problems
there are
-
Robust knowledge bases – missing data or errors – find missing data
-
JS: Is SMARTS effective as an intrusion detection tool? Can we tie it
into Global Guard – intrusion detection as symptoms in SMARTS?
-
Ex. Model network symptoms and problems. Code book – symptoms tell you
the problem
-
DOB: Hasn’t been carried out yet.
-
Code book reduction, encoding theory
-
Characteristics of LAND attacks
-
DOB: Ex. High traffic, lots of packets, congestion propagates, look for
SYN packet (SYN or network problem)
-
DK: If a web server is useless only for a short amount of time, then it
is not a SYN flood attack.
-
DOB: The rate of connections coming in from a web server may already overflow
buffers – normal operation.
-
DOB: With code book approach, there is a problem with incorporating enough
redundancy to tolerate missing data. Ultimately we want to know the root
cause.