Computer Sciences Dept.

Computer Security and Cryptography Seminar:
September 2004 Events

Date &
Location
Event
Monday
September 27, 2004
4:00 - 5:00 PM
2310 CS
Wenke Lee (web)
College of Computing, Georgia Institute of Technology (web)
Architectural Considerations for Anomaly Detection

The most commonly used intrusion detection system (IDS) performance metrics are detection rate and false alarm rate. From a usability point of view, a very important measurement is Bayesian detection rate, which indicates how likely there is an intrusion when the IDS outputs an alert. It depends on detection rate, false alarm rate, and base rate, which is the prior probability of intrusion. Typically, an anomaly detection system has a low Bayesian detection rate because it has a non-zero false alarm rate and the base rate is very low.

We argue that we need better system architecture to improve Bayesian detection rate. The main objective is to increase the base rate of data stream analyzed by complex detection modules. The general principle is to use layered architecture.

One approach is to use a cascade of successively more complex detection modules. We show that base rate increases from one layer to the next. In many cases, the overall false alarm rate of the cascade can be very low. We describe a worm detection system with cascade architecture. In DSC, the lower layer module identifies hosts with "infection-like" behavior and the higher layer module detects anomalous outgoing connection behavior of these hosts. Our (limited) experiments showed that DSC can detect fast scanning worms with zero false positive rate and thus 100% Bayesian detection rate.

Another approach is to deploy multiple simple or low-level sensors and correlate the observations or alerts from these sensors. HoneyStat is a worm detection system with such architecture. In HoneyStat, each low-level sensor detects "interesting" events in a honey pot. The correlation module uses logistic analysis on the event data to detect worms. We show that by deploying sufficient number of low-level sensors, HoneyStat can reliably detect worms.

 Cookies will be served at 3:30 PM in 2310 CS.

Wednesday
September 29, 2004
2:00 - 3:00 PM
2310 CS
Patrick McDaniel (web)
Computer Science and Engineering Department, Penn State University (web)
Origin Authentication in Interdomain Routing

Attacks against Internet routing are increasing in number and severity. A central limitation of the current network infrastructure is the absence of meaningful origin authentication: there is no way to validate if an entity using an address has the right to do so. This vulnerability is not only a conduit for malicious behavior, but indirectly allows seemingly inconsequential misconfigurations to disrupt large portions of the Internet. This talk discusses the semantics, design, and costs of origin authentication in interdomain routing. A formalization of address usage and delegation is presented and broad classes of cryptographic proof systems appropriate for origin authentication are considered.

The costs of origin authentication are largely determined by the form and stability of the served address space. However, prior to this work, little was known about the relevant characteristics of address use on the Internet. Developed from collected interdomain routing data and presented in this talk, our approximate delegation hierarchy shows that current IP address delegation is dense and relatively static. One notable result shows that as few as 16 entities are the source of 80% of the delegation on the Internet. We further show via simulation that these features can be exploited to efficiently implement Internet-scale origin authentication. The talk is concluded with a an overview of several ongoing efforts in routing security.

Bio
Patrick McDaniel is the Hartz Family Career Development Professor in the Computer Science and Engineering Department at the Pennsylvania State University. Prior to joining Penn State in Fall of 2004, Patrick was a senior technical staff Member of the Secure Systems Group at and Adjunct Professor of the Stern School of Business at New York University. Patrick's recent research efforts have focused on security management in distributed systems, network security, and public policy and technical issues in digital media. Patrick is a past recipient of the NASA Kennedy Space Center fellowship, a frequent contributor to the IETF security standards, and has authored many papers and book chapters in various areas of systems security.

 Cookies will be served at 1:30 PM in 2310 CS.

< Back to the Sec & Crypto seminar schedule

Created and maintained by Mihai Christodorescu (http://www.cs.wisc.edu/~mihai)
Created: Wed Aug 13 10:30:10 CDT 2003
Last modified: Fri Feb 27 14:17:36 Central Standard Time 2004
 
Computer Science | UW Home