originate), transference (shifting risk to someone
else, e.g., via insurance or outsourcing), and
mitigation (minimizing the impact of an incidence,
e.g., by reducing its scope or improving detection).
One of the major safeguards is to detect and
reduce/remove vulnerabilities. The main reasons for
existing vulnerabilities are buggy software design
and development, or system administration
problems. Existence of bugs in software are due to
• programming for security not being generally
taught,
• good software engineering processes not being
universal, as well as
• existence of legacy code.
The system administration problems are due to
inadequate policies and procedures, or the system
administrators being too busy with many machines
to administer, too many platforms and applications
to support, and too many updates and patches to
apply.
For the attack examples given in the previous
section, we can offer some rather simple safeguards.
For attacks that are based on making multiple
requests and ignoring the server acknowledgments,
such as ICMP Flood and Smurf Attack, and SYN
Flooding, one could employ a timer: if the response
does not arrive within a reasonable time, the request
could be dropped and the resources freed. For
attacks that are based on buffer overflow, one could
use operating systems written in “safe” languages
that perform range checking (like Java). The HTTP
GET attack could be prevented by making sure that
programs validate the parameters passed to them,
and that file permissions are set properly.
5 CONCLUSIONS
We have first set the stage emphasizing the
magnitude of the security problem, raising
awareness and focusing on the impact of security.
We have detailed two attacks: Denial of Service and
the HTTP GET attack, and defined the signature of
the latter. The application of data mining techniques
for detecting attacks was described. The novelty of
our approach is in determining the
relevance/importance of different log records,
defining intelligent signatures, and using efficient
data mining techniques. Preliminary results have
been encouraging.
There is significant work still to be done, e.g.,
improving the effectiveness of attack signatures,
developing distributed algorithms for
detection/prediction, and improving the efficiency of
pattern searching. We are currently working on these
issues.
REFERENCES
[1]. http://www.w3.org/TR/wsdl
[2]. Michael J. A. Berry and Gordon Linoff, Data Mining
Techniques, Wiley Computer Publishing, 1997
[3]. Computer Emergency Response Team/Coordination
Center (CERT/CC) at Carnegie Mellon University’s
Software Engineering Institute, http://www.cert.org/
[4].www.insecure.org/nmap/nmap-fingerprinting-
article.html
[5]. NIST ITL Bulletin, “Computer attacks: what they are
and how to defend against them,” May 1999.
[6]. CSI, “2002 CSI/FBI Computer Crime and Security
Survey,” http://www.gocsi.com/.
[7]. The SANS Institute (http://www.sans.org/top20/),
May 2003
[8]. Douglas Comer, Internetworking with TCP/IP Vol.1:
Principles, Protocols, and Architecture (4th Edition),
Prentice Hall, 2000
[9]. www.insecure.org/sploits/ping-o-death.html
[10]. www.w3c.org?
[11]. S. McClure, S. Shah, and S. Shah, Web Hacking:
Attacks and Defenses, Addison Wesley, 2003
[12].
http://www.interwld.com/pico/subs/pico_Environ_IP_Log
ging.htm
[13]. http://packages.debian.org/unstable/net/ippl.html
[14]. W. Lee and S. J. Stolfo, “Data Mining Approaches
for Intrusion Detection,” Usenix Security Symposium, San
Antonio, Texas, July 1998
[15]. Magnus Almgren, Herve Deba, and Marc Dacier, "A
Lightweight Tool for Detecting Web Server Attacks,"
http://www.ce.chalmers.se/~almgren/Publications/almgren
-ndss00.pdf
[16]. S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A.
Longstaff, “A Sense of Self for Unix Processes,” Proc.
1996 IEEE Symp. Security and Privacy, Los Alamitos,
CA, pp. 120-128, 1996
[17]. S. A. Hofmeyr, A. Somayaji, and S. Forrest,
"Intrusion Detection using Sequences of System Calls,"
Journal of Computer Security Vol. 6, pp. 151-180, 1998.
[18]. Jeremy Frank, “Artificial Intelligence and Intrusion
Detection: Current and Future Directions,” June 1994
(http://citeseer.nj.nec.com/frank94artificial.html)
[19]. Zhen Liu, German Florez, and Susan Bridges, “A
Comparison of Input Representation in Neural Networks:
A Case Study in Intrusion Detection,” Proc. International
Joint Conference on Neural Networks, May 12-17, 2002,
Honolulu, Hawaii.
[20]. http://www.data-miner.com
[21]. S. Weiss and N. Indurkhya, Predictive Data Mining:
A Practical Guide, Morgan Kaufmann, 1997.
DATA MINING TECHNIQUES FOR SECURITY OF WEB SERVICES
67