2 COMPUTER SECURITY
An Intrusion Detection System (IDS) is a system that
monitors and detects intrusions, or abnormal activi-
ties, in a computer or computer network. The IDS re-
ports corresponding alarms and may take immediate
action on the intrusions (Tjaden, 2004).
An intrusion is defined as an attempt to gain ac-
cess to a system by an unauthorized user. Misuse
refers to attempts to exploit weak points in the com-
puter or the abuse of existing system privileges. Ab-
normal activity means significant deviations from the
normal operation of the system or use of the system
by users (Tjaden, 2004).
Intrusion detection, then, is the process of monitor-
ing computer networks and systems for violations of
security policy. In the simplest terms, intrusion detec-
tion systems consist of three functional components:
1. an information source that provides a stream of
event records,
2. an analysis engine that finds signs of intrusions, and
3. a response component that generates reactions
based on the outcome of the analysis engine (Bace,
2000).
In order to get information for intrusion analysis, an
audit trail is often used. According with the Rainbow
Series of computer security documents, outlined by
the Department of Defense (Bace, 2000), the goals of
the audit mechanism are:
• to allow the review of patterns of access,
• to allow the discovery of both insider and outsider
attempts to bypass protection mechanisms,
• to allow the discovery of a transaction of a user
from a lower to a higher privilege level,
• to serve as a deterrent to users’ attempts to bypass
system-protection mechanisms, and
• to serve as a yet another form of user assurance that
attempts to bypass the protection will be recorded
as discovered.
The need for automatic audit trail review to sup-
port security goals has been well documented with the
matrix in Table 1 suggested for classifying risks and
threats to computer systems (Anderson, 1980).
Table 1: Threat matrix. Redrawn with minor modifications
from Anderson, 1980
Not authorized to Authorized to
use data/program use data/program
Not authorized CASE A Blank
to use computer External Penetration
Authorized to CASE B CASE C
use computer Internal Penetration Misfeasance
This suggests a taxonomy for classifying risks and
threats to computer systems that differentiates be-
tween external and internal sources of problems. This
articulation has been useful in structuring require-
ments for audit trail content (Bace, 2000). Accord-
ing to this classification, this paper focuses on internal
penetration—an audit trail file of a authorized user is
analyzed in order to get misuse.
A formal definition of security says that it must
guaranty confidentiality, integrity, and availability.
Confidentiality refers to the fact that the information is
only known by authorized users. Integrity means that
the information is protected from alteration. Avail-
ability means that the system operates as it was de-
signed; it means, for example, that users have access
to it when they need it, where they need it, and in the
form they need it.
Another crucial aspect of any system’s security is
its security policy. A security policy is the set of
practices that is explicitly stated by an organization
in order to protect sensitive information (Crosbie and
Spafford, 1995).
The content of most security policies is driven by
a desire to address threats. A threat is defined as any
event that has the potential to harm a system. This
harm can be access of data by an unauthorized user,
destruction or modification of data, or denial of ser-
vice (Bace, 2000).
Security problems in computer systems result from
vulnerabilities. Vulnerabilities are weaknesses in sys-
tems that can be exploited in ways that violate secu-
rity policy. Although threat and vulnerability are in-
trinsically related, they are not the same. Threat is the
result of exploiting one or more vulnerabilities. Intru-
sion detection is designed to identify and respond to
both (Bace, 2000).
IDSs can be classified as host-based, multihost-
based, and network-based (Tjaden, 2004). Host-
based IDSs monitor a single computer using the audit
trail of the operating system whereas network-based
IDSs monitor computers on a network by scrutinizing
the audit trail of multiple hosts and network traffic.
A multihost-based IDS analyzes data from multi-
ple computers. Usually a module of the IDS runs
on each individual computer and sends reports to a
special module, sometimes called a director, running
on one machine. Since the director receives informa-
tion from the other computers, it can correlate this in-
formation to recognize intrusions that host-based sys-
tems would probably miss, such as worms. A host-
based IDS may not notice that type of intrusion. A
multihost-based IDS, with its data from a number of
different computers, would have a much better chance
of recognizing a worm as it spreads (Tjaden, 2004).
This paper deals with a host-based IDS, and an au-
dit trail file generated by a Sun machine is analyzed.
IMPROVED OFF-LINE INTRUSION DETECTION USING A GENETIC ALGORITHM
67