2 INTRUSION DETECTION
SYSTEM
There are two general methods of detecting
intrusions into computer and network systems:
anomaly detection and signature recognition
(Rudzonis , 2003). Anomaly detection techniques
establish a profile of the subject’s normal behavior
(norm profile), compare the observed behavior of
the subject with its norm profile, and signal
intrusions when the subject’s observed behavior
differs significantly from its norm profile. Signature
recognition techniques recognize signatures of
known attacks, match the observed behavior with
those known signatures, and signal intrusions when
there is a match.
An IDS installed on a network is like a burglar
alarm system installed in a house. Through various
methods, both detect when an intruder/burglar is
present. Both systems issue some type of warning in
case of detection of presence of intrusion/burglar.
Systems which use misuse-based techniques
contain a number of attack descriptions, or
‘signatures’, that are matched against a stream of
audit data looking for evidence of the modeled
attacks. The audit data can be gathered from the
network, from the operating system, or from
application log files (Rudzonis, 2003).
Experimentation conducted in this research work is
based on DARPA KDD’99 data set.
3 KDD’99 DARPA DATA SET
MIT Lincoln Lab’s DARPA intrusion detection
evaluation data sets have been employed to design
and test intrusion detection systems. The KDD’99
intrusion detection datasets are based on the 1998
DARPA initiative, which provides designers of
intrusion detection systems (IDS) with a benchmark
on which to evaluate different methodologies
(DARPA, 1999, ISTG, 1998 , Kayacik and Zincir-
Heywood , 2005).
To do so, a simulation is made of a factitious
military network consisting of three ‘target’
machines running various operating systems and
services. Additional three machines are then used to
spoof different IP addresses to generate traffic.
Finally, there is a sniffer that records all network
traffic using the TCP dump format. The total
simulated period is seven weeks (Kayacik and
Zincir-Heywood , 2005). Packet information in the
TCP dump file is summarized into connections.
Specifically, “a connection is a sequence of TCP
packets starting and ending at some well defined
times, between which data flows from a source IP
address to a target IP address under some well
defined protocol” (Kayacik and Zincir-Heywood,
2005).
DARPA KDD'99 data set represents data as rows
of TCP/IP dump where each row consists of
computer connection which is characterized by 41
features.
Features are grouped into four categories:
Basic Features: Basic features can be
derived from packet headers without
inspecting the payload.
Content Features: Domain knowledge is
used to assess the payload of the original TCP
packets. This includes features such as the
number of failed login attempts;
Time-based Traffic Features: These features
are designed to capture properties that mature
over a 2 second temporal window. One
example of such a feature would be the
number of connections to the same host over
the 2 second interval;
Host-based Traffic Features: Utilize a
historical window estimated over the number
of connections – in this case 100 – instead of
time. Host based features are therefore
designed to assess attacks, which span
intervals longer than 2 seconds.
In this comparative study, we used KDD' 99 base
which is counting almost 494019 of training
connections. Based upon a discriminate analysis, we
used data about only important features (the 9
th
first
features):
Protocol type: type of the protocol, e.g. tcp,
udp, etc.
Service: network service on the destination,
e.g., http, telnet, etc.
Land: 1 if connection is from/to the same
host/port; 0 otherwise.
Wrong fragment: number of ``wrong''
fragments.
Num_failed_logins: number of failed login
attempts.
Logged_in: 1 if successfully logged in; 0
otherwise.
Root_shell: 1 if root shell is obtained; 0
otherwise.
Is_guest_login: 1 if the login is a ``guest''
login; 0 otherwise.
To these features, we added the
"attack_type". Indeed each training connection
COMPARATIVE STUDY BETWEEN BAYESIAN NETWORK AND POSSIBILISTIC NETWORK IN INTRUSION
DETECTION
25