Impact of IT monoculture on behavioral end host intrusion detection

  • Authors:
  • Dhiman Barman;Jaideep Chandrashekar;Nina Taft;Michalis Faloutsos;Ling Huang;Frederic Giroire

  • Affiliations:
  • Juniper, Sunnyvale, CA, USA;Intel Labs, Berkeley, CA, USA;Intel Labs, Berkeley, CA, USA;University of California, Riverside, CA, USA;Intel Labs, Berkeley, CA, USA;INRIA, Sophia-Antipolis, France

  • Venue:
  • Proceedings of the 1st ACM workshop on Research on enterprise networking
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we study the impact of today's IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to the uniform configuration of Host intrusion detection systems (HIDS) across all hosts in an enterprise networks. We assess the performance impact this policy has from the individual's point of view by analyzing network traces collected from 350 enterprise users. We uncover a great deal of diversity in the user population in terms of the "tail" behavior, i.e., the component which matters for anomaly detection systems. We demonstrate that the monoculture approach to HIDS configuration results in users that experience wildly different false positive and false negatives rates. We then introduce new policies, based upon leveraging this diversity and show that not only do they dramatically improve performance for the vast majority of users, but they also reduce the number of false positives arriving in centralized IT operation centers, and can reduce attack strength.