The role of suspicion in model-based intrusion detection

  • Authors:
  • Timothy Hollebeek;Rand Waltzman

  • Affiliations:
  • Teknowledge Corporation, Marina del Rey, CA;Teknowledge Corporation, Marina del Rey, CA

  • Venue:
  • NSPW '04 Proceedings of the 2004 workshop on New security paradigms
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our approach is similar to that of a human forensic analyst, who first notices details that seem slightly odd, and then investigates further and cross checks information in an attempt to build a coherent explanation for the observed details. We use deductive reasoning combined with expert knowledge about system behavior, potential attacks and evidence, and patterns of suspicion to link individual clues together in an automated way.A prototype implementation that was designed based on these considerations is presented, including details of how suspicions and deductions are represented, and how these structures are updated as new evidence is discovered. Finally, we describe how this algorithm performs in practice on a realistic example where five discrete pieces of evidence are brought together automatically to create a unified and coherent description of what is believed to have occurred.