Implementation of Echo State Neural Network and Radial Basis Function Network For Intrusion Detection
Implementation of Echo State Neural Network and Radial Basis Function Network For Intrusion Detection
Abstract---Intrusion detection is the art of detecting computer would attack or otherwise abuse the system; (iii) presenting
abuse and any attempt to break into networks. As a field of research, traces of intrusions, allowing improved diagnosis, recovery
it must continuously change and evolve to keep up with new types of and corrective measures after an attack; (iv) documenting the
attacks or adversaries and the ever-changing environment of the existing threat from inside and outside a system, permitting
Internet. To make networks more secure, intrusion-detection systems
(IDS) aims to recognize attacks. Artificial neural networks (ANN)
security management to realistically assess risk and adapt its
based IDS were implemented and tested. The goal for using ANNs security strategy in response, and (v) acting as quality control
for intrusion detection is to generalize from incomplete data and able for security design and implementation (highlighting some
to classify data as being normal or intrusive. An ANN consists of a deficiencies or errors, before serious incidents occur)
collection of processing elements that are highly interconnected. [Verwoed and Hunt, 2002].
Given a set of inputs and a set of desired outputs, the transformation
from input to output is determined by the weights associated with the
inter-connections among processing elements. By modifying these
Categories of Attacks
interconnections, the network adapts to desired outputs. The ability of A good taxonomy makes it possible to classify individual
high tolerance for learning-by-example makes neural networks attacks into groups sharing common properties. One widely
flexible and powerful in IDS. This paper has implemented Echo state used taxonomy divides attacks into four classes: Probes,
neural network and Radial basis function applied to intrusion Denial of Service (DoS), User to Root (U2R) and Remote to
detection. The scope of the work includes using the available KDD Local (R2L).
database.
I. INTRODUCTION
NTRUSION detection [Theuns Verwoerd, Ray Hunt, 2002]
I is the process of monitoring the events occurring in a
computer system or network and analyzing them for signs of
Fig. 1 Categories of Attacks
allow even unskilled attackers to find vulnerabilities the program. To manage that, the attacker uses a buff er with
automatically on a large number of machines. A typical attack non-existent or poorly performed boundary checking. The
scenario would involve a first phase where the attacker tries to second step is to subvert the state of the program. The attacker
scan the network that he intends to compromise. Table 1 must corrupt the stack pointer to make it point to his malicious
shows diff erent types of Probe with some properties for a code. Several options are possible but the most common is to
particular type such as the service that the attack uses, the overwrite a function return address to point to the first
platforms vulnerable to this kind of Probe, the type of instruction of the code of the attacker. This attack is also
vulnerability (mechanism) that the attack takes advantage of, called “stack smashing attack”. Other attacks such as
the time required to implement it and the effect caused by the “loadmodule” or “perl” take advantage of the way some
attack. programs sanitize their environment. Table 3 shows diff erent
TABLE 1 types of U2R with some properties for a particular type such
PROBE ATTACKS
as the service that the attack uses, the platforms vulnerable to
this kind of U2R, the type of vulnerability (mechanism) that
Mechanism
Vulnerable
implement
Platforms
Time to
Service
Effect
Name
Mechanism
Looks for
Vulnerable
implement
Abuse
Platforms
known
Time to
Service
Mscan Many All of Short
Effect
Name
vulnerabi
Feature
lities
Find
Abuse Eject Any Solaris Buffer Medium Root
active
Nmap Many All of Short user Overflow Shell
ports on a
Feature session
machine
Looks for Ffbconfig Any Solaris Buffer Medium Root
Abuse user Overflow Shell
known
Saint Many All of Short session
vulnerabi
Feature Fdformat Any Solaris Buffer Medium Root
lities
Looks for user Overflow Shell
Abuse session
known
Satan Many All of Short Loadmod Any SunOS Poor Short Root
vulnerabi
Feature ule user environm Shell
lities
session ent
TABLE 2 sanitation
FEATURE SELECTED FOR PROBE LAYER Perl Any Linux Poor Short Root
Feature Feature Name user environm Shell
Number session ent
1 duration sanitation
2 Protocol type Ps Any Solaris Poor temp Short Root
3 Service user file Shell
session managem
4 flag
ent
5 Src_bytes
Xterm Any Linux Buffer Short Root
user overflow Shell
User to Root (U2R): In a User to Root attack an attacker session
starts a session on a computer as a normal user with restricted
TABLE 4
rights and by exploiting some vulnerability on the software FEATURE SELECTED FOR U2R LAYER
installed on the system, the user can elevate his privilege. The Feature Feature Name
goal of this class of exploits is obviously to obtain Number
administrator rights on the attacked computer in order to have 10 hot
13 num_compromised
full control of it. There are several types of U2R attacks. 14 root_shell
Buff er overflow is certainly the major vulnerability used by 16 num_root
hackers when trying to obtain privileged rights on a computer. 17 num_file-creation
The goal of a buff er overflow attack is to corrupt a program 18 num_shell
19 num_access_files
running with high privileges (i.e. root) in order to take control 21 is_host_login
of the program. If the program has root privilege, the attacker
can immediately execute a command to obtain a root shell. In Remote to Local (R2L): In a Remote to Local attack, the
that case, the attacker has full control of the host computer attacker starts from a session on a computer outside of the
which runs the vulnerable program. The attack is performed in targeted network and exploits a vulnerability in order to gain
two steps. In the first step, the hacker must find a way to have access to a computer on the local network. A precondition that
the appropriate code to launch a root shell in the memory of must be fulfilled is the ability for the attacker to send network
packets to the victim host. R2L attacks are combined with TABLE 6
FEATURE SELECTED FOR R2L LAYER
U2R attacks allowing the attacker to obtain full access of a Feature Feature Name
remote machine which is part of a diff erent network than the Number
network of the attacker. Examples of remote to local attacks 1 duration
include “warezmaster” and “warezclient”. Those two attacks 2 Protocol_type
3 Service
exploit weaknesses in the file transfer protocol (FTP). The first 4 flag
one grants any user with writing permission on the FTP server. 5 Src_bytes
An attacker could use this bug to create a hidden directory and 10 hot
upload illegal files on the server. The “warezclient” attack can 11 Num_failed_logins
12 Logged_in
be seen as the second step of the “warezmaster” attack since it 13 num_compromised
involves a user downloading the uploaded files from the 17 num_file-creation
hidden directory created during the “warezmaster” attack. 18 num_shell
Other remote to local attacks called “imap”, “named” and 19 num_access_files
21 is_host_login
“sendmail” exploit bugs in well-known protocols used on the
22 is_guest-login
Internet such as DNS and SMTP. Attacks exploiting
misconfigurations in the system include “dictionary”, “ftp- Denial of Service (DoS): In a denial of service attack, an
write”, “guest” and “Xsnoop”. The main mitigation against attacker makes a resource on a network either unavailable to
remote to local attacks is to keep the system up-to-date. These legitimate users or too busy or too full to process their queries.
updates will remove from the system the most common bugs The resource can be network bandwidth, computer memory or
that are exploited by R2L attacks. Table 5 shows diff erent computing power. There are many diff erent types of DoS
types of R2L with some properties for a particular type such as attacks [Kumar, 2010]. A man-in-the-middle (MITM) attack is
the service that the attack uses, the platforms vulnerable to this a type of sniffing attack where the attacker stands in the middle
kind of R2L, the type of vulnerability (mechanism) that the of a communication between two hosts. The other major type
attack takes advantage of, the time required to implement it of DoS focuses on resource exhaustion. The attacker sends a
and the effect caused by the attack. huge amount of queries in a short amount of time to the
targeted victim. If the victim is a server, resource exhaustion
TABLE 5
REMOTE TO LOCAL ATTACKS occurs when the server receives more queries than it can
process. In that case, legitimate users will not be able to access
this resource during the time of the attack or even afterwards if
Mechanism
Vulnerable
implement
Platforms
Effect
Name
implement
organizational needs.
Platforms
Time to
Service
desired output and weight matrix added with products of [20] Ranjan S., Swaminathan R., Uysal M., Nucci A., and Knightly E., 2009,
DDoS-shield: DDoS resilient scheduling to counter application layer
reservoir matrix with state vector. The total summed value is attacks, IEEE/ACM Transactions on Networking, Vol.17, pp.26-39.
passed through tanh activation function which is treated as the [21] Samaneh Rastegari, Iqbal Saripan M., and Mohd Fadlee A. Rasid, 2009,
next state. After presenting all the patterns, a state matrix is Detection of Denial of Service attacks against Domain Name System
Using Neural Networks, International Journal of Computer Science
obtained for which pseudo inverse is found. The output of
Issues, Vol.6, No.1, pp.444-447.
pseudo inverse is processed with target values. [22] Sapna S. Kaushik, Deshmukh P.R., 2011, Detection of Attacks in an
Intrusion Detection System, International Journal of Computer Science
V. CONCLUSION and Information Technologies, Vol.2, No.3, pp.982-986.
[23] Shevtekar A., Anantharam K., and Ansari N., 2005, Low-rate TCP
This paper presents combination of RBF with ESNN for denial-of-service attack detection at edge routers, IEEE Communications
identification of intrusion attack information in an intrusion Letters, Vol.9, pp.363-365.
[24] Sung A., and Mukkamala S., 2004, The feature selection and intrusion
detection. The RBF uses distance concept for learning the detection problems, Lecture Notes in Computer Science, 3321, pp.468-
intrusion detection attacks. ESNN uses reservoirs concept for 482.
learning the intrusion detection attacks. [25] Tao peng, Christopher leckie, and Kotagiri ramamohanarao, Survey of
Network-Based Defense Mechanisms Countering the DoS and DDoS
Problems, ACM Computing Surveys, Vol.39, No.1, Article 3, 2007.
REFERENCES [26] Theuns Verwoerd, Ray Hunt, 2002, Intrusion detection techniques and
[1] Beghdad R, 2007, Training all the KDD dataset to classify and detect approaches, Computer Communications, Vol.25, pp.1356-1365.
attacks in International Journal on Neural and Mass parallel computing [27] Verwoed T., and Hunt R., 2002, Intrusion detection techniques and
and Information Systems, Vol.17. approaches, Elsevier: computer communications, Vol.25, No.10,
[2] Botha M., Solms R., Utilizing Neural Networks For Effective Intrusion pp.1356-1365.
Detection, ISSA, 2004. [28] Zenghui L., Yingxu L., 2009, A Data Mining Framework for Building
[3] Chan, A., Ng W., Yeung D.S., and Tsang E., 2005, Multiple classifier Intrusion Detection Models Based on IPv6, Proceedings of the 3rd
system with feature grouping for intrusion detection: Mutual information International Conference and Workshops on Advances in Information
approach, Lecture Notes in Artificial Intelligence, 3683, pp.141-148. Security and Assurance. Seoul, Korea, Springer- Verlag.
[4] Chobrolu S., 2005A. Abraham, P. Johnson, feature deduction and
ensemble design of intrusion detection systems, Elsevier computers and Y. Kalpana has received her M.C.A and M.Phil.
security, Vol.24, pp.195-307. degrees from Bharathidasan university, India and
[5] Cunningham R., and Lippmann R., 2000b, Improving Intrusion currently pursuing her Ph.D degree in VELS University.
Detection performance using Keyword selection and Neural Networks, She has 15 years of Teaching experience. She has
Computer Networks, Vol.34, No.4, pp.597-603. presented 8 papers in National Conference and 1 paper
[6] Deepa V. Guleria, Chavan M.K., 2013, Intrusion Detection System in International conference. Her research interests
Based On Conditional Random Fields, International Journal of include Network security and Data Mining.
Engineering Research and Technology, Vol.2, Issue 5, pp.653-660.
[7] Dongli W., Yan Z, and Xiaoyang H., 2007, RBF neural network based
model predictive control for freeway traffic systems, International Dr.S. Purushothaman completed his PhD from Indian
Journal of Intelligent Systems Technologies and Applications, Vol.2, Institute of Technology Madras, India in 1995. He has
No.4, pp.370-388. 129 publications to his credit. He has 19 years of
[8] Gavrilis D., and Dermatas E., 2005, Real-time detection of distributed teaching experience. Presently he is working as
denial-of-service attacks using RBF networks and statistical features. Professor in PET college of Engineering, India
Computer Networks and ISDN Systems, Vol.48, pp.235-245.
[9] Gelenbe E., 1993, Learning in the recurrent random neural network,
Neural Computation, Vol.5, pp.154-164.
[10] Hoai-Vu Nguyen and Yongsun Choi, 2010, Proactive detection of DDoS
attacks utilizing k-NN classifier in an anti-DDoS framework, R. Rajeswari completed MSc Information Technology
International Journal of Electrical and Electronics Engineering, Vol.4, from Bharathidasan university, Tiruchirappalli and
Issue 4, pp.247. M.Phil Computer Science from Alagappa University,
[11] Jaeger H., The echo state approach to analyzing and training recurrent Karaikudi, Tamilnadu, India. She is currently pursuing
neural networks, German National Research Center for Information PhD in Mother Teresa Women’s University. Her area of
Technology, Tech. Rep.148, 2001. interest is Intelligent Computing.
[12] Kayacik H., Zincir-Haywood A., and. Haywood M., 2005, Selecting
features for intrusion detection: a feature relevance analysis on KDD99
intrusion detection datasets, Dalhousie University.
[13] KDD Cup 1999 Intrusion Detection Data,
http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, 2010.
[14] Kejie Lu, Dapeng Wu, Jieyan Fan , Sinisa Todorovic, 2007, Antonio
Nucci, Robust and efficient detection of DDoS attacks for large scale
internet, Science Direct, Computer Networks, pp.5036-5056.
[15] Kumar S., 2010, Denial of Service Due to Direct and Indirect ARP
Storm Attacks in LAN Environment. Journal of Information Security 01,
Vol.2, pp.88–80.
[16] Lappas T., 2007, Data Mining Techniques for (Network) Intrusion
Detection System.
[17] Lukosevicius M., and Jaeger H., Reservoir computing approaches to
recurrent neural network training, Computer Science Review, pp.127–
149. 2009.
[18] Mum G., and Kim Y., 2006, network intrusion detection using statistical
probability distribution, information systems and information
technology, Vol.3984, pp.340-348.
[19] Power R., 2002, CSI/FBI computer crime and security survey, Computer
Security Journal, Vol.XVIII, No.2, pp.7-30.