LaTeX PHD Thesis With The Memor Package
LaTeX PHD Thesis With The Memor Package
Advisor:
Prof. Stefano Zanero
Tutor:
Prof. Letizia Tanca
December 2013
i
Preface
is thesis embraces all the efforts that I put during the last three years
as a PhD student at Politecnico di Milano. I have been working under
the supervision of Prof. S. Zanero and Prof. G. Serazzi, who is also the
leader of the research group I am part of. In this time frame I had the
wonderful opportunity of being “initiated” to research, which radically
changed the way I look at things: I found my natural “thinking outside
the box” attitude — that was probably well-hidden under a thick layer
of lack-of-opportunities, I took part of very interesting joint works —
among which the year I spent at the Computer Security Laboratory at
UC Santa Barbara is at the rst place, and I discovered the Zen of my
life.
My research is all about computers and every other technology pos-
sibly related to them. Clearly, the way I look at computers has changed
a bit since when I was seven. Still, I can remember me, typing on that
Commodore 64 in front of a tube TV screen, trying to get that d—n rou-
tine written in Basic to work. I was just playing, obviously, but when
I recently found a picture of me in front of that screen...it all became
clear.
So, although my attempt of writing a program to authenticate my-
self was a little bit naive — being limited to a print instruction up to
that point apart, of course — I thought “maybe I am not in the wrong
place, and the fact that my research is still about security is a good sign”!
Many years later, this work comes to life. ere is a humongous
amount of people that, directly or indirectly, have contributed to my
research and, in particular, to this work. Since my rst step into the lab,
I will not, ever, be thankful enough to Stefano, who, despite my skep-
ticism, convinced me to submit that application for the PhD program.
For trusting me since the very rst moment I am thankful to Prof. G.
Serazzi as well, who has been always supportive. For hosting and sup-
porting my research abroad I thank Prof. G. Vigna, Prof. C. Kruegel,
and Prof. R. Kemmerer. Also, I wish to thank Prof. M. Matteucci
for the great collaboration, Prof. I. Epifani for her insightful sugges-
tions and Prof. H. Bos for the detailed review and the constructive
comments.
On the colleagues-side of this acknowledgments I put all the fellows
of Room 157, Guido, the crew of the seclab and, in particular, Wil with
whom I shared all the pain of paper writing between Sept ’08 and Jun
’09.
ii
F M
Milano
September 2009
iv
Abstract
List of Tables x
1 Introduction 1
1.1 Todays’ Security reats . . . . . . . . . . . . . . . . 3
1.1.1 e Role of Intrusion Detection . . . . . . . . 4
1.2 Original Contributions . . . . . . . . . . . . . . . . . 8
1.2.1 Host-based Anomaly Detection . . . . . . . . 8
1.2.2 Web-based Anomaly Detection . . . . . . . . 9
1.2.3 Alert Correlation . . . . . . . . . . . . . . . . 10
2 A Chapter of Examples 11
2.1 A Table . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.2 Code . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.3 A Sideways Table . . . . . . . . . . . . . . . . . . . . 12
2.4 A Figure . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.5 Bulleted List . . . . . . . . . . . . . . . . . . . . . . . 14
2.6 Numbered List . . . . . . . . . . . . . . . . . . . . . 14
2.7 A Description . . . . . . . . . . . . . . . . . . . . . . 14
2.8 An Equation . . . . . . . . . . . . . . . . . . . . . . 15
2.9 A eorem, Proposition & Proof . . . . . . . . . . . . 15
2.10 De nition . . . . . . . . . . . . . . . . . . . . . . . . 16
2.11 A Remark . . . . . . . . . . . . . . . . . . . . . . . . 16
2.12 An Example . . . . . . . . . . . . . . . . . . . . . . . 16
2.13 Note . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
vi
CONTENTS vii
Bibliography 17
Index 21
List of Figures
1.1 Illustration taken from (Holz, 2005) and ©2005 IEEE. Au-
thorized license limited to University of California. . . . . 4
viii
List of Tables
x
List of Acronyms
xiii
Colophon
1
. I
ignored ads because of the “I’m feeling lucky” button. e scary part is
that, during their daily work activities, people typically pay poor or no
attention at all to the risks that derive from exchanging any kind of in-
formation over such a complex, interconnected infrastructure. is is
demonstrated by the effectiveness of social engineering (Mitnick, 2002)
scams carried over the Internet or the phone (Granger, 2001). Recall
that 76% of the phishing is related to nance. Now, compare this land-
scape to what the most famous security quote states.
In fact, the Internet is all but a safe place (Ofer Shezaf and Jeremiah
Grossman and Robert Auger, 2009), with more than 1,250 known data
breaches between 2005 and 2009 (Clearinghouse, 2009) and an esti-
mate of 263,470,869 records stolen by intruders. One may wonder why
the advance of research in computer security and the increased aware-
ness of governments and public institutions are still not capable of avoid-
ing such incidents. Besides the fact that the aforementioned numbers
would be order of magnitude higher in absence of countermeasures, to-
days’ security issues are, basically, caused by the combination of two
phenomena: the high amount of software vulnerabilities and the effec-
tiveness of todays’ exploitation strategy.
2
1.1. Todays’ Security reats
3
. I
4
1.1. Todays’ Security reats
reveals that, despite the complexity of this scenario, the problems that
must be solved by a security infrastructure can be decomposed into rel-
atively simple tasks that, surprisingly, may already have a solution. Let
us look at an example.
5
. I
6
1.1. Todays’ Security reats
7
. I
8
1.2. Original Contributions
9
. I
10
A Chapter of Examples 2
2.1 A Table
Feature M - A -
Modeled activity: Malicious Normal
Detection method: Matching Deviation
reats detected: Known Any
False negatives: High Low
False positives: Low High
Maintenance cost: High Low
Attack desc.: Accurate Absent
System design: Easy Difficult
2.2 Code
11
. AC E
12
A T H P S D . C
Table 2.2: Taxonomy of the selected state of the art approaches for network-based anomaly detection.
13
2.3. A Sideways Table
. AC E
2.4 A Figure
700
600
500
Number of occurrencies
400
300
200
100
0
25 30 35 40 45 50 55 60 65 70
Distance in syscalls
2.7 A Description
Time refers to the use of timestamp information, extracted from net-
work packets, to model normal packets. For example, normal
packets may be modeled by their minimum and maximum inter-
arrival time.
14
2.8. An Equation
Payload refers to the use of the payload, either at Internet Protocol (IP)
or TCP layer. For example, normal packets may be modeled by
the most frequent byte in the observed payloads.
2.8 An Equation
{
Ka + αa δa (i, j) if the elements are different
da (i, j) := (2.1)
0 otherwise
Proposition 2.9.2 3 + 3 = 6
Proof 2.9.1 For any nite set {p1 , p2 , ..., pn } of primes, consider m =
p1 p2 ...pn + 1. If m is prime it is not in the set since m > pi for all i.
If m is not prime it has a prime divisor p. If p is one of the pi then p is a
divisor of p1 p2 ...pn and hence is a divisor of (m − p1 p2 ...pn ) = 1, which
is impossible; so p is not in the set. Hence a nite set {p1 , p2 , ..., pn } cannot
be the collection of all primes.
15
. AC E
2.10 De nition
De nition 2.10.1 (Anomaly-based IDS) An anomaly-based IDS is a
type of IDS that generate alerts A by relying on normal activity pro les.
2.11 A Remark
Remark 1 Although the network stack implementation may vary from sys-
tem to system (e.g., Windows and Cisco platforms have different implemen-
tation of TCP).
2.12 An Example
Example 2.12.1 (Misuse vs. Anomaly) A misuse-based system M and an
anomaly-based system A process the same log containing a full dump of the
system calls invoked by the kernel of an audited machine. Log entries are in
the form:
2.13 Note
Note 2.13.1 (Inspection layer) Although the network stack implementa-
tion may vary from system to system (e.g., Windows and Cisco platforms
have different implementation of TCP), it is important to underline that
the notion of IP, TCP, HTTP packet is well de ned in a system-agnostic
way, while the notion of operating system activity is rather vague and by
no means standardized.
16
Bibliography
Jesse Alpert and Nissan Hajaj. We knew the web was big...
Available online at http://googleblog.blogspot.com/2008/07/
we-knew-web-was-big.html, Jul 2008.
orsten Holz. A short visit to the bot zoo. IEEE Security & Privacy,
3(3):76–79, 2005.
17
B
18
Bibliography
Dean Turner, Marc Fossi, Eric Johnson, Trevor Mark, Joseph Black-
bird, Stephen Entwise, Mo King Low, David McKinney, and Can-
did Wueest. Symantec Global Internet Security reat Report –
Trends for 2008. Technical Report XIV, Symantec Corporation,
April 2009.
Ke Wang and Salvatore J. Stolfo. Anomalous payload-based network
intrusion detection. In Proceedings of the International Symposium on
Recent Advances in Intrusion Detection (RAID 2004). Springer-Verlag,
September 2004.
Ke Wang, Janak J. Parekh, and Salvatore J. Stolfo. Anagram: A con-
tent anomaly detector resistant to mimicry attack. In Proceedings of
the International Symposium on Recent Advances in Intrusion Detection
(RAID 2006), Hamburg, GR, September 2006. Springer-Verlag.
Robert H’obbes’ Zakon. Hobbes’ internet timeline v8.2. Available on-
line at http://www.zakon.org/robert/internet/timeline/, Nov 2006.
Stefano Zanero. Analyzing tcp traffic patterns using self organiz-
ing maps. In Fabio Roli and Sergio Vitulano, editors, Proceedings
13th International Conference on Image Analysis and Processing - ICIAP
2005, volume 3617 of Lecture Notes in Computer Science, pages 83–90,
Cagliari, Italy, Sept. 2005. Springer. ISBN 3-540-28869-4.
19
Index
0-day, 6
HTTP, 9
IP, 15
malware, iv
TCP, 15
TTL, 15
URL, 1
21