+ All Categories
Home > Documents > Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network...

Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network...

Date post: 26-Dec-2015
Category:
Upload: hugh-hubbard
View: 222 times
Download: 0 times
Share this document with a friend
Popular Tags:
16
Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active Learning for Statistical Intrusion Detection NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007
Transcript
Page 1: Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active.

Jay Stokes, Microsoft ResearchJohn Platt, Microsoft ResearchJoseph Kravis, Microsoft Network SecurityMichael Shilman, ChatterPop, Inc.

ALADIN: Active Learning for Statistical Intrusion Detection

NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007

Page 2: Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active.

Motivation

Metadata of Microsoft’s external internet traffic is logged using ISA Server Firewall ISA – Internet Security and Acceleration

Up to 35 million log entries per day Security analysts must search for and

identify new anomalies Looking for new malware, bad PTP, etc. Can machine learning help?

NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007

Page 3: Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active.

Active Learning

User 2User 1

ISA Server

SQL

ALADIN

RankSamples

EvaluateSamples

Security Analyst

Human interactively provides labels for new sample

Network traffic metadata logged to SQL

ALADIN evaluates and ranks samples

Security Analyst labels samples

ALADIN reranks samples and repeats

NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007

Page 4: Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active.

ALADIN

Multiclass classifier for monitoring network traffic

Goal: Minimize analyst labeling time

Weights can be adaptively improved at user’s site

12/8/2007NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security

Page 5: Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active.

Choosing Samples for Labeling – Active Anomaly Detection

Label only anomalies (Pelleg, Moore, NIPS04)

Discover rare and interesting classes

Multiclass model Avoid “Normal” vs.

“Not Normal” problem

Leads to high error rates

12/8/2007NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security

Page 6: Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active.

Choosing Samples for Labeling – Active Learning Label only samples

closest to the decision boundary (Almgren, Jonsson, CSFW04)

RBF SVM Ignore samples

located away from the decision boundaries

May not find new classes

12/8/2007NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security

Page 7: Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active.

ALADIN: Combines Active Anomaly Detection and Active Learning

Unlabeled items

Anomalies (potential malware): ask analyst for labels

Samples closest to the hyperplanes

NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007

Page 8: Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active.

Classification Stage

12/8/2007NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security

Discriminative Learning, Logistic Regression

Minimize cross entropy function

Uncertainty Score

Fast computation for interactive labeling Scales well

| 1/ 1 expi ij j ij

P class x w x b

1

log | 1 log 1 |I

in n in nn i

E t P i x t P i x

;

| |min i n j ni j i

P class x P class x

Page 9: Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active.

Modeling Stage

12/8/2007NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security

naïve Bayes Model Training Data

labeled data predicted labels of the unlabeled data

Anomaly Score

Fast computation for interactive labeling Scales well

log | log |c j cj

P class P x class x

Page 10: Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active.

Network Intrusion Detection Results KDD-Cup 99 Data Set Provides Oracle Labels 100K Samples Use All Features in the Data Label 10 Initial Samples Randomly 100 Samples Labeled per Iteration

NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007

Page 11: Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active.

Results – Anomaly Detection

12/8/2007NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security

0 1 2 3 4 5 6 7 8 90

5

10

15

20

25

Iteration

Num

ber

of I

dent

ified

Cla

sses

ALADINLogistic RegressionSVM

Page 12: Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active.

Results – Prediction Accuracy

1 2 3 4 5 6 7 8 9 100

5

10

15

20

25

30

Iteration

Err

or R

ate

(%)

ALADINLogistic RegressionSVM

12/8/2007NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security

Page 13: Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active.

FP/FN Per Class

True Label

Num Labeled Samples

True Predicted

LabelTP

CountIncorrectly

Predicted LabelFN

Count FP Rate FN Ratenormal 551 normal 55715 satan 3 4.12% 0.20%

guess_passwd 10ipsweep 67back 2

neptune 57 neptune 20425 0.00% 0.00%smurf 82 smurf 18904 normal 7 0.00% 0.04%back 36 back 5 normal 1961 0.00% 99.75%

ipsweep 58 ipsweep 675 normal 27 0.07% 3.85%satan 49 satan 470 normal 20 0.00% 4.08%

portsweep 54 portsweep 223 normal 1 0.00% 0.45%

NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007

Page 14: Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active.

Malware Detection on Microsoft Network Logs

Analyzed several daily log files.

Identified “5.exe” on the corporate network which was not previously identified Trojan.Esteems.D. 5.exe monitors user Internet

activity and private information. It sends stolen data to a hacker site.

Identified several other worms (NewApt Worm, Win32.Bropia.T, W32.MyDoom.B), and keyloggers (svchqs.exe) All of which were currently logged Some waiting to be labeled All currently blocked by ISA firewall rules

NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007

Page 15: Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active.

Conclusions

ALADIN discovers rare and interesting classes

ALADIN maintains low classification error Scales due to fast learning with logistic

regression and naïve Bayes Identifies network intrusion attacks Identifies malware via network traffic

patterns Tech Report:

http://research.microsoft.com/~jstokesNIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007

Page 16: Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active.

Jay Stokes, Microsoft ResearchJohn Platt, Microsoft ResearchJoseph Kravis, Microsoft Network SecurityMichael Shilman, ChatterPop, Inc.

ALADIN: Active Learning for Statistical Intrusion Detection

NIPS Workshop 2007 – Machine Learning in Adversarial Environments for Computer Security 12/8/2007


Recommended