Academia.eduAcademia.edu

Outline

A Cognitive Approach to Intrusion Detection

2007, 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications

https://doi.org/10.1109/CISDA.2007.368149

Abstract

The VMSoar project at Pace University is building a cognitive agent for cybersecurity. The project's objective is to create an intelligent agent that can model and understand the activities of users who are on the network, and that can communicate with network administrators in English to alert them to illegal or suspicious activities. VMSoar can understand users' activities because it is capable of performing these activities itself. It knows how to perform both legal and illegal activities, and uses this knowledge to explore simulations of the activity on a network. It can also probe information stored on a machine to assess the legality of past activity. Research in cybersecurity is difficult is due to the extremely large amount of data that must be analyzed to detect illegal activities. In addition, new exploits are developed frequently. Most current projects in this area are attempting to build some level of intelligence into their systems; however, those projects are focusing primarily on statistical data mining approaches. The VMSoar project is unique in its approach to building an intelligent security agent. The VMSoar agent is based on Soar, a mature cognitive architecture that is used in universities and corporations around the world. I.

References (19)

  1. 01:10:23.445709 192.168.1.14.38931 > 192.168.1.15.711: S 1354789686:1354789686(0) win 5840 <mss 1460,sackOK,timestamp 8958340 0,nop,wscale 0> (DF) 01:10:23.445709 192.168.1.14.38932 > 192.168.1.15.3005: S 358598610:1358598610(0) win 5840 <mss 1460,sackOK,timestamp 8958340 0,nop,wscale 0> (DF) 01:10:23.445709 192.168.1.14.38933 > 192.168.1.15.4500: S 359735835:1359735835(0) win 5840 <mss 1460,sackOK,timestamp 8958340 0,nop,wscale 0> (DF) 01:10:23.445709 192.168.1.14.38934 > 192.168.1.15.1353: S 363526429:1363526429(0) win 5840 <mss 1460,sackOK,timestamp 8958340 0,nop,wscale 0> (DF) 01:10:23.445709 192.168.1.15.711 > 192.168.1.14.38931: R 0:0(0) ack 1354789687 win 0 01:10:23.445709 192.168.1.15.3005 > 192.168.1.14.38932: R 0:0(0) ack 1358598611 win 0 01:10:23.445709 192.168.1.15.4500 > 192.168.1.14.38933: R 0:0(0) ack 1359735836 win 0 01:10:23.445709 192.168.1.15.1353 > 192.168.1.14.38934: R 0:0(0) ack 1363526430 win 0 REFERENCES
  2. K. Avijit, P. Gupta, and D. Gupta. "Tied, libsafeplus: Tools for runtime buffer overflow protection", in USENIX Security Symposium, August 2004.
  3. Axelsson, Stefan, Intrusion Detection Systems: A Survey and Taxonomy, Technical Report No 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Sweden, 2000.
  4. Balasubramanian, J. S., Garcia-Fernandez, J. O., Isacoff, D., Spafford, E., and Zamboni, D., An Architecture for Intrusion Detection using Autonomous Agents, Proceedings of the Fourteenth Annual Computer Security Applications Conference, 1998.
  5. Benjamin, D. Paul, Lonsdale, Deryle, and Lyons, Damian, Designing a Robot Cognitive Architecture with Concurrency and Active Perception, Proceedings of the AAAI Fall Symposium on the Intersection of Cognitive Science and Robotics, Washington, D.C., October, 2004.
  6. C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. "Stack-Guard: automatic adaptive detection and prevention of buffer- overflow attacks", in Proceedings of the 7th USENIX Security Symposium, January, 1998.
  7. C. Cowan, M. Barringer, S. Beattie, and G. Kroah-Hartman. "FormatGuard: automatic protection from printf format string vulnerabilities", in Proceedings of the 10th USENIX Security Symposium, August 2001.
  8. Green, Nancy, and Lehman, Jill F., An Integrated Discourse Recipe-Based Model for Task-Oriented Dialogue, Discourse Processes, 33(2), pp.133-158, 2002.
  9. Kanlayasiri, U., Sanguanpong, S., and Jaratmanachot, W., A Rule-based Approach for Port Scanning Detection, in Proceedings of the 23rd Electrical Engineering Conference, Chiang Mai Thailand, 2000.
  10. H.-A. Kim and B. Karp, "Autograph: toward automated, distributed worm signature detection", in Proceedings of the 13th USENIX Security Symposium, August 2004.
  11. Laird, J.E., Newell, A. and Rosenbloom, P.S., Soar: An Architecture for General Intelligence, Artificial Intelligence 33, pp.1-64, 1987.
  12. Lee, Wenke, Christopher T. Park , Salvatore J. Stolfo, Automated Intrusion Detection Using NFR: Methods and Experiences, in Proceedings of the Workshop on Intrusion Detection and Network Monitoring, p.63-72, 1999.
  13. Lonsdale and C. Anton Rytting, Integrating WordNet with NL-Soar, WordNet and other lexical resources: Applications, extensions, and customizations; Proceedings of NAACL- 2001; Association for Computational Linguistics, 2001.
  14. Marsella, Stacy, Jonathan Gratch and Jeff Rickel, Expressive Behaviors for Virtual Worlds, Life-like Characters Tools, Affective Functions and Applications, Helmut Prendinger and Mitsuru Ishizuka (Editors), Springer Cognitive Technologies Series, 2003.
  15. Me, Ludovic, and Michel, Cedric, Intrusion Detection: A Bibliography, In Technical Report SSIR-2001-01, Sup'elec, Rennes, France, 2001.
  16. Miller, C. S., Modeling Concept Acquisition in the Context of a Unified Theory of Cognition, EECS, Ann Arbor, University of Michigan, 1993.
  17. Nelson, G., Lehman, J.F., and John, B.E., Integrating cognitive capabilities in a real-time task, In Proceedings of the Sixteenth Annual Conference of the Cognitive Science Society. Atlanta, GA, August, 1994.
  18. Newell, Allen, Unified Theories of Cognition, Harvard University Press, Cambridge, Massachusetts, 1990.
  19. Rosenbloom, P.S., Johnson, W.L., Jones, R.M., Koss, F., Laird, J.E., Lehman, J.F., Rubinoff, R., Schwamb, K.B., and Tambe, M., Intelligent Automated Agents for Tactical Air