DARPA Intrusion Detection Evaluation
The Detectability of Attacks in NT Audit Logs
Windows NT hosts are essential components of the computing environment in many government agencies. Despite the growing importance of NT hosts, researchers are only beginning to develop intrusion detection systems that use NT audit data. As part of the Lincoln Laboratory 2000 Development/Evaluation effort, we have performed analyses designed to make it easier for researchers to extend their existing systems to process NT audit data and begin detecting NT attacks.
The following process was performed for each of the twelve NT attacks used in the 1999 evaluation, with auditting setup just as it was during the 1999 evalation:
1. Clear the audit logs on the victim machine (172.16.112.100)
2. Run the attack against the machine with no background traffic
3. Immediately save the audit logs
The audit logs were then examined in an attempt to determine an audit log signature for each attack.
- The Application Log and System Log showed no evidence of any of the attacks.
- Ten of the twelve attacks left useful evidence in the Security Log.
- PPMacro and Framespoofer left no useful evidence in any of the audit logs.
The audit log signatures that were chosen for the other ten attacks are described in the "Attack signature" section of the attack descriptions. This information can be used to create signatures to detect the 1999 attacks.
To test the quality of the determined signatures, an example PERL script named NTaudit-detect.pl was written. It uses the signatures derived from the attack data base to scan for Windows NT attacks in NT audit log data. The script processes comma-separated text versions of the audit logs. These are created by using the NT event viewer to save the original event logs as comma-delimited text files.
The results of running the ntaudit-detect.pl PERL script on the 1999 test data are shown below. Note that this is not an official set of results and that the results are overly optimistic because the test data was used twice, both to develop signatures and for testing.
As can be seen, 24 of the 29 attacks that occurred during periods where NT audit records were available were detected and only 9 false alarms were generated. This good result, and the relatively simple nature of the signatures, demonstrates that the NT audit records collected in 1999 contain much useful information concerning the 1999 NT attacks. This information, however, needs to be supplemented to detect the two attack types that were missed (PPMacro and Framespoofer) and other attacks where information on file and registry access is important. Further experiments are planned in 2000 to provide this type of extended NT audit information where auditing for all files and the registry is enabled.
The results of the script are shown in the following table. Each row of this table represents on instance of an attack, as it occurred in Weeks 4 or 5 of the 1999 Test Data. For each attack instance the following information is given:
- IDnum - The instance ID number. The format is: wd.hhmmss, so 41.084031 would indicate Week 4, Day 1(Monday), 08:40:31. This is *roughly* when the attack was schduled to begin - however in the course of simulation, the actual time (not date) might have changed.
- Name - The common name of this attack
- Stealthy/Clear - Was the attack instance considered Stealthy or Clear
- New/Old - was this attack considered New or Old with regard to the 1999 Evaluation
- Category - the major category into which this attack is classified (prepended with ll)
- VictimOS - the operating system or platform that fell victim in this instance.
- Detected - was this attack detected in Audit Logs by Detect.pl
- Identified - was this attack correctly identified by Detect.pl
- Total False Alarms - total number of times Detect.pl false alarmed for the attack
For further information on the attack instances, follow the attack id number link to a listfile like list of sessions and time-periods during which the attack was carried out.
Documentation of the audit signatures can be found in the attack descriptions.
IDnum | Name | Stealthy/ Clear |
New/ Old |
Category | Victim OS | Detected | Total False Alarms |
All | All Attacks | - |
- | - | 11NT | 24 of 29 | 9 |
41.090000 | ntfsdos | Clr |
New | llDATA-llU2R- | llNT | 1 |
0 |
41.155048 | yaga | Clr |
New | llU2R | llNT | 1 |
0 |
41.161308 | crashiis-yaga | Clr |
Old | llDOS | llNT | 0 |
7 |
42.120000 | ntfsdos | Clr |
New | llDATA-llU2R- | llNT | 1 |
0 |
42.143228 | sechole | Clr |
New | llU2R | llNT | 1 |
0 |
42.210410 | crashiis | Clr |
Old | llDOS | llNT | 1 |
7 |
43.100000 | ppmacro | Clr |
New | llDATA-llR2L- | llNT | 0 |
0 |
43.110000 | netcat | Clr |
New | llR2L | llNT | 1 |
0 |
44.080000 | ntinfoscan | Clr |
Old | llPROBE | llNT | 1 |
2 |
44.083000 | netbus | Clr |
New | llR2L | llNT | 1 |
0 |
44.110000 | dosnuke | Clr |
New | llDOS | llNT | 1 |
0 |
44.120500 | ppmacro | Clr |
New | llDATA-llR2L- | llNT | 0 |
0 |
45.165009 | Clr |
New | llU2R | llNT | 1 |
0 |
|
51.114500 | dosnuke | Clr |
New | llDOS | llNT | 1 |
0 |
crashiis | Clr |
Old | llDOS | llNT | 1 |
7 |
|
51.194715 | dosnuke | Clr |
New | llDOS | llNT | 1 |
|
52.085357 | casesen | Clr |
New | llU2R | llNT | 1 |
0 |
52.135003 | crashiis | Clr |
Old | llDOS | llNT | 1 |
7 |
52.140207 | ppmacro | Clr |
New | llR2L | llNT | 0 |
0 |
52.205605 | dosnuke | Clr |
New | llDOS | llNT | 1 |
0 |
53.094800 | netbus | Clr |
New | llR2L | llNT | 1 |
0 |
53.110500 | netcat | Clr |
New | llR2L | llNT | 1 |
0 |
54.091200 | casesen | Clr |
New | llU2R | llNT | 1 |
0 |
54.102102 | ntfsdos | Clr |
New | llDATA | llNT | 1 |
0 |
54.110416 | ntinfoscan | Clr |
Old | llPROBE | llNT | 1 |
2 |
54.115000 | yaga | Clr |
New | llU2R | llNT | 1 |
0 |
54.115701 | crashiis-yaga | Clr |
Old | llDOS | llNT | 0 |
7 |
54.160341 | sechole | Clr |
New | llU2R | llNT | 1 |
0 |
54.183002 | ntinfoscan | Clr |
Old | llPROBE | llNT | 1 |
2 |
Audit logs for 5-5 were not collected properly | |||||||
55.081418 | crashiis | Clr |
Old | llDOS | llNT | - |
- |
55.085514 | netcat | Clr |
New | llR2L | llNT | - |
- |
55.100600 | anypw | Clr |
New | llU2R | llNT | - |
- |
55.110800 | framespoofer | Clr |
New | llR2L | llNT | - |
- |
55.124400 | yaga | Clr |
New | llU2R | llNT | - |
- |
55.125112 | crashiis | Clr |
Old | llDOS | llNT | - |
- |
55.125830 | crashiis | Clr |
Old | llDOS | llNT | - |
- |
55.204925 | casesen | Clr |
New | llU2R | llNT | - |
- |
top of page