Conference PaperPDF Available

Application of Case Based Reasoning in IT Security Incident Response

Authors:

Abstract and Figures

This research explores the possible utilization of the Case-based Reasoning (CBR) technique to realize a CBR system for the domain of cyber security incidents handling and response. The proposed CBR system is intended to assist incident handlers, be it the rookies or even the seniors, in responding to incidents. The CBR recommender system mimics the way of an experienced incident handlers in responding to security incidents. This research investigates other related works on CBR in the area of cyber security. This work also research on the development of case storage and case representation for the domain of incident response.
Content may be subject to copyright.
AbstractThis research explores the possible utilization of the
Case-based Reasoning (CBR) technique to realize a CBR system for
the domain of cyber security incidents handling and response. The
proposed CBR system is intended to assist incident handlers, be it
the rookies or even the seniors, in responding to incidents. The CBR
recommender system mimics the way of an experienced incident
handlers in responding to security incidents. This research
investigates other related works on CBR in the area of cyber
security. This work also research on the development of case storage
and case representation for the domain of incident response.
KeywordsCase based reasoning, recommender system,
intelligent system, incident response, CERT.
I. INTRODUCTION
ECURITY incident is an adverse event that is done to
bring damage to networks and computing resources. In
other words, an incident is defined as an event that indicates
harm or attempt to do harm on computing systems. Even
some attackers break into the defenses of any organizations
regardless how good the defences strategy has been
implemented. The advancement in technology and
sophistication of cyber-attacks had contributed to the growing
number of reported security incidents worldwide [1].
Based on Malaysia CERT (MyCERT) yearly statistics,
there are a total of 11918 number of reported incidents for the
year 2014. There is an increased of 12% from year 2013.
Internet fraud, intrusion and spam remains the main three
highest reported cases to MyCERT. In 2014 only the are 67
spam emails that contains malware has been reported to us
[2]. Besides that, there is also a rise in cyberharassment and
ransomware cases from year to year. This reported incidents
came from many entities, including individuals, companies,
organizations and government agencies.
With all this statistics presented, it is firm that, for any
targetted organizations, staying alive in cyberattack is a very
important task. The time to respond to the attacks and
incidents must be taken seriously in order to maintain the
good image, stable operations and business activities of the
organization. It is the job of Incident Handlers to make sure
that the incident is properly identified and contained before
Wira Zanoramy A. Zakaria is a Senior Analyst at Malaysia Computer
Emergency Response Team (MyCERT), Cybersecurity Malaysia. (e-mail:
wira@cybersecurity.my).
significant damage took place.
In this research, a CBR system that is capable to
recommend procedure how to handle a specific security
incident is proposed. The input to this system is the
information about the reported incident. Meanwhile, the
output the recommender system is a list of steps of incident
handling. This paper is further divided in the following
sections: Section II described about the important of
information sharing between Incident Handlers. Section III
discussed on the motivations of this research. Section IV
introduced the concepts behind the CBR methodology and the
existing related works. Section V laid out the proposed system
in this research and finally Section VI described the outcome
of this research and possible future works.
II. THE IMPORTANCE OF INFORMATION SHARING AMONG
INCIDENT HANDLERS
Security incident handling is an important task for any
organizations and most importantly the CERT organizations.
Hence, Incident Handlers, those IT security personnels who
are expert in incident handling and response, are great assets
at MyCERT. On daily basis, they spent most of their time
handling and responding to cyber security incidents reported
by Malaysian individuals, private sectors, government
agencies, security feeds, foreign security organizations and
foreign CERTs. Besides that, MyCERT also responds to
incident reported by foreign security organization [1].
MyCERT received thousands of incident report every year.
The huge amount of incident reports received by MYCERT is
a big challenge for the Incident Handlers to pick up and
respond as effective as possible. This is the first reasons on
why skill and information sharing is important
betweenthem.
The second reason is the dynamic behavior of the security
threats itself. In a covert manner at the underground level, the
cyber criminals are known to be very cooperative when it
comes to sharing information about exploits and 0-days. They
even have a sort of black markets selling stolen sensitive
records, exploit kits and malware templates. This shown that
they have a very supportive and sharing nature between them.
Furthermore, the attackers community have most of their
resources attacking and penetrating into software and
systems. In contrary to the Incident Handlers, which is most
of them have other roles to fulfill within their organization,
Application of Case Based Reasoning in IT
Security Incident Response
Wira Zanoramy A. Zakaria
S
3rd International Conference Recent treads in Engineering and Technology (ICRET'2015) Sept. 2-3, 2015 Istanbul (Turkey)
106
have a limited resources to handle any incidents in shortest
time possible. Due to this, in order to win or at least to be on
par of this never ending arms race, the Incident Handlers are
advisable to share their experiences, best practices, skills and
tricks with other Incident Handlers.
III. MOTIVATIONS
In the age of big data, where we have a super huge amount
of security incidents tickets and feeds, there is a challenge for
Incident Handlers, especially the rookies, to rapidly pick up
the knowledge and basic skills in handling incidents.
Furthermore, as a human, even a highly skilled Incident
Handlers cannot run from doing a mistake. With the
assistance of this type of AI system, we could leverage the
issue to a minimum level. When experienced staff left the
company, they bring along with them the valuable skills and
years of experience in incident handling. Since a CBR
system records every piece of domain experience in the form
of cases, we can store the experience in a system that later
reuse it to as a training ground for rookie level Incident
Handlers.
Additionally, this kind of tool also can be used as a
companion for any level of Incident Handlers in order to
provide a line of reference while responding to incidents.
Furthermore, with assistance from this kind of system could
reduce the time to respond to incidents, assist in auto-respond
when there is lack of resources, promotes automation in
security incident response and also could help Incident
Handlers in the event of cyber crisis. To overcome this
shortcomings, there is a need for an intelligent system that
can record and learn in the domain of security incident
response and handling.
IV. CASE BASED REASONING
After the success of expert systems, Case-based reasoning
(CBR) is another popular artificial intelligence (AI) technique
in realizing an intelligent system. Expert system mostly
known as utilizing human expert knowledge in the form of
rules, while in CBR, all recorded knowledge are in the form
of experiences.CBR is a problem solving and learning
technique that solves new problem by reusing past successful
experiences [3][5]. CBR make use of past experiences in
order to understand and to solve new problems. Different
from the expert system where it reasons using knowledge and
rules, CBR system reasons and make decision through the use
of past experiences.
The basic idea behind the CBR methodology is it mimics
the process done by human mind everytime when dealing
with a decision making situation. Human uses their memory
to find any similar past experiences and tweaks the previous
solution so that it can fit into the current problem in hand.
In other words, the main principle behind CBR is based on
the concept of similar problems have similar solutions [6],
[7]. This sort of problem solving methodology is similar to
reasoning process commonly applied by human in solving
problems in real life. Human beings used their past memories
in order to solve new problems or situations [7]. The
remembering, reasoning and making decision process in
humans are mimicked by representing it through the
implementation of four CBR steps Retrieve, Reuse, Revise
and Retain. Fig. 1 show the CBR cycle and the 4R steps.
Listed below are the description of the 4R steps in a CBR
system.
RETRIEVE, from the case storage, a list of most
similar past cases based on the given problem
description. All similar cases will be assigned a
similarity score that will show which case is the most
similar. The case that have highest score will be
selected.
REUSE the solution contained within the selected
retrieved case in order to solve the described
problem.
If needed, REVISE the proposed solution from Step
REUSE.
RETAIN is a step where new case is formed and it is
being added to the case storage. Every new problem
solving experience will be treated as a new case and
it is retained into the case storage for future problem
solving. Through this step, it is said that the CBR
system has learned a new problem solving
experience, and this experience collection will keep
growing from time to time.
CBR is suitable to be applied for the domain where past
cases are available. It is also applicable for domains that are
not well understood, unstructured and ill-defined [8]. CBR
has been proven to work in areas such as helpdesks, business,
diagnosis, military control, classification, recommendation,
prediction, gaming, learning, designing and planning systems
[9], [10]. For this research, CBR method is applicable because
MyCERT received and archived thousands of incidents on a
yearly basis. All of the responded incidents data are well kept
for future references. With this good repository of past
reported incidents, it is easy for us to retrieve it back and to
transform the selected successful incident data into the form
of cases.
V. CBR APPLICATIONS IN IT SECURITY
During the past years, there are a few research works that
implemented CBR technique to solve problems in the domain
of IT security. For instance, [11] successfully applied CBR in
the domain of intrusion detections. On the other hand, [12]
approached the issues in intrusion detection by applying
swarm intelligence. Since spam or junk email is a serious
problem in modern communication, [13] and [14] proved that
CBR is suitable for handling the spam domain. Both research
utilized the machine learning approach for building an email
spam filter. [15] proposed the use of CBR methodology for
building an intelligent reasoner that can manage the
3rd International Conference Recent treads in Engineering and Technology (ICRET'2015) Sept. 2-3, 2015 Istanbul (Turkey)
107
deployments of low-interaction honeypots in the network. The
research made full use of the rapid CBR development tool,
Jcolibri [16], to realized a CBR recommender system for the
domain of honeypot configuration. The research produced
positive result in which the honeypot configured by the CBR
is successfully detected in the network. [17] proposed the use
CBR method for detecting computer virus. The case storage
of the system is filled up with virus signatures cases. Each of
the virus signature cases, contained the solution for that
particular signature. So in the future, whenever the CBR
system is queried by a new virus signature, the retrieval
algorithm with search for the most similar virus signature
cases that matches the new signature [17].
Fig. 1 CBR cycle
VI. PROPOSED SYSTEM
In this research, we proposed a CBR system for assisting
Incident Handlers. The case base will contain past
experiences of successful incident handling. The experiences
are represented in the form of cases which later can be used
by the CBR reasoner. Before the proposed CBR system can be
developed, listed below are the tasks that need to be
addressed:
A. Case Storage
For a decision support system, the program instructions
will refer to a database in order to make decision and this
database usually stores lots of data in tables and columns.
Meanwhile in CBR, a case base is used. This case base or
case storage keeps a list of past experiences in the form of
cases that represents a specific domain [9]. The case-base is
populated by a collection of previous successful experiences
represented in the form of cases [18]. A case is a contextual
piece of information that describes a successful experience for
a particular problem or situation in the past.
Fig. 2 Basic structure of a case
B. Case Representation
For this research, the cases are related to incident handling
and response.In CBR methodology, all recorded
experiences are represented in the form of cases. A case is a
knowledge model for a particular experience in a particular
domain. It is a method for representing experiences.
Basically, a case consists of two segments: problem and
solution. Fig. 2 shows the diagram of a case’s basic structure.
The first segment contains the description about a problem or
situation. In this research, the first segment of a case contains
all the attributes that represents an incident description. The
second segment contains the description on the solution for
that particular problem. Thus, this segment contains the
attributes that describes on the action taken by the Incident
Handler.
Fig. 3 Attributes in an incident response case
These cases are retained and indexed inside the case
storage. Thus, selecting the most suitable case representation
approach for the cases and picking the right attributes to be
included within the cases is a vital process. In this research,
the cases contains past successful experiences of incident
handlers. For the domain of incident response, there are
twelve attributes contained in a case including the Case ID
attribute. The Case ID attribute assists in indexing the cases
inside the case storage. It also acts as a referral value in order
to retrieve and maintain the cases from time to time. These
twelve attributes describes about the past incident and it’s
corresponding response made by the incident handler. Fig. 3
shows a conceptual structure of an incident response case
Case ID
PROBLEM: INCIDENT
DESCRIPTION
Time of incident
Incident category
Incident subcategory
Reported URL
Reported IP
SOLUTION: RESPONSE
Time of response
Type of action
Eradication Steps
Notification contacts
Notified entities
Advisory
Problem
Solution
3rd International Conference Recent treads in Engineering and Technology (ICRET'2015) Sept. 2-3, 2015 Istanbul (Turkey)
108
developed for the proposed system. Table 1 shows the
attributes, its data type and sample value.
TABLE I
LIST OF ATTRIBUTES, IT DATA TYPE AND SAMPLE VALUE
Attribute
Type
Sample value
Case ID
INTEGER
1137
Time of
incident
INTEGER
20151019:0245
Incident
category
STRING
Online fraud
Incident
subcategory
STRING
Phishing
Reported URL
STRING
http://domainname.com/xxx/
yy
Reported IP
STRING
x.x.x.x
Time of
Response
INTEGER
201510190309
Type of action
STRING
Notify URL, bad IP
Eradication
Steps
STRING
Shutdown the suspected
phishing website
Notification
contacts
STRING
ISP email address
Notified
entities
STRING
ISP, complainant
Advisory
STRING
Refer to Doc13-2
VII. CONCLUSION AND FUTURE WORK
In this research we proposed a CBR based intelligent
recommender system that is able to reason and make decision
in the domain of security incident response. With enough
cases and modifications in the 4R steps, this system could
autonomously handle large number of incidents in crisis
situations. For future work, the proposed system will be
implemented in a CBR development tool, for example
jCOLIBRI or myCBR. The algorithm for case retrieval and
case revise will be refine. The proposed system is planned to
be tested with real incident data available at MyCERT.
REFERENCES
[1] Automating Big Data Analysis: Malaysia CERT Experience, Tokyo
International Conference on Engineering and Applied Sciences 2014.
[2] MyCERT Incident Statistics, www.mycert.org.my/statistics/2015.php
[3] Aamodt, A, Plaza, E (1994). Case-based reasoning: Foundational issues,
methodological variations, and system approaches. Artificial Intelligence
Communications, 7(1), 39 - 59.
[4] Kolodner, JL, Leake, D (1996) A tutorial introduction to case-based
reasoning. In: LEAKE, D. (ed.) Case-Based Reasoning: Experiences,
Lessons, and Future Directions, 31 - 65. AAAI Press/TheMIT Press.
[5] Watson, I (1999). Case-based reasoning is a methodology not a
technology, Knowledge-Based Systems, Volume 12, Issues 56, October
1999, 303 - 308,10.1016/S0950-7051(99)00020-9.
[6] Fanoiki, T. O., Drummond, I., Sandri, S. (2010). Case-based reasoning
retrieval and reuse using case resemblance hypergraphs. International
Conference on Fuzzy Systems, 17. doi:10.1109/FUZZY.2010.5584854
[7] Carmona, M. A., Barbancho, J., Larios, D. F., León, C. (2013). Applying
case based reasoning for prioritizing areas of business management. Expert
Systems with Applications, 40(9), pp. 34503458.
[8] Wang, C.S., Yang, H.L. (2012). A recommender mechanism based on
case-based reasoning. Expert Systems with Applications, 39(4), pp. 4335 -
4343.
[9] Tsai, C., Chiu, C., Chen, J. (2005). A case-based reasoning system for
PCB defect prediction. Expert Systems with Applications, 28(4), 813822.
[10] Recio-Garcia, J.A., Diaz-Agudo, B., Gonzalez-Calero, P.A., "Boosting the
Performance of CBR Applications with jCOLIBRI," Tools with Artificial
Intelligence, 2009. ICTAI '09. 21st International Conference on , pp.276-
283, 2-4 Nov. 2009
[11] Micarelli, A., Sansonetti, G. (2007). A Case-Based Approach to Anomaly
Intrusion Detection, 434448.
[12] Kolias, C., Kambourakis, G., Maragoudakis, M. (2011). Swarm
intelligence in intrusion detection: A survey. Computers and Security,
30(8), 625642. doi:10.1016/j.cose.2011.08.009
[13] Delany, S. J., Thesis (2006). Using case-based reasoning for spam filtering.
[14] Alguliyev, R. (2012). Two Approaches on Implementation of CBR and
CRM Technologies to the Spam Filtering Problem. Journal of Information
Security, 03(01), 1117. doi:10.4236/jis.2012.31002
[15] Zakaria WZA, Mat Kiah ML (2014). Implementing a CBR Recommender
for Dynamic Honeypot using jCOLIBRI. 3rd International Conference on
Computer Science and Computational Mathematics 2014, 8 9 May,
Langkawi, Kedah, Malaysia.
[16] Atanassov, A., Antonov, L. (2012). Comparative Analysis of Case Based
Reasoning Software Frameworks jCOLIBRI and myCBR. Journal of the
University of Chemical Technology and Metallurgy (1), pp. 83 90.
[17] Berkat, A. (2011). Using Case-Based Reasoning ( CBR ) for detecting
computer virus. Journal of Computer Science, 8(4), 606610.
[18] Mitra, R., & Basak, J. (2005). Methods of case adaptation: A survey.
International Journal of Intelligent Systems, 20(6), 627645.
3rd International Conference Recent treads in Engineering and Technology (ICRET'2015) Sept. 2-3, 2015 Istanbul (Turkey)
109
... A CBR recommender system is an intelligent system that is able to make use of previous experiences stored in the form of cases, to derive a computer generated solution recommendation in order to solve a problem. An initial finding of this research also has been described in Wira (2015). In the paper, we discussed about the motivations that drives this research. ...
Conference Paper
Full-text available
Incident response is a very important subject in IT security. Due to significant rise in the number of total reported incidents, there is a need for an intelligent based recommender system to assist the Incident Handlers (IH) in responding to cyber threats. This work explores the application of the Case-based Reasoning (CBR) methodology in order to develop a CBR recommender system for assisting IH in handling and responding to cyber security incidents. The architecture of the proposed system and the work done on case representation describing some sample cyber incident category are discussed in this paper.
Conference Paper
Full-text available
This paper presents the comparison, in depth, of the capabilities of two Case-Based Reasoning (CBR) oriented software frameworks myCBR and jCOLIBRI for the development of predictive diagnosis and maintenance systems. Those frameworks were selected after detailed preliminary investigations [1] of the most popular noncommercial software systems for CBR as: myCBR, jCOLIBRI, CBR*Tools, CAT-CBR, CASPIAN. The evaluation of myCBR and jCOLIBRI includes the capacity to support the: R 4 CBR circle; clusterization of cases, variety of used similarity functions, etc. Specific abilities to provide GUI, database support, required knowledge to work with the systems were also considered.
Article
Full-text available
Recently the number of undesirable messages coming to e-mail has strongly increased. As spam has changeable character the anti-spam systems should be trainable and dynamical. The machine learning technology is successfully applied in a filtration of e-mail from undesirable messages for a long time. In this paper it is offered to apply Case Based Reasoning technology to a spam filtering problem. The possibility of continuous updating of spam templates base on the bases of which new coming spam messages are compared, will raise efficiency of a filtration. Changing a combination of conditions it is possible to construct flexible filtration system adapted for different users or corporations. Also in this paper it is considered the second approach as implementation of CRM technology to spam filtration which is not applied to this area yet.
Article
Full-text available
This paper presents the comparison, in depth, of the capabilities of two Case-Based Reasoning (CBR) oriented software frameworks myCBR and jCOLIBRI for the development of predictive diagnosis and maintenance systems. Those frameworks were selected after detailed preliminary investigations [1] of the most popular noncommercial software systems for CBR as: myCBR, jCOLIBRI, CBR*Tools, CAT-CBR, CASPIAN. The evaluation of myCBR and jCOLIBRI includes the capacity to support the: R 4 CBR circle; clusterization of cases, variety of used similarity functions, etc. Specific abilities to provide GUI, database support, required knowledge to work with the systems were also considered.
Article
Full-text available
The typical antivirus approach consists of waiting for a number of computers to be infected, detecting the virus, designing a solution, delivering and deploying a solution. In such a situation, it is very difficult to prevent every machine from being compromised by viruses. In this paper, we propose a new method, for detecting computer viruses, that is based on the technique of Case-Based Reasoning (CBR). In this method, (a) even new viruses that do not exist in the database can be detected (b) the updating of the virus database is done automatically without connecting to the Internet. Whenever a new virus is detected, it will be automatically added to the database used by our application. This presents a major advantage.
Article
Full-text available
pam is a universal problem with which everyone is familiar. Figures published in 2005 state that about 75% of all email sent today is spam. In spite of significant new legal and technical approaches to combat it, spam remains a big problem that is costing companies meaningful amounts of money in lost productivity, clogged email systems, bandwidth and technical support. A number of approaches are used to combat spam including legislative measures, authentication approaches and email filtering. The most common filtering technique is content-based filtering which uses the actual text of the message to determine whether it is spam or not. One of the main challenges of content based spam filtering is concept drift; the concept or the characteristics used by the filter to identify spam email are constantly changing over time. Concept drift is very evident in email and spam, in part due to the arms race that exists between spammers and the filter producers. The spammers continually change the content and structure of the spam emails as the filters are modified to catch them. In this thesis we present Email Classification Using Examples (ECUE) a content based approach to spam filtering that can handle the concept drift inherent in spam email. We apply the machine learning technique of case-based reasoning which models the email as cases in a knowledge-base or case-base. The approach used in ECUE involves two components; a case-base editing stage and a case-base update policy. We present a new technique for case-base editing called Competence-Based Editing which uses the competence properties of the cases in the case-base to determine which cases are harmful to the predictive power of the case-base and should be removed. The update policy allows new examples of spam and legitimate emails to be added to the case-base as they are encountered allowing ECUE to track the concept drift. We compare the case-based approach to an ensemble approach which is a more standard technique for handling concept drift and present a prototype email filtering application that demonstrates how the ECUE approach to spam filtering can handle the concept drift.
Article
Full-text available
Case-based reasoning is a recent approach to problem solving and learning that has got a lot of attention over the last few years. Originating in the US, the basic idea and underlying theories have spread to other continents, and we are now within a period of highly active research in case-based reasoning in Europe as well. This paper gives an overview of the foundational issues related to case-based reasoning, describes some of the leading methodological approaches within the field, and exemplifies the current state through pointers to some systems. Initially, a general framework is defined, to which the subsequent descriptions and discussions will refer. The framework is influenced by recent methodologies for knowledge level descriptions of intelligent systems. The methods for case retrieval, reuse, solution testing, and learning are summarized, and their actual realization is discussed in the light of a few example systems that represent different CBR approaches. We also discuss the role of case-based methods as one type of reasoning and learning method within an integrated system architecture.
Conference Paper
This work presents a similarity case-based reasoning approach in which clustering and similarity relations plays a central role in the retrieval and reuse processes. A set of cases will form a cluster when the similarity of the case in the solution space is at least as large as their similarity in the problem space. Our approach is composed of four steps: preparation of cases in the case base, creation of the sets of (eventually intersecting) clusters of cases in the case base, selection of the cluster whose case descriptions reach the highest overall similarity with the new case description, and computation of the solution for the new problem as a function of the solutions yielded by the individual cases in the selected cluster. Preliminary results obtained in a classification task shows that our approach is promising.
Article
This paper asks whether case-based reasoning is an artificial intelligence (AI) technology like rule-based reasoning, neural networks or genetic algorithms or whether it is better described as a methodology for problem solving, that may use any appropriate technology. By describing four applications of case-based reasoning (CBR), that variously use: nearest neighbour, induction, fuzzy logic and SQL, the author shows that CBR is a methodology and not a technology. The implications of this are discussed.