You are on page 1of 4

VOL. 1, NO.

2, Oct 2010 E-ISSN 2218-6301


Journal of Emerging Trends in Computing and Information Sciences

©2009-2010 CIS Journal. All rights reserved.

http://www.cisjournal.org 

The Rule Based Intrusion Detection and Prevention Model


for Biometric System
Maithili Arjunwadkar 1, R.V. Kulkarni 2
1
MCA Dept, Modern College Of Engineering, Pune, India
2
Director, SIBER , Kolhapur, India
E-Mail: Maithili.arjunwadkar@gmail.com, drrvkulkarni@siberindia.co.in

ABSTRACT
Modern biometric systems claim to provide alternative solution to traditional authentication processes. Even though there
are various advantages of biometric process, it is vulnerable to attacks which can decline it’s security. The intrusion
detection is an essential supplement of traditional security system. This security system needs the robust automated
auditing, intelligent reporting mechanism and robust prevention techniques. We suggest rule based intelligent intrusion
detection and prevention model for biometric system. This model contains a scheduler to prepare a schedule to check
different logs for possible intrusions, detectors to detect normal or abnormal activity. If activity is normal then alarming
and reporting has been executed. If abnormal activity is found the rule engine fires the rule to detect intrusion point and
type of intrusion. The model also contains an expert system to detect source of intrusion and suggest best possible
prevention technique and suitable controls for different intrusions. This model is also used for security audit as well as
alarming and reporting mechanisms. The malicious activity database is stored for future intrusion detection. To detect
source tracking backward chaining approach is used. The rules are defined and stored in the Rule engine of the system.

Keywords: Security, biometric process, attacks, intrusion detection, prevention, expert system.

1. INTRODUCTION 2. RELATED WORK

Modern biometric technologies like biometric Even though there are various advantages of
based authentication system that uses physiological (e.g. biometric process, it is vulnerable to attacks, which can
thumb print, retina scan, iris) or behavioral (e.g voice, decline it’s security. Ratha et al. [15] analyzed these
keystroke, touch) claim to provide an alternative for attacks and grouped them into different attack points
traditional authentication systems that are based on which are shown in figure 1 [16].
password (token-based) and key (knowledge based).
Biometric process or biometric encryption
process is used in two separate modes namely enrollment
and authentication process. During the enrollment process,
the user’s physiological and behavioral characteristics are
captured by the sensor. The different feature extractor or
key binding algorithms are used to create biometric
template. The template is stored during enrollment process
to be compared in the future to the one produced during an
authentication process. The stored template & the one
produced during authentication process is compared by
matching algorithm that produces matching result
(response Yes/NO). The matched response is then sent to
the application, on which a decision algorithm is
implemented for granting or denying to the user.
This paper is divided into three primary areas.
The first section provides an overview of Biometric
process, possible intrusions in the biometric process and
intrusion detection fundamentals. The second section
describes the architecture of intrusion detection &
prevention system for intrusions in biometric process. The
third section provides how intelligent models are used in Figure 1: Location of biometric process Attack points
this architecture. Finally, the future research and
conclusion of intrusion detection & prevention system are According to common criteria of biometric
presented. evaluation methodology supplement [16], it is particularly
important to consider that attacks can be done on the direct
input and output of a biometric template. The Biometric

117
VOL. 1, NO. 2, Oct 2010 E-ISSN 2218-6301
Journal of Emerging Trends in Computing and Information Sciences

©2009-2010 CIS Journal. All rights reserved.

http://www.cisjournal.org 
templates are considered to be very sensitive information. comparison of a user's activities with the known behaviors
They identify and are bound to people. It is the template of attackers attempting to penetrate a system. Misuse
that is used to determine the user’s rights and privileges to Detection also utilizes a knowledge base of information.
access a resource. Hybrid or Combined Anomaly/Misuse Detection is a third
When performing a vulnerability evaluation of a approach, which combine the Anomaly Detection
biometric system, we must consider a wide variety of approach and the Misuse Detection approach. The
generic possible attacks or threats to the security of the combined approach permits a single Intrusion Detection
system. All elements of a biometric system are susceptible System to monitor for indications of external and internal
to these threats to some degree. Fig 1 showing locations attacks. Intrusion detection system which includes
within the biometric system identified numerically. functions like monitoring and analyzing both user and
Throughout the process, there are different points system activities and detect suspicious pattern. [7]
of possible attacks. Some of the possible attack points may Most of the intrusion detection systems are
be at biometric device, extractor, on channel on which available for network security purpose. The biometric
template is transported or transmitted, Extraction/ process also requires some system which can be used to
Comparison unit, Extraction/ Template Storage points detect the possible attacks and used some prevention
during Enrolment, Template Storage units, Template mechanisms to avoid these attacks in future. The authors
Retrieval unit etc. suggest the Intrusion detection & Prevention System
Before created biometric template, the biometric (IDPS) to detect attacks, back tracing the origin of the
sample which is really bound to the credentials, privileges, attack and some suggest prevention mechanisms.
rights, etc. are in most vulnerable state. An attacker may
try to substitute his/her own sample or biometric template 3. ARCHITECTURE OF IDPS
to masquerade as the intended user.
When a template is not associated from its To design robust security system, it fulfills the
binding with the user, there is the possibility of a objectives of security like authenticity, confidentiality,
substitution attack. If the unbound template is transported integrity, availability & non-repudiation. IDPS (Intrusion
or transmitted through an accessible, unprotected medium, detection & Prevention System) contains modules to
then an appropriate means of protection must be detect intrusion, filtering intrusion, trace back of intrusion
considered. The possibility of somehow duplicating the origin, and prevention mechanism for theses intrusions.
device specific format of the biometric must also is This security system needs the robust automated auditing
considered for evaluation. This must be done through the & and intelligent reporting mechanism and robust
analysis of the device algorithms that transform the prevention techniques.
biometric sample into the template used by the device for We suggest security system using intelligent
comparison, determining the output of the algorithm and models for biometric protection approach.
then determining the likelihood of duplicating the output This system is divided into 3 sub systems :
through some logic. • Intrusion detection
The different locations which are shown in figure 1 require • Backtracking of intrusion source
some detection technique which can be used to detect the • Prevention techniques.
attack at those points. The components of the intrusion detection and prevention
The intrusion detection is a necessary supplement system are shown in figure 2.
of traditionally security protection measures such as The Rule based intelligent intrusion detection and
firewalls, data encryption, because it can provide real prevention model for biometric system contains a
protection against internal attacks, external attacks and scheduler to prepare schedule to check different logs for
abuse [4]. possible intrusions, and detectors to detect normal or
We can incrementally improve security through abnormal activity. If activity is normal then standard
the use of tools such as Intrusion Detection System (IDS). alarming and reporting would be executed. If abnormal
The IDS approach to security is based on the assumption activity is found then the rule engine checks the rule to
that a system will not be secure, but that violations of detect intrusion point and type of intrusion. The model
security policy (intrusions) can be detected by monitoring also contains an expert system to detect source of intrusion
and analyzing system behavior. [14] IShahbaz Parvez et and suggests best possible prevention technique and
al. [7] describe that, the Intrusion Detection system can be suitable controls for different intrusions. This model also
categorized into Anomaly Detection, Misuse detection & uses security audit as well as alarming and reporting
hybrid detection which is nothing but combined anomaly mechanisms. The malicious activity database is stored for
& misuse. future intrusion detection. To detect the source by
Anomaly detection is the general category of tracking, backward chaining approach is used. The rules
Intrusion Detection, which works by identifying activities are defined and are stored in the Rule engine of the
which vary from established patterns for users, or groups system. Intrusion points & type is passed to expert system.
of users. Anomaly detection typically involves the creation Expert system evaluates that data with known malicious
of knowledge bases which contain the profiles of the activity database and detects the source using backward
monitored activities. chaining approach.
Misuse Detection is a second approach to
Intrusion Detection. This technique involves the

118
VOL. 1, NO. 2, Oct 2010 E-ISSN 2218-6301
Journal of Emerging Trends in Computing and Information Sciences

©2009-2010 CIS Journal. All rights reserved.

http://www.cisjournal.org 
some automated response, such as terminating that user’s
session, block user’s account will be taken. Normally, a
rule firing will result in additional assertions being added
Activit Normal to the fact base. They, in turn, may lead to additional rule-
Detector Activity
fact bindings. This process continues until there are no
Data
more rules to be fired. [3]. Consider the intrusion scenario
in which two or more unsuccessful authentication attempts
Yes are made in a period of time shorter than it would take a
Alarming human to present biometric info in the login information at
Normal? & biometric sensor. If the rule or rules for this scenario fire,
R ti then suspicion level of specific user can get increased. The
No system may raise an alarm or report ‘freeze action’ to the
named user’s account. Account freeze would be entered
into the fact database.
Rule Known Expert system module categorizes the audit data
Engine Malicious by fact base component initially and then uses relevant
activity detection technique for different audit data. The Rules are
Figure 2: Components of Intrusion Detection Process defined using JESS. Jess is a clone of the popular expert
system shell CLIPS which rewritten entirely in Java.
Detected If biometric template stored in central database, alteration
and deletion of biometric template is not allowed to any
Intrusion user except root or system or super user for database
i t& administration purpose. The attacker modifies or deletes
the biometric template. The rule which is to be checked for
Figure 2: components of intrusion detection and unauthorized modification of biometric template is:
prevention system

After detecting source, system suggests the IF( (user is “root” || “superuser”|| “system”)
different prevention techniques. For this robust security &&( transaction_type is “Modification”) &&
system the authors use intelligent models like expert ( not(time_stamp is normaltime_stamp)))
system. THEN (Alart: “UnauthorizedModification”)

4. IDP MODEL AS RULED-BASED EXPERT Figure 3: unauthorized Modification of biometric


SYSTEM template rule

Expert systems are the most common form of AI The rule which is to be checked for unauthorized
applied today in intrusion detection system. An expert deletion of biometric template is:
system consists of a set of rules that encode the knowledge
IF( (user is “root” || “superuser”|| “system”)
of a human "expert”. These rules are used by the system to
&&( transaction_type is “Deletion”) &&
make conclusions about the security-related data from the
( not(time_stamp is normaltime_stamp)))
intrusion detection system. Expert system permits the
THEN (Alart: “Unauthorized Deletion”)
incorporation of an extensive amount of human experience
into a computer application and then utilizes that Figure 4: unauthorized Deletion of biometric template rule
knowledge to identify activities that match the defined
characteristics of misuse and attack. Expert system detects The imposter steals the biometric template of an
intrusions by encoding intrusion scenarios as a set of rules. authorized user from template storage or from other
These rules replicate the partially ordered biometric system. The rule which is to be checked for
sequence of actions that include the intrusion scenario. illegal copy of biometric template is:
Some rules may be applicable to more than one intrusion
scenario. Rule-based programming is one of the most IF (transaction_type is “Copy”)
commonly used techniques for developing expert systems.
Rule based analysis relies on sets of predefined rules that THEN (Alart “Unauthorized Copying )
can be repeatedly applied to a collection of facts and that
are provided by an administrator, automatically created by Figure5: unauthorized Copying of biometric template rule
the system or both. Facts represent conditions that describe
a certain situation in the audit records or directly from 5. CONCLUSION
system activity monitoring & rules represent heuristics
that define a set of actions to be executed in a given In spite of the various advantages of biometric
situation & describe known intrusion scenario(s) or process, it is vulnerable to attacks which can compromise
generic techniques. The rule then fires. It may cause an on it’s security objectives. Intruder can attack on different
alert to be raised for a system administrator. Alternatively, points of biometric process for example biometric

119
VOL. 1, NO. 2, Oct 2010 E-ISSN 2218-6301
Journal of Emerging Trends in Computing and Information Sciences

©2009-2010 CIS Journal. All rights reserved.

http://www.cisjournal.org 
template database, network channel, biometric device, Ruan in Journal of computers vol 4 no 12 December
template creation module etc. The model suggested in this 2009.
paper is useful to detect the intrusion in both types. The [5] Design & Implementation of rule based expert
system for fault management, by Su Myat Soe and
model also contains an expert system to detect source of Paing Paing Zaw in World academy of science ,
intrusion and suggests best possible prevention technique engineering & technology 48 2008
and suitable controls for different intrusions. This model [6] Jess in Action by Ernest Friedman -Hill
also uses security audit as well as alarming and reporting [7] A Comparative Analysis of Artificial Neural Network
mechanisms. The malicious activity database is stored for Technologies in Intrusion Detection Systems by
Shahbaz Pervez, Iftikhar Ahmad, Adeel Akram, Sami
future intrusion detection. To detect the source by Ullah Swati
tracking, backward chaining approach is used. The rules [8] Intelligent system for information security
are defined and are stored in the Rule engine of the Management: architecture & design issues by Marina
system. The intelligent model uses AI and expert system is Hentea in Informing science & information
backbone of this system. technology vol. 4 2007.
[9] Neural Network Learning based chaos by Truong
Quang Dang Khoa & Masahiro Nakagava in
6. FUTURE Work International Journal of computer & system Science
& engineering 1:2 2007
In this paper the authors design the architecture of [10] One way hash functions based on neural network
the model for intrusion detection and prevention in Shiguo Lian,Jinsheng sun, Zhiquan Wang
biometric process. In future the research will expand the [11] Password based a generalize robust security system
different methods for intrusion detection of different design using neural network By Manoj Kumar Singh
In IJCSI international Journal of computer science
vulnerabilities. The backward chaining approach of expert issue vol 4 no 2,2009
system can be used to detect source of intrusion [12] An Introduction to Intrusion Detection by Aurobindo
Also we design some rules for backtracking of source Sundaram
using backward chaining process and suggest different [13] On artificial Intelligence approaches for network
prevention techniques. Intrusion detection systems by sattar B. Sadkhan in
MASUAM Journal of computing vol. 1 issue 2 ,
September 2009.
REFERENCES [14] A Backpropagation Neural Network for Computer
Network Security Khalil Shihab
[1] Computer System Intrusion Detection: A Survey By [15] “An analysis of minutiae matching strength” by
Anita K. Jones and Robert S. Sielken N.K.Ratha , J.H. Connell and R.M. Bolle Proc
[2] Feature deduction and ensemble design of Intrusion AVBPA 2001, Third international conference on
detection system By Srilatha Chebrolu, Ajith Audio and video based biometric person
Abraham,Johnson Thomas Computer & security authentication pp 223-228 2001.
(2004) [16] Biometric Evaluation Methodology (BEM)
[3] An Intrusion detection system expert system with fact suppliment, Produced by the common criteria
based ByYuan Yuan,Dai Guanzhong Asian Journal of Biometric evaluation methodology working group.
Information Technology 6(5) 614-617, 2007 Version 1.0 August 2002.
[4] The Application of Generic Neural Network in
Network Intrusion Detection By Hua Jian, Junhu

120

You might also like