Home Research Personal  activity   Link

¡¡

Using Hidden Markov Model in

Anomaly Intrusion Detection

Content:

 

  1. Hidden Markov Model (HMM) description
  2. Using HMM model to modeling user¡¯s behavior
  3. Using Hidden Markov Model to do Intrusion Detection on SIAC log data
  4. Why HMM failed in doing anomaly detection for SIAC log data?

 

 Abstract:

¡¡

Hidden Markov Model (HMM) has been successfully used in speech recognition and some classification areas. Since Anomaly Intrusion Detection can be treated as a classification problem, we proposed some basic idea on using HMM model to modeling user's behavior. Then we tried HMM modeling on the real SIAC company log data. The results are not good, the reasons are: 1. SIAC data gives us too little information that can distinguish normal behavior and anomaly behavior; 2. Anomaly Intrusion Detection is a very hard topic. By now, it is still in academic research area without real application; 3. HMM is suitable for one-dimension sequence classification, like voice wave or spectrum. Typical anomaly detection  data are multi-dimensional sequences with continuous and discrete variables mixed together. It seems that HMM is not quite suitable for anomaly intrusion detection task.

 

1.     Hidden Markov Model Description

 

      The Hidden Markov Model is a finite set of states, each of which is associated with a (generally multidimensional) probability distribution. Transitions among the states are governed by a set of probabilities called transition probabilities. In a particular state an outcome or observation can be generated, according to the associated probability distribution. It is only the outcome, not the state visible to an external observer and therefore states are ``hidden'' to the outside. This is what the name Hidden Markov Model comes from.

 

      Traditionally, people have used Markov model to successfully model a lot of real world processes. But for some other processes, the strict assumption of Markov that next state is dependent only upon the current state will not hold, thus we need to find more generally models to deal with these processes while at the same time withhold some good properties of Markov model. These principles motivated people to generate the Hidden Markov Model. Hidden Markov Model is a double embedded stochastic process with two hierarchy levels. The upper level is a Markov process that the states are unobservable. Observation is a probabilistic function of the upper level Markov states. Different Markov states will have different observation probabilistic functions.

 

      The two hierarchy-level structure is the main idea and advantage of HMM. It can be used to model much more complicated stochastic processes than traditional Markov model. In speech recognition, HMMs have been widely used for analysis human auditory signals as speech patterns [1]. In modeling dynamic human control strategy, [2] uses HMMs to classify different human¡¯s behavior patterns. Transient sonar signals are analyzed with HMM for ocean surveillance [4]. [5] analyzes 30-electrode neuronal spike activity in a monkey¡¯s visual cortex with HMMs. [6] classifies task structure in teleoperation based on HMMs.  [7] uses HMMs to characterize sequential images of human actions.

  

2.     Using HMM model to modeling user¡¯s behavior

 

       In Intrusion Detection research, nowadays people mainly put their effort on Misuse Detection direction since it is strait forward and easy to implement. But it has the inherent disadvantage. It is difficult to gathering required information on known attack (you must check content of TCP packet and maybe not enough). The most severe disadvantage is that it possibly can¡¯t detect attempts to new and unforeseen vulnerabilities [4].

 

    So we should also do research on Anomaly Detection approach. Here we will make some effort to do user-based anomaly detection. That means we don¡¯t use our method to detect all class of intrusion actions, we only use it to detect who illegally log in as a local user or root of a system.

 

    In order to modeling normal user¡¯s behavior, we believe a good model should be able to give a reasonable explanation of the real system. Here we think Hidden Markov Model can satisfy this condition.

 

(1). First, a computer user of a system should have some kind of routine behavior, especially for long-term computer users. ---- This is what anomaly detection IDS based on.

 

(2). Each user when he use computer, he should be in some kind of state, this state correspond to what he currently mainly want to do. For example, at one time, the user wants to browse web sites for shopping or fun, at another time, he wants to make programming or play network game, etc. In each state, the user will mainly do some correspondent commands or actions to this state and this domain command type is different with other states.  So from statistic aspect, the distribution of every kind of connections or commands in each state will be different from other states.

 

(3). Transition from one state to another can be treated roughly as a modified Markov process. For the state duration time, we treat it as Gaussain distributed since human doing a task is not without remembering, so we can¡¯t use exponential distributed. On state transition decision, because human usually make decision on which task he will do next based on the previous several tasks he has done, not as Markov process that only based on current state. So we treat the transition probability with conditional transition. We can do these modifications and still use it, like what has been used in speech recognition [1].

 

  So from above three aspects, we believe HMM can be used to model computer user¡¯s behavior in a fairly understandable and accurate way.

 

2.1 Where can we use HMM in Intrusion Detection?

 

   Since HMM is used to modeling normal user¡¯s behavior, using HMM is an anomaly intrusion detection method, belong to anomaly intrusion detection systems.

 

   We don¡¯t use HMM to model outsider users who didn¡¯t login as a local user. In our approach, abnormal intrusion detection systems use HMM to model local legal user¡¯s behavior. Once a local user login, the IDS will track the user¡¯s actions until he logout. Comparing with the HMM model of this user, it can know whether this connection is abnormal or not.

 

  The system can detect two classes of intrusion. One is the abnormal usage by local users, the other is the illegal outsiders who go through some ways to have access the local user account or privilege.  For the second detection, it is based on the fact that an intruder¡¯s behavior when he use a local user¡¯s account will be significantly different from the normal user.

 

   It should be noted that it is not suitable to use Anomaly Intrusion Detection to detect every kinds of intrusion. It has the following reasons:

1.       The large amount of connections through network, for example, an on-line store maybe have thousands connection from different users at the same time, the computation overhead to check each user¡¯s behavior is unfeasible. 

 

2.       Comparing with normal user¡¯s connections, the intrusion events are rare events. So making every judgment on every user¡¯s connection will either generate a large false alarm rate or miss some intrusions.  This can be explained intuitively by information theory: every connection has great possibility to be normal connection, if you check them one by one to judge if they are normal user¡¯s connections, you spend a lot of energy to make almost sure decision, i.e., you get very little information through each judgement.

 

3.       Hacker can spoof the source IP address of intrusion connections, like Land attack, etc.  So from network audit data you may not be able to distinguish one user from another.

  

   So in IDS, we should use AD-IDS combined with Misuse Detection IDS (MD-IDS). Each one concentrates on different aspect of audit data to detect different classes of intrusion.

 

   For example, on DARPA intrusion evaluation program[2], basically, it gives 4 classes of intrusion actions. They are:

(1). Denial of Service (DoS). 

(2). User to Root (U2R).

(3). Remote to Local (R2L).

(4). Probes. 

 

   In the U2R attack, hacker starts from a user account to gain root access in local system; in the R2L attack, an attacker through network gains local access as a user of local system. In both attacks, the hacker will behave as a local user before or after he attack. The hacker¡¯s behavior will be different from normal user and can be recorded down in audit data. Like their login time, command type, each command time, etc. Thus, for these two classes of intrusion, it is suitable to use AD-IDS and we can construct HMM model to match each user¡¯s behavior. This kind of approach is feasible for:

 

(1). As stated above, HMM is well fitted and reasonable to model human behavior. We can use some mature statistic and stochastic technique in processing the large amount of audit data.

 

(2). For a local system, the normal users account number is limited and not very large. The normal user account means user who can login and get access the local system resources and can do some operations, not include the enormous online account. (For example, the users of a bank account.) Thus we can build different HMM models for different users, the computation of IDS is feasible and can be used on-line.

   

   If the user number is large, we can build each HMM model for more than two users who have similar behavior. Of cause, this type of modeling will probably has larger false alarm rate than the previous one.

 

   In the other two classes of attack, DoS and Probes, it is suitable to use Misuse Detection IDS since the attackers do not login as a local user and they can spoof their identifications. Misuse Detection IDS usually collect enough information about connections in audit data and make decision based on some kinds of knowledge, or rules. But in this area, careful hacker can change their attack behave style, or embed their action steps into normal traffic to make it more like normal connection. How to construct more comprehensive rules to deal with these is still open research problem.

 

 

2.2 How to use HMM to model user behavior?

 

   Here we try to present some descriptions of the specific hidden Markov model we will use in modeling normal user¡¯s behavior on computer network. We will not just take in the original HMM model in anomaly detection. In stead, we will make some necessarily modifications to the HMM to make it more precisely in describing user¡¯s behavior.

 

1). How to select state number?

    As we have discussed above, the state in our model represent an abstract relatively stable status of a computer user, corresponding what the user currently mainly want to do. From audit data point of view, it means each state mainly have different type of commands. For example, when a user current state is in doing programming, most commands will be edit and running C language; when he change to browse web site and deal with email, most commands will be HTTP and SMTP type.

 

   So after investigating each user¡¯s behavior (like do interview with each user), it is not difficult for a system manager to select how many state a pacific user¡¯s HMM model should have. And the system manager can also determine if he should merge two or three users into one group if they are similar behaved and decide the state number.

 

2). The critical states in HMM model¡ªinitial state & user to root state.

 

   Since every user¡¯s action will always begin after login (we do not consider if he has first accessed the local system as an outsider or not), so we add the login as an initial state to the HMM model. The initial state is the entry state, it record some information of the user, such as user name, login time, source IP address, login failure times, etc.

 

   The initial state is an important state, it is roughly the first security gate. Here we can take in some Misuse Detection idea to check the user¡¯s suspicious rate based on knowledge and rules. This is the first ¡°burglar alarm¡± trigger[1] implement in our anomaly detection.

 

   Actually we will put a lot of good misuse detection technique in our modeling and IDS, although our system is anomaly detection IDS. These two methods should be cooperated and combined tightly to make better performance.

 

    Among all the intrusion actions, a large percent of them is to illegally gain root access into a local computer system, either from a local user account (e.g., U2R) or directly from outside (e.g., R2L). So adding a burglar alarm trigger on the change to root privilege is very important [3]. We add a state correspond to this, called user-to-root state. Like in the Bottleneck Verification [3], the state record information about how root privilege obtained. Then we can match if this transition state is similar with this user¡¯s normal transition to root.  In the overall HMM model matching algorithm, we will put heavy weight on this state matching score. If a user usually log in as a supervisor, then the user-to-root state is the same as the initial state.

 

3). How to partition commands sequence in audit data into discrete states?

 

   In discrete hidden Markov model, each state will only give out one observation, then state will transfer to another state or itself. But here in our model, each state will give out a lot of observations, i.e., computer commands. So when we check the audit data with the user¡¯s HMM model, we must first to partition the audit data commands sequence into discrete groups to do state matching.

 

   We know that different state has different type of dominant commands. For example, in file manage state of a root, the file processing commands will be seen with very high frequency while in web browsing state, the http commands will be frequently used. Here we use ¡°window¡± concept in our model. For example, if in the last 20 commands sequence the dominant command type has changed from A to B, then we know that the state has transferred from state A to state B. Here we can use two type of window: time window and commands number window. The above example is a commands number window. The time window is to check commands sequence in last fixed time interval. We will do further research and experiments to see which one is better.

 

4). What information should be recorded in state?

 

   The simplest way is to just record the distribution of different commands name in a state. This is what an ordinary HMM model will do. But for intrusion detection, this is surely not enough. In order to make more accurate detection, we should use some rule-based detection technique[5] to add some features. Such as: command duration time, state duration time (exponential distributed), overall command number, number of ¡°hot actions¡± (e.g., access to system directories, creation and execution of programs, etc), number of access to ¡°access control¡± files (e.g., /etc/passwd, .rhosts), etc. How many features should be included will be determined by user¡¯s number, state number and false alarm rate.

 

2.3 How to use training data to train HMM models?

 

    In order to make more accurate HMM model for user¡¯s behavior, and also for the model to be adaptive, we must find algorithm to train HMM model by training data.

 

    From above discussion, we have known that the state number is pre-determined and need not to change in training. Since we have partitioned the audit data commands sequence into separate parts, and each part has its own domain command type, so it is easy to know which state the user transfers. It means that not like ordinary hidden Markov model, which the state is unobservable, here Markov state is almost sure observable. So the state transition probability and state duration time can be easily calculated from training data.

 

    For each state information, the distribution of commands can be easily obtained by calculated their frequency. For other parameters, such as the command duration time, hot actions number, accessing critical file number, we can treat them as Gussian distribution. This kind of approximation is reasonable and simple to implement.

 

    It should be noted that since most parameters in HMM have physical meaning, the system manager can set the initial value of these parameters in advance. So the training task will be light-burdened and more efficient.

   

2.4 How to determine if a user¡¯s behavior is anomaly by matching HMM model?

 

    Since our HMM model has modified a lot from original model, the matching criterion is not simply to calculate the probability of the observation sequence by given the model.

 

    We compute a suspicious score for the matching process. The critical state, i.e., the initial state and user-to-root state has higher weight factor while other state has lightweight factor. Each state has its own suspicious rate score, computed by summating the score of difference between each parameter with its observation value.

 

    Then we compare the suspicious score of this user with a threshold level. The threshold level is the trade off between false alarm rate and detection completeness.

 

    Now we give out the suspicious score formula of a matching process in detail. From probability theory, every parameter in HMM model is a stochastic variable. We treated all parameters as Gaussian distributed, such as state duration time, hot actions number, overall commands number, etc. This is a reasonable and simple way. So in HMM model, each parameter in a state has its own expectation value and variance value.

 

    Let  be the suspicious score of an HMM model. The model has  states, the user¡¯s behavior has been recorded in audit data. After preprocessing, the user¡¯s action sequence is divided into  parts, corresponding that he has  state transition.

 

    The formula of suspicious score is:

 : the probability of state transition from  state  to state .

: the weight factor of state  ( the user-to-root state and initial state have larger ).

: the suspicious score of state  comparing with the kth observed state.

 

    For example, if a user¡¯s observed action sequence is , then the  is:

,  is the suspicious score obtained by comparing state 2 with two different parts in user¡¯s action sequence.

 

    Suppose there are  parameters in state , each parameter  has expectation  and variance , the observed value of parameter is , then  can be calculated as:

Where  is the weight factor of parameter .

 

    The weight factor  and  can be set by system manager and be modified from training.

 

 

 

3. Using Hidden Markov Model to do Intrusion Detection on SIAC log data

 

 

3.1 Background:  SIAC log data description.

 

SIAC log data contains two parts: normal and abnormal part. In abnormal part, there are some kinds of intrusion attempts in it. Our mission is to find out where these intrusion attempts are in the abnormal data part. Normal data part can be used as training data. They are one-day log data from SIAC Company.

 

In SIAC log data, each line is a log event, one connection (like http connection) can contains one to several log events. Most of these connections are http connections, others are ftp, smap, sendmail, etc. Different connection type has very different logged information.

 

The following table summarize the amount of log events of each connection type in these log data:

 

Normal log data

Abnormal log data

Http-gw

2026074

596611

tn-gw

348

100

Smap

244

184

Sendmail

162

38

ftp-gw

102

34

Smapd

43

28

Vmunix

152

0

Syslog

75

0

Last message repeated

0

2

UDP scanned by ISS

0

10

Table 1. SIAC log data information

 

 

3.2 Procedure of using HMM dealing with SIAC log data

 

First, we must do a lot work on preprocess the SIAC source log data. In order to use HMM to do classification, the preprocessed data should contains each connections common attributes, like the timestamp, the connection types, connection lasting time, successful or not, etc. Unfortunately, it is not feasible and we have to ignore none-http connection data. The reasons for doing this is:

 

(1). The logged information of none-http connections are totally different from http connections and we can't find any common attribute except the connection timestamp and connection lasting time. If we want to consider some other information in http connection, we have to ignore none-http connections.

(2). HMM is a statistical model. But here more than 99.8% of SIAC data are http connections while all other types of connection occupy only less than 0.2%. So the none-http connections will be so rare events that they will not be exhibited by any statistical model if we combined them with those huge amount of http connections.

(3). From Table 1, we know that none-http type connections are less than 100-400, they are not enough for statistical analyze. (e.g., the "UDP scanned by ISS" event, can we say that all 10 events of it in abnormal data are all intrusion?)

 

Second, after we erased all none-http connections, we subtract 7 common attributes of each http connections. They are:

 

¡¤         Timestamp of each connection

¡¤         Connection lasting time

¡¤         Real data bytes that come in

¡¤         Real data bytes that come out

¡¤         Normal http or Secure Socket Layer(SSL) http

¡¤         Connection permitted or denied or failed

¡¤         User is normal user or unauthorized.

 

We can see that the first four attributes are continuous variables while last three attributes are logical variables.

 

We didn't include the Web server IP addresses in our data because of two reason: first, the IP addresses in our data are in digital IP form or name form, it is very difficult to convert them to each other; second, the Web IP addresses are so huge that it is too big for the following HMM process.

 

Third, in order to use HMM, we must do Vector Quantization on the above http connection attributes vector sequence data. Here the VQ method has some problem. Because the last three attributes are logical variables, so they only need 2 to 3 codebook indexes. The first four are continuous variables that have 0 to 1e6 values, so the VQ codebook indexes must be very large. Here since we use a single HMM model to model normal behavior, they must use the same codebook domain.

 

Fourth, use the normal http connection vector sequence data to train HMM model. The data is multidimensional vector sequence data so we use the method of reference [2](as my last semester term paper).

 

Last, we use the trained HMM model to process abnormal SIAC data part. We cut the abnormal data into equal length segments, each segment contains 10 http connections. Then use the trained HMM to parse each segment data to get the possibility of this segment data being generated from the normal behavior HMM model. If the possibility is lower than a threshold, then we can say that this segment data contains abnormal connections, i.e., find out where intrusions are.

 

 

4. Why HMM failed in doing anomaly detection for SIAC log data?

 

(1). In preprocess, too much information has been ignored.

 

SIAC data contains mainly two part, http connection and none-http connection, http connections occupy 651393 connection, while none-http connection only has 1328 items in normal data. Less than 0.2%, So the none-http connection can't be contained in data process because of its rare not enough for statistical approximate.

 

But the most likely intrusion is in none-http connection. It's seems not likely in http connection. So just deal with http data is not a right way.

 

Second, when I deal with http connection, too much information has been ignored. Because we must find common attribute in all http connection, so the IP addresses, the proxy IP addresses have all been ignored. The connection details in Secure Socket Layer http connection are very complicated and so are totally ignored. Such coarse pre-filter is not a right way but I have no other method to deal with it.

 

(2).  Problem of HMM---- How to deal with not comparable items in a vector sequential data?

 

The preprocessed data of SIAC http connection is a vector sequential data, but different items in it have totally different numerical domain. The last three attributes are of 1/2/3,while the first four attributes are all varied from 0 to 10e6. 

 

But if I use the same method of reference [2]( as my term paper's method). The vector items must vector quantazied into the same domain. Since items in the vector hasve totally different domain, this is not a suitable VQ method.

 

(3).  Classify vs. Intrusion Detection.

 

Original, we use HMM to do classification, that is , to decide one whole sample data belong to which one of several systems. That means, the whole sample data is generated from one system, so the whole sample data always contains characteristics of that system. We make classification by investigating the whole sample path that has enough statistical information for us to use.

 

But here, we need to classify into two classes (normal or abnormal) by dealing with just one abnormal SIAC data. That means, this sample data contains both classes data, we need to find out segments that belong to one class while other segments that belong to another class. So we must make decision by only investigating a small segment data, which may not contains rich statistical information of a class thus we will make a lot of false decisions.

 

(4). Problems of Statistical Anomaly Intrusion Detection.

 

Statistical Anomaly Intrusion Detection is based on statistic analyses, which need a large amount of sample data. It means two things: First, it requires we should have statistically enough normal behavior data for training, which sometimes is very difficult to be obtained; Second, it means in order to find if there are intrusions in a segment of test data, the data segment must also be large enough for statistical analysis. Otherwise, there will not be enough statistical information in the test data segment to get rid of stochastic error.

 

On the other hand, if we make the test data segment long enough for statistical analysis, we maybe can only determine that if there are abnormal behaviors in this large segment data but can't tell where they are inside this large segment and what kind of intrusion it is. The workload left for rule-based intrusion detection system or human experts will be very large, because no other guideline is provided for them.

 

The large false alarm rate is another problem for anomaly intrusion detection. First, it is because the normal behaviors vary a lot except for some specific regularly services; Second, the normal training data may not contains all statistical information of all normal behaviors; Third, the test data segment may not be long enough for statistical analysis.

 

Another problem is the log data. If it does not contain enough information to make any difference between normal and abnormal behavior, there will be no way to find intrusions. Of cause this is a common problem for any kind of data analysis.

 

 

 

 

References

 

[1]. L.R. Rabiner. A tutorial on Hidden Markov Models and Selected Applications in Speech Recognition", Proc. IEEE, vol. 77, No.2, 1989.

[2]. M.C. Nechyba, Y. Xu. Stochastic Similarity for Validating Human Control Strategy Models.

[3]. A.K. Ghosh, et al. Learning Program Behavior Profiles for Intrusion Detection, Proceedings of Workshop on Intrusion Detection and Networking Monitoring, USENIX association 1999.

[4]. A. Kundu, G. C. Chen and C. E. Persons. Transient Sonar Signal Classification Using Hidden Markov Models and Neural Nets. IEEE Journal of Oceanic Engineering, 19(1):87-99, 1994.

[5]. G. Radons, J. D. Becker, B. Dulfer and J. Kruger. Analysis, Classification and Coding of Multielectrode Spike Trains with Hidden Markov Models. Biological Cybernetics, 71(4):359-373,1994.

[6]. B. Hannaford, P. Lee. Hidden Markov Model Analysis of Force/Torque Information in Telemanipulation. Int. Journal of Robotics Research, 10(5): 528-539, 1991.

[7]. J. Yamato, S. Kurakakae, A. Tomono, K. Ishii. Human Action Recognition Using HMM with Category Separated Vector Quantization, Trans. Institute of Electronics, Information, and Communication Engineers D-II, J77D-II(7): 1311-1318,1994.

 

 

 

 


Appendix A:                    some results from DARPA 99 intrusion detection evaluation

 


        Fig. 1                                                                       Fig. 2                                                               Fig.3

 

Fig.1 : RST-elman neural networks [3].

Fig.2 : UCSB Ustat

Fig.3 : Gorge Mason audit data analysis and mining

 

From above figure, we can see that the RST elman networks who using BP neural network to do anormaly detection has too many false alarms 4627 for only 23 real attacks. It just displays that their method is failed. 

 

Fig 3 has 16 False alarms for 102 real attacks, but the detection rate is low, only 42%. Fig 2 seems very good. High detection rate with

 

Fig.1 is anomaly detection, the other two are all rule-based IDS.

 

 

 

Appendix B:             Sample of SIAC log data.

 

1.       two normal http connection:

May  4 04:23:34 pub http-gw[28660]: permit host=nodnsquery/162.69.5.7 use of proxy

May  4 04:23:34 pub http-gw[28660]: connecting to host catalog.entrypoint.com port 80

May  4 04:23:35 pub http-gw[28660]: exit host=nodnsquery/162.69.5.7 cmds=1

                                    in=3003 out=0 user=u nauth duration=1

-----------------------------------------------

May  4 12:34:34 pub http-gw[28400]: deny host=nodnsquery/162.69.5.7 connect to

                                    wwww.yahoo.com:80

May  4 12:34:34 pub http-gw[28400]: failed to connect to http server wwww.yahoo.com

                                  (80) reason: hostname unknown

May  4 12:34:34 pub http-gw[28400]: exit host=nodnsquery/162.69.5.7 cmds=1 in=0

                                   out=0 user=unauth duration=0 

 

2. One Secure Socket Layer(SSL) HTTP connection:

May  4 15:17:53 pub http-gw[27010]: permit host=nodnsquery/162.69.5.7 use of ssl proxy

May  4 15:17:53 pub http-gw[27010]: permit host=nodnsquery/162.69.5.7

                destination=psw.fidelity.com/4.18.81.143 port=443

May  4 15:17:53 pub http-gw[27010]: permit host=nodnsquery/162.69.5.7

                destination=psw.fidelity.com port=443

May  4 15:17:53 pub http-gw[27010]: connecting to host psw.fidelity.com port 443

May  4 15:17:53 pub http-gw[27010]: connection to host psw.fidelity.com successful

May  4 15:17:55 pub http-gw[27010]: exit host=nodnsquery/162.69.5.7 cmds=1 in=5575

                out=558 user=unauth duration=2 

 

3. Other type of connections (very rare 0.2%)

 

May  4 15:31:03 pub ftp-gw[16824]: authenticate user=cdattilo

May  4 15:31:04 pub ftp-gw[16824]: permit host=nodnsquery/162.69.4.146 connect

                to ftpprod.intdata.com

May  4 15:31:42 pub ftp-gw[16824]: exit host=nodnsquery/162.69.4.146 cmds=10

                in=879544 out=0 user=cdattilo duration=40   

------------------------------------------------

May  4 15:28:57 pub smap[13298]: Force an ip --> name lookup

May  4 15:28:57 pub smap[13298]: connect host=unknown/162.69.4.142

May  4 15:28:57 pub smap[13298]: relay logging is ON

May  4 15:28:57 pub smap[13298]: nuisance logging is ON

May  4 15:28:57 pub smap[13298]: DoSrc'spam'Chk: don't perform domain matching

May  4 15:28:57 pub smap[13298]: connection OK unknown/162.69.4.142 passed

                nuisance check

-------------------------------------------------

May  4 15:37:27 pub smapd[26892]: message-id Message-ID:

                <E09E0881FDA1D31190D900508B7141A101BD80@BAMBINO>

May  4 15:37:27 pub smapd[26891]: message-id Message-ID:

                <852568D5.0069D318.00@SIAC_NOTES_001.wisdom.siac.com>

May  4 15:37:27 pub smapd[26891]: delivered file=sma025489 pid=26896 code=0

May  4 15:37:27 pub smapd[26892]: delivered file=sma026854 pid=26893 code=0  

-------------------------------------------------

May  4 16:53:04 162.69.78.75 UDP Scan by ISS (514)

May  4 16:53:11 162.69.78.75 UDP Scan by ISS (5)

May  4 16:53:16 162.69.78.75 UDP Scan by ISS (5)

-------------------------------------------------

May  4 08:08:41 pub tn-gw[21986]: authenticate user=sviverit

May  4 08:08:47 pub tn-gw[21986]: permit host=nodnsquery/162.69.5.54

                destination=127.0.0.1 port=23

May  4 08:08:49 pub tn-gw[21986]: connected host=nodnsquery/162.69.5.54

                destination=localhost port=23

May  4 08:09:27 pub tn-gw[21986]: exit host=nodnsquery/162.69.5.54

                dest=localhost in=16305 out=106 user=sviverit duration=50 

-------------------------------------------------

May  4 15:37:27 pub sendmail[26896]: PAA26896: from=<owner-linux-390@VM.MARIST.EDU>,

                size=2159, class=0, pri=32159, nrcpts=1, 

                msgid=<852568D5.0069D318.00@SIAC_NOTES_001.wisdom.siac.com>,

                relay=uucp@localhost 

-------------------------------------------------

May  4 16:41:34 pub netacl-ssh[10877]: deny host=nodnsquery/162.69.78.75

                service=netacl-ssh

May  4 16:41:35 pub ssl-gw[10881]: deny host=nodnsquery/162.69.78.75 service=443 

May  4 16:45:31 pub cyber[362]: Cyberdaemon CYBER_BLOCKED  some dir at this

                IP listen.to  

May  4 16:47:28 pub last message repeated 7 times

May  4 16:49:24 pub pcxdpp[548]: DEBUG: no opcode