IDS And Tripwire Rayhan Mir COSC 356. What is IDS IDS - Intrusion detection system Primary function – To monitor network or host resources to detect intrusions.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Computer Security: Principles and Practice
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Managing Security and System Integrity. Value Proposition  Need for high reliability and integrity of information networks  Need for security at multiple.
1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
Using Nagios for Intrusion detection Miguel Cárdenas Montes Elio Pérez Calle Francisco Javier Rodríguez Calonge.
Web Server Administration TEC 236 Securing the Web Environment.
Chapter 7 HARDENING SERVERS.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
2004, Jei Tripwire An Intrusion Detection Tool Information Networking Security and Assurance Lab National Chung Cheng University.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Host-Based Intrusion Detection software TRIPWIRE & MD5.
Security SIG: Introduction to Tripwire Chris Harwood John Ives.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Presented by C.SARITHA ( 07R91A0568) INTRUSION DETECTION SYSYTEM.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
T RIP W IRE Karthik Mohanasundaram Wright State University.
1 Host – Based Intrusion Detection “Working of Tripwire”
Linux Networking and Security Chapter 10 File Security.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Achieving Qualities 1 Võ Đình Hiếu. Contents Architecture tactics Availability tactics Security tactics Modifiability tactics 2.
Tripwire Enterprise Server Rule Sets Vincent Fox, Doreen Meyer, and Paul Singh UC Davis, Information and Educational Technology July 25, 2006.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
CIS 290 LINUX Security Tripwire file integrity and change management tool and log monitoring.
Network Security Jiuqin Wang June, 2000 Security & Operating system To protect the system, we must take security measures at two levels: Physical level:
Chapter 12 Operating System Security Strategies The 2010 Australian Signals Directorate (ASD) lists the “Top 35 Mitigation Strategies” Over 85% of.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Overview Managing a DHCP Database Monitoring DHCP
Unix Security.  Security architecture  File system and user accounts  Integrity management  Auditing and intrusion detection.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
AIDE Timothy J. Bruce 21 September 2010 For the Portland Linux/Unix Group (PLUG) Protecting your file system.
Module 4.0: File Systems File is a contiguous logical address space.
MCSE Guide to Microsoft Windows Vista Professional Chapter 5 Managing File Systems.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
CIS 193A – Lesson 6 Intrusion Detection. CIS 193A – Lesson 6 Focus Question What Linux utilities and third party software is there for detecting an intrusion?
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Cryptography and Network Security Sixth Edition by William Stallings.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Understand Audit Policies LESSON Security Fundamentals.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Chapter 12 Operating System Security. Possible for a system to be compromised during the installation process before it can install the latest patches.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
IDS Intrusion Detection Systems
Working at a Small-to-Medium Business or ISP – Chapter 8
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Lesson 16-Windows NT Security Issues
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Security.
PLANNING A SECURE BASELINE INSTALLATION
Operating System Concepts
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

IDS And Tripwire Rayhan Mir COSC 356

What is IDS IDS - Intrusion detection system Primary function – To monitor network or host resources to detect intrusions and attacks Expands available options to manage risk from threats and vulnerabilities

Types of IDS Network-based (NIDS) Monitors network traffic Most commonly used Host-based (HIDS) Monitors activity on host machine Primarily used for critical servers Ensures the integrity of critical system files and directories

What is Tripwire Host-based IDS Software that identifies changes made to specified files and directories Detects intrusions by analyzing logs of operating systems and applications, resource utilization, and other system activity

Why use Tripwire Intrusion detection Damage assessment Track system changes Speed recovery from a break-in by reducing the number of files you must restore to repair the system.

Monitors Unix File System Permissions Inode number Number of links (i.e. inode reference count) User ID of owner Group ID of owner File type File size File is expected to grow Device number of the disk on which the inode is stored Device number of the device to which the inode points. Number of blocks allocated Access timestamp Modification timestamp Inode creation / modification timestamp CRC-32 hash of the data MD5 hash of the data SHA hash of the data HAVAL hash of the data

Monitors Windows NT/2000 File System Archive flag Read only flag Hidden flag Offline flag Temporary flag System flag Directory flag Last access time Last write time Create time File size MS-DOS 8.3 name NTFS Compressed flag Registry Maximum length of data for any value in the key Security descriptor control Size of security descriptor Last write time Registry type: key or value Type of value data Length of value data CRC-32 hash of the value data MD5 hash of the value data SHA hash of the value data HAVAL hash of the value data Type of value data

How does Tripwire work Protects Itself with El Gamal 1024-bit asymmetric cryptography Message-digest algorithms used to insure data integrity MD5 Haval SHA/SHS CRC 32 Authentication and Encryption Between Manager and Server All data transmission uses SSL (Secure Socket Layer) 168 Triple DES Encryption

How does Tripwire work Generates a baseline by taking a snapshot of specified files and directories Then compares files and directories against the baseline database And reports any modifications, additions, or deletions.

How does Tripwire work Tripwire files are signed or encrypted using site and local keys These protect the configuration, policy, database, and report files from being viewed or altered except by users who know the site and/or local passphrases. This means that, even if an intruder can obtain root access to your system, they will not be able to alter the Tripwire files to hide their tracks unless they also know the passphrases.

How does Tripwire work

Using tripwire Update the Tripwire policy file — If you need to change the list of files Tripwire monitors or how it treats integrity violations, you should update your sample policy file Build a database of critical system files to monitor based on the contents of the new, signed Tripwire policy file Run a Tripwire integrity check — Compare the newly-created Tripwire database with the actual system files, looking for missing or altered files. Examine the Tripwire report file — View the Tripwire report file using twprint to note integrity violations.

Policy File Contains comments, rules, directives, and variables to check your system Each rule in the policy file specifies the files and directories you wish to monitor Encrypted to prevent unauthorized modifications

Why change the policy file? to actually change the files Tripwire records in its database modify the severity in which violations are reported Changes are made to a text policy file (twpol.txt) which is then is encrypted and becomes active (tw.pol)

Using tripwire for windows Update the Tripwire policy file — Change twpol.txt then load new policy twadmin --create-polfile "C:\Program Files\Tripwire\TFS\Policy\twpol.txt "

Initialize and Check database The database file is a baseline snapshot of the system in a known secure state. Tripwire compares this baseline against the current system to determine what changes have occurred. This comparison is called an integrity check.

Using tripwire for windows Build a database of critical system files to monitor - tripwire-- init --verbose Messages are printed when specific objects are not found

Using tripwire for windows Run a Tripwire integrity check — tripwire –check Examine the Tripwire report

Using tripwire for windows Examine the report Identify any threats and take action

Summary Tripwire used for Intrusion detection Damage assessment Identifies changes, regardless of source or intent Expands options to manage risk from threats and vulnerabilities

How Does Tripwire Work? SSL Tripwire Manager Syslog SNMP 1. Take digital snapshot of existing files 2. Take a second digital snapshot later in time to compare 3. Any integrity violations are reported in various formats

Other programs Intact Veracity Data Sentinel Microsoft SFC - system file checker

Sources Text Book