NETWORKS Fall 2010.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Firewalls and Intrusion Detection Systems
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Host Intrusion Prevention Systems & Beyond
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
INTRUSION DETECTION SYSTEM
Security Guidelines and Management
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
COEN 252 Computer Forensics
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
BUSINESS B1 Information Security.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
1 Intrusion Detection “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking resources.”
Intrusion Detection System
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
Security Methods and Practice CET4884
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Lesson 8 Intrusion Detection Systems
CompTIA Security+ Study Guide (SY0-401)
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Intrusion Control.
Computer Data Security & Privacy
Security Methods and Practice CET4884
Domain 4 – Communication and Network Security
Outline Introduction Characteristics of intrusion detection systems
Principles of Computer Security
CompTIA Security+ Study Guide (SY0-401)
6.6 Firewalls Packet Filter (=filtering router)
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
NET 412 Network Security protocols
NET 412 Network Security protocols
Intrusion Prevention Systems
Intrusion Detection Systems
Lecture 8: Intrusion Detection
Intrusion Detection system
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Session 20 INST 346 Technologies, Infrastructure and Architecture
6. Application Software Security
Lecture 7: Intrusion Detection
Presentation transcript:

NETWORKS Fall 2010

Review – IDS What is Intrusion Detection ? The process of monitoring events occurring in a computer system or network and analyzing them for signs of intrusions Need for Intrusion Detection Systems Detect attacks not prevented by other security systems Detect and deal with Preambles to attacks Document existing threat to an organization Act as quality control for secure design and administration

Review – Why Not Firewalls? Need real time detection of intrusion Not all access to internet is through Firewalls Not all threats originate outside Firewalls Firewalls are subject to attack themselves IDSs and Firewalls should compliment each other

OUTLINE Intrusion Detection Systems

Intrusion Detection Systems

Intrusion Detection Capabilities Scan packet contents for classified or proprietary data Scan traffic for attack signatures Terminate suspicious TCP sessions Update firewall rules or router filters to deny all access from suspicious sources Alert administrators about violations/attacks Provide database of attacks and possible countermeasures

IDS Limitations Monitor traffic across routers, bridges or switches Find classified or proprietary information in encrypted transmissions Perform statistical analysis of traffic over time (not yet, anyway) Replace diligent, human review of logs/traces

Burglar Alarm 1 Based on site policy, alert administrator to policy violations Detect events that may not be “security” events which may indicate a policy violation New routers New subnets New web servers

Burglar Alarm 2 A burglar alarm is a misuse detection system that is carefully targeted You may not care about people port-scanning your firewall from the outside You may care profoundly about people port-scanning your mainframe from the inside Set up a misuse detector to watch for misuses violating site policy

Burglar Alarm 3 The ideal burglar alarm is situated so that it fires when an attacker performs an ordinary action, e.g., Mapping the network Scanning the network After successfully breaking in: Adding a userid Zapping a log file Making a program setuid root Starting a sniffer

Burglar Alarm Construction Burglar alarms can be built using firewall/router logs, e.g., Watch for attempts to access non-existent hosts on your network, which could indicate network scanning or mapping activity Send an email or other alert to the administrator Refer to the following URL for numerous examples of host-based burglar alarms: http://www.blackhat.com/presentations/bh-usa-99/MJR/burglar-alarms.ppt

Reporting Suspicious Hosts Always follow official channels first Don’t email info if you’re not reasonably sure that the attacker doesn’t “own” the mail host. Include dates and times Include log information if you can (may want to edit IP addresses to protect the innocent)

A Simple IDS Model A simple model of an Intrusion Detection system looks like CPU IDS monitor respond report IDS Control

IDS Components Audit Data Preprocessor Audit Records Activity Data system activities are observable Detection Models Detection Engine Alarms normal and intrusive activities have distinct evidence Decision Table Decision Engine Action/Report

Why use an IDS? Why would we want to do intrusion detection? Why not just keep intruders out? Stallings' list. Second line of defense. Even the best intrusion detection system can fail. Many intruders are insiders. Ejection. Catch intruders before they can do much damage. Deterrent. Intruders may stay out if they think they'll be caught. Educational. Learn how intruders do what they do and use this to improve both prevention and detection techniques.

Security principles: layered mechanisms Second Line of Defense Since Firewalls fail, detection is our second line of defense Prevent Detect React/ Survive Security principles: layered mechanisms

Fundamentals 1 What methods are used? Audit Trail Processing On the fly processing Profiles of normal behavior Signatures of abnormal behavior Parameter Pattern Matching

Processing Engine (Algorithms) Fundamentals 2 How is it organized? What are the basic components and how are they interconnected To target system To other IDS GUI/Display Sensor Audit/ Archive System Management Processing Engine (Algorithms) Knowledge Base Alarms To operators

Fundamentals 3 What is an intrusion? Is an attack the same thing as an intrusion? What actions constitute an intrusion? How is the identity of an intruder obtained? How is information correlated? Single or multiple packets Real time vs after the fact In-band and all-band

Fundamentals 4 How can an intruder be trapped? Can the intruder be diverted to a special trap system? What methods are available for incident response?

IDS Methods While there are automatic intrusion detections tools available it worth while to note that nearly all incidents in which an intruder has been caught in real time have involved manual intrusion detection methods. However there are five specific methods of practical intrusion detection. Audit Trail Processing On-the-fly processing Profiles of Normal Behavior Signature of Abnormal Behavior Parameter Pattern Matching

Audit Trail Processing Activity on audit probes is logged and stored in an audit trail The audit probes are selected by system administrators based on their view of what is a security critical event Logins / file opens / . . . GOAL: have a good set of probes that cover the threat environment PROBLEM: system performance decreases as the number of probes increase

Sample Audit Trail An audit record might look like: Example: <source IP addr, destination IP addr, source port, destination port, protocol, time session initiated, session initiation direction, success or failure of session> some external IP address Example: telnet output port <in, out, 3000, 23, TCP, 13:04, outbound, success> some internal IP address some user port

YES Example Audit Record Below is an example of an audit record: <in, in, 4050, 80, TCP, 07:36:04, inbound, success> <out(X), gw, 6025, 23, TCP, 07:51:12, inbound, failure> <out(X), gw, 6025, 23, TCP, 07:51:55, inbound, failure> <out(X), gw, 6025, 23, TCP, 07:52:17, inbound, failure> <out(X), gw, 6025, 23, TCP, 07:52:58, inbound, failure> <out(X), in, 3000, 23, TCP, 13:04:22, inbound, success> <out(Y), gw, 5000, 23, TCP, 23:54:22, inbound, success> Your intranet gateway Is there anything suspicious going on?

Audit Trail Analysis 1 Consider the first entry: <in, in, 4050, 80, TCP, 07:36:04, inbound, success> An inbound session should have a out source IP address It appears that some intruder is changing the source IP address in an IP gateway spoof attack

Audit Trail Analysis 2 Consider the next few entries: <out(X), gw, 6025, 23, TCP, 07:51:12, inbound, failure> <out(X), gw, 6025, 23, TCP, 07:51:55, inbound, failure> <out(X), gw, 6025, 23, TCP, 07:52:17, inbound, failure> <out(X), gw, 6025, 23, TCP, 07:52:58, inbound, failure> Someone from out address X is trying to telnet to the gateway

Consider the 6th entry: Audit Trail Analysis 3 <out(X), in, 3000, 23, TCP, 13:04:22, inbound, success> The previously suspicious IP address X manages to telnet to a internal address

Audit Trail Analysis 4 Consider the final entry: <out(Y), gw, 5000, 23, TCP, 23:54:22, inbound, success> This is suspicious because of the time (around midnight)

General Principles Things to look for in an Audit record: Users logging in at odd hours Unexplained reboots or changes to the system clock Unusual error messages from mailers, daemons or other servers Failed login attempts with bad passwords Unauthorized use of the su command Users logging in from unfamiliar sites on the network