Identification and Authorization

Slides:



Advertisements
Similar presentations
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Advertisements

Lecture 6 User Authentication (cont)
Authentication & Kerberos
Cryptography and Network Security Chapter 15 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Cryptography and Network Security Chapter 20 Intruders
Intrusion Detection Systems and Practices
Cryptography and Network Security Chapter 18 Fourth Edition by William Stallings.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 11 Intrusion Detection (cont)
Cryptography and Network Security Chapter 20 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 18 Fourth Edition by William Stallings.
1 Chapter 9 Intruders. 2 Chapter 9 - Intruders significant issue for networked systems is hostile or unwanted access either via network or local can identify.
Chapter 18 Intruders.
Chapter 9 INTRUDERS MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
BUSINESS B1 Information Security.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Topic 5: Basic Security.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Chapter 9 Intruders.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Role Of Network IDS in Network Perimeter Defense.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Computer and Network Security
Chapter 9 Intruders.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Intruders By Dr. Shadi Masadeh.
Network Security Essentials
Chapter One: Mastering the Basics of Security
Challenge/Response Authentication
Cryptography and Network Security
Cryptographic Hash Function
Security Methods and Practice CET4884
Cryptography and Network Security Chapter 18
Cryptography and Network Security
Outline Introduction Characteristics of intrusion detection systems
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
The Security Problem Security must consider external environment of the system, and protect it from: unauthorized access. malicious modification or destruction.
Firewalls.
Information and Network Security
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
NET 412 Network Security protocols
NET 412 Network Security protocols
Network Security – Kerberos
Intrusion Prevention Systems
Cryptography and Network Security
User Authentication Lecture 6.
Chapter 9 Intruders.
Lecture 8: Intrusion Detection
Cryptography and Network Security Chapter 20 Intruders
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Cryptography and Network Security Chapter 18
Cryptography and Network Security Chapter 18
Computer Security Authentication
New York Institute of Technology- Amman Campus
Operating System Concepts
Computer Security Protection in general purpose Operating Systems
Operating Systems Concepts
Lecture 7: Intrusion Detection
Presentation transcript:

Identification and Authorization Describes a method by which a subject claims to have a specific identity It is the assertion of unique identity for a person or system It is the critical first step in applying access control Can be provided by the use of username or account number etc Authentication Describes a method to validate a subject claims of who it claims it to be (validity of identity) Authentication involves two step process; entering the public information (identification) and then entering the private information It establishes trust between the user and the system for the allocation of privileges Providing access to an authenticated resource based on its rights Identification and Authentication are “All or nothing” aspects of access control, in contrast authorization occupies a wide range of variations

User Authentication fundamental security building block basis of access control & user accountability is the process of verifying an identity claimed by or for a system entity has two steps: identification - specify identifier verification - bind entity (person) and identifier distinct from message authentication This chapter examines some of the authentication functions that have been developed to support network-based use authentication. In most computer security contexts, user authentication is the fundamental building block and the primary line of defense. User authentication is the basis for most types of access control and for user accountability. RFC 2828 defines user authentication as the process of verifying an identity claimed by or for a system entity. An authentication process consists of two steps: Identification step: Presenting an identifier to the security system. (Identifiers should be assigned carefully, because authenticated identities are the basis for other security services, such as access control service.) Verification step: Presenting or generating authentication information that corroborates the binding between the entity and the identifier.” In essence, identification is the means by which a user provides a claimed identity to the system; user authentication is the means of establishing the validity of the claim. Note that user authentication is distinct from message authentication.

Means of User Authentication four means of authenticating user's identity based one something the individual knows - e.g. password, PIN possesses - e.g. key, token, smartcard is (static biometrics) - e.g. fingerprint, retina does (dynamic biometrics) - e.g. voice, sign can use alone or combined all can provide user authentication all have issues There are four general means of authenticating a user's identity, which can be used alone or in combination: • Something the individual knows: Examples includes a password, a personal identification number (PIN), or answers to a prearranged set of questions. • Something the individual possesses: Examples include electronic keycards, smart cards, and physical keys. This type of authenticator is referred to as a token. • Something the individual is (static biometrics): Examples include recognition by fingerprint, retina, and face. • Something the individual does (dynamic biometrics): Examples include recognition by voice pattern, handwriting characteristics, and typing rhythm. All of these methods, properly implemented and used, can provide secure user authentication. However, each method has problems. An adversary may be able to guess or steal a password. Similarly, an adversary may be able to forge or steal a token. A user may forget a password or lose a token. Further, there is a significant administrative overhead for managing password and token information on systems and securing such information on systems. With respect to biometric authenticators, there are a variety of problems, including dealing with false positives and false negatives, user acceptance, cost, and convenience.

Authentication Protocols used to convince parties of each others identity and to exchange session keys may be one-way or mutual key issues are confidentiality – to protect session keys timeliness – to prevent replay attacks An important application area is that of mutual authentication protocols. Such protocols enable communicating parties to satisfy themselves mutually about each other's identity and to exchange session keys. There, the focus was key distribution. We return to this topic here to consider the wider implications of authentication. Central to the problem of authenticated key exchange are two issues: confidentiality and timeliness. To prevent masquerade and to prevent compromise of session keys, essential identification and session key information must be communicated in encrypted form. This requires the prior existence of secret or public keys that can be used for this purpose. The second issue, timeliness, is important because of the threat of message replays.

Replay Attacks where a valid signed message is copied and later resent simple replay repetition that can be logged repetition that cannot be detected backward replay without modification countermeasures include use of sequence numbers (generally impractical) timestamps (needs synchronized clocks) challenge/response (using unique nonce) Replay Attacks are where a valid signed message is copied and later resent. Such replays, at worst, could allow an opponent to compromise a session key or successfully impersonate another party. At minimum, a successful replay can disrupt operations by presenting parties with messages that appear genuine but are not. [GONG93] lists the examples above of replay attacks. Possible countermeasures include the use of: • sequence numbers (generally impractical since must remember last number used with every communicating party) • timestamps (needs synchronized clocks amongst all parties involved, which can be problematic) • challenge/response (using unique, random, unpredictable nonce, but not suitable for connectionless applications because of handshake overhead)

One-Way Authentication required when sender & receiver are not in communications at same time (eg. email) have header in clear so can be delivered by email system may want contents of body protected & sender authenticated One application for which encryption is growing in popularity is electronic mail (e-mail). The very nature of electronic mail, and its chief benefit, is that it is not necessary for the sender and receiver to be online at the same time. Instead, the e-mail message is forwarded to the receiver’s electronic mailbox, where it is buffered until the receiver is available to read it. The "envelope" or header of the e-mail message must be in the clear, so that the message can be handled by the store-and-forward e-mail protocol, such as the Simple Mail Transfer Protocol (SMTP) or X.400. However, it is often desirable that the mail-handling protocol not require access to the plaintext form of the message, because that would require trusting the mail- handling mechanism. Accordingly, the e-mail message should be encrypted such that the mail- handling system is not in possession of the decryption key. A second requirement is that of authentication. Typically, the recipient wants some assurance that the message is from the alleged sender.

One-Way Authentication have public-key approaches for email encryption of message for confidentiality, authentication, or both must know public keys using costly public-key alg on long message for confidentiality encrypt message with one-time secret key, public-key encrypted for authentication use a digital signature may need to protect by encrypting signature use digital certificate to supply public key We have already presented public-key encryption approaches that are suited to electronic mail, including the straightforward encryption of the entire message for confidentiality, authentication or both These approaches require that either the sender know the recipient's public key (confidentiality) or the recipient know the sender's public key (authentication) or both (confidentiality plus authentication). In addition, the public-key algorithm must be applied once or twice to what may be a long message. If confidentiality is the primary concern, then better to encrypt the message with a one-time secret key, and also encrypt this one-time key with B's public key. If authentication is the primary concern, then a digital signature may suffice (but could be replaced by an opponent). To counter such a scheme, both the message and signature can be encrypted with the recipient's public key. The latter two schemes require that B know A's public key and be convinced that it is timely. An effective way to provide this assurance is the digital certificate.

Using Symmetric Encryption as discussed previously can use a two-level hierarchy of keys usually with a trusted Key Distribution Center (KDC) each party shares own master key with KDC KDC generates session keys used for connections between parties master keys used to distribute these to them A two-level hierarchy of symmetric encryption keys can be used to provide confidentiality for communication in a distributed environment. Usually involves the use of a trusted key distribution center (KDC). Each party in the network shares a secret master key with the KDC. The KDC is responsible for generating session keys, and for distributing those keys to the parties involved, using the master keys to protect these session keys.

Kerberos -Authentication Kerberos is a de facto authentication standard for heterogeneous networks and used in distributed environments Its an authentication protocol It works on a client/server model Uses Symmetric key algorithm It has 4 elements necessary for enterprise access control Transparency, reliability, scalability, security It provides end-to-end security Most Kerberos authentications work with shared secret keys, it eliminates the need to share the passwords over the network

Kerberos provides centralised private-key third-party authentication in a distributed network allows users access to services distributed through network without needing to trust all workstations rather all trust a central authentication server two versions in use: 4 & 5 Kerberos is an authentication service developed as part of Project Athena at MIT, and is one of the best known and most widely implemented trusted third party key distribution systems. Kerberos provides a centralized authentication server whose function is to authenticate users to servers and servers to users. Unlike most other authentication schemes, Kerberos relies exclusively on symmetric encryption, making no use of public-key encryption. Two versions of Kerberos are in common use: v4 & v5.

Remote User Authentication use of public-key encryption for session key distribution assumes both parties have other’s public keys may not be practical have Denning protocol using timestamps uses central authentication server (AS) to provide public-key certificates requires synchronized clocks we presented one approach to the use of public-key encryption for the purpose of session key distribution This protocol assumes that each of the two parties is in possession of the current public key of the other. It may not be practical to require this assumption. A protocol using timestamps is provided that uses a central system, referred to as an authentication server (AS), because it is not actually responsible for secret key distribution. Rather, the AS provides public-key certificates. The session key is chosen and encrypted by A; hence, there is no risk of exposure by the AS. The timestamps protect against replays of compromised keys. See text for details. This protocol is compact but, as before, requires synchronization of clocks. Another approach, proposed by Woo and Lam [WOO92a], makes use of nonces. Note the authors themselves spotted a flaw in it and submitted a revised version of the algorithm in [WOO92b]. In both this example and the protocols described earlier, protocols that appeared secure were revised after additional analysis. These examples highlight the difficulty of getting things right in the area of authentication.

Federated Identity management Process Cross-certification model Each entity must authenticate with every other entity is worthy of its trust The biggest problem is the scalability issue when more entities start participating Trusted third party model (bridge model) Each of the participating entity subscribes to the standard and practices of a third-party that manages the verification and due diligence process for all participating companies The third-party acts a bridge between the participating organizations for identity verification purposes. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.

Federated Identity Management use of common identity management scheme across multiple enterprises & numerous applications supporting many thousands, even millions of users principal elements are: authentication, authorization, accounting, provisioning, workflow automation, delegated administration, password synchronization, self-service password reset, federation Kerberos contains many of these elements Federated identity management is a relatively new concept dealing with the use of a common identity management scheme across multiple enterprises and numerous applications and supporting many thousands, even millions of users. Identity management is a centralized, automated approach to provide enterprise-wide access to resources by employees and other authorized individuals, defining an identity for each user (human or process), associating attributes with the identity, and enforcing a means by which a user can verify identity. Its principal elements are: • Authentication: confirmating user corresponds to the user name provided. • Authorization: granting access to services/resources given user authentication. • Accounting: process for logging access and authorization. • Provisioning: enrollment of users in the system. • Workflow automation: movement of data in a business process. • Delegated administration: use of role-based access control to grant permissions. • Password synchronization: Creating a process for single sign-on (SSO) or reduced sign-on (RSO). • Self-service password reset: enable user to modify their password • Federation: process where authentication and permission will be passed on from one system to another, usually across multiple enterprises, reducing the number of authentications needed by the user. Kerberos contains a number of the elements of an identity management system.

Identity Management Figure illustrates entities and data flows in a generic identity management architecture. A principal is an identity holder. Typically, this is a human user that seeks access to resources and services on the network. User devices, agent processes, and server systems may also function as principals. Principals authenticate themselves to an identity provider. The identity provider associates authentication information with a principal, as well as attributes and one or more identifiers. Increasingly, digital identities incorporate attributes other than simply an identifier and authentication information (such as passwords and biometric information). An attribute service manages the creation and maintenance of such attributes. For example, a user needs to provide a shipping address each time an order is placed at a new Web merchant, and this information needs to be revised when the user moves. Identity management enables the user to provide this information once, so that it is maintained in a single place and released to data consumers in accordance with authorization and privacy policies. Users may create some of the attributes to be associated with their digital identity, such as address. Administrators may also assign attributes to users, such as roles, access permissions, and employee information. Data consumers are entities that obtain and employ data maintained and provided by identity and attribute providers, often to support authorization decisions and to collect audit information. For example, a database server or file server is a data consumer that needs a client's credentials so as to know what access to provide to that client.

Identity Federation Identity federation is, in essence, an extension of identity management to multiple security domains. Federated identity management refers to the agreements, standards, and technologies that enable the portability of identities, identity attributes, and entitlements across multiple enterprises and numerous applications and supporting many thousands, even millions, of users. Stallings Figure illustrates entities and data flows in a generic federated identity management architecture. The identity provider acquires attribute information through dialogue and protocol exchanges with users and administrators. Identity management enables the user to provide this information once, so that it is maintained in a single place and released to data consumers in accordance with authorization and privacy policies. Service providers are entities that obtain and employ data maintained and provided by identity providers, often to support authorization decisions and to collect audit information. A service provider can be in the same domain as the user and the identity provider. The power of this approach is for federated identity management, in which the service provider is in a different domain.

Network Security and IDS THREAT TO NETWORK SECURITY A significant security problem for networked system is, or at least unwanted, trespass by users or software. User trespass can take form of unauthorized logon to a machine or, in case of an authorized user, acquisition of privileges or performance of actions beyond those that have been authorized. Software trespass can take form of a virus, worm or Trojan horse.

Intruders significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders: masquerader misfeasor clandestine user varying levels of competence A significant security problem for networked systems is hostile, or at least unwanted, trespass being unauthorized login or use of a system, by local or remote users; or by software such as a virus, worm, or Trojan horse. One of the two most publicized threats to security is the intruder (or hacker or cracker), which Anderson identified three classes of: • Masquerader: An individual who is not authorized to use the computer (outsider) • Misfeasor: A legitimate user who accesses unauthorized data, programs, or resources (insider) • Clandestine user: An individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection (either) Intruder attacks range from the benign (simply exploring net to see what is there); to the serious (who attempt to read privileged data, perform unauthorized modifications, or disrupt system)

Types of Intruders In an early study of intrusion, Anderson identified three classes of intruders: Masqueraders: An individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account. Misfeasor: A legitimate user who accesses data, programs or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges. Clandestine user: An individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit actions.

What is an intrusion? Any set of actions that attempt to compromise the confidentiality, integrity, or availability of a computer resource

Consequences of Intrusion Intruder attacks range from benign to the serious. At the benign end of the scale, there are many people who simply wish to explore internet and what is out there. At the serious end, intruder may attempt following: Read privileged data. Perform unauthorized modification to data. Disrupt the system settings.

What is Intrusion detection system? Any unauthorized access, not permitted attempt to access/damage or malicious use of information resources Intrusion Detection Detection of break-ins and break-in attempts via automated software systems Intrusion Detection Systems(IDS) Defense systems, which detect and possibly prevent intrusion detection activities

Why IDS ? Straight Forward Reason to protect data and system integrity. Fact : can not be done with ordinary password and file security Misconception : A network firewall will keep the bad guys off my network, right? My anti-virus will recognize and get rid of any virus I might catch, right? And my password-protected access control will stop the office cleaner trawling through my network after I've gone home, right? So that's it – “I'm fully protected”

Here is the Reality Anti-virus systems are only good at detecting viruses they already know about Passwords can be hacked or stolen or changed by other Firewalls DO NOT recognize attacks and block them Simply a fence around your network no capacity to detect someone is trying to break-in(digging a hole underneath it) Can’t determine whether somebody coming through gate is allowed to enter or not. Roughly 80% of financial losses occur hacking from inside the network “BEWARE OF INTERNAL INTRUDERS” Example : In April 1999, many sites were hacked via a bug in ColdFusion. All had firewalls to block other access except port 80. But it was the Web Server that was hacked.

Intrusion Detection Systems (IDS) Intrusion detection is the process of identifying and responding to malicious activity targeted at resources IDS is a system designed to test/analyze network system traffic/events against a given set of parameters and alert/capture data when these thresholds are met. IDS uses collected information and predefined knowledge-based system to reason about the possibility of an intrusion. IDS also provides services to cop with intrusion such as giving alarms, activating programs to try to deal with intrusion, etc.

Functions of IDS An IDS detects attacks as soon as possible and takes appropriate action. An IDS does not usually take preventive measures when an attack is detected. It is a reactive rather than a pro-active agent. It plays a role of informant rather than a police officer.

Principles of Intrusion Detection Systems An IDS must run unattended for extended periods of time The IDS must stay active and secure The IDS must be able to recognize unusual activity The IDS must operate without unduly affecting the system’s activity The IDS must be configurable

Typical intrusion scenario -Find as much as info. As possible -who is lookup and DNS Zone transfers -Normal browsing ; gather important info. Information Gathering -ping sweeps, port scanning -web server vulnerabilities -version of application/services Further Information Gathering -start trying out different attacks -try to find misconfigured running services -Passive Attack / Active Attack Attack ! -install own backdoors and delete log files -replace existing services with own Trojan horses that have backdoor passwords or create own user accounts Successful Intrusion Steal confidential information Use compromised host to lunch further attacks - Change the web-site for FUN Fun and Profit

Intrusion Techniques aim to gain access and/or increase privileges on a system basic attack methodology target acquisition and information gathering initial access privilege escalation covering tracks key goal often is to acquire passwords so then exercise access rights of owner Knowing the standard attack methods is a key element in limiting your vulnerability. The basic aim is to gain access and/or increase privileges on some system. The basic attack methodology list is taken from McClure et al "Hacking Exposed". A basic technique for gaining access is to acquire a user (preferably administrator) password, so the attacker can login and exercise all the access rights of the account owner.

Password Guessing one of the most common attacks attacker knows a login (from email/web page etc) then attempts to guess password for it defaults, short passwords, common word searches user info (variations on names, birthday, phone, common words/interests) exhaustively searching all possible passwords check by login or against stolen password file success depends on password chosen by user surveys show many users choose poorly Password guessing is a common attack. If an attacker has obtained a poorly protected password file, then can mount attack off-line, so target is unaware of its progress. Some O/S take less care than others with their password files. If have to actually attempt to login to check guesses, then system should detect an abnormal number of failed logins, and hence trigger appropriate countermeasures by admins/security. Likelihood of success depends very much on how well the passwords are chosen. Unfortunately, users often don’t choose well

Password Capture another attack involves password capture watching over shoulder as password is entered using a trojan horse program to collect monitoring an insecure network login eg. telnet, FTP, web, email extracting recorded info after successful login (web history/cache, last number dialed etc) using valid login/password can impersonate user users need to be educated to use suitable precautions/countermeasures There is also a range of ways of "capturing" a login/password pair, from the low-tech looking over the shoulder, to the use of Trojan Horse programs (eg. game program or nifty utility with a covert function as well as the overt behaviour), to sophisticated network monitoring tools, or extracting recorded info after a successful login - say from web history or cache, or last number dialed memory on phones etc. Need to educate users to be aware of whose around, to check they really are interacting with the computer system (trusted path), to beware of unknown source s/w, to use secure network connections (HTTPS, SSH, SSL), to flush browser/phone histories after use etc.

Intrusion Detection inevitably will have security failures so need also to detect intrusions so can block if detected quickly act as deterrent collect info to improve security assume intruder will behave differently to a legitimate user but will have imperfect distinction between intruder and user Inevitably, the best intrusion prevention system will fail. A system’s second line of defense is intrusion detection, which aims to detect intrusions so can: block access & minimize damage if detected quickly; act as deterrent given chance of being caught; or can collect info on intruders to improve future security. Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified. This is imperfect at best.

Approaches to Intrusion Detection statistical anomaly detection rule-based detection Audit Records Can identify the following approaches to intrusion detection: Statistical anomaly detection: collect data relating to the behavior of legitimate users, then use statistical tests to determine with a high level of confidence whether new behavior is legitimate user behavior or not. a. Threshold detection: define thresholds, independent of user, for the frequency of occurrence of events. b. Profile based: develop profile of activity of each user and use to detect changes in the behavior 2. Rule-based detection: attempt to define a set of rules used to decide if given behavior is an intruder a. Anomaly detection: rules detect deviation from previous usage patterns b. Penetration identification: expert system approach that searches for suspicious behavior

Audit Records fundamental tool for intrusion detection native audit records part of all common multi-user O/S already present for use may not have info wanted in desired form detection-specific audit records created specifically to collect wanted info at cost of additional overhead on system A fundamental tool for intrusion detection is the audit record. Some record of ongoing activity by users must be maintained as input to an intrusion detection system. Basically,two plans are used: • Native audit records: Virtually all main O/S’s include accounting software that collects information on user activity, advantage is its already there, disadvantage is it may not contain the needed information • Detection-specific audit records: implement collection facility to generates custom audit records with desired info, advantage is it can be vendor independent and portable, disadvantage is extra overhead involved

Statistical Anomaly Detection threshold detection count occurrences of specific event over time if exceed reasonable value assume intrusion alone is a crude & ineffective detector profile based characterize past behavior of users detect significant deviations from this profile usually multi-parameter Statistical anomaly detection techniques cover threshold detection and profile-based systems. Threshold detection involves counting no occurrences of a specific event type over an interval of time, if count surpasses a reasonable number, then intrusion is assumed. By itself, is a crude and ineffective detector of even moderately sophisticated attacks. Profile-based anomaly detection focuses on characterizing past behavior of users or groups, and then detecting significant deviations. A profile may consist of a set of parameters, so that deviation on just a single parameter may not be sufficient in itself to signal an alert. Foundation of this approach is analysis of audit records.

Audit Record Analysis foundation of statistical approaches analyze records to get metrics over time counter, gauge, interval timer, resource use use various tests on these to determine if current behavior is acceptable mean & standard deviation, multivariate, markov process, time series, operational key advantage is no prior knowledge used An analysis of audit records over a period of time can be used to determine the activity profile of the average user. Then current audit records are used as input to detect intrusion, by analyzing incoming audit records to determine deviation from average behavior. Examples of metrics that are useful for profile-based intrusion detection are: counter, gauge, interval timer, resource use. Given these general metrics, various tests can be performed to determine whether current activity fits within acceptable limits, such as: Mean and standard deviation, Multivariate, Markov process, Time series, Operational; as discussed in the text. Stallings Table18.1 shows various measures considered or tested for the Stanford Research Institute (SRI) intrusion detection system. The main advantage of the use of statistical profiles is that a prior knowledge of security flaws is not required. Thus it should be readily portable among a variety of systems.

Rule-Based Intrusion Detection observe events on system & apply rules to decide if activity is suspicious or not rule-based anomaly detection analyze historical audit records to identify usage patterns & auto-generate rules for them then observe current behavior & match against rules to see if conforms like statistical anomaly detection does not require prior knowledge of security flaws Rule-based techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious. Can characterize approaches as either anomaly detection or penetration identification, although there is overlap. Rule-based anomaly detection is similar in terms of its approach and strengths to statistical anomaly detection. Historical audit records are analyzed to identify usage patterns and to automatically generate rules that describe those patterns. Current behavior is then observed and matched against the set of rules to see if it conforms to any historically observed pattern of behavior. As with statistical anomaly detection, rule-based anomaly detection does not require knowledge of security vulnerabilities within the system.

Rule-Based Intrusion Detection rule-based penetration identification uses expert systems technology with rules identifying known penetration, weakness patterns, or suspicious behavior compare audit records or states against rules rules usually machine & O/S specific rules are generated by experts who interview & codify knowledge of security admins quality depends on how well this is done Rule-based penetration identification takes a very different approach based on expert system technology. It uses rules for identifying known penetrations or penetrations that would exploit known weaknesses, or identify suspicious behavior. The rules used are specific to machine and operating system. The rules are generated by “experts”, from interviews of system administrators and security analysts. Thus the strength of the approach depends on the skill of those involved in setting up the rules.

Base-Rate Fallacy practically an intrusion detection system needs to detect a substantial percentage of intrusions with few false alarms if too few intrusions detected -> false security if too many false alarms -> ignore / waste time this is very hard to do existing systems seem not to have a good record To be of practical use, an intrusion detection system should detect a substantial percentage of intrusions while keeping the false alarm rate at an acceptable level. If only a modest percentage of actual intrusions are detected, the system provides a false sense of security. On the other hand, if the system frequently triggers an alert when there is no intrusion (a false alarm), then either system managers will begin to ignore the alarms, or much time will be wasted analyzing the false alarms. Unfortunately, because of the nature of the probabilities involved, it is very difficult to meet the standard of high rate of detections with a low rate of false alarms. A study of existing intrusion detection systems indicated that current systems have not overcome the problem of the base-rate fallacy.

Distributed Intrusion Detection traditional focus is on single systems but typically have networked systems more effective defense has these working together to detect intrusions issues dealing with varying audit record formats integrity & confidentiality of networked data centralized or decentralized architecture Until recently, work on intrusion detection systems focused on single-system standalone facilities. The typical organization, however, needs to defend a distributed collection of hosts supported by a LAN or internetwork, where a more effective defense can be achieved by coordination and cooperation among intrusion detection systems across the network. Porras points out the following major issues in the design of a distributed IDS: • A distributed intrusion detection system may need to deal with different audit record formats • One or more nodes in the network will serve as collection and analysis points for the data, which must be securely transmitted to them • Either a centralized (single point, easier but bottleneck) or decentralized (multiple centers must coordinate) architecture can be used.

Distributed Intrusion Detection - Architecture Stallings Figure18.2 shows the overall architecture, consisting of three main components, of the system independent distributed IDS developed at the University of California at Davis. The components are: • Host agent module: audit collection module operating as a background process on a monitored system • LAN monitor agent module: like a host agent module except it analyzes LAN traffic • Central manager module: Receives reports from LAN monitor and host agents and processes and correlates these reports to detect intrusion

Honeypots (Intrusion Prevention) decoy systems to lure attackers away from accessing critical systems to collect information of their activities to encourage attacker to stay on system so administrator can respond are filled with fabricated information instrumented to collect detailed information on attackers activities single or multiple networked systems Honeypots are decoy systems, designed to lure a potential attacker away from critical systems, and: • divert an attacker from accessing critical systems • collect information about the attacker’s activity • encourage the attacker to stay on the system long enough for administrators to respond These systems are filled with fabricated information designed to appear valuable but which any legitimate user of the system wouldn’t access, thus, any access is suspect. They are instrumented with sensitive monitors and event loggers that detect these accesses and collect information about the attacker’s activities. Have seen evolution from single host honeypots to honeynets of multiple dispersed systems. The IETF Intrusion Detection Working Group is currently drafting standards to support interoperability of IDS info (both honeypot and normal IDS) over a wide range of systems & O/S’s.

Password Management (Intrusion Prevention) front-line defense against intruders users supply both: login – determines privileges of that user password – to identify them passwords often stored encrypted should protect password file on system The front line of defense against intruders is the password system, where a user provides a name/login identifier (ID) and a password. The password serves to authenticate the ID of the individual logging on to the system. Passwords are usually stored encrypted rather than in the clear (which would make them more vulnerable to theft). Unix systems traditionally used a multiple DES variant with salt as a one-way hash function (see text). More recent O/S’s use a cryptographic hash function (eg. MD5). The file containing these passwords hashes needs access control protections to make guessing attacks harder.

Managing Passwords - Education can use policies and good user education educate on importance of good passwords give guidelines for good passwords minimum length (>6) require a mix of upper & lower case letters, numbers, punctuation not dictionary words but likely to be ignored by many users Goal is to eliminate guessable passwords while allowing user to select a memorable password. Four basic techniques are in use: education, computer generation, reactive checking & proactive checking. The user education strategy tells users the importance of using hard-to-guess passwords and provides guidelines for selecting strong passwords, but it needs their cooperation. The problem is that many users will simply ignore the guidelines.

Managing Passwords - Computer Generated let computer create passwords if random likely not memorisable, so will be written down (sticky label syndrome) even pronounceable not remembered have history of poor user acceptance Computer-generated passwords create a password for the user, but have problems. If the passwords are quite random in nature, users will not be able to remember them. Even if the password is pronounceable, the user may have difficulty remembering it and so be tempted to write it down. In general, computer-generated password schemes have a history of poor acceptance by users. FIPS PUB 181 defines one of the best-designed automated password generators. The standard includes not only a description of the approach but also a complete listing of the C source code of the algorithm, which generates words by forming a random set of pronounceable syllables and concatenating them to form a word.

Managing Passwords - Reactive Checking reactively run password guessing tools note that good dictionaries exist for almost any language/interest group cracked passwords are disabled but is resource intensive bad passwords are vulnerable till found A reactive password checking strategy is one in which the system periodically runs its own password cracker to find guessable passwords. The system cancels any passwords that are guessed and notifies the user. Drawbacks are that it is resource intensive if the job is done right, and any existing passwords remain vulnerable until the reactive password checker finds them.

Managing Passwords - Proactive Checking most promising approach to improving password security allow users to select own password but have system verify it is acceptable simple rule enforcement compare against dictionary of bad passwords use algorithms The most promising approach to improved password security is a proactive password checker, where a user is allowed to select his or her own password, but the system checks to see if it is allowable and rejects it if not. The trick is to strike a balance between user acceptability and strength. The first approach is a simple system for rule enforcement, enforcing say guidelines from user education. May not be good enough. Another approach is to compile a large dictionary of possible “bad”passwords, and check user passwords against this disapproved list. But this can be very large & slow to search. A third approach is based on rejecting words using either a Markov model of guessable passwords, or a Bloom filter. Both attempt to identify good or bad passwords without keeping large dictionaries. See text for details.