Principles of Computer Security

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Bro: A System for Detecting Network Intruders in Real-Time Vern Paxson Lawrence Berkeley National Laboratory,Berkeley, CA A stand-alone system for detecting.
Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection Aaron Beach Spring 2004.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Firewalls and Intrusion Detection Systems
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Intrusion Detection/Prevention Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality,
seminar on Intrusion detection system
Bro: A System for Detecting Network Intruders in Real-Time Presented by Zachary Schneirov CS Professor Yan Chen.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection - Arun Hodigere. Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from.
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Bro: A System for Detecting network Intruders in Real-Time Vern Paxson Klevis Luli.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Intrusion Detection System [Snort]
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
FIREWALL Mạng máy tính nâng cao-V1.
Penetration Testing Security Analysis and Advanced Tools: Snort.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Access Control List (ACL)
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
7.5 Intrusion Detection Systems Network Security / G.Steffen1.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Intrusion Detection System
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
Machine Learning for Network Anomaly Detection Matt Mahoney.
Role Of Network IDS in Network Perimeter Defense.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
An Introduction To Gateway Intrusion Detection Systems Hogwash GIDS Jed Haile Nitro Data Systems.
Some Great Open Source Intrusion Detection Systems (IDSs)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
CompTIA Security+ Study Guide (SY0-401)
IDS Intrusion Detection Systems
Snort – IDS / IPS.
Access control techniques
NETWORKS Fall 2010.
Computer Data Security & Privacy
Domain 4 – Communication and Network Security
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Firewalls.
CompTIA Security+ Study Guide (SY0-401)
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Firewalls.
Introduction to Network Security
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Principles of Computer Security Instructor: Haibin Zhang hbzhang@umbc.edu

IDS, IPS, Bitcoin, and XSS Things we will cover for this and next lectures

IDS and IPS IDS: Intrusion detection systems IPS: Intrusion prevention systems Intrusion detection and prevention systems Bro Acknowledgement: A few slides are from Arun Hodigere

IDS IDS tries to find attack signatures specific patterns that usually indicate malicious or suspicious intent.

IDS Anomaly-based intrusion detection Misuse-based intrusion detection Specification-based intrusion detection

Anomaly-based intrusion detection Looks for a statistical deviation from a known “safe” set of data. Most spam filters use anomaly detection.

Drawbacks of Anomaly detection IDS Assumes that intrusions will be accompanied by manifestations that are sufficiently unusual so as to permit detection. These generate many false alarms and hence compromise the effectiveness of the IDS.

Misuse-based intrusion detection Also known signature based Looks for a pre-defined set of signatures of known “bad” things. Most host and network-based intrusion detection systems and virus scanners are misuse detectors.

Signature based IDS (contd.) For example, an IDS that watches web servers might be programmed to look for the string “phf” as an indicator of a CGI program attack. Most signature analysis systems are based off of simple pattern matching algorithms. In most cases, the IDS simply looks for a sub string within a stream of data carried by network packets. When it finds this sub string (for example, the ``phf'' in ``GET /cgi-bin/phf?''), it identifies those network packets as vehicles of an attack.

Drawbacks of Signature based IDS They are unable to detect novel attacks. Suffer from false alarms Have to programmed again for every new pattern to be detected.

Specification-based IDS are the opposite of misuse detectors. They look for a pre-defined set of signatures of known “good” things.

ByzID Using trusted component Monitoring instead enforcing [Duan, Levitt, Meling, Sean, and Zhang, SRDS 2014] Using trusted component Monitoring instead enforcing Highly efficient Robust 32

A Different Perspective host based network based A few of the following slides from Arun Hodigere (with modifications); two pages are from wiki.

Host/Applications based IDS The host operating system or the application logs in the audit information. These audit information includes events like the use of identification and authentication mechanisms (logins etc.) , file opens and program executions, admin activities etc. This audit is then analyzed to detect trails of intrusion.

Network based IDS Network intrusion detection systems (NIDS) are placed at a strategic point or points within the network to monitor traffic to and from all devices on the network. It performs an analysis of passing traffic on the entire subnets and matches the traffic that is passed on the subnets to the library of known attacks. An example of an NIDS would be installing it on the subnet where firewalls are located in order to see if someone is trying to break into the firewall. Ideally one would scan all inbound and outbound traffic, however doing so might create a bottleneck that would impair the overall speed of the network. 

Bro: Real time IDS Network based IDS Also a host IDS Can do anomaly, misuse, specification based

Design goals for Bro High-speed, large volume monitoring No packet filter drops Real time notification Mechanism separate from policy Extensible Monitor will be attacked

Structure of the Bro System Policy Script Interpreter Real time notification Policy script Event Control Event Stream Event engine Tcpdump filter Filtered Packet Stream libcap Packet Stream Network

Bro - libcap It’s the packet capture library used by tcpdump. Isolates Bro from details of the network link technology. Filters the incoming packet stream from the network to extract the required packets. E.g port finger, port ftp, tcp port 113 (Ident), port telnet, port login, port 111 (Portmapper). Can also capture packets with the SYN, FIN, or RST Control bits set.

Bro – Event Engine The filtered packet stream from the libcap is handed over to the Event Engine. Performs several integrity checks to assure that the packet headers are well formed. It looks up the connection state associated with the tuple of the two IP addresses and the two TCP or UDP port numbers. It then dispatches the packet to a handler for the corresponding connection.

Bro – TCP Handler For each TCP packet, the connection handler verifies that the entire TCP Header is present and validates the TCP checksum. If successful, it then tests whether the TCP header includes any of the SYN/FIN/RST control flags and adjusts the connection’s state accordingly. Different changes in the connection’s state generate different events.

Policy Script Interpreter The policy script interpreter receives the events generated by the Event Engine. It then executes scripts written in the Bro language which generates events like logging real-time notifications, recording data to disk or modifying internal state. Adding new functionality to Bro consists of adding a new protocol analyzer to the event engine and then writing new events handlers in the interpreter.

Application Specific Processing - Finger Tests for buffer overflow, checks the user against sensitive ids, etc Script interpreter Generates event controls based on the policy Generates Finger_request event Event Engine Event Engine Finger reply Finger request

Future of IDS To integrate the network and host based IDS for better detection. Detecting novel attacks rather than individual instantiations. SDN + IDS? Others

Bitcoin Hash and random oracles Digital signatures