Backtracking Intrusions

Slides:



Advertisements
Similar presentations
Computer Security set of slides 10 Dr Alexei Vernitski.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
CS 443 Advanced OS Fabián E. Bustamante, Spring 2005 Backtracking Intrusions Sam King & Peter Chen CoVirt Project, University of Michigan Presented by:
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Aktueller Status How Hackers Cover Their Tracks ECE 4112 May 1st, 2007 Group 1 Chris Garyet Christopher Smith Introduction Lab Content Conclusions Questions.
System and Network Security Practices COEN 351 E-Commerce Security.
Intrusion Detection Systems and Practices
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Backtracking Intrusions Sam King Peter Chen CoVirt Project, University of Michigan.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Presented by C.SARITHA ( 07R91A0568) INTRUSION DETECTION SYSYTEM.
Apache : Installation, Configuration, Basic Security Presented by, Sandeep K Thopucherela, ECE Department.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
5205 – IT Service Delivery and Support
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
HyperSpector: Virtual Distributed Monitoring Environments for Secure Intrusion Detection Kenichi Kourai Shigeru Chiba Tokyo Institute of Technology.
What is FORENSICS? Why do we need Network Forensics?
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
1 Vulnerability Analysis and Patches Management Using Secure Mobile Agents Presented by: Muhammad Awais Shibli.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Ether: Malware Analysis via Hardware Virtualization Extensions Author: Artem Dinaburg, Paul Royal, Monirul Sharif, Wenke Lee Presenter: Yi Yang Presenter:
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
1 Quick Overview Overview Network –IPTables –Snort Intrusion Detection –Tripwire –AIDE –Samhain Monitoring & Configuration –Beltaine –Lemon –Prelude Conclusions.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
Backtracking Intrusions. Introduction Rapidly increasing frequency of computer intrusions Common routines for system administrators (1)Understand how.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
CSI3131 – Lab 1 Observing Process Behaviour. Running Linux under Virtual PC  Start Virtual PC  This Windows program provides a virtual machine to run.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
SCSC 455 Computer Security Chapter 3 User Security.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Lecture 02 File and File system. Topics Describe the layout of a Linux file system Display and set paths Describe the most important files, including.
An Evening with Berferd Bill Cheswick, USENIX 1990 Presented by Chris Grier.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
Aaron Corso COSC Spring What is LAMP?  A ‘solution stack’, or package of an OS and software consisting of:  Linux  Apache  MySQL  PHP.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Security (part 1) CPS210 Spring Current Forensic Methods  Manual inspection of existing logs  System, application logs  Not enough information.
IDS And Tripwire Rayhan Mir COSC 356. What is IDS IDS - Intrusion detection system Primary function – To monitor network or host resources to detect intrusions.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Chapter 6 Application Hardening
TECHNOLOGY GUIDE THREE
Wireless Network Security
Outline Introduction Characteristics of intrusion detection systems
Operating System Structure
Backtracking Intrusions
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
A Real-time Intrusion Detection System for UNIX
LINUX SECURITY Dongmei Wu ID: /25/00.
ISMS Information Security Management System
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
SECURITY IN THE LINUX OPERATING SYSTEM
Security.
Operating System Concepts
Designing IIS Security (IIS – Internet Information Service)
Preventing Privilege Escalation
Presentation transcript:

Backtracking Intrusions By King & Chen Presented by: Sebastian Tomaszewski Mike DeSantis

Backtracker Presentation Agenda Introduction Research Problem Key Ideas / Approaches Evaluation Conclusion

Backtracker Introduction This paper discusses a new software tool to aid system administrators in providing system security. Backtracker’s goal is to reconstruct a timeline of events that occur in an attack, and to generate a visual representation of actions taken by a system intruder. This is a upgrade from previously existing software.

Research Problem Identify source of intrusion on a computer system Analyze sequence of actions taken by intruder Identify files & processes that have been effected Minimize system overhead to achieve tracking

Research Problem - Importance Once an attack has occurred: Identify venerability point that attacker exploited Fix system venerability that attacker gained access through Undue damage that attacker inflicted

Key Idea – Detection Identify a ‘detection point’ on one or more levels (ie. file modification, firewall, port scanning, process that is behaving in an unusual or suspicious manner) Tools providing ability to achieve a detection point: Tripwire, Snort, Coroner’s Toolkit (each is endorsed by Backtracker)

Key Idea - Differentiation Other software package exists, but suffer from limitations: Limited data & easily disabled logging Encrypted data used by attacker Backtracker addresses these limitations and provides many tools to analyze attacking transactions

Application - Differentiation Works by observing OS-level objects (files, filenames, processes) through a compromise between application level and machine level, tracking by process ID and version number - Application level: Semantically rich, easily disabled by an attacker - Machine level: Semantically poor, hard to disable by an attacker

Key Idea – Graph generation Generate a dependency graph through OBJECTS: Log objects and dependency-causing events during runtime. Save enough information to build a graph that depicts the dependency relationships between all objects seen over that execution. Backtracker keeps track of a process from the time it is created by a fork or clone system call, to the point where it exits. Prioritize all parts of the dependency graph for easy of searching for an attacker’s actions

Application – Graph Generation [Object definitions] A file object is identified uniquely by a device, inode number, version number (Backtracker treats pipes as normal files) A filename object refer to the directory data that maps a name to a file object A process is identified uniquely by a process ID and version number

Application – Graph Generation [Dependency causing events] One process directly effects the execution of another process object A process effects or is effected by data or attributes associated with a file object A process effects or is effected by a filename object Note: Effecting an object is not the same as controlling an object!

Application – Graph Generation [Prioritizing dependency graph] Dependency graphs for a busy system will be too large to scrutinize each object/event Ignore certain objects & events: Ignore all child events from a specific event Ignore read but not written files in a time period Ignore helper processes Choose several detection points to scrutinize

Application - Graph Generation “PTrace Attack” Analysis Exploits a race condition in Linux PTrace code to gain root access 1) Attacker caused Apache web server (httpd) to create a command shell (bash) 2) Downloaded and unpacked an executable 3) Run the executable using a different group identity

Key Idea – Dependency & Event Tracking A tracking system must examine higher level events instead of low level events to minimize system overhead Examples of high-level events: Changing contents of a file Creating a child process Examples of low-level events: Changing a file’s access time Creating a filename in a directory

Application – Dependency & Event Tracking Backtracker is able to provide useful analysis without tracking low level events even if low level events are used in the attack Backtracker logs & analyzes: Process creation through fork or clone Load and store to shared memory Read and write of files and pipes Receive data from a socket Perform execve of files Load and store to m-map’ed files Opening a file Note: Backtracker produces a 9% running time overhead and 1.2GB of log data per day for an operating system intensive workload

Application – Dependency & Event Tracking [In virtual machine environments] Virtual machine monitor prevents intruders in the guest OS from interfering with event tracking Virtual machine monitor notifies Backtracker whenever a guest application performs a high level event

Evaluation - Introduction To test Backtracker, a default installation of RedHat 7.0 was setup on a Honeypot machine RedHat: Vulnerable to several remote and local attacks Honeypot: Vulnerable to at least two attacks (Apache) A “Bind” attack was run on this system Files read but not written are ignored Ignore files in /root/.bash_history, lastlog, utmp, mtab Ignore helper processes

Evaluation - Results 1) Gain access through httpd (Apache) 2) Downloaded a rootkit using wget 3) Write the rootkit to the file “/tmp/ /bind”

Evaluation - Shortcomings Backtracker can be circumvented by: Attacking the layers upon which Backtracker’s analysis or logging depend Using a hidden channel to break the chain of events that Backtracker tracks An attacker carrying out an attack sequence of steps over a long period of time Attacking the Virtual machine monitor layer or host OS (Much harder than attacking guest kernel)

Conclusion Data integrity and security is vital as computing becomes more widespread. Backtracker allows system administrators to analyze an attack, and avoid future vulnerability. An everyday applications of this technology might be for a banking system administration team to protect their clients accounts. Questions?