Bro: A System for Detecting Network Intruders in Real-Time Vern Paxson Lawrence Berkeley National Laboratory,Berkeley, CA A stand-alone system for detecting.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection Aaron Beach Spring 2004.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
COEN 252 Computer Forensics Using TCPDump / Windump for package analysis.
1 Topic 2 – Lesson 4 Packet Filtering Part I. 2 Basic Questions What is packet filtering? What is packet filtering? What elements are inside an IP header?
1 Reading Log Files. 2 Segment Format
1. AGENDA History. WHAT’S AN IDS? Security and Roles Types of Violations. Types of Detection Types of IDS. IDS issues. Application.
Web Server Administration TEC 236 Securing the Web Environment.
Firewalls and Intrusion Detection Systems
Copyright © 2005 Department of Computer Science CPSC 641 Winter WAN Traffic Measurements There have been several studies of wide area network traffic.
Bro: A System for Detecting Network Intruders in Real-Time Overview Structure Language Implementation Decisions Attack Against the System Application Processing.
CLIENT / SERVER ARCHITECTURE AYRİS UYGUR & NİLÜFER ÇANGA.
Examining IP Header Fields
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Computer Security and Penetration Testing
Bro: A System for Detecting Network Intruders in Real-Time Presented by Zachary Schneirov CS Professor Yan Chen.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
1 WAN Measurements Carey Williamson Department of Computer Science University of Calgary.
Intrusion Detection - Arun Hodigere. Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from.
Using Argus Audit Trails to Enhance IDS Analysis Jed Haile Nitro Data Systems
INTRUSION DETECTION SYSTEM
Bro: A System for Detecting network Intruders in Real-Time Vern Paxson Klevis Luli.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
1 Figure 5-4: Drivers of Performance Requirements: Traffic Volume and Complexity of Filtering Performance Requirements Traffic Volume (Packets per Second)
FIREWALL Mạng máy tính nâng cao-V1.
Office of Science U.S. Department of Energy The Bro Intrusion Detection Stephen Lau NERSC/LBNL November 20, 2003 SC2003 Phoenix, AZ.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Web Server Administration Chapter 10 Securing the Web Environment.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
Chapter 4 TCP/IP Overview Connecting People To Information.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Bugs SATAN scans for It is interesting to look at the bugs SATAN scans for. They are easily detected by the scanners and therefore do not pose a threat.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Security at NCAR David Mitchell February 20th, 2007.
Linux Networking and Security
Breno de MedeirosFlorida State University Fall 2005 Network Intrusion Detection Systems Beyond packet filtering.
 network appliances to filter network traffic  filter on header (largely based on layers 3-5) Internet Intranet.
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
BASIC INTERNET PROTOCOLS: http, ftp, telnet. Mirela Walczak.
Sniffer, tcpdump, Ethereal, ntop
Internet Security and Firewall Design Chapter 32.
Network Simulator 2. Introduction Open source network simulator NS uses two languages: C++ and OTcl  C++ is fast to run but slower to change Kernel 
Lawrence Berkeley National Laboratory 1 James Rothfuss Computer Protection Program Manager Lawrence Berkeley National Lab Internet2 Security at Line Speed.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
1 Flexible, High-Speed Intrusion Detection Using Bro Vern Paxson Computational Research Division Lawrence Berkeley National Laboratory and ICSI Center.
Speaker:Chiang Hong-Ren An Investigation and Implementation of Botnet Detection Schemes.
COMP2322 Lab 1 Introduction to Wireshark Weichao Li Jan. 22, 2016.
UNIX SYSTEM SECURITY Tanusree Sen Agenda Introduction Three Different Levels of Security Security Policies Security Technologies Future of.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
Managing Secure Network Systems
SECURING NETWORK TRAFFIC WITH IPSEC
15-744: Computer Networking
Principles of Computer Security
Overview of Networking & Operating System Security
* Essential Network Security Book Slides.
Intrusion Detection Systems (IDS)
CPSC 641: WAN Measurement Carey Williamson
Firewalls.
Carey Williamson Department of Computer Science University of Calgary
ITIS 6167/8167: Network and Information Security
Session 20 INST 346 Technologies, Infrastructure and Architecture
Transport Layer 9/22/2019.
Presentation transcript:

Bro: A System for Detecting Network Intruders in Real-Time Vern Paxson Lawrence Berkeley National Laboratory,Berkeley, CA A stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruders traffic transits.

Outline Introduction -What is an attack? -Ways of detecting an attack. Structure of Bro -Event driving -Policy script Example usage of Bro to detect network intruder in real time.

What is an attack? With growing Internet connectivity comes growing opportunities for attackers to illicitly access computers over the network. Such as: use telnet to connect to Unix server, guess administrators password,when succeed,do what they want. How to detect an attack? -Examine information gathered by host at a later time. (Maybe after attack happens.) -A stand-alone system by observing network link traffic directly,using a packet filter.(Like the Bro does.)

What is Bro ? High-speed,large volume monitoring Bro tracks an FDDI network link with a speed of 100Mbps. Real-time notification Bro has a layered structure to ensure that packet filter,event generating,event tackling locate at different level.Each layer only process limited information.Bro reacts quickly at an attack. Extensible Bro implemented with C++,any new attack knowledge can be easily added. The monitor will be attacked Bro monitor network traffic,attacker will try to evade Bro.

Structure of the Bro system Network libpcap Event Engine Policy Script Interpreter Event stream Filtered packet stream Packet stream Real-time notification Record to disk Tcpdump filter Event control Policy script

Structure of the Bro system Packet Filter(libpcap) Bro use packet filter to extract specified packet out of network traffic, send to its upper layer (Event engine) for further analyse. Event Engine -First it will do an integrity check to assure that the packet headers are well formed.If it fails,then Bro generates an event. -Further on, it will do TCP or UDP header check,like the SYN/FIN/RST control flags.

Structure of the system Policy Script Bro designed its own language to specify which host,which service to listen to,an interpreter program will explain it and indicate if an attack happen or issue a command to throw a packet. For example: Const allowed_services={[ftp.lbl.gov,ftp],[ftp.lbl.gov,20/tcp],…} If ([H,S] in allowed_services) …its ok…

Attacks on the monitor Subterfuge attack In order to intrude an host,if a Bro stand by,the attacker will first try to defeat Bro. For example: An attacker as a FTP client may send a login name as User nice\0User root Bro will extract the whole message,instead only user nice\0 part. Another way is to launch the packet with an IP Time to Live(TTL) field sufficient to carry the packet past the monitoring point,but insufficient to carry it all the way to the endpoint. See the following graph:

A TTL-based evasion attack Attacker ttl=12 nice root user ttl=20 user root victim Monitor user = ? Another way is to launch the packet with an IP Time to Live(TTL) field sufficient to carry the packet past the monitoring point,but insufficient to carry it all the way to the endpoint.

Conclusion Bro can track six internet applications: Finger,FTP, Portmapper, Ident,Telnet and Rlogin. A number of commercial products exist that do what Bro does. Question: Can Bro survive a Internet Worm intrusion?