Chapter 9 The Art of Intrusion Detection

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Third Edition
Advertisements

Guide to Network Defense and Countermeasures Second Edition
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
seminar on Intrusion detection system
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
Host Intrusion Prevention Systems & Beyond
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
APA of Isfahan University of Technology In the name of God.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
Chapter 6: Packet Filtering
IIT Indore © Neminah Hubballi
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
What is FORENSICS? Why do we need Network Forensics?
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Intrusion Detection State of the Art/Practice Anita Jones University of Virginia.
Cryptography and Network Security Sixth Edition by William Stallings.
Chapter 9 Intruders.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Intrusion Detection System
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Role Of Network IDS in Network Perimeter Defense.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Some Great Open Source Intrusion Detection Systems (IDSs)
Security Methods and Practice CET4884
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Chapter 9 Intruders.
CompTIA Security+ Study Guide (SY0-401)
IDS Intrusion Detection Systems
Securing Network Servers
Instructor Materials Chapter 7 Network Security
NETWORKS Fall 2010.
Intrusion Control.
Security Methods and Practice CET4884
Chapter 2: System Structures
Intrusion Detection Systems
CompTIA Security+ Study Guide (SY0-401)
NET 412 Network Security protocols
NET 412 Network Security protocols
Intrusion Prevention Systems
Chapter 9 Intruders.
Intrusion Detection Systems
Lecture 8: Intrusion Detection
Intrusion Detection system
Network hardening Chapter 14.
Intrusion-Detection Systems
Lecture 7: Intrusion Detection
Presentation transcript:

Chapter 9 The Art of Intrusion Detection J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Chapter 9 Outline 9.1 Basic Ideas of Intrusion Detection 9.2 Network-Based and Host-Based Detections 9.3 Signature Detections 9.4 Statistical Analysis 9.5 Behavioral Data Forensics 9.6 Honeypots J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Basic Ideas of Intrusion Detection What is Intrusion? E.g. Malice gets Alice’s user name & password and impersonates Alice Intruders are attackers who obtain login information of legitimate users and impersonate them J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Basic Ideas of Intrusion Detection Observation! (Back to mid-1980’s) Intruder’s behavior is likely to be substantially different from the impersonated users The behavior differences can be “measured” to allow quantitative analysis Intrusion detection: Identify as quick as possible intrusion activities occurred or are occurring inside an internal network Trace intruders and collect evidence to indict the criminals Common approach: Identify abnormal events How about building an automated tool to detect these behaviors?  Intrusion Detection System (IDS) J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Basic Methodology Log system events and analyze them Can be done manually if log file is small. But a log file could be big… need sophisticated tools Can be generated to keep track of network-based activities and host based activities Network-based detection (NBD) Host-based detection (HBD) Both (hybrid detection) J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Basic Methodology Auditing Analyzing logs is often referred to as auditing Two kinds of audits Security profiles: static configuration information Dynamic events: dynamic user events Parameters Values Password Minimum length (bytes) Lifetime (days) Expiration warning (days) 8 90 14 Login session Maximum number of unsuccessful attempts allowed Delay between delays (seconds) Time an accounts is allowed to remain idle (hours) 3 20 12 subject action object exception condition resource usage time stamp Alice executes opens writes cp ./myprog etc/myprog none write fails CPU:00001 byte-r: 0 byte-w: 0 Tue 11/06/07 20:18:33 EST Tue 11/06/07 20:18:34 EST J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

IDS Components Three components: Assessment Detection Alarm Evaluate security needs of a system and produce a security profile for the target system Detection Collect system usage events and analyze them to detect intrusion activities User profile, acceptable variation Alarm Alarm the user or the system administrator Classify alarms and specify how system should respond J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

IDS Architecture Command console Target service Control and manage the target systems Unreachable from external networks Target service Detect intrusions on devices J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Intrusion Detection Policies IDP are used to identify intrusion activities Specify what data must be protected and how well they should be protected Specify what activities are intrusions and how to respond when they are identified False Positives vs. False Negatives Behavior Classifications Green-light behavior: a normal behavior acceptable Red-light behavior: an abnormal behavior must be rejected Yellow-light behavior: cannot determine with current information Reactions to red-light and yellow-light behavior detections: Collect more info for better determination, if yellow-light behavior Terminate user login session, if red-light behavior Disconnect network, if red-light behavior Shut down computer J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Unacceptable Behaviors A sequence of events or a collection of several sequences of events Acceptable behavior: A sequence of events that follow the system security policy Unacceptable behavior: A sequence of events that violate the system security policy Challenging issues: How to define what behaviors are acceptable or unacceptable? How to model and analyze behaviors using quantitative methods J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Chapter 9 Outline 9.1 Basic Ideas of Intrusion Detection 9.2 Network-Based and Host-Based Detections 9.3 Signature Detections 9.4 Statistical Analysis 9.5 Behavioral Data Forensics 9.6 Honeypots J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Network-Based Detections (NBD) NBD analyzes network packets NBD: Identify yellow-light behaviors, red-light behaviors Send warning messages to alarm manager in command console Log packets in event log for future analysis Two major components: Network tap: tap network at selected points to gather information Detection engine: Analyze packets and send warning messages J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

NBD Architecture Network-Node Detections Network-Sensor Detections Inside a target computer Network-Sensor Detections At a selected point of network Need a network tap J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

NBD Pros and Cons Advantages: Disadvantages: Low cost No interference Intrusion resistant Disadvantages: May not be able to analyze encrypted packets Hard to handle large volume of traffics in time Some intrusion activities are hard to identify Hard to determine whether the intrusion has been successfully carried out J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Host-Based Detections (HBD) HBD analyzes system events and user behaviors and alert the alarm manager Check an event log to identify suspicious behavior Check system logs, keep record of system files Check system configurations Keep a copy of the event log in case an intruder modifies it J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

HBD Pros and Cons Advantages: Disadvantages: Can detect data encrypted during transmissions Detect intrusions that cannot be detected by NBD Do not need special hardware devices Check system logs, more accurate Disadvantages: Require extra system managing Consume extra computing resources May be affected if host computers or servers affected Cannot be installed in routers or switches J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Chapter 9 Outline 9.1 Basic Ideas of Intrusion Detection 9.2 Network-Based and Host-Based Detections 9.3 Signature Detections 9.4 Statistical Analysis 9.5 Behavioral Data Forensics 9.6 Honeypots J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Signature Detection Also referred to as operational detections or rule-based detections Inspect current events and decide whether they are acceptable Two types of signature detections: Network signatures Analyze packet behaviors Host-based signatures Analyze event behaviors A set of behavior rules: System files should not be copied by users Users should not access disks directly Users should not probe other users’ personal directories Users should not keep on trying to log on their accounts if three attempts have failed … J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Signature Classification J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Compound Signature Examples Network-based activities Host-based activities Compound signatures a user uses FTP to log on to the system and uses cd and ls commands a user browses the etc directory and read the passwd file a user browses system files from a remote computer a user uses FTP to log on to the system and uses the put command the files uploaded to the system have virus and Trojan horse signatures a user uploads malicious software to the system from a remote computer a user modifies system files and registry entities a user modifies system files from a remote computer a certain Web attack read system executable files a Web attack is successful Examples of compound signatures J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Outsider behaviors and insider misuses Insider: A person with authenticated access to a system Outsider: A person without authenticated access to a system Use outsider behaviors to detect intrusion: Attacker may plant a Trojan horse, hijack a TCP connection, or try a sweeping attack Use insider misuses to detect intrusion: Attacker may do things legitimate users would not normally do J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Signature Detection System Build-in System Store detection rules inside the system Provide an IDS editor to user User can select rules based on their needs Programming System Has default rules and a programming language Allow users to select rules and define their own rules Expert System More specific and comprehensive Require domain experts J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Chapter 9 Outline 9.1 Basic Ideas of Intrusion Detection 9.2 Network-Based and Host-Based Detections 9.3 Signature Detections 9.4 Statistical Analysis 9.5 Behavioral Data Forensics 9.6 Honeypots J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Common Approaches Two common approaches to identifying unacceptable events based on quantified event measures: Threshold values of certain measures Simple but inaccurate Count No. of occurrences of certain events during a period of time User profile More accurate Collect past events of a user to create user profiles based on certain quantified measures J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Quantifiable Events Examples: The time a particular event occurs The number of times a particular event occurs in a period of time The current values of system variables The utilization rate of system resources J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Events Measures Event Gauge Event Timer Resource Utilization Event Counter An integer variable for each type of events to record the total number of times this type of events occurs in a fixed period of time Event Gauge An integer variable for each measurable object in the system to denote the current value of the object Event Timer An integer variable for two related events in the system to denote the time difference of the occurrences of the first event and the second event Resource Utilization A variable for each resource in the system to record the utilization of the resource during a fixed period of time J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Statistical Techniques The mean and standard deviation Compare with the normal values Multivariate analysis Analyze two or more related variables at the same time to identify anomalies Markov process Calculate the probability the system changes from one state to another Time series analysis Study event sequences to find out anomalies J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Chapter 9 Outline 9.1 Basic Ideas of Intrusion Detection 9.2 Network-Based and Host-Based Detections 9.3 Signature Detections 9.4 Statistical Analysis 9.5 Behavioral Data Forensics 9.6 Honeypots J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Behavioral Data Forensics Behavioral data forensics studies how to use data mining techniques to analyze event logs and search for useful information Data Mining Techniques Data Refinement Contextual Interpretation Source Combination Out-of-Band Data Drill Down A behavioral data forensic example (pp.339) J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Chapter 9 Outline 9.1 Basic Ideas of Intrusion Detection 9.2 Network-Based and Host-Based Detections 9.3 Signature Detections 9.4 Statistical Analysis 9.5 Behavioral Data Forensics 9.6 Honeypots J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Honeypots Definition: Mission IDS = Guard Decoy System = Honeypot Any device, system, directory, or file used as a decoy to lure attackers away from important assets and to collect intrusion behaviors Mission Help its owner to know the enemies Sacrifice itself to save the other assets IDS = Guard Decoy System = Honeypot J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Types of Honeypots Physical system, developed in 1990 Host computers connected to unprotected LANs with real IP addresses Require high-level interactions and substantial efforts to maintain it Software techniques, late 1990’s Easy to deploy Require low-level interactions Honeyd, KFSensor, CyberCop Sting … J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Interaction Levels Low interaction: Mid interaction: High interaction Daemon only writes to the hard disk of the local host Mid interaction: Daemon reads from and writes to the hard disk of the local host High interaction Daemon interacts with OS, and through OS interacts with hard disk and other resources J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Honeypot functionalities and characterizations J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Honeyd An engine for running virtual IP protocol stacks in parallel A lightweight framework for constructing virtual honeypots at the network level Can simulate standard network services running different OS on different virtual hosts simultaneously Can detect and disable worms, distract intruders and prevent spread of spam mails J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Honeyd Virtual Framework J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Honeyd Personality Engines A block diagram of Honeyd architecture J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015

Other Systems MWCollect Projects Honeynet Projects Honeywall CDROM Sebek High Interaction Honeypot Analysis Toolkit (HIHAT) HoneyBow J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015