Formal Methods for Intrusion Detection Presented by Brian Kellogg CSE 914: Formal Methods for Software Development Michigan State University December 11.

Slides:



Advertisements
Similar presentations
Jeremy S. Bradbury, James R. Cordy, Juergen Dingel, Michel Wermelinger
Advertisements

Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Guide to Network Defense and Countermeasures Second Edition
Vulnerability Analysis. Formal verification Formally (mathematically) prove certain characteristics Proves the absence of flaws in a program or design.
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
Background information Formal verification methods based on theorem proving techniques and model­checking –to prove the absence of errors (in the formal.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
1. AGENDA History. WHAT’S AN IDS? Security and Roles Types of Violations. Types of Detection Types of IDS. IDS issues. Application.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
Guide to Network Defense and Countermeasures Second Edition
Intrusion Detection Systems and Practices
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 Intrusion Detection CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 4, 2004.
Learning Classifier Systems to Intrusion Detection Monu Bambroo 12/01/03.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Design of an Intrusion Response System using Evolutionary Computation Rohit Parti.
seminar on Intrusion detection system
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Chirag N. Modi and Prof. Dhiren R. Patel NIT Surat, India Ph. D Colloquium, CSI-2011 Signature Apriori based Network.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS: Technical Seminar Presentation by MANOJ KUMAR GANTAYAT.
IIT Indore © Neminah Hubballi
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
Preventing SQL Injection Attacks in Stored Procedures Alex Hertz Chris Daiello CAP6135Dr. Cliff Zou University of Central Florida March 19, 2009.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Master Thesis Defense Jan Fiedler 04/17/98
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
1 COPYRIGHT © 2015 ALCATEL-LUCENT. ALL RIGHTS RESERVED. Cognitive Security: Security Analytics and Autonomics for Virtualized Networks Lalita Jagadeesan.
Formal Specification of Intrusion Signatures and Detection Rules By Jean-Philippe Pouzol and Mireille Ducassé 15 th IEEE Computer Security Foundations.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
A Network-based Response Framework and Implementation Marcus Tylutki and Karl Levitt
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Formal Verification. Background Information Formal verification methods based on theorem proving techniques and model­checking –To prove the absence of.
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors : Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Some Great Open Source Intrusion Detection Systems (IDSs)
Security Methods and Practice CET4884
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
CompTIA Security+ Study Guide (SY0-401)
Security Testing Methods
Security Methods and Practice CET4884
Basics of Intrusion Detection
Outline Introduction Characteristics of intrusion detection systems
CompTIA Security+ Study Guide (SY0-401)
Intrusion Prevention Systems
Intrusion Detection system
Presentation transcript:

Formal Methods for Intrusion Detection Presented by Brian Kellogg CSE 914: Formal Methods for Software Development Michigan State University December 11 th, 2002

Purpose and Method Find intrusion detection methods that utilize formal methods Analyze strengths and weaknesses of each method Compare the methods and see if they can be combined in such a way to improve one another Found three research papers on intrusion detection that used formal methods for different purposes

Intrusion Detection Quickie The SANS institute defines intrusion detection as “the art of detecting inappropriate, incorrect, or anomalous activity” Two types: Host-based: detects intrusions on a specific host Network-based: detects intrusions on a network Two (main) methods: Knowledge-based Determine vulnerabilities and attempts to detect vulnerabilities Low false alarm rate Attacks not specified are not detected Behavior-based Determines normal system activity High false alarm rate Able to detect many intrusions (even ones not previously known)

Intrusion Detection Continued Why use intrusion detection, why not just prevent the attacks? Firewalls can prevent many attacks, but have no power over the internal network Certain network activities that have legitimate uses can also signify an attack (e.g. port scans) What should an intrusion system do when it detects an attack? Responses range from s to reconfiguring the network Just because the system detects an intrusion, may be legitimate Severe (or even simple) responses can be utilized by attackers to create new attacks

Yasinsac Paper (Motivation) “An Environment for Security Protocol Intrusion Detection” Traditional methods of protocol analysis not fool proof or complete Different protocols running concurrently can create new exploits Shift to “tunneling” paradigm in networks Sensitive data sent over same links as non- sensitive data Cryptographic techniques must be applied at higher layer (application layer)

Yasinsac Paper (Method) Take knowledge gained from formal analysis of security protocols and make them in to intrusion signatures Uses both knowledge-based and behavior- based intrusion detection Knowledge-based: signature an ordering of activity traces Behavior-based: surveys taxonomies and protocol principles to determine profile strategies and behavior recognition State-based attack recognition

Yasinsac Paper (Method) IKE protocol: A  B: HDR 1, SA A, KE A, N A, A B  A: HDR 2, SA B, KE B, N B, B, {prf(K AB, (KE B, KE A, KE B, KE A, B))}K B Exploit: A  B: HDR 1, SA A, KE A, N A, A I  B: HDR 1, SA A, KE A, N A, I B  I: HDR 2, SA B, KE B, N B, B, {prf(K AB, (KE B, KE A, KE B, KE A, B))}K B

Yasinsac Paper (Architecture) Central monitor, each principal communicates with monitor through secure channel

Pouzol Paper Motivation: Algorithm that detects attacks in a declarative IDS is a black box Partial instances of attacks can choke an IDS Wants to give more power to security officer to choose which attack instances are important Method: Formally specify intrusion signatures and detection rules Create a lattice used to define equivalence classes that defines a signature Choose an equivalence relation that can reduce the number of instances reported

Pouzol Lattice Т {U 1, U 2, T 1, T 2, T 3 } {U 1, U 2, T 3 } {U 1, U 2 } {U 2, T 3 } {T3}{T3} {U 1 }{U 2 } { } U 1 U 2 T 3 : In this equivalence class, every instance that has a unique pair of users and a third time stamp will be reported. This is an example of a good choice. This class will resist the choking attack, and will report all completed instances of an attack. Having the final timestamp means that the last part of the attack occurred, thus only a completed attack is being reported.

NetSTAT Paper (Motivation) “NetSTAT: A Network-based Intrusion Detection Approach” Motivated by the increase of network reliance and attacks Host-based intrusion detection fails to detect these attacks Firewalls do an excellent job of preventing external intrusions, but internal threats are left unchecked

NetSTAT Paper (Method) NetSTAT is a network-based intrusion detection system Wants to solve: Networks generate large amounts of data Some attacks occur only in a certain portion of a network Too much communication between IDS components can clog a network Networks can grow very large Able to work with host-based methods Four components: A network fact base A state transition scenario database Many general purpose probes An analyzer

NetSTAT Paper (Method) Network fact base Stand alone application that describes network topology and network services Contains interfaces, hosts, and links Represented as a hypergraph Interfaces are nodes, hosts and links are edges This is a formal model, adds benefits: Well defined semantics Supports reasoning and automation Topological properties described in expressive way

NetSTAT Paper (Method) State transition scenario database Contains signatures of attacks Attacks are sequences of states (snapshots) States are described by assertions that return Boolean values Example: i.link.type==”ATM”; Probes Sensors that are strategically placed in a network but are also full blown intrusion detection system Made up of: Filter that only collects data of interest Inference engine contains attack scenarios Decision engine issues response according to information collected in the inference engine, or reports info to the analyzer

NetSTAT Paper (Method) Analyzer Takes as input a network fact base and a state transition scenario Tells security officer where probes are needed Sets up the probes It determines: Events to be monitored, The network topology State information it requires to verify state assertions

NetSTAT Paper (Architecture)

Analysis: Yacinsac Advantages Able to find flaws in protocols that get past formal analysis Able to detect flaws in concurrently running protocols Architecture is cheap and versatile Disadvantages How do you choose the sources for signatures? How many signatures is too many? Architecture Every single principal required to run software to report to central authority Intruders can disable software Network attacks can still occur unnoticed

Analysis: Pouzol Advantages Allows security officer to specify an equivalence relation to prevent choking attacks on the IDS Formal specification of signatures and detection rules proven sound and complete Disadvantages Has not been implemented in any IDS Complexity of algorithm may create choking attacks Equivalence relations can be dangerous if configured incorrectly

Analysis: NetSTAT Advantages: Can detect intrusions on multiple sub-networks and total network Scalable to large networks Formal methods allow expressiveness and automation Disadvantages Not yet fully implemented Analyzer does ad hoc configuring of probes

Combination Pouzol’s technique to prevent choking attacks can be used by Yasinsac (and NetStat) Two full intrusion detection architecture Which one is best? NetSTAT! Yasinsac’s knowledge base can be used by NetSTAT (and all IDS)

Conclusion Formal methods and intrusion detection can work together to make networks more secure There are many different areas where formal methods can be applied Neither is a silver bullet to network security Attackers are always evolving new techniques to attack a network, and as security experts, so must we

Main References A. Yasinsac. An Environment for Security Protocol Intrusion Detection. Special edition of the Journal of Computer Security, 2001 J. Pouzol and M. Ducassé. Formal Specification of Intrusion Signatures and Detection Rules. 15th IEEE Computer Security Foundations Workshop, June 2002 G. Vigna and R. Kemmerer. NetSTAT: A Network- based Intrusion Detection Approach. Computer Security Applications Conference, 1998