Security Technology: Intrusion Detection, Access Control and Other Security Tools Chapter 7.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Guide to Network Defense and Countermeasures Third Edition
Guide to Network Defense and Countermeasures Second Edition
FIRST LINE OF DEFENSE Intrusion Prevention System Stephen Gates – CISSP Hoàng Thế Long – Nguyễn Thái Bình
Learning Objectives Upon completion of this material, you should be able to:
Chapter 13: Intrusion Detection and Prevention Systems
Example of a hub and switch
Learning Objectives Upon completion of this material, you should be able to:
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 13 Intrusion Detection and Prevention Systems By Whitman, Mattord, & Austin© 2008.
Guide to Network Defense and Countermeasures Second Edition
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion Detection MIS ALTER 0A234 Lecture 3.
Computer Security: Principles and Practice
seminar on Intrusion detection system
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Host Intrusion Prevention Systems & Beyond
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Network security policy: best practices
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Introduction Intrusion: type of attack on information assets in which instigator attempts to gain entry into or disrupt system with harmful intent Intrusion.
Principles of Information Security, Fourth Edition
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Intrusion Detection Chapter 12.
Principles of Information Security, Fifth Edition
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Security Architecture
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Guide to Network Defense and Countermeasures
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Cryptography and Network Security Sixth Edition by William Stallings.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Guide to Network Security First Edition Chapter Six Network Monitoring and Intrusion Detection and Prevention Systems.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Role Of Network IDS in Network Perimeter Defense.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Jason Ewing. What is an Intrusion Why Detecting Signs of Intrusion is Important? Types of Intrusion Detection Systems (IDS) Approaches for Detection Anomaly.
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
Some Great Open Source Intrusion Detection Systems (IDSs)
Security Methods and Practice CET4884
Intrusion Detection, Access Control and Other Security Tools
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Security Methods and Practice CET4884
Intrusion Detection system
Protection Mechanisms in Security Management
Presentation transcript:

Security Technology: Intrusion Detection, Access Control and Other Security Tools Chapter 7

Intrusion “Intrusion is a type of attack on information assets in which the instigator attempts to gain entry into a system or disrupt the normal operation of system with, almost always, the intent to do malicious harm.”

Definitions Intrusion prevention: activities that deter an intrusion Writing &implementing a good enterprise information security policy Planning & executing effective information security programs Installing & testing technology-based countermeasures Conducting & measuring the effectiveness Employee training and awareness activities Intrusion detection: procedures and systems that identify sys intrusions Intrusion correction: Activities finalize the restoration of operations to a normal state Activities seek to identify the source & method of attack for prevention

Intrusion Detection Systems Commercially available in late 1990 Works like a burglar alarm Detects a violation and sounds alarm Extension – Intrusion prevention systems Detect and prevent intrusion Generally accepted combination Intrusion detection and prevention system (IDPS)

IDPS Terminology Alarm or alert: indication that attack is happening Evasion: attacker change the format and/or timing of activities to avoid being detected False attack stimulus: event triggers alarm – no real attack False negative: failure of IDPS to react to attack False positive: alarm activates in the absence of an actual attack Noise: alarms events that are accurate but do not pose threats Site policy: rules & configuration guidelines governing the implementation & operation of IDPS

IDPS Terminology Site policy awareness: ability to dynamically modify config in response to environmental activity True attack stimulus: event that triggers alarms in event of real attack Tuning: adjusting an IDPS Confidence value: measure IDPS ability correctly detect & identify type of attacks Alarm filtering: Classification of IDPS alerts Alarm clustering and compaction: grouping almost identical alarms happening at close to the same time

Why Use an IDS Prevent problem behaviors by increasing the perceived risk of discovery and punishment Detect attacks and other security violations Detect and deal with preambles to attacks Document existing threat to an organization Act as quality control for security design & administration Provide useful information about intrusions that take place

Types of IDS Network based Host-based Focused on protection network information assets Wireless Network behavior analysis Host-based Focused on protection server of host’s information assets

Network-Based Resides on computer or appliance connected to an a segment of orgs. network Monitors network traffic on the segment Monitors packets Monitoring port (switched port analysis) Monitors all ingoing and outgoing traffic Looks for attack patterns Compares measured activity to known signatures Protocol verification – packet structure Application verification – packet use

Advantages and Disadvantages Needs few devices to monitor large network Little or no disruption to normal operations May not be detectable by attackers Disadvantages Overwhelmed by network volume Requires access to all traffic Cannot analyze encrypted packets Cannot ascertain if an attack was successful Some forms of attack are not easily discerned Fragmented packets Malformed packets

Wireless NIDPS Monitors and analyzes wireless network traffic Looks for potential problems with the wireless protocols (layers 2 and 3) Cannot evaluate & diagnose issue with higher level layers Issues associated with implementation Physical security Sensor range Access point and wireless switch locations Wired network connections Cost

Wireless NIDPS Can detect conditions in addition to traditional types of IDSPS Unauthorized WLAN and WLAN devices Poorly secured WLAN devices Unusual usage patterns The use of wireless network scanners DoS attacks and condition Man-in-middle attacks Unable to detect Passive wireless protocol attacks Susceptible to evasion techniques Susceptible to logical and physical attacks on wireless access point

Host-Based Resides on a particular computer or server & monitors traffic only on that system Also known as system integrity verifiers Works on principle of configuration and change management Classifies files in categories & applies various notification actions based on rules Maintains own log file Can monitor multiple computers simultaneously

Advantages Reliable Can detect local events Operates on host system where encrypted files already decrypted and available Use of switched network protocols does not affect Can detect inconsistencies in how application and system programs were used

Disadvantages Pose more management issues Configured and maintained on each host Vulnerable both to direct attacks and attacks against the host operating system Not optimized to detect multi-host scanning

Disadvantages Not able to detect scanning of non-host devices (routers and switches) Susceptible to Denial of Service attacks Can use large amounts of disk space – audit logs Can inflict a performance overhead on host systems

Application Based Examines application for abnormal events Looks for files created by application Anomalous occurrences – user exceeding authorization Tracks interaction between users and applications Able to tract specific activity back to individual user Able to view encrypted data Can examine encryption/decryption process

Advantages & Disadvantages Aware of specific users Able to operate on encrypted data Disadvantages More susceptible to attack Less capable of detecting software tampering

IDS Methodologies Types determined by where placed for monitoring purposes IDS methodologies based on detection methods Two dominate methodologies Signature-based (knowledge-based) Statistical-anomaly approach

Signature Based Examines data traffic in search of patterns that match known signature Foot printing and fingerprinting activities Specific attack sequences DOS Widely used Signature database must be continually updated Attack time-frame sometimes problematic Slow and methodical may slip through

Statistical Anomaly Based Based on frequency on which network activities take place Collect statistical summaries of “normal” traffic to form baseline Measure current traffic against baseline Traffic outside baseline will generate alert Can detect new type of attacks Requires much more overhead and processing capacity May not detect minor changes to baseline

Log file Monitors Similar to NIDS Reviews logs Looks for patterns & signatures in log files Able to look at multiple log files from different systems Large storage requirement

Responses to IDS Vary according to organization policy, objectives, and system capabilities Administrator must be careful not to increase the problem Responses active or passive

Which One? Consider system environment Technical specification of systems environment Technical specification of current security protections Goals of enterprise Formality of system environment and management culture

Which One? Consider Security Goals and Objectives Protecting from threats out organization? Protecting against inside? Use output of IDS to determine new hardware/software needs Maintain managerial over one-security related network usage

Which One? Security policy Structure Job descriptions of system user Include reasonable use policy What are you going to do if violation occurs

Which One? Organization Requirements and Constraints? Outside Requirements Resource Constraints Features and Quality Tested Product User Level of Expertise Product Support

Strengths of IDS Monitoring & analysis of system events & user behaviors Testing security states of system configuration Base lining security state of the system & track changes to baseline Pattern recognition Auditing and logging Alerting Measuring performance

Limitations of IDS Compensate for weak or missing security mechanisms Instantly report or detect during heavy operations Detect newly published attacks Effectively respond to sophisticated attackers Automatic investigate Keep attacks from circumventing them Deal effectively with switched networks

Control Strategies Centralized Partially distributed Fully distributed

Centralized All IDS control functions are implemented and managed in a centralized location 1 management system Advantages Cost and control Specialization Disadvantage

Fully Distributed Opposite of centralized All control functions applied at the physical location of each IDS component Each sensor/agent is best configured to deal with its own environment Reaction to attacks sped up

Partially Distributed Control Individual agents respond to local threats Report to a hierarchical central facility One of the more effective methods

Honey Pots / Honey Nets / Padded Cell Systems Decoy systems Lure potential attackers away from critical systems Encourages attacks against themselves Honey Net Collection of honey pots Connects honey pots on a subnet Contains pseudo-services the emulated well-known services Filled with factious information

Honey Pots / Honey Nets / Padded Cell Systems Protected honey pot IDS detects attacks and transfers to simulated environment Monitors action of attacker

Trap and Trace Systems Detect intrusion and trace incident back Consist of honey pot or padded cell & alarm Similar to concept of caller ID Back-hack Considered unethical Legal drawbacks to trap and trace Enticement and entrapment

Scanning and Analysis Tools Help find vulnerabilities in system, holes in security components, and unsecure aspects of the network Allow system admin to see what the attacker sees May run into problems with ISP Port scanners – what is active on computer Firewall analysis tools Operating system detection tools Vulnerability scanners Packet sniffers

Access Control Tools Authentication – validation of users identity 4 general ways carried out What he knows What he has Who he is What he produces