Distributed Intrusion Detection Mamata Desai (99305903) M.Tech.,CSE dept, IIT Bombay.

Slides:



Advertisements
Similar presentations
Intrusion Detection System(IDS) Overview Manglers Gopal Paliwal Gopal Paliwal Roshni Zawar Roshni Zawar SenthilRaja Velu SenthilRaja Velu Sreevathsa Sathyanarayana.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
1 Reading Log Files. 2 Segment Format
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Intrusion Detection CS461/ECE422 Spring Reading Material Chapter 8 of the text.
Snort: A Network Intrusion Detection Software Matt Gustafson Becky Smith CS691 Semester Project Spring 2003.
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion Detection/Prevention Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality,
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Log Analysis and Intrusion Detection By Srikrishna Gudavalli Venkata Naga Vamsi Krishna Ravi Kiran Yellepeddy.
Intrusion Detection - Arun Hodigere. Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
USENIX LISA ‘99 Conference © Copyright 1999, Martin Roesch Snort - Lightweight Intrusion Detection for Networks Martin Roesch.
IDS Mike O’Connor Eric Tallman Matt Yasiejko. Overview IDS defined IDS defined What it does What it does Sample logs Sample logs Why we need it Why we.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
Penetration Testing Security Analysis and Advanced Tools: Snort.
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
COEN 252 Computer Forensics
IIT Indore © Neminah Hubballi
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
COEN 252 Computer Forensics Collecting Network-based Evidence.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
SNORT Feed the Pig Vicki Insixiengmay Jon Krieger.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
FORESEC Academy FORESEC Academy Security Essentials (III)
Snort & Nmap Mike O’Connor Eric Tallman Matt Yasiejko.
1 Guide to Network Defense and Countermeasures Chapter 9.
Linux Networking and Security
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Chapter 5: Implementing Intrusion Prevention
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Network Security: Lab#5 Port Scanners and Intrusion Detection System
1 HoneyNets, Intrusion Detection Systems, and Network Forensics.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Snort - Lightweight Intrusion Detection for Networks YOUNG Wo Sang Program Committee, PISA
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Intrusion Detection System
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
IDS Intrusion Detection Systems
Snort – IDS / IPS.
Port Scanning James Tate II
NETWORKS Fall 2010.
Footprinting (definition 1)
Principles of Computer Security
NET 412 Network Security protocols
NET 412 Network Security protocols
Intrusion Detection Systems (IDS)
Lecture 8: Intrusion Detection
Intrusion Detection system
Intrusion Detection Systems
Lecture 7: Intrusion Detection
Presentation transcript:

Distributed Intrusion Detection Mamata Desai ( ) M.Tech.,CSE dept, IIT Bombay

Overview  What is intrusion ?  Dealing with intrusion  Intrusion detection principles  Our problem definition  Packages analyzed  Our approach  Experiments and Results  Conclusions

What is intrusion ?  The potential possibility of a deliberate unauthorized attempt to: 1.Access information 2.Manipulate information 3.Render a system unreliable or unusable  Types of intrusions: –External attacks Password cracks, network sniffing, machine & services discovery utilities, packet spoofing, flooding utilities, DOS attacks –Internal penetrations – Masqueraders, clandestine users –Misfeasors – authorized misuse

Example attacks  Password cracking  Buffer overflow  Network reconnaissance  Denial of service (DoS)  IP spoofing

Dealing with intrusion  Prevention –isolate from n/w, strict auth, encryption  Preemption –“do unto others, before they do unto you”  Deterrence –dire warnings: “we have a bomb too”  Deflection –diversionary techniques to lure away  Counter measures  Detection

Intrusion Detection principles  Anomaly-based –Form an opinion on what constitutes “normal”, and decide on a threshold to flag as “abnormal” –Cannot distinguish illegal from abnormal  Signature-based –Model signatures of previous attacks and flag matching patterns –Cannot detect new intrusions  Compound

System characteristics  Time of detection  Granularity of data processing  Source of audit data  Response to detected intrusions –passive v/s active  Locus of data-processing  Locus of data-collection  Security  Degree of inter-operability

Host-based v/s Network-based IDS  Host-based IDS 1.Verifies success or failure of an attack 2.Monitors specific system activities 3.Detects attacks that n/w based systems miss 4.Well-suited for encrypted and switched environments 5.Near-real-time detection and response 6.Requires no additional hardware 7.Lower cost of entry

…contd.  Network-based IDS 1.Lower cost of ownership 2.Detects attacks that host-based systems miss 3.More difficult for an attacker to remove evidence 4.Real-time detection and response 5.Detects unsuccessful attacks and malicious intent 6.Operating system independence 7.Performance issues

Our problem definition  Portscanning  Our laboratory setup –Multiple machines with similar configuration  Portscan on a single machine  Distributed portscan - Small evasive scans on multiple machines  Aim – Detect such distributed scans

Typical lab setup

Types of Portscans  Scan types: –TCP connect() scan –Stealth SYN scan –Stealth FIN scan –Xmas scan –Null scan  Scan sweeps: –One-to-one, one-to-many, many-to-one, many- to-many

SourceTargetNetwork Messages Send SYN, seq=x Receive SYN segment Send SYN, seq=y, ACK x+1 Receive SYN + ACK segment Send ACK y+1 Receive ACK segment Send ACK+FIN+RST Receive ACK+FIN+RST … more packet exchanges Normal sequence of packets

SourceTargetNetwork Messages Send SYN, seq=x Receive SYN segment Send SYN, seq=y, ACK x+1 Receive SYN + ACK segment Send RST Receive RST Stealth SYN scan

SourceTargetNetwork Messages Stealth FIN scan Send FIN Receive FIN

SourceTargetNetwork Messages Stealth Xmas scan Send FIN+PSH+URG Receive FIN+PSH+URG

Packages analyzed  Sniffit ( –A network sniffer for TCP/UDP/ICMP packets –Interactive mode  Tcpdump ( –A tool for network monitoring and data acquisition  Nmap ( –“Network mapper” for network exploration, security auditing –Various types of TCP/UDP scans, ping scans

…contd  Portsentry ( –Host-based TCP/UDP portscan detection and active defense system –Stealth scan detection –Reacts to portscans by blocking hosts –Internal state engine to remember previously connected hosts –All violations reported to syslog  Snort ( –Network-based IDS – real-time analysis and traffic logging –Content searching/matching to detect attacks and probes – buffer overflows, CGI attacks, SMB probes, OS fingerprinting attacks –Rules language to describe traffic to collect or pass –Alerts via syslog, user files, WinPopUp messages –3 functional modes – sniffer, packet logger, NIDS

…contd  Portsentry –Binds to all ports to be monitored –A static “list” of ports monitored –State engine – different hosts  Snort –Preprocessor – connections to P ports in T seconds –V1.8 – only one-to-one and one-to-many portscans detected

Our approach  Pick up network packets  Based on which type of portscan is to be analyzed, identify the scan signature  Add each source and target IP address, to the correlation lists  Use the correlation lists to infer the scan sweep – one-to-one, one-to-many, many-to- one, many-to-many

Experimental Setup

Detection algorithm  Examine each TCP packet on the network.  Extract source and target IP addrs and ports.  For each scan type to be detected, maintain a list of “valid” connections.  When a scan signature is detected, add source and target IP addrs to 2 correlation lists pointed to by srcIP and tarIP, remove entry from connections list.

…contd  Identical correlation lists record source and target IP addrs info, along with number of scans.  Scan sweeps one-to-one, one-to-many, many-to-one, and many-to-many are detected by passes thru the correlation lists.

Experiments SourceTargetTCP ports pro-13pro-1925, 119 pro-15pro-2121, 23, 80 pro-17pro-2322, 79 SourceTargetTCP ports pro-13pro-19 pro-21 pro-23 7, 20, 21 22, 23, 25, 53 69, 79, 80, 88 pro-15pro-19 pro , 111, , 143, 194, 220 One-to-one scan One-to-many scan

…contd SourceTargetTCP ports pro-13pro-21443, 513, 518 pro-15pro-21873, 3130, 6667 pro-17pro-21107, 20, 21, 23 SourceTargetTCP ports pro-13pro-19 pro-21 pro-23 7, 20, 21, 79 80, 113, 119, , 194, 667 pro-15…… pro-17…… Many-to-one scan Many-to-many scan

Conclusions  All the scans performed by nmap were detected successfully by our detector and the correlations were accurate.  Some stray incidents of ident lookups did get classified as scans, due to the way closed ports behave.