Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 6 – Intrusion Detection.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 9 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Advertisements

Lecture 13 Intrusion Detection modified from slides of Lawrie Brown.
Cryptography and Network Security Chapter 20 Intruders
Snort: A Network Intrusion Detection Software Matt Gustafson Becky Smith CS691 Semester Project Spring 2003.
Computer Security: Principles and Practice
Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 8 “Intrusion Detection”.
Guide to Network Defense and Countermeasures Second Edition
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
Lecture 14 Intrusion Detection
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Eng. Hector M Lugo-Cordero, MS April 2012 Intrusion Detection, Firewalls, and Intrusion Prevention CIS 4361.
Department Of Computer Engineering
CS 432 – Computer and Network Security Sabancı University
Intrusion Detection. Intruders Classes (from [ANDE80]: Classes (from [ANDE80]: two most publicized threats to security are malware and intruders two most.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Cryptography and Network Security Chapter 20 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Cryptography and Network Security Chapter 20 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 20. Chapter 20– Intruders They agreed that Graham should set the test for Charles Mabledene. It was neither.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Penetration Testing Security Analysis and Advanced Tools: Snort.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
COEN 252 Computer Forensics
IIT Indore © Neminah Hubballi
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
Chapter 18 Intruders.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Data Security and Encryption (CSE348) 1. Lecture # 26 2.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
INTRUDERS BY VISHAKHA RAUT TE COMP OUTLINE INTRODUCTION TYPES OF INTRUDERS INTRUDER BEHAVIOR PATTERNS INTRUSION TECHNIQUES QUESTIONS ON INTRUDERS.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Name:Neha Madgaonkar Roll no:  What are intruders?  Types  Behavior  Techniques.
Kittiphan Techakittiroj (25/10/58 12:06 น. 25/10/58 12:06 น. 25/10/58 12:06 น.) Intrusion Detection System Kittiphan Techakittiroj
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Cryptography and Network Security Sixth Edition by William Stallings.
Chapter 9 Intruders.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Role Of Network IDS in Network Perimeter Defense.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Computer Security Intrusion Detection. Intruders  A significant security problem for networked systems is hostile/unwanted, trespass by users or software.
Computer Security: Principles and Practice Chapter 6 – Intrusion Detection.
Chapter 9 Intruders.
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Network Security Essentials
NETW4005 COMPUTER SECURITY A
CS 432 – Computer and Network Security Sabancı University
NET 412 Network Security protocols
NET 412 Network Security protocols
CS 432 – Computer and Network Security Sabancı University
Chapter 9 Intruders.
Lecture 8: Intrusion Detection
Intrusion Detection system
Computer Security: Principles and Practice
Lecture 7: Intrusion Detection
Presentation transcript:

Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 6 – Intrusion Detection

Intruders  significant issue hostile/unwanted trespass from benign to serious from benign to serious  user trespass unauthorized logon, privilege abuse unauthorized logon, privilege abuse  software trespass virus, worm, or trojan horse virus, worm, or trojan horse  classes of intruders: masquerader, misfeasor, clandestine user masquerader, misfeasor, clandestine user

Examples of Intrusion  remote root compromise  web server defacement  guessing / cracking passwords  copying viewing sensitive data / databases  running a packet sniffer  distributing pirated software  using an unsecured modem to access net  impersonating a user to reset password  using an unattended workstation

Security Intrusion & Detection Security Intrusion a security event, or combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system (or system resource) without having authorization to do so. Intrusion Detection a security service that monitors and analyzes system events for the purpose of finding, and providing real- time or near real-time warning of attempts to access system resources in an unauthorized manner.

Hackers  motivated by thrill of access and status hacking community a strong meritocracy hacking community a strong meritocracy status is determined by level of competence status is determined by level of competence  benign intruders might be tolerable do consume resources and may slow performance do consume resources and may slow performance can’t know in advance whether benign or malign can’t know in advance whether benign or malign  IDS / IPS / VPNs can help counter  awareness led to establishment of CERTs collect / disseminate vulnerability info / responses collect / disseminate vulnerability info / responses

Hacker Behavior Example 1. select target using IP lookup tools 2. map network for accessible services 3. identify potentially vulnerable services 4. brute force (guess) passwords 5. install remote administration tool 6. wait for admin to log on and capture password 7. use password to access remainder of network

Criminal Enterprise  organized groups of hackers now a threat corporation / government / loosely affiliated gangs corporation / government / loosely affiliated gangs typically young typically young often Eastern European or Russian hackers often Eastern European or Russian hackers common target credit cards on e-commerce server common target credit cards on e-commerce server  criminal hackers usually have specific targets  once penetrated act quickly and get out  IDS / IPS help but less effective  sensitive data needs strong protection

Criminal Enterprise Behavior 1. act quickly and precisely to make their activities harder to detect 2. exploit perimeter via vulnerable ports 3. use trojan horses (hidden software) to leave back doors for re-entry 4. use sniffers to capture passwords 5. do not stick around until noticed 6. make few or no mistakes.

Insider Attacks  among most difficult to detect and prevent  employees have access & systems knowledge  may be motivated by revenge / entitlement when employment terminated when employment terminated taking customer data when move to competitor taking customer data when move to competitor  IDS / IPS may help but also need: least privilege, monitor logs, strong authentication, termination process to block access & mirror data least privilege, monitor logs, strong authentication, termination process to block access & mirror data

Insider Behavior Example 1. create network accounts for themselves and their friends 2. access accounts and applications they wouldn't normally use for their daily jobs 3. former and prospective employers 4. conduct furtive instant-messaging chats 5. visit web sites that cater to disgruntled employees, such as f'dcompany.com 6. perform large downloads and file copying 7. access the network during off hours.

Intrusion Techniques  objective to gain access or increase privileges  initial attacks often exploit system or software vulnerabilities to execute code to get backdoor e.g. buffer overflow e.g. buffer overflow  or to gain protected information e.g. password guessing or acquisition e.g. password guessing or acquisition

Intrusion Detection Systems  classify intrusion detection systems (IDSs) as: Host-based IDS: monitor single host activity Host-based IDS: monitor single host activity Network-based IDS: monitor network traffic Network-based IDS: monitor network traffic  logical components: sensors - collect data sensors - collect data analyzers - determine if intrusion has occurred analyzers - determine if intrusion has occurred user interface - manage / direct / view IDS user interface - manage / direct / view IDS

IDS Principles  assume intruder behavior differs from legitimate users expect overlap as shown expect overlap as shown observe deviations observe deviations from past history problems of: problems of: false positivesfalse positives false negativesfalse negatives must compromisemust compromise

IDS Requirements  run continually  be fault tolerant  resist subversion  impose a minimal overhead on system  configured according to system security policies  adapt to changes in systems and users  scale to monitor large numbers of systems  provide graceful degradation of service  allow dynamic reconfiguration

Host-Based IDS  specialized software to monitor system activity to detect suspicious behavior primary purpose is to detect intrusions, log suspicious events, and send alerts primary purpose is to detect intrusions, log suspicious events, and send alerts can detect both external and internal intrusions can detect both external and internal intrusions  two approaches, often used in combination: anomaly detection - defines normal/expected behavior anomaly detection - defines normal/expected behavior threshold detectionthreshold detection profile basedprofile based signature detection - defines proper behavior signature detection - defines proper behavior

Audit Records  a fundamental tool for intrusion detection  two variants: native audit records - provided by O/S native audit records - provided by O/S always available but may not be optimumalways available but may not be optimum detection-specific audit records - IDS specific detection-specific audit records - IDS specific additional overhead but specific to IDS taskadditional overhead but specific to IDS task often log individual elementary actionsoften log individual elementary actions e.g. may contain fields for: subject, action, object, exception-condition, resource-usage, time-stampe.g. may contain fields for: subject, action, object, exception-condition, resource-usage, time-stamp

Anomaly Detection  threshold detection checks excessive event occurrences over time checks excessive event occurrences over time alone a crude and ineffective intruder detector alone a crude and ineffective intruder detector must determine both thresholds and time intervals must determine both thresholds and time intervals  profile based characterize past behavior of users / groups characterize past behavior of users / groups then detect significant deviations then detect significant deviations based on analysis of audit records based on analysis of audit records gather metrics: counter, guage, interval timer, resource utilizationgather metrics: counter, guage, interval timer, resource utilization analyze: mean and standard deviation, multivariate, markov process, time series, operational modelanalyze: mean and standard deviation, multivariate, markov process, time series, operational model

Signature Detection  observe events on system and applying a set of rules to decide if intruder  approaches: rule-based anomaly detection rule-based anomaly detection analyze historical audit records for expected behavior, then match with current behavioranalyze historical audit records for expected behavior, then match with current behavior rule-based penetration identification rule-based penetration identification rules identify known penetrations / weaknessesrules identify known penetrations / weaknesses often by analyzing attack scripts from Internetoften by analyzing attack scripts from Internet supplemented with rules from security expertssupplemented with rules from security experts

Distributed Host-Based IDS

Network-Based IDS  network-based IDS (NIDS) monitor traffic at selected points on a network monitor traffic at selected points on a network in (near) real time to detect intrusion patterns in (near) real time to detect intrusion patterns may examine network, transport and/or application level protocol activity directed toward systems may examine network, transport and/or application level protocol activity directed toward systems  comprises a number of sensors inline (possibly as part of other net device) inline (possibly as part of other net device) passive (monitors copy of traffic) passive (monitors copy of traffic)

NIDS Sensor Deployment

Intrusion Detection Techniques  signature detection at application, transport, network layers; unexpected application services, policy violations at application, transport, network layers; unexpected application services, policy violations  anomaly detection of denial of service attacks, scanning, worms of denial of service attacks, scanning, worms  when potential violation detected sensor sends an alert and logs information used by analysis module to refine intrusion detection parameters and algorithms used by analysis module to refine intrusion detection parameters and algorithms by security admin to improve protection by security admin to improve protection

Distributed Adaptive Intrusion Detection

Intrusion Detection Exchange Format

Honeypots  are decoy systems filled with fabricated info filled with fabricated info instrumented with monitors / event loggers instrumented with monitors / event loggers divert and hold attacker to collect activity info divert and hold attacker to collect activity info without exposing production systems without exposing production systems  initially were single systems  more recently are/emulate entire networks

Honeypot Deployment

SNORT  lightweight IDS real-time packet capture and rule analysis real-time packet capture and rule analysis passive or inline passive or inline

SNORT Rules  use a simple, flexible rule definition language  with fixed header and zero or more options  header includes: action, protocol, source IP, source port, direction, dest IP, dest port  many options  example rule to detect TCP SYN-FIN attack: Alert tcp $EXTERNAL_NET any -> $HOME_NET any \ (msg: "SCAN SYN FIN"; flags: SF, 12; \ reference: arachnids, 198; classtype: attempted-recon;)

Summary  introduced intruders & intrusion detection hackers, criminals, insiders hackers, criminals, insiders  intrusion detection approaches host-based (single and distributed) host-based (single and distributed) network network distributed adaptive distributed adaptive exchange format exchange format  honeypots  SNORT example