CISCO Secure Intrusion Detection System

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

FIREWALLS Chapter 11.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Guide to Network Defense and Countermeasures Second Edition
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
Host Intrusion Prevention Systems & Beyond
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
IDS Mike O’Connor Eric Tallman Matt Yasiejko. Overview IDS defined IDS defined What it does What it does Sample logs Sample logs Why we need it Why we.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
Intrusion Detection Chapter 12.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Guide to Network Defense and Countermeasures
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Computer Emergency Notification System (CENS)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Chapter 5: Implementing Intrusion Prevention
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
© 2003, Cisco Systems, Inc. All rights reserved. CSIDS 4.0—15-1 Chapter 15 Blocking Configuration.
Intrusion Detection Reuven, Dan A. Wei, Li Patel, Rinku H.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Cryptography and Network Security Sixth Edition by William Stallings.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
SIEM Rotem Mesika System security engineering
CompTIA Security+ Study Guide (SY0-401)
IDS Intrusion Detection Systems
Proventia Network Intrusion Prevention System
Working at a Small-to-Medium Business or ISP – Chapter 8
Click to edit Master subtitle style
Firewalls.
CompTIA Security+ Study Guide (SY0-401)
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

CISCO Secure Intrusion Detection System Marsa Rayani Maryam Shahpasand Ali Falsafi

Contents: Introduction CSIDS definition CSIDS components CSIDS features CSIDS Platforms Cisco Security Agent Advantages Disadvantages CSIDS VS. Snort Summery references

Introduction: Cisco security experts believe that The most effective intrusion detection strategy is to implement both host-based and network-based IDS. Typically, most organizations implement network-based IDS first, because it’s effective against attacks originating externally. Adding host-based IDS further enhances protection from attack, especially from attacks that are generated from internal sources.

To achieve these elements, Cisco implements a line of IDS products that can be integrated into current network routers switches deployed as separate IDS appliances run as software applications on management workstations.

Cisco Secure IDS is a network-based intrusion detection system that uses a signature database to trigger intrusion alarms

Components: The major components are: Sensor Configuration Manager Event Manager Software

Components : Sensor : This performs real-time monitoring of network traffic, searching for patterns that could represent an attack.

Performance of the Sensor when it detects an attack: No action Shun (shunning) refers to the complete blocking of any traffic from the offending host or subnet Log (logging) refers to both attack event alarms and whole suspicious IP session logs Shun + log TCP connection reset TCP connection reset + shun TCP connection reset + log TCP connection reset + shun + log

Configuration manager : The configuration manager provides configuration management for the sensor pushing configuration and policy settings to the sensor. The configuration manager may be co-located with the sensor (typical for smaller sensor deployments) or may be separately located at a central location (typical for larger sensor deployments).

Event manager : The event manager is used to collect events generated by sensors. Cisco Secure IDS event management platforms include a Network Security Database (NSDB), which includes detailed information about each attack that is detected by a sensor. This information provides analysis support for security administrators who must decipher and respond to detected attacks. Cisco Secure IDS sensors have extremely limited event management capabilities; hence the event manager is always separate from the sensor. (An event is most often an alarm, which is generated if the sensor detects intrusive activity on the network it’s currently monitoring. )

Software: Cisco Secure IDS (CSIDS) isn’t just a set of hardware components—it also includes software that has evolved over years.

Communication between Sensor and management platform: To communicate messages between the management platform and the sensor platform, Cisco Secure IDS uses a proprietary protocol called the PostOffice protocol. This protocol provides numerous necessary features, such as the following: Reliability Redundancy Fault tolerance

Reliability 1 When a sensor generates an alarm, it transmits this information to the Director platform. The sensor needs to guarantee that the Director received the alarm information. The PostOffice protocol supports guaranteed delivery by requiring an acknowledgment for every message sent When the sensor sends a message to the Director, the Director must reply with an acknowledgment within a predetermined length of time. If the acknowledgment is not received, the sensor retransmits the message repeatedly until the acknowledgment is received. 2

Redundancy In many network topologies, you want a sensor to transmit alarm messages to multiple Directors. Notifying multiple Directors enables you to inform multiple personnel when sensors detect intrusive activity on your network. The PostOffice protocol enables sensors to propagate messages up to 255 destinations .This feature allows for redundant alarm notifications, which ensures that the appropriate personnel are notified when an alarm is received.

Fault Tolerance With the PostOffice protocol, you can have up to 255 alternate IP addresses for a single host. These alternate IP addresses represent different network interface cards (NICs) on your multi homed Director. The alternate routing protocol automatically switches to the next IP address on your Director whenever the current connection fails. It also uses a system watchdog to detect when a connection to the preferred IP address is reestablished, at which time the sensor reverts to the primary address. To obtain the highest fault tolerance, you also need to ensure that multiple paths exist to the different NICs on your Director. Therefore, a single network failure is unlikely to prevent your sensor from communicating with your Director

Cisco Secure IDS Features Cisco offers a rich IDS product set that is part of Cisco’s SAFE enterprise security blueprint. Cisco Secure IDS has many features that let you effectively detect and respond to security threats against your network. It provides the following fundamental capabilities: Alarm display and logging Intrusion response Remote sensor configuration and management These features are discussed in the following sections.

Alarm Display and Logging When a sensor detects an attack, it sends an alarm to the event management platform. On the event management platform, a graphical user interface (GUI) displays these alarms in real time, color-coding each alarm based on its severity. This display provides a quick indication that an attack has occurred and how dangerous the attack is. The sensor can also log more detailed alarm information in a local text-based log file, which allows for in-depth analysis of attack data and the use of custom scripts to present alarm data specific to your requirements.

Intrusion Response The Cisco Secure IDS sensor can directly respond to an attack using one or more of the following methods: TCP reset IP blocking IP logging

TCP reset: The TCP reset response is available only for TCP- based attacks. It’s implemented by the sensor sending a TCP reset packet to the host that is being attacked (the target). This causes the attacked system to close the connection, destroying any processes and memory associated with the connection.

IP blocking The IP blocking response (also known as shunning) allows a sensor to apply an access control list (ACL) to a perimeter router interface, blocking IP connectivity from an attacking system. You can also manually block a host or network from the sensor management platform if you see any suspicious activity

IP logging When a sensor detects an attack, an alarm is generated and forwarded to the event management platform. The IP logging response allows a sensor to write alarm information to a local log file as well. The information written to the log file contains much more information than is sent to the event management platform, so you can use this option to provide detailed analysis of specific attacks.

Remote Sensor Configuration and Management Cisco Secure IDS sensor management platforms let you centrally manage and monitor multiple sensors located throughout your network. All sensor-related configurations are stored on a configuration management platform. configuration management platform is responsible for pushing these configurations out to each sensor. Configuration attributes include the types of intrusive activity (signatures) that each sensor should monitor.

Other Features Cisco Secure IDS also includes an Active Updates feature, which allows customers to subscribe to regular e-mail notifications generated by the Cisco Countermeasures Research Team (C-CRT). download new signature updates to a central location on the network, and then have multiple sensors automatically update their signature databases on a regular basis. Customize signatures: you create your own signatures that can detect some new attack. This functionality is provided by a complete signature language, which is similar to a scripting language, providing a powerful tool for customization.

Cisco Secure Sensor Platforms The sensor platform is the most critical component of Cisco Secure IDS, because it detects, responds to, and reports intrusion activity to the sensor management platform. Each sensor is a hardware appliance that has been secured for the environment it works in, optimized for performance, and designed for ease of maintenance.

The sensor uses an extensive signature database that allows it to capture security attacks in realtime from large amounts of IP traffic. Sensor possesses packet-reassembly features that prevent IDS bypass techniques. Once an attack is detected, the sensor sends an alarm to an event management platform and can optionally place that alarm information in a local log file. The sensor can also automatically reset a TCP- based connection that is associated with the attack and/or block the source IP address of the attacking system.

Cisco produces three main sensor platforms dedicated to IDS: 4200 series sensors Catalyst 6000/6500 IDS module (IDSM) Cisco 2600/3600/3700 IDS network modules

Sensors Interface All of these sensor platforms are passive sensors, in that they passively monitor network traffic traversing one or more segments for intrusive activity. Each of these sensors contains two interfaces: Command-and-control interface Monitoring interface

Command-and-control interface provides a management interface for the sensor. The command-and-control interface allows the sensor to be managed via TCP/IP. lets the sensor send alarms to the event management platform. The command-and-control interface is the only interface that contains an IP address.

Monitoring interface The monitoring interface operates in promiscuous mode, capturing all traffic on the attached segment and passing it to the IDS application for analysis. The monitoring interface doesn’t have an IP address. ensuring that the sensor can be placed on an insecure segment and not be subjected to an attack itself

Cisco Security Agent The Cisco Security Agent consists of server and desktop agents. The security agent resides between the operating system kernel and applications. enabling visibility of all system calls to memory, file, network, Registry, and COM object resources. Cisco Security Agent is an example of an anomaly- based intrusion detection system. It is useful for detecting new attacks that are often impossible to detect with signature-based intrusion detection systems such as Cisco Secure IDS sensors

The Cisco Security Agent provides a variety of features that ensure that critical systems and applications are protected from attacks. It’s designed to detect known and unknown attacks based on the following intrusive activities: Probing Penetration Persistence Propagation Paralyzing

Probing Probing relates to the activities associated with reconnaissance being performed against the host or an attempt to break into a host by guessing security information. The following are some of the probe attacks that the Cisco Security Agent detects: Ping Port scans Password and username guessing

Penetration Penetration refers to the process of gaining unauthorized access to processes running and/or data stored on the target system. The Cisco Security Agent can detect a possible attack based on events that indicate the host is in the process of being compromised or penetrated. The following are some of the events related to penetration attacks that the Cisco Security Agent detects: Mail attachments Buffer overflows ActiveX controls Back doors

Persistence Persistence refers to events that result from a successful attack and subsequent infection of a host system. The following are some of the events that indicate that a system has been compromised and that some form of unauthorized action, application, or service is present: File creation File modification Security settings modification Installation of new services Trap doors

Propagation Propagation refers to the automatic self- replication of an attack to other systems after an initial target system has been infected. There are some of the events related to propagation that the Cisco Security Agent detects: E-mail copies of the attack Web and FTP connections Internet Relay Chat (IRC) connections Propagation via file shares

Paralyzing Paralyzing refers to the complete or partial removal of the availability and responsiveness of computing resources on a target system. The following are some of the events related to system paralysis that the Cisco Security Agent detects: File modification and deletion Computer crashes Denial of service Stealing of sensitive/confidential information

Advantages: Accurate attack detection Intelligent attack investigation Ease of security management Flexible deployment options for all network design models and topologies you can create your own signatures that can detect some new attack.

Cont. combines leading Cisco security solutions with a rich ecosystem of complementary programs, products, partners and services. Focuses on large businesses Assumes a security policy

Disadvantaged Expensive Black box design, you’ll have no idea why it does anything that it does. Closed signature language, you have no ability to see what or how they’re trying to detect anything. Difficult to install. Difficult to administer

CSIDS VS Snort Battle of Open Source VS Commercial! Snort has a better GUI. Snort biggest advantage is COST. CSIDS is better at both IP fragment and TCP session reassembly. CSIDS has an excellent support and services. For small environments where funds are very limited, snort is probably the better solution. For large enterprises, Cisco would probably be the better choice.

References www.cisco.com CCSP Complete study book by Cisco www.net-security.org/ www.ciscopress.com/articles https://itaudit.sans.org/community/papers/aud iting-cisco-secure-ids-system-auditors- perspective_114