1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.

Slides:



Advertisements
Similar presentations
Intrusion Detection System(IDS) Overview Manglers Gopal Paliwal Gopal Paliwal Roshni Zawar Roshni Zawar SenthilRaja Velu SenthilRaja Velu Sreevathsa Sathyanarayana.
Advertisements

Intrusion Detection System Snort. What is Snort? Free and Open Source Intrusion Detection System Monitor network traffic Scan for protocol anomalies Scan.
Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Snort: A Network Intrusion Detection Software Matt Gustafson Becky Smith CS691 Semester Project Spring 2003.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Guide to Network Defense and Countermeasures Second Edition
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Intrusion Detection Systems and Practices
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion Detection CS-480b Dick Steflik. Hacking Attempts IP Address Scans scan the range of addresses looking for hosts (ping scan) Port Scans scan.
Information Networking Security and Assurance Lab National Chung Cheng University Analysis Console for Intrusion Databases.
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Host Intrusion Prevention Systems & Beyond
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
INTRUSION DETECTION SYSTEM
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Intrusion Detection Chapter 12.
COEN 252 Computer Forensics
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
Intrusion Detection Chapter 12.
Intrusion Detection Systems. A properly implemented IDS is watched by someone besides your system administrators, such as security personnel.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Intrusion Detection Systems Austen Hayes Cameron Hinkel.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Guide to Network Defense and Countermeasures
Linux Networking and Security
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Intrusion Intrusion Detection Systems with Snort Hailun Yan 564-project.
Intrusion Detection Cyber Security Spring Reading material Chapter 25 from Computer Security, Matt Bishop Snort –
1 HoneyNets, Intrusion Detection Systems, and Network Forensics.
Security fundamentals Topic 13 Detecting and responding to incidents.
PERIMETER SECURITY Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
SIEM Rotem Mesika System security engineering
CompTIA Security+ Study Guide (SY0-401)
IDS Intrusion Detection Systems
Snort – IDS / IPS.
NETWORKS Fall 2010.
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
CompTIA Security+ Study Guide (SY0-401)
NETWORK SECURITY LAB Lab 9. IDS and IPS.
Intrusion Detection system
Presentation transcript:

1

 To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate the IDS policy 2

 IDS location  Honey pots vs. IDS  IDS policy 3

 NIDS  E.g. Snort or Cisco Secure IDS  Monitor network traffic or suspicious activity  Often reside on subnets that are directly connected to the firewall, as well as at critical points on the internal network  HIDS  E.g. Tripwire or ISS BlackICE  Resides on monitor individual hosts mms© 4

 IDS  Like a burglar alarm system in the network. It detects and alerts on malicious events  Many different IDS sensors placed at strategic points in your network  Watch for predefined signatures of malicious events, and might perform statistical and anomaly analysis  When detects suspicious events,  it alerts in several different ways:  E.g. , paging, or simply logging the occurrence  Reports to a central database that correlates their information to view the network from multiple points mms© 5

6

 Depending upon your network topology  Depend upon what type of intrusion activities you want to detect – internal, external, or both  Depends on security policy mms© 7

Example scenario:  If you want to detect only external intrusion activities and have only 1 router connecting to the Internet Recommendation:  The best place for IDS may be just inside the router or a firewall  If you have multiple paths to the Internet, you may want to place one IDS box at every entry point  However, if you want to detect internal threats as well, you may want to place a box in every network segment. mms© 8

Typical locations for an IDS:  Behind each firewall and router  If your network contains a DMZ (demilitarized zone), IDS may be placed in that zone as well  However, alert generation policy should not be as strict in a DMZ compared to private parts of the network mms© 9

Consists of:  Snort  data is captured and analyzed  MySQL  DB based on captured data from Snort  Apache web server  Help from ACID, PHP, PHPLOT  Displays data in browser windows to user mms© 10

11 A user looking at intrusion data collected by Snort through web browser MySQL Database Apache web server with PHP, GD Library, and PHPLOT installed Snort server captures the intruder data and stores it in MySQL database using output plug-in Intruder tries to attack hosts present on this network mms©

 You can build a single computer with Snort, MySQL, Apache, ACID, PHP, PHPLOT, and GD library 12 A user looking at intrusion data collected by Snort through web browser Intruder tries to attack hosts present on this network A computer with Snort, MySQL, Apache, ACID, PHPLOT, GD library installed

 In the enterprise – have multiple Snort sensors behind every router or firewall.  In that case, can use a single centralized DB to collect data from all sensors  Can run Apache web server on this centralized DB server 13 mms©

14 mms© A user looking at intrusion data collected by Snort through web browser Network cloud Centralized DB server running MySQL, Apache, ACID, PHPLOT, GD library Snort sensor

 Sniffer  Packet Logger  IDS  Free and Open Source IDS  Monitor network traffic  Scan for protocol anomalies  Scan for packet payload signatures that represent potential attacks, worms, and unusual activities  Monitoring consoles available  Can be configured as an IPS mms© 15

Previously logged network traffic Snort rules Network traffic log Alerts (file) Alerts (Database) Snort NIDS Live network traffic OR 16

 Snort Tap Placement  Natural Choke Points  Areas where the network topology creates a single traffic path  Artificial Choke Points  Exist due to logical topology of the network  Intranet Trust/Un-trust Zone Boundaries  Similar to Natural Choke Points but are intra-network mms© 17

[!] [!]  Primarily a signature based detection engine  Example:  While indicative of attacks, leaks, and protocol violations, false positives are generated mms© 18

mms© Example 1: “log tcp traffic from any port going to ports less than or equal to 6000” log tcp any any -> /24 :6000 Example 2: RPC alert call alert tcp any any -> / (rpc: , *,3; msg:RPC getport (TCP);) see Snort Users Manual for more information 19

mms© 20

mms© 21

mms© 22

 BASE (Basic Analysis and Security Engine)  Number of unique alerts  Alerts ordered by category  Today’s alert  Most frequent src/dest ports mms© 23

24 mms©

25 mms©

26 mms©

27 mms©

 ~ a system that is deliberately named and configured so as to invite attack  Goals:  Make it look inviting  Make it look weak and easy to crack  Instrument every piece of the system  Monitor all traffic going in or out  Alert administrator whenever someone accesses the system  Trivial honey pots can be built using tools like:  tcpwrapper  Restricted/logging shells (sudo, adminshell) 28 mms©

 Pros:  Easy to implement  Easy to understand  Reliable  No performance cost  Cons:  Assumes hackers are really stupid – they aren’t! 29 mms©

 When should you install:  …if your organization has enough resources (hardware and personnel) to track down hackers.  Otherwise, no need to install a honey pot, as you can’t use the data  A honey pot is useful only if you want to use the info gathered  Also if you want to prosecute hackers by gathering evidence of their activities 30 mms©

 project.honeypot.org/  Honeyd:  South Florida Honeynet Project:  etc… 31 mms©

 Before you install an IDS on your network, you must have a policy:  To detect intruders and take action when you find such activity  A policy must dictate IDS rules and how they will be applied  Depending upon your requirements  Who will monitor the IDS  Who will administer the IDS, rotate logs and so on  Who will handle incidents and how  What will be the escalation process (level 1, level 2, and so on)  Reporting  Signature updates  Documentation is required for every project 32 mms©

 Snort provides another tool in the toolkit and can help provide info about exactly who is talking to whom on the network  The usage of different types of IDS depends on the type of the user/organization  Different types of IDS has its own strengths and weaknesses  To position the IDS in the network depends on your network topology and the type of intrusion activities you want to detect  Based on the IDS policy you will get a clear idea on how many IDS sensors and other resources are required for your network 33