Behavior Intrusion Detection: Enhanced Hakan Evecek Rodolfo Ortiz Hakan Evecek Rodolfo Ortiz.

Slides:



Advertisements
Similar presentations
Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
Advertisements

VOYAGER: Yet Another Secure Web Browser to Demonstrate Secure Socket Layer Working and Implementation By : Shrinivas G. Deshpande Advisor: Dr. Chung E.
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
Anomaly Detection Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
History DHCP was first defined as a standards track protocol in RFC 1531 in October 1993, as an extension to the Bootstrap Protocol (BOOTP). The motivation.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Common IS Threat Mitigation Strategies An overview of common detection and protection technologies Max Caceres CORE Security Technologies
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Intrusion Detection CS-480b Dick Steflik. Hacking Attempts IP Address Scans scan the range of addresses looking for hosts (ping scan) Port Scans scan.
Report on statistical Intrusion Detection systems By Ganesh Godavari.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Big Data Analytics and Challenge Presented by Saurabh Rastogi Asst. Prof. in Maharaja Agrasen Institute of Technology B.Tech(IT), M.Tech(IT)
seminar on Intrusion detection system
Autonomous Anti-DDoS Network V2.0 (A2D2-2) Sarah Jelinek University Of Colorado, Colo. Spgs. Spring Semester 2003, CS691 Project.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Host Intrusion Prevention Systems & Beyond
Lecture 11 Intrusion Detection (cont)
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
IDS Mike O’Connor Eric Tallman Matt Yasiejko. Overview IDS defined IDS defined What it does What it does Sample logs Sample logs Why we need it Why we.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS: Technical Seminar Presentation by MANOJ KUMAR GANTAYAT.
Chapter 6: Packet Filtering
Network Flow-Based Anomaly Detection of DDoS Attacks Vassilis Chatzigiannakis National Technical University of Athens, Greece TNC.
IIT Indore © Neminah Hubballi
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
FEATURES & FUNCTIONALITY. Page 2 Agenda Main topics Packet Filter Firewall Application Control Other features.
Signature Based and Anomaly Based Network Intrusion Detection
Intrusion Detection Systems Austen Hayes Cameron Hinkel.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
FlowScan at the University of Wisconsin Perry Brunelli, Network Services.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 10 Conducting Security Audits.
Learning Rules for Anomaly Detection of Hostile Network Traffic Matthew V. Mahoney and Philip K. Chan Florida Institute of Technology.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
Chapter 10 Conducting Security Audits. Objectives Define privilege audits Describe how usage audits can protect security List the methodologies used for.
.  Define privilege audits  Describe how usage audits can protect security  List the methodologies used for monitoring to detect security-related.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Module 7: Advanced Application and Web Filtering.
Open-Eye Georgios Androulidakis National Technical University of Athens.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Security System for KOREN/APII-Testbed
MITRE 7 April 2009 CS 5214 Presenter: Phu-Gui Feng Performance Analysis of Distributed IDS Protocols for Mobile GCS Dr. Jin-Hee Cho, Dr. Ing-Ray Chen MITRE.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Network Intrusion Detection System (NIDS)
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Some Great Open Source Intrusion Detection Systems (IDSs)
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Basics of Intrusion Detection
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Outline Introduction Characteristics of intrusion detection systems
Presentation transcript:

Behavior Intrusion Detection: Enhanced Hakan Evecek Rodolfo Ortiz Hakan Evecek Rodolfo Ortiz

GOALS 1.Discuss the characteristics of a Behavior Intrusion Detection Systems 2.Monitor the timing for a sequence of DNS, ICMP, HTTP/HTTPS packets. 3.Provide the results. 4.Analyze the behavior of protocols when firewall enabled/disabled. 5.Present an approach to prioritize suspicious packets. 6.How to enhance Behavior IDS

WHAT IS IDS? IDS is concerned with the detection of hostile actions towards a computer system or network. There are two types:  Anomaly detection (Behavior IDS)  Signature detection

OVERVIEW OF BIDS They can be described as an alarm for strange system behavior. Based on statistics. Advantages  They don’t need to know the details of an attack  Dynamic, they are automatically updated Disadvantages  Many false positives are generated during the sensor training  The training must be extensive so that the baseline is accurate

OVERVIEW OF BIDS Anomalies to be detected:  Traffic to unused ports  Non standard service assigned to one standard port (port 80 set for peer sharing)  Too much UDP/TCP traffic  More bytes coming to a HTTP server than outgoing bytes

Measure timing for DNS, ICMP and HTTP/HTTPS Establish a baseline for different packet sequences Label packets outside the baseline for further analysis IDS Outer (FC4) Intra1 (XP) Internet DLink SW2 DNS Server Web Server Intranet ( /24) DLink SW1 Intra2(win2003) DMZ ( /24) HP5000 SW Firewall IDS Inner (FC4) Firewall (FC4) THE PROJECT IDS Sensor DB IDS Sensor

ICMP Intra1 (XP) ICMP Request ICMP Reply Firewall D C B A SERVER IDS Inner

DNS DNS SERVER DNS Request DNS Reply Firewall IDS Inner D C B A Intra1 (XP)

HTTP

SERVER HELLO CERTIFICATE SERVER KEY EXCHANGE CERTIFICATE REQUEST SERVER HELLO DONE HTTPS

Units are in seconds. In a normal distribution, approximately 99.7% of the population will be in the interval defined by works well for the upper bound, but the lower bound is defined by Using the formula above, we get a confidence interval  3  DATA OBTAINED  1   3 

Firewall Blue-enabled Pink-disabled Packets outside the range in a circle 3 times standard deviation ICMP Time (sec) Packet Sequence Number

Firewall Blue-enabled Pink-disabled Packets outside the range in a circle 3 times standard deviation DNS Time (sec) Packet Sequence Number

Firewall enabled Blue-HTTP Pink-HTTPS Packets outside the range in a circle 3 times standard deviation HTTP vs. HTTPS Time (sec) Packet Sequence Number

HTTP vs. HTTPS Firewall disabled Blue-HTTP Pink-HTTPS Packets outside the range in a circle 3 times standard deviation Time (sec) Packet Sequence Number

HTTP vs. HTTPS

Using the standard deviation, the intervals will be defined. Starting from 3 times for upper bound and 1 time for lower bound. Label the suspicious packets and give them priorities based on their distance from the confidence interval. Upper boundLower bound PROPOSED APPROACH  3   1 

Firewall enabled ICMP 6 times standard deviation (higher priority) 3 times (lower priority) Confidence interval 1 time (lower priority) 2 times (higher priority) Time (sec) Packet Sequence Number

Firewall enabled DNS 6 times standard deviation (higher priority) 3 times (lower priority) Confidence interval 1 time (lower priority) 2 times (higher priority) Time (sec) Packet Sequence Number

Firewall enabled HTTP 6 times standard deviation (higher priority) 3 times (lower priority) Confidence interval 1 time (lower priority) 2 times (higher priority) Time (sec) Packet Sequence Number

Firewall enabled HTTPS 6 times standard deviation (higher priority) 3 times (lower priority) Confidence interval 1 time (lower priority) 2 times (higher priority) Time (sec) Packet Sequence Number

The suspicious packets are defined. Then prioritize/label the packets based on the distance from the mean. How do we know it’s an attack? Define a behavior for each kind of attack, e.g. worms SUSPICIOUS PACKETS

Based on “ A behavioral approach to worm detection” [20] Need to look for this pattern of information –behavioral signature- in the database. WORMS BEHAVIOR CA A:? -> C:D C:? -> E:D Host A and C and E are infected D is port number

 What to do with the packet? How to know if it is from an intruder?  What data do we need to store?  How to collect the data towards an automated process?  How can SNORT create the intervals automatically?  Implement the approach in SNORT’s source code  Analyzing other protocols FUTURE WORK

 Analyzing other scenarios like an internet server instead of a local server  Analyze wireless communication  DNSSecure  Behavioral signatures for other attacks FUTURE WORK

Timing is important and we also need to look at other variables, like performance before making a decision. This decreases false positives. The intervals work in the studied protocols, results may change for other protocols. Intervals need to be tested using attacks like DDoS, worms, etc. HTTP and HTTPS graphs are different because more information is exchanged and timing varies. CONCLUSION

Network Intrusion Detection. Stephen Northcutt, Judy Novak. New Riders 2003 Defending yourself: The role of Intrusion Detection Systems. Jon McHugh, Alan Christie and Julia Allen Design of an Autonomous Anti-DdoS Network (A2D2). Angela Cearns Thesis, 2002 Intrusion detection with SNORT. Rafeeq Ur Rehman. Prentice Hall 2003 REFERENCES

QUESTIONS?