Intrusion Detection Systems and Practices

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Second Edition
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
FIREWALLS Chapter 11.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Snort: A Network Intrusion Detection Software Matt Gustafson Becky Smith CS691 Semester Project Spring 2003.
System Security Scanning and Discovery Chapter 14.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Guide to Network Defense and Countermeasures Second Edition
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Intrusion Detection Chapter 12.
COEN 252 Computer Forensics
Intrusion Detection Chapter 12.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
COEN 252 Computer Forensics Collecting Network-based Evidence.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
SNORT Feed the Pig Vicki Insixiengmay Jon Krieger.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Guide to Network Defense and Countermeasures
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
Linux Networking and Security
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
7.5 Intrusion Detection Systems Network Security / G.Steffen1.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
Some Great Open Source Intrusion Detection Systems (IDSs)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
NETWORKS Fall 2010.
Introduction to Networking
Firewalls.
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Intrusion Detection Systems (IDS)
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Presentation transcript:

Intrusion Detection Systems and Practices Chapter 13

Intrusion Detection Terms and Concepts An intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are similar to incidents An incident does not necessarily involve an active system or network device, an intrusion does An intrusion detection system (IDS) is software/hardware that monitors activity on the system or network And delivers an alert if it notices suspicious activity

Intrusion Detection Terms and Concepts (continued) Security policies are either prohibitive or permissive An IDS is sensitive to configuration To achieve the goals of your security policy, you must be able to configure appropriately There are three basic types of IDS errors False positives False negatives Subversion error

Dealing with Intruders Intruders can be external or internal External intruders are hackers or crackers Internal intruders are more common and very dangerous An organizational security policy should state what steps will be taken to handle intrusions Block and ignore Simplest tactic for handling intrusions Block the intruder and address the vulnerability Don’t take any further action

Dealing with Intruders (continued) Block and investigate Block the intruder and address the vulnerability Collect evidence and try to determine the intruder’s identity Although this may result in finding and stopping the intruder, it can be costly and time-consuming Honeypot (bait the intruder) Allow the intruder to access a part of your network Try to catch the intruder while he/she explores This is a potentially dangerous approach The intruder does have at least partial access Crackers may become interested in your site

Detecting Intruders An IDS monitors system activity in some way When it detects suspicious activity, it performs an action The action is usually an alert of some type E-mail, cell phone, audible alert, etc. to a person or process For highly sensitive systems, consider an out-of-band channel that does not depend on the potentially compromised system All IDS systems continuously sample system activity and compare the samples to a database

Principles of Intrusion Detection Systems An IDS must run unattended for extended periods of time The IDS must stay active and secure The IDS must be able to recognize unusual activity The IDS must operate without unduly affecting the system’s activity The IDS must be configurable

Principles of Intrusion Detection Systems (continued)

The IDS Taxonomy Two basic types of intrusions Misuse intrusion: an attack against a known vulnerability Relatively easy to detect because the actions required for the exploit are known (called the attack signature) Anomaly intrusion: an attack against a new vulnerability or one using an unknown set of actions Relatively difficult to detect, must compare current system activity with some normal baseline of activity Two types of IDS that correspond to the two intrusion types Signature based Knowledge based

The IDS Taxonomy (continued) Signature-based IDS Detects misuse intrusions Maintains a database of attack signatures Compares current activity to database Database must be current and complete to be effective Knowledge-based IDS Detects anomaly intrusions Builds a profile of “normal” system activity over time Produces more false positives and requires more administration Requires careful initial configuration

Using Rules and Setting Thresholds for Detection A rule tells the IDS which packets to examine and what action to take Similar to a firewall rule Alert tcp any any -> 192.168.1.0/24 111 (content:”|00 01 86 a5|”;msg:”mountd access”;) Alert specifies the action to take Tcp specifies the protocol Any any 192…. specifies the source and destination within the given subnet 111 specifies the port Content specifies the value of a payload Msg specifies the message to send

Using Rules and Setting Thresholds for Detection (continued) A threshold is a value that represents the boundary of normal activity For example, if the login failure threshold is three, the IDS takes some action after the third failed attempt Action might be to lock the account and notify an administrator Other thresholds include file I/O, network activity, administrator logins and actions

Exploring a Typical IDS Snort is an example of an IDS Freely available Originally written for UNIX, but now available for Windows also Basically a highly configurable packet sniffer, Snort analyzes network traffic in real time

Exploring a Typical IDS (continued) Snort sniffs a packet from the network Preprocessor looks at the packet header and decides whether to analyze it further If so, the detection engine compares pattern from rules to the packet payload If the payload matches, the appropriate action is taken Snort can be used in a plain packet sniffer mode or in full IDS mode Snort has numerous options that are used to configure its activity

Exploring a Typical IDS (continued)

Exploring a Typical IDS (continued)

Exploring a Typical IDS (continued)

Network-Based Versus Host-Based IDS IDS systems are also classified by their intended locations A network-based IDS monitors all traffic on a network segment Can detect intrusions that cross a specific network segment Administrators sometimes place one inside and one outside of a firewall Will not see traffic that passes between LAN computers

Network-Based Versus Host-Based IDS (continued) A host-based IDS examines all traffic and activity for a particular machine Can examine system log files as well as inbound and outbound packets Each system requires its own IDS If resources are available, the best choice is to use both network-based and host-based IDS in your organization Many firewalls provide some IDS functionality

A Network-Based IDS

Choosing an Appropriate IDS The first step in choosing an IDS is to determine what your organization’s security needs are Research the different IDS packages available These change frequently For medium to large organizations, it is common to use both network-based and host-based IDS Make sure you get a product you have confidence in

Security Auditing with an IDS Every organization should have periodic security audits Sometimes mandated by law or by corporate structure An IDS can contribute to a complete audit Many host-based IDS can scan and analyze system log files They can act as a filter for various behaviors A port-sniffing IDS can help to profile network activity Providing a picture of system activity over time

Summary An intrusion is the use of a system without authorization An intrusion detection system (IDS) is hardware or software that monitors system activity, and looks for and responds to suspicious behavior Intruders can be external or internal Responses to intruders are block and ignore, block and investigate, and honeypot A set of five principles should be applied to the selection of an IDS

Summary Two basic types of intrusions are misuse intrusion and anomaly intrusion Corresponding IDS types are signature-based and knowledge-based A signature-based IDS compares attack signatures to a signature database A knowledge-based IDS compares threshold values to current activity Snort is a typical, freely available, IDS

Summary A network-based IDS monitors all traffic on a network segment A host-based IDS monitors activity on a particular machine The choice of an IDS should be based on the organization’s security needs and its resources It is common to implement both network-based and host-based IDS in medium and large organizations Auditors can use IDS capabilities to assist in completing a thorough audit