Introduction to Intrusion Detection Systems Presented by Parwez.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Auditing Computer-Based Information Systems
Lecture 1: Overview modified from slides of Lawrie Brown.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
IDS/IPS Definition and Classification
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 Intrusion Detection CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 4, 2004.
Unsupervised Intrusion Detection Using Clustering Approach Muhammet Kabukçu Sefa Kılıç Ferhat Kutlu Teoman Toraman 1/29.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
seminar on Intrusion detection system
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Building Survivable Systems based on Intrusion Detection and Damage Containment Paper by: T. Bowen Presented by: Tiyseer Al Homaiyd 1.
Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Supervised By: Mohammad F. Tolba Mohammad S. Abdel-Wahab.
WAC/ISSCI Automated Anomaly Detection Using Time-Variant Normal Profiling Jung-Yeop Kim, Utica College Rex E. Gantenbein, University of Wyoming.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Cryptography and Network Security
Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing.
IIT Indore © Neminah Hubballi
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Operating system Security By Murtaza K. Madraswala.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Intrusion Control. CSCE Farkas2 Readings Lecture Notes Pfleeger: Chapter 7.5.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Intrusion Detection State of the Art/Practice Anita Jones University of Virginia.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Intrusion Detection System
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
A Blackboard-Based Learning Intrusion Detection System: A New Approach
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors : Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Some Great Open Source Intrusion Detection Systems (IDSs)
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Ch.22 INTRUSION DETECTION
Intrusion Control.
Operating system Security
Evaluating a Real-time Anomaly-based IDS
A Real-time Intrusion Detection System for UNIX
Intrusion Detection Systems
Intrusion Detection system
Operating System Concepts
Presentation transcript:

Introduction to Intrusion Detection Systems Presented by Parwez

Overview of Seminar Introdcution Need for Intrusion Dectection Systems Classification of Systems Anomaly Detection Misuse Detection Other Models and Directions Conclusion

Introduction The networking revolution has come of age. Internet is changing computing. The possibilities and oppurtunities are limitless. Risks and chances of malicious intrusions is increasing. Intrusion attempt: The potential possibility of a deliberate unauthorized attempt to Access Information Manipulate Information Render a system unreliable or unusable.

The need for IDSs A computer system should provide Confidentiality Integrity Assurance Subversion attempts try to exploit flaws in the operating system as well as in application programs and have resulted in spectacular incidents like the Internet Worm incident of 1988.

Ways to handle subversion attempts Prevent subversion by building a completely secure system. We could require all users to identify and authenticate themselves. We could protect data by various cryptographic methods and very tight access control mechanisms. Limitations Complete security not possible in real life. Transition will be long in coming. Cryptograhic methods have their own problems. Abuse by insiders who abuse their privilages. The stricter the mechanisms the lower the efficiency.

An Intrsusion Detection System(IDS) An IDS detects attacks as soon as possible and takes appropriate action. An IDS does not usually take preventive measures when an attack is detected. It is a reactive rather than a pro-active agent. It plays a role of informant rather than a police officer.

IDS(Contd.) The most popular way to detect intrusions has been using the audit data generated by the operating system. And audit trail is a record of activities on a system that are logged to a file in chronologically sorted order. Audit trails are particularly useful in establishing the guilt attackers. They are often the only way to detect unauthorized but subversive user activity.

IDS (Contd.) Eugene Spafford reports: Information theft is up over 250% in the last 5 years. 99% of all major companies report at least one major incident. Telecom and computer fraud totaled $10 billion in the US alone. Since it seems obvious that we cannot prevent subversion, we should at least ry to detect it and prevent similar attacks in future.

Terminology used in IDSs Risk : Accidental exposure of information, or voilation of operations integrity due to the malfunction of hardware or incomplete or incorrect software design. Vulnerability: A known or suspected flaw in the h/w or s/w or operation of a system that exposes the system to penetration or its information to accidental disclosure. Attack: A specific formulation or execution of a plan to carry out a threat. Penetration: A successful attack.

Classification of IDSs Attempted break-ins Masquerade attacks Penetration of the security control system Leakage Denial of service Malicious use Techniques: Anomaly Detection Misuse detection

Anomaly Detection Systems Anomaly detection systems(ADSs) assume that all intrusive activities are necessarily anomalous. Anomalous activities that are not intrusive are flagged as intrusive. Intrusive activities that are not anomalous result in false negatives(events are not flagged intrusive, though they actually are) ADSs are also computationally expensive because of the overhead of keeping track of, and possibly updating several system profile metrics.

ADSs(Contd.) A typical anomaly detection system Audit DataSystem Profile attack state Update Profile generate new profiles dynamically statistically devalant ?

Approaches to ADSs Statistical approaches Behaviour profiles for subjects are generated. The aomaly detector constantly generates the variance of the present profile from the original one. They adaptively learn the behavior of users. Potentially more sensitive than humans. Problems with Statistical approaches They can gradually be trained by intruders so that eventually, intrusive events are considered normal. It is not known exactly what the subset of all possible measures that accurately predicts intrusive activities is.

Approaches to ADSs(Contd.) Predictive pattern generation This method tries to predict future events based on the events that have already occurred. We could have a rule E1 – E2 --> (E3 = 80%, E4 =15%, E5 = 5%) The problem is that some intrusion scenarios that are not described by the rules will not be flaged intrusive. Advantages: Rule based sequential patterns can detect anomalous activities that were difficult with traditional methods. Systems built using this model are highly adaptive to changes. It is easier to detect users who try to train the system during its learning period. Anomalous activities can be detected and reported within seconds of recievig audit events.

Approaches to ADSs(Contd.) Neural Networks The ides here is to train neural netwrk to predict a user’s next action or command, given the window of n previous actions. Advantages: They cope with noisy data Their success does not depend on any statistical assumption about the nature of the underlyning data They are easier to modify for new user communities Problems: A small window will result in false positives, a large window will euslt in irrelevant data as well as increase the chance of false negatives. The net topology is only determined after considerable trail and error. The intruder can train the net during its learming phase.

Misuse Detection Systems(MDSs) The concept behind the MDSs is that there are ways to represent attacks in the form of a pattern or a signature so that even variations of the same attack can be detected. They can detect many or all known attack patterns, but they are of little use for unknown attack methods. Misuse detection systems try to recognize known “bad” behavior.

MDSs (Contd.) A typical misuse detection system Audit DataSystem Profile attack state Rule match ? modify existing rules Add new rules Timing Information

Types of MDSs Expert systems These are modelled in such a way as to separate the rule matching phase from the action phase. Ex: NIDES developed by SRI. NIDES follows a hybrid ID technique. It builds user profiles based on many differrent criteria. The expert system misused detection component encodes known scenarios and attack patterns

Types of MDSs (Contd.) Key Stroke Monitoring This is a very simple technique that monitors keystrokes for attack patterns. Features of shells in which user definable aliases are present defeat the tecnique unless alias expansion and semantic analysis of commands is taken up. Operating systems do not offermuch support for keystroke capturing, so the keystroke monitor should have a hook that analyses keystrokes before sending them to their intended reciever. An improvement would be to monitor system calls by application programs as well.

Types of MDSs (Contd.) Model Based Intrusion Detection This states that certain scenarios are inferred by certain other observable activities. The model based scheme consists of three important modules The antcipator uses the active models and the scenario models to try to predict the next step in the scenario that is expected to occur. The planner then translates this hypothesis into a format that shows the behavior as it would occur in the audit trail. The interpreter then searches for this data in the audit trail. The system proceeds in this way, accumulating more and more evidence for an intrusion attempt until a threshold is crossed.

Types of MDSs (Contd.) State Transition Analysis The monitored system is presented as a state transition diagram. As data is analyzed, the system makes transitions from one state to another. A transition takes place on some boolean condition being true. Drawbacks Attack patterns can specify only a sequence of events, rather than more complex forms. There are no general purpose methods to prune the search except through the assertion primitives. They can’t detect denail of service attacks.

Types of MDSs (Contd.) Pattern Matching This model encodes known intrusion signatures as patterns that are then matched against the auidt data. The implementation makes transitions on certain events called labels, and boolean variables called guards can be placed at each transition. Advantages Declarative Specification Multiple event streams Portability Real-time capabilities

Other Models Generic Intrusion Detection Model Independent of any particular system, application environment, system vulnerability, or type of intrusion. Network Security Monitor It is an Intrusion Detection System developed at the UC-Davis. NSM is a network based IDS that differs from all of the IDSs as it doesn’t use or analyze the host machines(s) audit trails.

Conclusions Future research trends seem to be converging towards a model that is hybrid of the anomaly and misuse detection models. It is slowly acknowledged that neither of the models can detect all intrusion attempts on their own.

???