Intrusion Detection CS-480b Dick Steflik. Hacking Attempts IP Address Scans scan the range of addresses looking for hosts (ping scan) Port Scans scan.

Slides:



Advertisements
Similar presentations
Intrusion Detection System(IDS) Overview Manglers Gopal Paliwal Gopal Paliwal Roshni Zawar Roshni Zawar SenthilRaja Velu SenthilRaja Velu Sreevathsa Sathyanarayana.
Advertisements

1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Guide to Network Defense and Countermeasures Second Edition
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Intrusion Detection Systems and Practices
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Computer Security and Penetration Testing
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
Host Intrusion Prevention Systems & Beyond
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
INTRUSION DETECTION SYSTEM
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
USENIX LISA ‘99 Conference © Copyright 1999, Martin Roesch Snort - Lightweight Intrusion Detection for Networks Martin Roesch.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Agenda Review route summarization Cisco acquire Sourcefire Review Final Exam.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Linux Networking and Security
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Snort - Lightweight Intrusion Detection for Networks YOUNG Wo Sang Program Committee, PISA
Cryptography and Network Security Sixth Edition by William Stallings.
1 ForeScout Technologies Inc. Frontline Defense against Network Attack Tim Riley, Forescout.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Some Great Open Source Intrusion Detection Systems (IDSs)
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Outline Securing your system before the IDS and some tools to help you
IDS Intrusion Detection Systems
Snort – IDS / IPS.
CSCE 548 Student Presentation By Manasa Suthram
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
NETWORKS Fall 2010.
Footprinting (definition 1)
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Footprinting and Scanning
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Intrusion Detection & Prevention
Intrusion Detection Systems (IDS)
Intrusion Detection system
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Protection Mechanisms in Security Management
Presentation transcript:

Intrusion Detection CS-480b Dick Steflik

Hacking Attempts IP Address Scans scan the range of addresses looking for hosts (ping scan) Port Scans scan promising ports for openness (80, 21, …) Service Evaluation determine the OS Target Selection pick the most vulnerable host, most running services... Vulnerability Probes Automated password attacks FTP, HTTP, NetBIOS, VNC PCAnywhere…. Application specific attacks try known vulnerabilities on present services

Intrusion Detection Systems (IDS) Inspection Based (Signature Based) Uses a database of known attack signatures observe the activity on a host or network and make judgements about whether or not an intrusion is in progress or has taken place look for known indicators –ICMP Scans, port scans, connection attempts –CPU, RAM I/O Utilization –File system activity, modification of system files, permission modifications Anomaly Based baseline the normal traffic and then look for things that are out of the norm Variations of IDS Rule based Statistical Hybrid

Decoys/Honeypots Purposely place an incorrectly configured or unprotected system where it is easily found so that a hacker will try to use it as an attack vector. All accesses will set off alarms that indicate an intrusion is in progress

IDS Systems Tripwire Windows or UNIX alarms on modification to system files c:\ c:\WINNT c:\WINNT\system c:\WINNT\system32 CyberCop Network Assoc. –suite of 4 ID tools Sun/Symantec iForce IDS Appliance Sun/Solaris and Symantec’s ManHunt IDS –ID Analysis at 2 Gbits /sec –ManHunt uses distributed network sensors and a variety of methods to identify threats, including protocol-anomaly detection, signature detection, traffic-state profiling and statistical flow analysis.

SNORT Open Source ( ) Uses: Packet Sniffer produces a tcpdump formatted output Packet Logger can log packets so that after-the-fact data mining tools can be used for analysis –Traffic Debugging and Analysis Can design a ruleset that recognizes certain traffic patterns Can do both anomaly based and Inspection based detection SPADE (Silicon Defense) – a SNORT preprocessor that logs anomalies for later analysis

ActiveScout ForeScout Technologies ( ) Intrusion Prevention Tool Method: Watches for hacker reconnaissance (port scans, NetBios Scans, ect.) Return bogus info to hacker If hackers attempts to break in with the bogus data Active Scout sets off alarms or block any further traffic for the intruder Downside: only works in conjunction with Check Point’s Firewall-1 Requires little administration and eliminates many false positives Cost w/T1 port is about $10K

Manhunt Symantec Corp. ( ) Advanced Threat Management System Signature based hybrid detection protocol anomaly detection traffic rate monitoring protocol state tracking IP packet reassembly to provide a level of detection superior to other, signature- based systems. These detection capabilities can identify threats in real time, eve Real-time Analysis and Correlation collects information from security devices throughout the network to spot trends Automatic Policy Based Responses Scaleable Across Geographic Areas of an Enterprise one Manhunt can be configured across 10 network segments

Watson Researchers Kanad Ghose Doug Summerville Viktor Skormann Mark Fowler