Report on Common Intrusion Detection Framework By Ganesh Godavari.

Slides:



Advertisements
Similar presentations
Web Service Ahmed Gamal Ahmed Nile University Bioinformatics Group
Advertisements

Report on Common Intrusion Detection Framework By Ganesh Godavari.
A Cooperative Approach to Support Software Deployment Using the Software Dock by R. Hall, D. Heimbigner, A. Wolf Sachin Chouksey Ebru Dincel.
Software Modeling SWE5441 Lecture 3 Eng. Mohammed Timraz
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
Continuously Recording Program Execution for Deterministic Replay Debugging.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Sensemaking and Ground Truth Ontology Development Chinua Umoja William M. Pottenger Jason Perry Christopher Janneck.
Web Server Administration
Application architectures
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Collaborative Intrusion Detection and Response. Limitations of Monolithic ID Single point of failure Limited access to data sources Only one perspective.
A survey of commercial tools for intrusion detection 1. Introduction 2. Systems analyzed 3. Methodology 4. Results 5. Conclusions Cao er Kai. INSA lab.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Systems Architecture, Fourth Edition1 Internet and Distributed Application Services Chapter 13.
Common Intrusion Detection Framework By Ganesh Godavari.
Models of Computation as Program Transformations Chris Chang
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
Lecture 11 Intrusion Detection (cont)
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Web Services Michael Smith Alex Feldman. What is a Web Service? A Web service is a message-oriented software system designed to support inter-operable.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
Application architectures
Defeating Large Scale Attacks: Technology and Strategies for Global Network Monitoring The NetViewer Experiment PAVG in collaboration with Networking Systems.
IBM Research – Thomas J Watson Research Center | March 2006 © 2006 IBM Corporation Events and workflow – BPM Systems Event Application symposium Parallel.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Rainbow Facilitating Restorative Functionality Within Distributed Autonomic Systems Philip Miseldine, Prof. Taleb-Bendiab Liverpool John Moores University.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
COEN 252 Computer Forensics
16-1 The World Wide Web The Web An infrastructure of distributed information combined with software that uses networks as a vehicle to exchange that information.
1 Version 3.1 modified by Brierley Module 8 TCP/IP Suite Error and Control Messages.
Chapter 6: Packet Filtering
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1. 2 Purpose of This Presentation ◆ To explain how spacecraft can be virtualized by using a standard modeling method; ◆ To introduce the basic concept.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Active Monitoring in GRID environments using Mobile Agent technology Orazio Tomarchio Andrea Calvagna Dipartimento di Ingegneria Informatica e delle Telecomunicazioni.
1 Vulnerability Analysis and Patches Management Using Secure Mobile Agents Presented by: Muhammad Awais Shibli.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
(Business) Process Centric Exchanges
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
Web Services Management Framework by Umut Bultan & Gül Hünerkar.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
O.C.E.A.N Open Computation Exchange and Auctioning Network.
S E C U R E C O M P U T I N G Not For Public Release 1 Intrusion Tolerant Server Infrastructure Dick O’Brien OASIS PI Meeting July 25, 2001.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
DoS/DDoS attack and defense
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
CS223: Software Engineering
Role Of Network IDS in Network Perimeter Defense.
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
DIVYA K 1RN09IS016 RNSIT1. Cloud computing provides a framework for supporting end users easily through internet. One of the security issues is how to.
Application architectures. Objectives l To explain the organisation of two fundamental models of business systems - batch processing and transaction processing.
SQL Database Management
PROTOCOLS PROTOCOLS.
An Introduction to Software Architecture
Chapter 7 –Implementation Issues
Autonomous Network Alerting Systems and Programmable Networks
OpenSec:Policy-Based Security Using Software-Defined Networking
Intrusion Detection Systems
Presentation transcript:

Report on Common Intrusion Detection Framework By Ganesh Godavari

Outline of the talk CIDF GIDO Negotiation protocol scenarios

Goal Goal of IDIAN –Develop a negotiation protocol that is dynamic –Allow distributed collection of heterogeneous ID components –Provide inter-operate ability to reach agreement on ID information processing capability

Motivation Understand –Common Intrusion Detection Framework – Common Intrusion Specification Language (CISL)

Common Intrusion Detection Framework (CIDF) CIDF architecture –Divides IDS into Components –Component consists of software code with configuration information –Components can be added/removed –Components interact in real time and exchange data using GIDO

Generalized Intrusion Detection Objects (GIDO) GIDO consists of two components – Fixed Format header CIDF version, timestamp, and length of body –Variable Length Body data

GIDO body (ByMeansOf (Attack (Observer (ProcessName `StackGuard') ) (Target (HostName `somehost.someplace.net') ) (AttackSpecifics (Certainty `100') (Severity `100') (AttackID `1' `0x4f') ) (Outcome (CIDFReturnCode `2') ) (When (BeginTime `14:57:36 24 Feb 1999') (EndTime `14:57:36 24 Feb 1999') ) ) (ByMeansOf (Execute (Process (ProcessName `fingerd') ) (When (BeginTime `14:57:36 24 Feb 1999') (EndTime `14:57:36 24 Feb 1999') ) ) ) ) data Semantic Identifier (SID) Where the attack occurred Which process detected Where is the attack targeted at? StackGuard is a compiler that emits programs hardened against "stack smashing" attacks.

SID is associated with each piece of data in the body SID associated with data are called Atom SID Atom SID cannot completely describe an event. Verbs describe events –e.g. Attack SID Verb SID has set of Role SIDs which provide additional information about the event. –e.g. Observer Role provides information about the observer of an event.

Example V is a verb SID R1 and R2 are role SIDs A1 through A3 are Atom SIDs S-expression (V (R1 (A1 data1) (A2 data2) ) (R2 (A3 data3) ) Tree Representation

CIDF components Components –Event generators ("E-boxes") Produce GIDOs –Event analyzers ("A-boxes") Consume GIDOs Conclusions are turned out as GIDOs –Event databases ("D-boxes") store events for later retrieval –Response units ("R-boxes") Consume GIDOs Take action like kill process, reset connections

CIDF Component Interaction

Add/remove an IDS Component New components need to notify others Negotiation protocol –Publish the capabilities of new components Ability to describe and disseminate the description to other components –Collection of components need to interact with each other To determine which components provide specific set of capabilities that the others can utilize

Categorization of overload situations Resources are limited Demand driven overloads –IDS is asked to provide additional detection facilities –Fluctuation in the amount of data to be processed Flooding !! Supply driven overloads –Computer/network down!! –Compromised components unavailable –Number crunching jobs competing with IDS for jobs

Adapting to overload situations Solution –Supply of resources/components is increased Human assistance, killing processes/files competing for resources –Reduction in the demand Modify the packet filtering rules to eliminate flooding the system from outside; Killing processes that generate massive floods of OS audit records –Adapt to ensure important jobs are met Reduce the number and kinds of attacks detected, number of systems/network covered by IDS

New Attack Signatures and Responses Install new signatures – computational cost Cost –Determine if the capability exists in the IDS to respond to the attack signature –Cost of response i.e. degradation in performance, loss of functionality E-box needs to specify the cost of sensor data R-box needs to specify the cost executing requested actions A-box needs to asses (stress) the cost of deploying a new attack signature

New producer E-box – can I supply the capabilities with in cost limits? –If true send acceptance message to A-box –If false send rejection message to A-box If the minimum cost is relatively close to the upper bound set by A-box. Send a counter proposal to A- box The counter proposal can be accepted or rejected by A-box

New Consumer Enhanced/diminished capability New Consumer –R-box advertises its capabilities to existing A- Boxes Enhanced/diminished capability –Upgraded/degraded E-box advertises to A- box. –A-box renegotiates its utilization of the capabilities of E-box

How does one know what are the existing capabilities? –generate new proposals that contain more arbitrary lists of capabilities –For example, suppose that an R-box R announces a list of capabilities L0. An A-box A requests a list L1 that is a subset of L0. R comes back with a list L2 that is a subset of L1. Unsatisfied, A proposes an entirely new list M that is a subset of L0 but that may share only some capabilities with L1.

Scenario 1: a new capability new host machine with detection component is added to LAN. Network under connection laundering attack

solution E-box supplies system-call audit trail A-box might correlate all inbound TCP/IP connections with outbound connections.

Scenario 2: flooding IDS Stolen company laptop with VPN Connection to the company that has detection component and is used to launch an attack. Hacker generate lot of spurious audit data to deflect suspicion. Second host is also compromised. Generate more audit data and crash the central IDS?

Solution Request the event generator to switch to a pre-negotiated fallback setting in which only critical audit data is sent. Request that other event generators reduce their output so the analyzer can concentrate on the attack.

References Intrusion Detection Inter-component Adaptive NegotiationIntrusion Detection Inter-component Adaptive Negotiation – Richard Feiertag et al 2000 IEEE Computer Networks special issue on intrusion detection A Common Intrusion Specification Language, CIDF working group document. Communication in the Common Intrusion Detection Framework, CIDF working group document.