Network Intrusion Prevention CSCI 5235.01 Network Security Amruta Gurav.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

FIREWALLS Chapter 11.
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching.
Lecture 14 Firewalls modified from slides of Lawrie Brown.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewalls and Intrusion Detection Systems
Intrusion Detection Systems and Practices
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Security Awareness: Applying Practical Security in Your World
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
LittleOrange Internet Security an Endpoint Security Appliance.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Host Intrusion Prevention Systems & Beyond
Department Of Computer Engineering
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 5 – Implementing Intrusion Prevention.
Intranet, Extranet, Firewall. Intranet and Extranet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Linux Networking and Security
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Chapter 5: Implementing Intrusion Prevention
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Firewall Security.
Network security Product Group 2 McAfee Network Security Platform.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Chapter 4: Implementing Firewall Technologies
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
CompTIA Security+ Study Guide (SY0-401)
Proventia Network Intrusion Prevention System
PCNSE7 Palo Alto Networks Certified Network Security Engineer
Working at a Small-to-Medium Business or ISP – Chapter 8
Click to edit Master subtitle style
Chapter 5: Inter-VLAN Routing
CompTIA Security+ Study Guide (SY0-401)
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Presentation transcript:

Network Intrusion Prevention CSCI Network Security Amruta Gurav

Outline Intrusion System Terminologies Network Intrusion Prevention Overview Cisco IOS IPS Cisco IPS Sensor Software IPS High Availability

Need for intrusion prevention system Today, viruses, worms, and several other invading malicious codes and programs proliferate widely on the Internet. With the environment becoming increasingly hostile, networks are easy targets because the infection can spread across the network rapidly. Networks need to be designed and equipped with sophisticated intelligence to diagnose and mitigate threats in real-time.

Intrusion System Terminologies IDS (Intrusion Detection System): The term IDS is typically limited to sensors that employ promiscuous- only monitoring based on an out-of-packet stream. IPS (Intrusion Prevention System): The term IPS is most commonly applied to sensors that reside inline within the packet stream and that can drop malicious packets, flows, or attackers. IPS Feature versus IDS Feature: The IPS feature is specifically the inline monitoring with inline response action deny-packet capability, whereas the IDS feature is promiscuous-only monitoring with post attack response actions such as TCP reset or block/shun on an external device.

Network Intrusion Prevention Overview Networks today have grown both in size and complexity while the environment has remained highly exposed and vulnerable. Because of the evolving network landscape, networks require a security solution that works throughout the network in collaboration with all the network devices, servers, and endpoints within the network.

Challenges for networks in providing in-depth defense Security incidents and evolving threats are on the rise and are increasing exponentially. The complexity and sophistication of malicious codes and network exploits continues to rise. The potential impact resulting from these attacks is significant. Multiple technologies are working together, in contrast to the point products deployed independently in the past.

Cisco Network Intrusion Prevention solution It is an integral part of the Cisco Self-Defending Network strategy that provides network intelligence to identify and prevent malicious traffic including network viruses, worms, spyware, adware, and application abuse. The solution offers comprehensive threat prevention and protection for a wide range of network intrusions and attacks.

Cisco IOS IPS Cisco IOS IPS The Cisco IOS Intrusion Prevention System (IPS) feature set provides an integrated inline deep- packet inspection solution within the router software architecture. IOS IPS enables the network to be able to defend itself with the intelligence to monitor, detect, identify, classify, and mitigate malicious traffic in real- time and stop malicious traffic close to its entry point.

Key features in IOS IPS Protects against network viruses, worms, and a large variety of network threats and exploits. Eliminates the need for a standalone IPS device. Provides integrated inline deep-packet inspection. Supports about 2,000 attack signatures similar to those available on a regular Cisco IPS sensor appliance. Uses Cisco IOS routing capabilities to deliver integrated functionality. Enables distributed network wide threat mitigation. Sends a syslog message or an alarm in Secure Device Event Exchange (SDEE) format upon detecting an attack signature. Complements Cisco IOS Firewall and VPN solutions for superior threat protection at all entry points into the network.

Deploying IPS Figure: Cisco IDS/IPS Network wide Deployment

Cisco IPS Sensor OS Software Cisco IPS Sensor software version 6.0 is a comprehensive, end-to-end protection solution for network-based sensors that delivers the latest IPS capabilities, enhanced performance, security improvements, and a range of new enhanced features. Cisco IPS Sensor Software supports both the IDS and IPS capabilities for hybrid operation, acting simultaneously as an IDS sensor and an IPS sensor.

Cisco IPS Sensor Software Figure Cisco IPS Sensor Software System Design

Components of Cisco IPS Sensor Software MainApp Event Store SensorApp (Analysis Engine) Command Line Interface (CLI)

MainApp NotificationApp AuthenticationApp Attack Response Controller (ARC) InterfaceApp LogApp Web Server ctlTransSource (Control Transaction server)

Sensor Software—Communication Protocols IDAPI RDEP2 IDIOM IDCONF SDEE CIDEE

Sensor Software—User Roles Administrator Operator Viewer Service

Sensor Software—Partitions Application partition Maintenance partition Recovery partition

Sensor Software—Signatures and Signature Engines Signature: A signature is a description of a network traffic pattern that attackers use while conducting network-based attacks. Signature Engine: A signature engine is a component of the Cisco IPS that is designed to support many signatures in a certain category. The signature engines are designed to perform a wide range of functions, such as pattern matching, stateful pattern matching, protocol decoding, deep-packet inspection, and other heuristic methods.

Sensor Software—IPS Events Types of IPS data that are communicated by various functional units: Intrusion events Error events Status events Control transaction log events Attack response events Debug events Control transaction events

Types of IPS events evAlert evStatus evError evLogTransaction evShunRqst

Sensor Software—IPS Risk Rating (RR) RR allows users to make informed decisions on the IPS inline drop actions and provides users with greater confidence by enhancing the reliability of the inline deployment. RR is a multidimensional formula that is applied on a per-signature basis. RR has a value between 0 and 100; the higher the RR value, the greater the confidence that the event detected is an indication of malicious activity.

Risk Rating Calculation Signature Fidelity Rating (SFR) Attack Severity rating (ASR) Target Value Rating (TVR) Attack Relevancy Rating (ARR) Promiscuous Delta (PD) Watch List Rating (WLR) RR = ((ASR*TVR*SFR)/10000)+ARR- PD+WLR

Sensor Software—IPS Interfaces Command and control interface Sensing interface (aka Sniffing interface)

Sensor Software—IPS Interface Modes Promiscuous mode Inline interface mode Inline VLAN pair mode VLAN Group mode

Promiscuous mode Figure: Cisco IDS Sensor in Promiscuous Mode

Inline interface mode Figure: Cisco IPS Sensor in Inline Interface Mode

Inline VLAN pair mode Figure: Cisco IPS Sensor in Inline VLAN Pair Mode

VLAN Group mode In VLAN Group mode, each physical interface or inline interface can be divided into VLAN group subinterfaces, each of which consists of a group of VLANs on that particular interface. With the introduction of multiple virtual sensors, the sensor can monitor one or more of these interfaces. VLAN Group mode provides the capability of applying multiple policies to the same sensor. This allows the sensor to emulate multiple interfaces; with only a few interfaces, the sensor can seem to have many interfaces.

Sensor Software—IPS Blocking (Shun) Host block: Blocks all traffic from a given IP address. Connection block: Blocks all traffic from a specific source IP address to a given destination IP address and destination port. Network block: Blocks all traffic from a given network subnet.

Sensor Software—IPS Rate Limiting It provides the capability of reducing the effect of a denial of service (DoS) attack or network attack, instead of blocking it entirely.

Sensor Software—IPS Virtualization Virtual sensors can be effectively used to monitor multiple data streams, apply different configurations to different sets of traffic, monitor two network segments with overlapping IP spaces with one sensor, or monitor concurrently both the inside and outside of a firewall with one sensor. Multiple virtual sensors can be hosted on the same appliance, each configured with different signature behavior and traffic feeds. Each virtual sensor is associated with a specifically named signature definition, event action rules, and anomaly detection configuration. The sensor can receive data inputs from one or many monitored data streams.

Sensor Software—IPS Security Policies Signature definition policy Event action rules policy Anomaly detection policy

Sensor Software—IPS Anomaly Detection (AD) The AD solution detects worm-infected hosts and worm-based attacks. AD detects the following two situations: o The network starts to become congested by worm traffic. o A single worm-infected source enters the network and starts scanning for other vulnerable hosts.

Zones in IPS AD Internal zone Illegal zone External zone

Modes in AD Learn mode Detect mode Inactive mode

IPS High Availability High availability is defined as building into the network the capability of the network to cope with the loss of a component while preserving network functionality. There are three possible solutions to resolve situations in which the inline IPS device may fail: o Fail- open mechanism o Failover mechanism o Load- balancing mechanism

Fail- open mechanism Hardware-based fail-open mechanism Software-based fail-open mechanism

Failover mechanism Layer 3: PIX/ASA Failover, Cisco IOS HSRP Layer 2: Spanning Tree

Load-Balancing Technique Cisco IPS sensors can be deployed inline as part of an EtherChannel (EC) to provide redundancy.

Summary Networks today are becoming increasingly vulnerable to hostile attacks and infections such as viruses and worms that spread rapidly, crippling the entire network. With this growing threat, networks need to be designed and equipped with the sophisticated intelligence to diagnose and mitigate these threats in real-time. The chapter examined the core concepts for the Cisco IPS Sensor OS Software, such as the sensor system architecture, sensor communication protocols, signature and signature engines, IPS events and event actions, IPS Virtualization, and load-balancing techniques.

References Bhaji, Yusuf. CCIE Professional Development Series Network Security Technologies and Solutions Information on trunk port /sw/configuration/guide/cli/AccessTrunk.pdf Signature engine- on/guide/idm/dmSgEng.html#wp Sensor software- on/guide/idm/dmArch.html

Thank you!!!!