Building Survivable Systems based on Intrusion Detection and Damage Containment Paper by: T. Bowen Presented by: Tiyseer Al Homaiyd 1.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
Anomaly Detection Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
Lecture 1: Overview modified from slides of Lawrie Brown.
IDS/IPS Definition and Classification
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 Intrusion Detection CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 4, 2004.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Intrusion Detection CS-480b Dick Steflik. Hacking Attempts IP Address Scans scan the range of addresses looking for hosts (ping scan) Port Scans scan.
seminar on Intrusion detection system
Bro: A System for Detecting Network Intruders in Real-Time Presented by Zachary Schneirov CS Professor Yan Chen.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEM
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
1 Issues in Benchmarking Intrusion Detection Systems Marcus J. Ranum.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS: Technical Seminar Presentation by MANOJ KUMAR GANTAYAT.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
IIT Indore © Neminah Hubballi
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
Signature Based and Anomaly Based Network Intrusion Detection
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
JIT in webkit. What’s JIT See time_compilation for more info. time_compilation.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
KAIST Internet Security Lab. CS710 Behavioral Detection of Malware on Mobile Handsets MobiSys 2008, Abhijit Bose et al 이 승 민.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Chapter 5: Implementing Intrusion Prevention
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
SCALABLE EVOLUTION OF HIGHLY AVAILABLE SYSTEMS BY ABHISHEK ASOKAN 8/6/2004.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
Intrusion Detection State of the Art/Practice Anita Jones University of Virginia.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
Intrusion Detection System
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors : Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Some Great Open Source Intrusion Detection Systems (IDSs)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Ch.22 INTRUSION DETECTION
Security Methods and Practice CET4884
Introduction to Operating System (OS)
Principles of Computer Security
Introduction to Networking
12/6/2018 Honeypot ICT Infrastructure Sashan
Intrusion Detection Systems
Intrusion Detection system
Network hardening Chapter 14.
Honeypots Visit for more Learning Resources 1.
Introduction to Internet Worm
Presentation transcript:

Building Survivable Systems based on Intrusion Detection and Damage Containment Paper by: T. Bowen Presented by: Tiyseer Al Homaiyd 1

Introduction: Intrusions: show observable events that deviate from the norm. Survivable system usually focus on detecting intrusions rather than preventing or containing damage. New approach that combines early attack detection with automated reaction for damage prevention and containment. ◦ based on specifying security-relevant behaviors using patterns over sequences of observable events.  EX: a process’s system calls and their arguments, and the contents of network packets. ◦ Intercepting actual events at runtime and comparing them to specifications can detect attacks ◦ operations associated with the deviant events can be modified to stop the attack. Because this approach is based on security-relevant behaviors instead of attack signatures  protect against unknown attacks. 2

Introducing BMSL Event based intrusion detection  developing specific language called “behavioral monitoring specification language” (BMSL) ◦ Enables concise specifications of event based security-relevant properties. ◦ These properties can capture either normal behavior of programs and systems, or misuse behaviors associated with known exploitations. Compile BMSL specifications into efficient detection engines  possibility of increasing real-time intrusion detection with real-time intrusion reaction. Experimenting BMSL in : ◦ Incoming network packets as events.  Based on packet contents ◦ system calls requested by executing processes as events.  Based on both system calls and the values of system call arguments. 3

Language Goals ◦ Supporting multiple event types like system calls and network packets. ◦ Robustness and type-saftey: to reduce specification errors and their damage. ◦ Simplicity to control language.  Simple but expressive pattern language. ◦ Efficient monitoring.  Simple but expressive pattern language. ◦ Specifying responses (Automatic reactions)  By associating each security property with the reaction to be taken when the property is violated. 4

Architecture of Intrusion detection/response system An interceptor provides efficient interception of raw events. Interceptors deliver raw event streams to a runtime environment with each stream. The runtime environments: ◦ Demultiplex the event steams into the event streams for individual detection engines  implement the actual intrusion detection and reaction specifications. ◦ Provide easy functions for detection engines and isolate the detection engines from the details of specific interface & data format. A single detection engine monitors each defended process & another detection engine monitors all of the network traffic of one or more hosts. 5

Reactions to Detected intrusions The network packet detection engine can alter, drop or spontaneously generate packets. ◦ Event modification capabilities will differ for different runtime systems. Prototype: ◦ Interposition capabilities  system calls ◦ Passive interception capability  network packets. Using interposition  different reactions ◦ terminate intruder access to the victim host. ◦ Waste the intruder’s resources by allowing intruder access  placing compromised processes on an isolated environment so that they don’t cause damage to the victim. 6

Interactions among multiple rules If there is a reaction conflict : ◦ Define a notation of conflict among operations contained in the reaction components of rules.  Use assignment to variables or invocation of support functions provided by the runtime system. ◦ Having a condition that there must not exist 2 patterns with conflicting operations such that for same sequence of system calls, they can match ate the same point. 7

Using Specification for Isolation When we detect an attack on a host that is delivered via network packets  drop those packets. When we detect an attack on a process  switch to a new specification that contain BMSL rules to isolate the process ◦ Return faked return value, specifically for system calls that can damage the system. ◦ Log the activity for later analysis ◦ Reduce limits on resources that the rogue process can consume. ◦ Restrict access to files. In network operations: ◦ Operations are slowed down using sleep() ◦ The CPU and resource usage on the attacked system are minimized. ◦ The intruder will likely perceive slow system and congested network. 8

Global Isolation Via active Networking Host based approach can detect the attack, but cannot react in a useful manner like in denial-of- service (DOS) attack ◦ the host can detect that it is swamped by meaningless requests, and may even know the (spoofed) source IP address from which the requests originate, but cannot do anything to preserve itself under the attack. ◦ (Hosts can always respond to the attack by shutting down the attack services, but this reaction is not useful, since it accomplishes the aims of the attacker.) a more useful reaction: the host informs the nearest active network element of the attack and requests that active network elements work together to (find and isolate the source of the attack.) Protect the host and eliminate the attack track traffic (unnecessary traffic) 9

Results The current research into active network technology for defense is illustrative, but insufficient. Progress toward truly powerful active network based defenses requires further maturity of the technology, which is currently in prototype form. The attacks are identified using rules but the rules can be more complicated when training and debugging the system. Scores assigned to our system by Lincoln Labs Significantly better detection rates over the baseline system  reducing false positive rates 10

Results Results by IDS: it shows the attacks that were missed by the system too. 11

Main Results BMSL: expressive, easy-to-use and robust language for capturing behaviors of processes and hosts as patterns over sequences of events such as system calls and network packets. Protection against Known and Unknown attacks: by enforcing security-relevant properties, we protect against known and unknown attacks. Enforcement of normal behaviors and isolation of misbehaving programs. Follow pattern matching to detect deviation from normal behavior. 12

Related work (Host based Detection) a state-transition diagram based approach is used to capture signatures of intrusions. Their language is more expressive than this one in some ways like in (e.g., ability to capture occurrence of two concurrent sequences of actions), and less expressive in (e.g., ability to capture atomic sequences or the occurrence of one event immediately following another). ◦ most intrusion signatures expressed on these papers can be easily captured in our language as well “Computer Immunology, Comm.” by Forrest was the first paper that focused on program behavior instead of user behavior. Now results got improved using a neural network based approach (deals with system calls) Different approach is taken for intrusion detection using data mining. Some papers use statistical and expert system based techniques. They use pattern matching techniques. The technique on this papser focused on speed and reduction of false positives. Problem is that unknown attacks may go undetected. The anomaly detection systems are typically better at detecting unknown attacks, but they are not good in false positive rates. Some papers focus on defining a special purpose language for intrusion detection. 13