IDS SOEN321, Fall 2004 Serguei Mokhov. Contents IDS intro What it is good for How can you do it (anomaly detection, misuse detection) How it can be compromised.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Bro: A System for Detecting Network Intruders in Real-Time Vern Paxson Lawrence Berkeley National Laboratory,Berkeley, CA A stand-alone system for detecting.
Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection Aaron Beach Spring 2004.
Using Nagios for Intrusion detection Miguel Cárdenas Montes Elio Pérez Calle Francisco Javier Rodríguez Calonge.
IDS/IPS Definition and Classification
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
1 Intrusion Detection CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 4, 2004.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
seminar on Intrusion detection system
Bro: A System for Detecting Network Intruders in Real-Time Presented by Zachary Schneirov CS Professor Yan Chen.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection - Arun Hodigere. Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEM
Building Survivable Systems based on Intrusion Detection and Damage Containment Paper by: T. Bowen Presented by: Tiyseer Al Homaiyd 1.
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
IIT Indore © Neminah Hubballi
COEN 252 Computer Forensics Collecting Network-based Evidence.
Computer Security and Penetration Testing
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Operating system Security By Murtaza K. Madraswala.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Chapter 5: Implementing Intrusion Prevention
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
7.5 Intrusion Detection Systems Network Security / G.Steffen1.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Intrusion Detection System
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
An Introduction To Gateway Intrusion Detection Systems Hogwash GIDS Jed Haile Nitro Data Systems.
Some Great Open Source Intrusion Detection Systems (IDSs)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Ch.22 INTRUSION DETECTION
Access control techniques
Principles of Computer Security
Intrusion Detection Systems
Intrusion Detection system
Intrusion Detection.
Intrusion Detection Systems
Presentation transcript:

IDS SOEN321, Fall 2004 Serguei Mokhov

Contents IDS intro What it is good for How can you do it (anomaly detection, misuse detection) How it can be compromised (at least, automatic forms of it) Biggest problems.

Intro Started as detection of anomalous network traffic –Difference with the firewalls? (prevention vs. detection) More sophisticated: monitoring behavioral patterns of programs (system calls)/users (typical commands/activities)

Principles –Actions of users and processes are statistically predictable. –Actions of users and processes do not include sequences of commands that subvert security. –Actions of processes lie inside a set of actions permitted by the security policy. Violation of any of the above is an indicator of an attack.

Example An attacker wants to install a backdoor. He enters as an ordinary user and then becomes root. This is unusual if the user is not part of the admin group (principle 1). While becoming root, the attacker uses "evil" sequences of commands (principle 2). Moreover, any changes to system files may cause them to behave in ways they are not supposed to (principle 3). Also, modifying a user file may allow processes executing on behalf of that user to, say, connect to sites they were unable to connect to before or by executing commands they could/did not execute before (principle 1). Note: Intrusions can be arbitrarily sophisticated.

Rootkits and Attack Tools Definition: An attack tool is an automated tool designed to violate a security policy. Example: 'rootkit' is an attack tool; among other things, it sniffs passwords. It also installs fake versions of system programs. These include fake: –netstat: conceals certain network connections –ps: conceals certain processes (e.g., the sniffer) –ls: conceals certain files (as does 'du') ifconfig: conceals promiscuous mode –login: accepts "magic" password The cryptographic checksums of the fake programs are perfect. We see that most of the obvious traces of an attack have been hidden. But, there are still certain integrity checks: –used blocks plus free blocks = all blocks –'ls' should tell the truth about file counts –load average should reflect number of running processes We can assess these quantities by programs other than the fake ones and do the analysis. 'Rootkit' did not corrupt the kernel/file structure, so other programs will continue to report correct information; only the fake programs lie.

Tripwire File modification checks Good against rootkits

Automation Can we automate the intrusion-detection process? We want to automate: - anomaly detection - misuse detection - specification-based detection

Goals of an IDS Detect a wide variety of intrusions (including from insiders). Detect intrusions in a timely fashion (both in real and non real time). Digest/abstract. Present summary to expert human. Accuracy (false positives, negatives). Generally –anomaly models are statistically based –misuse models are signature based –specification models are specification based

Anomaly Detection Anomaly detection requires adaptive statistical profiling. There is an infinite range of possibilities if only because there is an infinite range of variables. Suppose I'm a mole and I want to read sensitive files without attracting attention. My daily average is to peruse 5 files a day. So, I plan ahead, opening 6, then 7, then 8,... until my profile will not be disturbed as I forage widely in files outside my "need-to-know" range. Urban legend: Nervous people are shaky (they emit "tells") when they use touchtone phones. Back-of-the-envelope absurdity, if untargeted. But, there is biometrics, typing rhythms, pseudopolygraphs. Formally, this requires either pure math (some form of statistics) or AI (machine learning of predictive models. Note that data mining is a generalization of statistics so many, many things are possible in principle.

Misuse Modeling Signature analysis actually generalizes to rule-based detection, but this requires a knowledge of system vulnerabilities. This gets us into different flavors of AI. One stab at a distinction: –Does the sequence of data match any of the rules (of bad stuff) as opposed to is it kind of unusual? There is some brittleness here because you first have to have a good set of rules. If anomaly detection is the art of looking for unusual states, then misuse detection is the art of looking for states known to be bad. (Admins can tweak the rules, say in Network Flight Recoder, NFR.)

Agent Who gathers the information? Obviously, it needs to be filtered (downselected) before it can be analyzed. –host-based information gathering: system and application logs –network-based information gathering: monitor network traffic ( tcpdump ), detect network-oriented attacks, use network sniffing The major subtlety is that the analysis software must ensure that the view of the network traffic is identical across the set {analyzer, host1, host2,...}.

Notifier Automatic or incident response. Automatic: If the IDSs on fw1 and fw2 detect a coordinated attack, they can instruct fw3 to reject packets from the source(s) of the attacks. Let's look at an example of an IDS for detecting network intruders in real time. - passively monitor network link over which an intruder's traffic passes - filter the network-traffic stream into a sequence of higher-level events - feed events into an analysis engine that checks conformity with the security policy We will also - look at a number of attacks that attempt to subvert passive monitoring systems fw1 fw2

Design Goals for a Network Monitor no packet-filter drops: the missing traffic might contain precisely the interesting traffic; after all, an attacker might attack the monitor itself real-time notification extensible to include knowledge of new types of attacks

Attacks on the monitor overload, crash, subterfuge: –Overload: Drive the monitor to the point of overload, then attempt a network intrusion. Defense: Can be mysterious about how much load you can handle. –Crash attacks: Kill the monitor (failure, resource exhaustion), then attack as before. Defense: not particularly interesting. –Subterfuge attacks: The key idea is to find a traffic pattern that is interpreted in one way by the monitor and by an entirely different way by the receiving endpoint (target host). Example: What if the monitor sees a particular packet that the endpoint does not? How could this be accomplished by the attacker? Launch a packet with an IP "Time to Live" (TTL) field just sufficient to get it past the monitor but not sufficient to reach the endpoint. Or, suppose the endpoint has a smaller "Maximum Transmission Unit" (MTU). Just send a packet that is too big with the "Do not fragment" bit set.

Signature analysis is when the IDS is programmed to interpret a certain series of packets, or a certain piece of data contained in a packet, as an attack. Example: –An IDS that watches web servers might be programmed to look for the string "phf" as an indicator of a CGI-script attack. Most signature analysis is simple pattern matching: Find "phf" in "GET/cgi-bin/phf?“ –Let's look at insertion and evasion attacks.

Insertion attack Here, an IDS accepts a packet that the end system rejects. Thus, the IDS alone might see the "funny" packets. This defeats signature analysis because it defeats the pattern matching. To illustrate, consider: GET/cgi-bin/....p....h....f....? where the dots stand for funny packets that only the monitor sees.

Evasion attack Here, the end-system accepts a packet that the IDS rejects. There are all kinds of reasons why one computer can be more or less strict about accepting packets than another (checksums, fragments, sequence numbers,...). Since the packets are rejected by the monitor, the attack is not seen.

Conceptual basis IDS either - generates a model of a program's or system's response to known inputs, or - requires the generation of a rule base An IDS that monitors raises an alarm if it detects a deviation from the model or a rule fires. But how can you machine-learn the model? We need some human help. Expert Systems?

Cont’ Can we detect when an application has been penetrated and is then exploited to do harm to other parts of the system? app | frame IDS problem as a sandbox problem | v specify allowed sequences of system calls O S Think of the (uncorrupted) application as a finite-state machine (transition system) whose outputs are sequences of system calls. A transition system can only generate _certain_ sequences of calls. If you observe an impossible call sequence, it is likely that an attacker has introduced malicious code into the application's thread of control by means of a buffer overflow, a format-string attack, or whatever.

Cont’ We detect the insertion of malicious code by observing sequences of system calls that normally could not have occurred. We use human intelligence to build a very abstract model of the application we wish to monitor. We quickly detect "exploit code" running with the application's privilege. We first build a very abstract model of the application's (normal) behavior. Most existing exploit scripts grab full root privilege and take other distinctive actions, such as launching a shell under the attacker's control. This is so blatant it does not require a sophisticated IDS to detect it. But this abstract-model approach is able to detect when some of the backdoors (fake programs) of 'rootkit' are executed, which causes the behavior to deviate from that specified by the original source code and captured in the abstract model.

Problems with IDS Biggest: false positives Require high level of expertise Attacks (previously mentioned can be conducted).

IDS vs. Firewall Would you choose one of if you can afford only one of them: –IDS –Firewall If you can afford both, would you opt for IDS? Recall: firewalls prevent what IDSs detect.

Refs These slides largely based on Dr. Probst transcripts and the textbook.