Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
FIREWALLS Chapter 11.
Intrusion Detection CS461/ECE422 Spring Reading Material Chapter 8 of the text.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Guide to Network Defense and Countermeasures Second Edition
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Intrusion Detection Systems and Practices
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Host Intrusion Prevention Systems & Beyond
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
IIT Indore © Neminah Hubballi
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Guide to Network Defense and Countermeasures
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Chapter 5: Implementing Intrusion Prevention
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
Network Intrusion Detection System (NIDS)
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
An Introduction To Gateway Intrusion Detection Systems Hogwash GIDS Jed Haile Nitro Data Systems.
Some Great Open Source Intrusion Detection Systems (IDSs)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Computer Data Security & Privacy
Outline Introduction Characteristics of intrusion detection systems
Firewalls.
Intrusion Prevention Systems
Presentation transcript:

Intrusion Detection Systems Present by Ali Fanian In the Name of Allah

Outline Intrusion Concept Intrusion Detection Systems(IDS) Types of IDS Attacks to the IDS Gateway Intrusion Detection System Host-based Intrusion Detection

What is an intrusion? An intrusion can be defined as “any set of actions that attempt to compromise the: –Integrity –confidentiality, or –availability of a resource”.

Intruders Insider : abuse by a person with authorized access to the system. Hacker : attack the via communication links (e.g. Internet). Hacker : attack the via communication links (e.g. Internet). Malicious software (`MalWare`, Trojan horse, Virus): attack on the system by software running on it. Malicious software (`MalWare`, Trojan horse, Virus): attack on the system by software running on it.

Intrusion Examples VirusBuffer-overflows –2000 Outlook Express vulnerability. Denial of Service (DOS) –explicit attempt by attackers to prevent legitimate users of a service from using that service. Address spoofing –a malicious user uses a fake IP address to send malicious packets to a target. Many others

Outline Intrusion Concept Intrusion Detection Systems(IDS) Types of IDS Attacks to the IDS Gateway Intrusion Detection System Host-based Intrusion Detection

Intrusion Detection Systems Systems that detect attacks on computer systems.

Intrusion Detection Systems Intrusion Prevention System can prevent the network from outside attacks. Internet Intruder Victim IPS

IDS Basic Functions Monitoring –Collect the information from the network Analyzing –Determine what, if any thing, is of interest Reporting –Generate conclusions and otherwise act on analysis results

Intrusion Detection Systems Firewalls are typically placed on the network perimeter protecting against external attacks Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks Solution? –Intrusion Detection Systems –Monitor data and behavior –Report when identify attacks

Traditional IDS response tends to be passive response Traditional IDS response tends to be passive response Secondary investigation required because IDS is still imperfect These days, IDS can be set up to respond to events automatically – “active response” Intrusion Detection Systems

Active response – dropping connection, reconfiguring networking devices (firewalls, routers) Intrusion Detection Systems

Alarm investigation resource would affect the delays in response in both active and passive response If multiple alarm types involved, which alarm to investigate is an issue Intrusion Detection Systems

Passive response –potential damage cost - resulting from alarmed events not investigated immediately –low false alarm costs since alarmed events are not disrupted Intrusion Detection Systems

Active response –It could prevent attack damage because the events are terminated immediately –higher false alarm costs contingent on the performance of the IDS Intrusion Detection Systems

Audit Log Architecture The System Being Monitored IDS Alerts Reports Profiles Audit Log Data

Inline Architecture The System Being Monitored IDS Alerts Reports Sniffer Data Profiles

Outline Intrusion Concept Intrusion Detection Systems(IDS) Types of IDS Attacks to the IDS Gateway Intrusion Detection System Host-based Intrusion Detection

Types of IDS Host-based Network- based Signature- based Anomaly- based

Signature-based IDS Characteristics –Uses known pattern matching to signify attack

Signature-based IDS Advantages? –Widely available –Fairly fast –Easy to implement –Easy to update Disadvantages? –Cannot detect attacks for which it has no signature

Anomaly-based IDS Characteristics Characteristics –Uses statistical model or machine learning engine to characterize normal usage behaviors –Recognizes departures from normal as potential intrusions

Anomaly-based IDS Advantages? –Can detect attempts to exploit new and unforeseen vulnerabilities –Can recognize authorized usage that falls outside the normal pattern Disadvantages? Disadvantages? –Generally slower, more resource intensive compared to signature-based IDS –Greater complexity, difficult to configure –Higher percentages of false alerts

More Problems with Anomaly Detection The dynamic update problem is unsolved. –You can train these systems successfully to handle static environments, but computer networks are dynamic. –If you try to retrain an existing system to deal with new events, it will usually forget its old training. You have to give it the old training data as well as the new.

Possible Approaches to Anomaly Detection Neural networks Expert systems Statistical decision theory

Network-based IDS Characteristics –NIDS examine raw packets in the network passively and triggers alerts

Network-based IDS Advantages? –Easy deployment –Difficult to evade Disadvantages? –NIDS needs to create traffic seen at the end host –Need to have the complete network topology and complete host behavior

Host-based IDS Characteristics –Runs on single host –Can analyze logs, integrity of files and directories, etc.

Host-based IDS Advantages –More accurate than NIDS –Less volume of traffic so less overhead Disadvantages –Deployment is expensive –What happens when host get compromised?

Honey Pots and Burglar Alarms Burglar alarms are resources on the network that generate an alarm if accessed incorrectly. Honey pots are burglar alarms dressed up to look attractive. Have to look real to the attackers

Intrusion Detection Using Honey Pot Honey pot is a “decoy” system that appears to have several vulnerabilities for easy access to its resources. It provides a mechanism so that intrusions can be trapped before attack is made on real assets.

Intrusion Detection Using Honey Pot (cont.) Multi-level Log Mechanism (MLLM) MLLM logs the attacker’s activities into –Remote Log Server –Sniffer Server

An Architecture for Intrusion Detection using Honey Pot using Honey Pot Intrusion Detection Using Honey Pot (cont.)

honeypotHTTPDNS Firewall

IDS Placement

Outline Intrusion Concept Intrusion Detection Systems(IDS) Types of IDS Attacks to the IDS Gateway Intrusion Detection System Host-based Intrusion Detection

Attacks to the IDS Overload until IDS fails to keep up with the data Overload packet filter (easy) Overload event engine (difficult because events are light weighted and attacker doesn’t know policy script) Overload Logging/Recording mechanism

Attacks to the IDS An Subterfuge attack attempts to mislead the IDS to the meaning of the analyzed traffic

IDS Software Snort­ Free, libpcap based, rules driven IDS package. Many add-on components available. …

Outline Intrusion Concept Intrusion Detection Systems(IDS) Types of IDS Attacks to the IDS Gateway Intrusion Detection System Host-based Intrusion Detection

What Is a Gateway IDS? Gateway Intrusion Detection System –A network intrusion detection system which acts as a network gateway –Designed to stop malicious traffic and generate alerts on suspicious traffic –An “ideal” gateway IDS is able to stop all known exploits

GIDS vs NIDS GIDS Acts as network gateway Stops suspect packets Prevents successful intrusions False positives are VERY bad NIDS Only observes network traffic Logs suspect packets and generates alerts Cannot stop an intruder False positives are not as big of an issue

About Inline Snort Based on the Snort intrusion detection system Operation is similar to some bridging firewalls Uses snort rules with some additional keywords to make forward/drop decisions Compatible with most snort plugins Freely available under the GPL

Inline Snort drop Drops a packet, sends an rst, logs the packet ignore Drops a packet without sending an rst sdrop Drops a packet, sends an rst, does not log the packet

Content Replacement It can replace content in a packet –“replace” keyword tells hogwash to replace a detected string with another string. –Example: alert tcp any any -> $IIS_SERVERS 80 (content:”cmd.exe”; replace:”yyy.yyy”;) –Any content in the packet payload can be replaced. –A great way to break an exploit without dropping the packet!!

Sample snort Rules To drop incoming port 80 connections: drop tcp any any -> $HOMENET 80 (msg:”Port 80 tcp”) To drop cmd.exe calls to your webservers: drop tcp any any -> $HOMENET 80 (msg:“cmd.exe attempt”; content: “cmd.exe”) drop tcp any any -> $HOMENET 80 (msg:“cmd.exe attempt”; content: “cmd.exe”)

Outline Intrusion Concept Intrusion Detection Systems(IDS) Types of IDS Attacks to the IDS Gateway Intrusion Detection System Host-based Intrusion Detection

Anomaly detection: IDS monitors system call trace from the app DB contains a list of subtraces that are allowed to appear Any observed subtrace not in DB sets off alarms App allowed traces IDS Operating System

HIDS’ Advantages over NIDS HIDS can monitor user-specific activity of the system –Check process listing, local log files, system calls. –It is difficult for NIDS to associate packets to specific users (except when content switch-based NIDS is used!) and to determine if the commands in the packets violate specific user’s access privilege.