Polytechnic University Introduction 1 Intrusion Detection Systems Examples of IDSs in real life r Car alarms r Fire detectors r House alarms r Surveillance.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Guide to Network Defense and Countermeasures Second Edition
Network Traffic Anomaly Detection Based on Packet Bytes Matthew V. Mahoney Florida Institute of Technology
1 Reading Log Files. 2 Segment Format
Snort: A Network Intrusion Detection Software Matt Gustafson Becky Smith CS691 Semester Project Spring 2003.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewalls and Intrusion Detection Systems
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Intrusion Detection Systems and Practices
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Bro: A System for Detecting Network Intruders in Real-Time Presented by Zachary Schneirov CS Professor Yan Chen.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Host Intrusion Prevention Systems & Beyond
Intrusion Detection - Arun Hodigere. Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
INTRUSION DETECTION SYSTEM
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
USENIX LISA ‘99 Conference © Copyright 1999, Martin Roesch Snort - Lightweight Intrusion Detection for Networks Martin Roesch.
Port Scanning.
IDS Mike O’Connor Eric Tallman Matt Yasiejko. Overview IDS defined IDS defined What it does What it does Sample logs Sample logs Why we need it Why we.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
FIREWALL Mạng máy tính nâng cao-V1.
Penetration Testing Security Analysis and Advanced Tools: Snort.
COEN 252 Computer Forensics
Chapter 6: Packet Filtering
IIT Indore © Neminah Hubballi
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Honeypot and Intrusion Detection System
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Intrusion Detection and Prevention. Objectives ● Purpose of IDS's ● Function of IDS's in a secure network design ● Install and use an IDS ● Customize.
COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.
SNORT Feed the Pig Vicki Insixiengmay Jon Krieger.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Snort & Nmap Mike O’Connor Eric Tallman Matt Yasiejko.
1 Guide to Network Defense and Countermeasures Chapter 9.
Cs490ns - cotter1 Snort Intrusion Detection System
Linux Networking and Security
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Intrusion Intrusion Detection Systems with Snort Hailun Yan 564-project.
Intrusion Detection Reuven, Dan A. Wei, Li Patel, Rinku H.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.
Sniffer, tcpdump, Ethereal, ntop
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Role Of Network IDS in Network Perimeter Defense.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
An Introduction To Gateway Intrusion Detection Systems Hogwash GIDS Jed Haile Nitro Data Systems.
IDS Intrusion Detection Systems
Port Scanning James Tate II
Intrusion Detection Systems
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Polytechnic University Introduction 1 Intrusion Detection Systems Examples of IDSs in real life r Car alarms r Fire detectors r House alarms r Surveillance systems An IDS is any combination of hardware & software that monitors a system or network for malicious activity.

Polytechnic University Introduction 2 Why IDS Can be detected: r Mapping r Port scans m Tens of thousands of packets r TCP stack scans m Hundreds of thousands of packets r “Deep Packet Inspection” r Many organizations deploy IDS systems r Provide warnings to network administrator m Administrator can then improve network’s security m Vigorous investigation could lead to attackers There are host-based and network-based IDS systems. Focus here on network-based.

Polytechnic University Introduction 3 IDS sensors Web server FTP server DNS server application gateway Internet Demilitarized zone Internal network firewall = IDS sensor Underlying OS needs to be hardened: stripped of unnecessary network services

Polytechnic University Introduction 4 False Alarms False alarms: r False positive: normal traffic or benign action triggers alarm m Example: fire alarm if wrong password is entered; benign user makes a typo r False negative: alarm is not fired during attack

Polytechnic University Introduction 5 Efficiency of IDS system r Accuracy: low false positive and false negative rates r Performance: the rate at which traffic and audit events are processed m To keep up with traffic, may not be able to put IDS at network entry point m Instead, place multiple IDSs downstream r Fault tolerance: resistance to attacks m Should be run on a single hardened host that supports only intrusion detection services r Timeliness: time elapsed between intrusion and detection

Polytechnic University Introduction 6 Signature-based IDS Sniff traffic on network r border router or multiple sensors within a LAN Match sniffed traffic with signatures r attack signatures in database r signature: set of rules pertaining to a typical intrusion activity m Simple example rule: any ICMP packet > 10,000 bytes m Example: more than one thousand SYN packets to different ports on same host under a second r skilled security engineers research known attacks; put them in database r can configure IDS to exclude certain signatures; can modify signature parameters Warn administrator when signature matches r send , SMS r send message to network management system

Polytechnic University Introduction 7 Limitations to signature detection r Requires previous knowledge of attack to generate accurate signature m Blind to unknown attacks r Signature bases are getting larger m Every packet must be compared with each signature m IDS can get overwhelmed with processing; can miss packets

Polytechnic University Introduction 8 Anomaly Detection IDS r Observe traffic during normal operation r Create normal traffic profile r Look for packet streams that are statistically unusual m e.g., inordinate percentage of ICMP packet m or exponential growth in port scans/sweeps r Doesn’t rely on having previous knowledge of attack r Research topic in security

Polytechnic University Introduction 9 IDS evasion: “spy vs. spy” r Attackers do not want to be detected by IDS m Often attackers are intimately familiar with the popular IDS products, their weaknesses r Idea: manipulate attack data m Active area of research in attack community m Example: port scan stretched out over long period of time, with different source IP addresses r Most common approach: fragmentation m To detect malicious activity, IDS must capture, store, and analyze fragments.  Many fragment streams spread out over long period time ➜ IDS must have large buffers Requires significant memory and processing power

Polytechnic University Introduction 10 IDS evasion: fragmentation r Send a flood of fragments m Send so many fragments that IDS system saturates. m Once saturated, IDS will not be able detect a new attack r Fragment packets in unexpected ways m Such that the IDS does not understand how to properly reassemble the attack packets

Polytechnic University Introduction 11 IDS evasion tool: FragRouter r Runs on Unix/Linux systems r Provides over 35 different schemes for fragmenting flow of data r Separates attack functionality from the fragmentation functionality attack system (eg nmap) attack obfuscation (fragrouter) IDS target Internet

Polytechnic University Introduction 12 Some fragmentation types in FragRouter r Sends data in ordered 8-byte fragments r Sends data in ordered 24-byte fragments r Sends data in ordered 8-byte fragments with one fragment out of order r Complete TCP handshake, send fake FIN and RST (with bad checksums) before sending data in ordered 1-byte

Polytechnic University Introduction 13 Snort r Popular open source IDS m 200,000 installations r Enhanced sniffer m Runs on Linux, Unix, Windows m Generic sniffing interface libpcap m Can easily handle 100 Mbps of traffic r Signatures m Written and released by Snort community within hours m Anyone can create m Largest collection of signatures for IDS Typical setup snort sensor hub internal network firewall Good book: Intrusion Detection with Snort, by Jack Koziol

Polytechnic University Introduction 14 Snort deployment snort sensor hub internal network firewall snort sensor internal network firewall Switch SPAN port: provides monitoring for net admin & security switch copies all traffic to SPAN port can select which switch ports get copied approach doesn’t require intro of new hub no need for unidirectional cable unidirectional sniffing cable switch

Polytechnic University Introduction 15 Distributing traffic to multiple sensors r Large organizations often have Gbps backbone r Snort with full rule set cannot handle all traffic m Packets can get dropped; attacks go undetected r Tempting to tune Snort by trimming rules r Solutions: m Put sensors on different 100 Mbps segments m Or, multiple sensors on backbone; each sensor processes different range of destination IP addresses

Polytechnic University Introduction 16 snort.conf Example: var HOME_NET /24 var EXTERNAL_NET ! /24 Var HTTP_SERVERS Var HTTP_PORTS

Polytechnic University Introduction 17 Snort rule examples alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:”ICMP PING NMAP”; dsize: 0; itype: 8;) m Rule generates alert for ICMP having empty payload, ICMP type 8, and arriving from the outside. m This is part of an NMAP ping. alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg: “DOS SMBdie attack”:; flags: A+; content:”|57724c a|”;)  Rule generates alert if a TCP packet from outside contains |57724c a| in payload and is headed to port 139 (netbios) for some internal host. m This is part of a buffer overflow attack on a computer running Server Message Block Service.

Polytechnic University Introduction 18 Snort rule examples (2) alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:”WEB-IIS ISAPI.ida attempt”; uricontent:”.ida?”; nocase; dsize:>239; flags:A+;) m Rule generates alert for packet heading to Web server with.ida? in URL in GET message m Buffer overflow attack that allows attacker to take over server.

Polytechnic University Introduction 19 Snort rule files r chat.rules r ddos.rules r ftp.rules r multimedia.rules r p2p.rules r porn.rules r virus.rules

Polytechnic University Introduction 20 Snort Rule Writing Example: Cross-site scripting (XSS): r Web site allows scripts to be inserted into dynamically created Web page. Can reek havoc. r Look out for HTTP requests containing r Might first try: m alert tcp any any -> any any (content: “ ”; msg: “XSS attempt”;) m triggers many false positives: e.g., message with JavaScript r Then try: m alert tcp $EX_NET any -> $HTTP_SRVS $HTTP_PRTS (content: “ ”; msg: “XSS attempt”; nocase;)

Polytechnic University Introduction 21 Snort Rule Syntax r Rule is a single line m Rule header: everything before parenthesis m Rule option: what’s in the parenthesis Syntax for rule header: rule_action protocol src_add_range src_prt_range dir_operator dest_add_range dest_prt_range Example: alert tcp /24 1:1024 -> r rule actions: alert, log, drop r protocol: tcp, udp, icmp r direction: -> and <> r src, dest port ranges :

Polytechnic University Introduction 22 Snort Rule Syntax (2) Syntax for rule option: r One or more option keywords m separated by semi-colons r Example: m (msg: “XSS attempt”; content: “ ”; nocase;) Content-related keyword examples: r content: ”smtp v2”; (ascii) r content: ”|0f 65 a7 7b|” ; (binary) r uricontent: ”.ida?”; r content-list: “inappropriate_content.txt”; r nocase; r offset: 20; (start at byte 20 in payload) r depth: 124; (stop at byte 124 in payload)

Polytechnic University Introduction 23 Snort Rule Syntax (3) IP-related keyword examples: r ttl: <5; r id:2345; (id field, used for fragments) r fragoffset: 0; r dsize: >500; (payload size) r ip_proto: 7; ICMP-relayed keyword examples: r itype: 8; r icode: 3;

Polytechnic University Introduction 24 Snort Rule Syntax (4) TCP-related rules r flags: A+; (ACK flag) r flags: FUP; (FIN, Urgent, or Push flag) m + alert if specified bit is discovered, in addition to at least one other m ! alert if any of the specified bits is not set r seq: ; ack: ; Response examples r msg: “christmas tree attack”; r logto: “new_rule.log”; logs packet when match occurs