NetRanger Intrusion Detection System Marek Mąkowski 0600_11F8_c2.

Slides:



Advertisements
Similar presentations
Security Monitoring & Management Security Control Panel Sensors & Detection Devices $ $ $ $ $ $ Physical Security Monitoring.
Advertisements

ActiveXperts Network Monitor Monitors servers, workstations and devices for availability Alerts and corrects.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Guide to Network Defense and Countermeasures Second Edition
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Intrusion Detection Systems and Practices
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
A survey of commercial tools for intrusion detection 1. Introduction 2. Systems analyzed 3. Methodology 4. Results 5. Conclusions Cao er Kai. INSA lab.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
Host Intrusion Prevention Systems & Beyond
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2003, Cisco Systems, Inc. All rights reserved. CSIDS 4.0—16-1 Chapter 16 Enterprise Intrusion Detection System Monitoring and Reporting.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
COEN 252 Computer Forensics
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
1. 2 Device management refers to the IDS Sensor's ability to dynamically reconfigure the filters and access control lists (ACL) on a router, switch, and.
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Internet and Intranet Fundamentals Class 9 Session A.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Presentation : 2 OF n by Manish Mehta 02/07/03.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Guide to Network Defense and Countermeasures
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Linux Networking and Security
NMS Case Study HP OpenView Network Node Manager Hong-taek Ju DP&NM Lab. Dept. of Computer Science and Engineering POSTECH, Pohang Korea Tel:
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
CHAPTER 9 Sniffing.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Intrusion Intrusion Detection Systems with Snort Hailun Yan 564-project.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
IS3220 Information Technology Infrastructure Security
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
© 2001, Cisco Systems, Inc. CSPFA 2.0—16-1 Chapter 16 Cisco PIX Device Manager.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
CompTIA Security+ Study Guide (SY0-401)
Click to edit Master subtitle style
CompTIA Security+ Study Guide (SY0-401)
Intrusion Detection Systems (IDS)
Home Internet Vulnerabilities
Chapter 4: Protecting the Organization
Lecture 3: Secure Network Architecture
Presentation transcript:

NetRanger Intrusion Detection System Marek Mąkowski 0600_11F8_c2

The Security Wheel: Defense In-Depth Effective network security requires defense in-depth, multiple capabilities - a combination of framework/process, technology, and expertise/ongoing operations… Real-Time Intrusion Detection & Response 7x24 Monitoring Vulnerability Scanning & Analysis Security Posture Assessment Risk Assessment Centralized Policy & Configuration Management Trend Analysis Management Reports Incident Response ID/Authentication Encryption & VPN Firewalls Security Design & Implementation/Integration 1) Corporate Security Policy 2) SECURE 3) MONITOR 4) AUDIT/TEST 5) MANAGE & IMPROVE Policy Development & Review

Why Active Audit? The hacker might be an employee or ‘trusted’ partner Up to 80% of security breaches are from insiders -- FBI Your defense might be ineffective One in every thee intrusions occur where a firewall is in place -- Computer Security Institute Your employees might make mistakes Misconfigured firewalls, modems, old passwords, etc. Your network will Grow and Change Each change is a security risk Firewalls, Authorization, Encryption do not provide Visibility into these problems

Active Audit -- Goal: Visibility NetRanger Intrusion Detection System Monitors user behaviors while on the network Similar to the guards, video cameras and motion detectors that help secure bank vaults

NetRanger Overview Real-Time Intrusion Detection and Response Finds and stops unauthorized activity occurring on the network --- “reactive” appliance Network “motion sensor, video camera, and security guard” Industry-leading technology Scalable, distributed operation High performance (100MB Ethernet, FDDI, Token Ring) “On-the-fly” re-configuration of Cisco Router ACLs to shun intruders

NetRanger Architecture NetRanger Director * Software * NetRanger Sensor * Appliance * Alarm Handling Configuration Control Signature Control Detection Alarm Generation Response Countermeasures Comm

Sensor Appliance

Sensor Front Panel

Sensor Back Panel Monitoring NIC Command NIC

Attack Signature Detection Scans Packet Header and Payload Single and multiple packet attacks Three-tier Attack Detection 1. Name Attacks (Smurf, PHF) 2. General Category (IP Fragments) 3. Extraordinary (TCP Hijacking, Spam) Customer Defined Signatures String matching (words) Quickly defend against new attacks Scan for unique misuse

Sensor—Detect Intrusions Context: (Header) Content: (Data) “Atomic” Single Packet “Composite” Multiple Packets Ping of Death Land Attack Port Sweep SYN Attack TCP Hijacking MS IE Attack DNS Attacks Telnet Attacks Character Mode Attacks

Sensor—Event Logging Events are Logged for Three Different Activities Alarms Alarms—when signature is detected Errors Errors—when error is detected Commands Commands—when user executes command on Director or Sensor Ping Sweep Director Lost Communications Director Sensor Shun Attacking Host _03F8_c2 NW98_US_401 Sensor

Sensor—Attack Response Session Termination and Shunning Session Termination TCP Hijack Kill current session Kills an active session Shunning NetworkDevice Shun Attacker Reconfigure router to deny access Sensor Attacker

Sensor—Session Logging Protected Network Session Log Attack Sensor Attacker Capture evidence (Keystrokes) of suspicious or criminal activity Fish Bowl or Honeypot -- Learn and record a hacker’s knowledge of your network

NetRanger Deployment DNS IOS Firewall Cisco Router WWW Server DNS Server Corporate Network Engineering Finance Admin Business Partner Dial-Up Access Cisco Router NetRanger Director ID/Auth. TACACS+ Cisco Secure Server Switch PIX Firewall Internet NR/NS NetRanger Remote Security Monitoring NetRanger NetSonar

NetRanger Director Geographically Oriented GUI Operations-friendly HP OpenView GUI Color Icon Alarm notification Quickly pinpoint, analyze and respond Maintain Security operations consistency Network Security Database Attack info, hotlinks, countermeasures Customizable Monitor Hundreds of Sensors per NOC

Software Requirements Operating Systems Solaris or 2.6 HP-UX HP OpenView 4.11, 5.01, 6.0 Web browser (for NSDB)

Hardware Requirements Sun SPARC platform with: NetRanger install partition: /usr/nr (50 MB) NetRanger log partition: /usr/nr/var (2 GB) HP OpenView install partition: /opt (110 MB) Java run-time environment: /opt (12 MB) System RAM: 96 MB

Hardware Requirements (cont.) HP-UX platform with: NetRanger install partition: /usr/nr (50 MB) NetRanger log partition: /usr/nr/var (2 GB) HP OpenView install partition: /opt (65 MB) Java run-time environment: /opt (10 MB) System RAM: 96 MB

Director - Distributed Management Enterprise Strategic Management Regional Operational Management Local Network Security Management Director Tier 1 Director Tier 2 Director Tier 3 Director Tier 3

Alarm Display and Management Director icon Context intrusion alarm Content intrusion alarm Sensor icon

Configuration Management

Network Security Database On-line reference tool Contains: Descriptions Recommendations and fixes Severity ratings Hyperlinks to external information/patches

Custom Script Execution Starts any user- defined script. and Script Execution Notification Sends notification to recipient or pager.

The Security Wheel: Defense In-Depth Effective network security requires defense in-depth, multiple capabilities - a combination of framework/process, technology, and expertise/ongoing operations… Real-Time Intrusion Detection & Response 7x24 Monitoring Vulnerability Scanning & Analysis Security Posture Assessment Risk Assessment Centralized Policy & Configuration Management Trend Analysis Management Reports Incident Response ID/Authentication Encryption & VPN Firewalls Security Design & Implementation/Integration 1) Corporate Security Policy 2) SECURE 3) MONITOR 4) AUDIT/TEST 5) MANAGE & IMPROVE Policy Development & Review

What comprises Active Audit? NetSonar Vulnerability scanning Network mapping Measure exposure Security expertise NetRanger Real-time analysis Intrusion detection Dynamic response Assurance Proactive Reactive

NetSonar™ Security Scanner “ Proactive Security” 0305_10F8_c2

Network Vulnerability Assessment Active Audit—Network Vulnerability Assessment Assess and report on the security status of network components Scanning (active, passive), vulnerability database NetSonar

NetSonar Overview Vulnerability scanning and network mapping system Identifies and analyzes security vulnerabilities in ever-changing networks -- “proactive” software Industry-leading technology Network mapping Host and device identification Flexible reporting Scheduled scanning

Network Discovery Process Network Mapping Identify live hosts Identify services on hosts Vulnerability Scanning Analyze discovery data for potential vulnerabilities Confirm vulnerabilities on targeted hosts Target

Network Mapping Tool Uses multiple techniques Ping sweeps - Electronic Map Port sweeps - Service discovery Unique discovery features Detects workstations, routers, firewalls, servers, switches, printers, and modem banks Detects Operating Systems and version numbers Does not require SNMP

Vulnerability Assessment Engine Potential Vulnerability Engine -- Passive Compares network discovery data to rules to reveal potential vulnerabilities Confirmed Vulnerability Engine -- Active Uses well-known exploitation techniques to fully confirm each suspected vulnerability and to identify vulnerabilities not detected during passive mapping

How NetSonar Works Network Discovery Active Ping Sweep - ID Hosts Inactive Port Sweeps - ID Svcs Svr Web Svr Workstation Firewall Router SMTP FTP HTTP FTP Telnet Passive Vulnerability Analysis Active Vulnerability Analysis Presentation & Reporting Exploits executed against target hosts Discovery data analyzed by rules Workstation: Windows NT v4.0 SMB Redbutton Anonymous FTP Communicate results FTP Bounce Exploit