1 Computer Science 653 Lecture 9 --- Inference Control Professor Wayne Patterson Howard University Fall 2009.

Slides:



Advertisements
Similar presentations
Chapter 1  Introduction 1 Chapter 1: Introduction.
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
1 Firewalls. 2 References 1.Mark Stamp, Information Security: Principles and Practice, Wiley Interscience, Robert Zalenski, Firewall Technologies,
1 Topic 2 – Lesson 4 Packet Filtering Part I. 2 Basic Questions What is packet filtering? What is packet filtering? What elements are inside an IP header?
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Firewalls and Intrusion Detection Systems
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Firewalls and Intrusion Detection Systems
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Chapter 8 Deworming.
CS 483 – SD SECTION (8) AUTHORIZATION. INTRODUCTION The authorization (or access control) process is used to decide if person, program or device X is.
Intrusion Detection Systems and Practices
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Access Control 1 Access Control Access Control 2 Access Control  Two parts to access control  Authentication: Who goes there? o Determine whether access.
Department Of Computer Engineering
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
FIREWALL Mạng máy tính nâng cao-V1.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Chapter 6: Packet Filtering
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Beginning Network Security Monitor and control flow into and out of the LAN Ingress Egress Only let in the good guys Only let out the corp. business.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Principles of Information Systems, Sixth Edition 1 The Internet, Intranets, and Extranets Chapter 7.
Chapter 8 Authorization Access control matrix Multilevel Security Multilateral security Covert channel Inference control CAPTCHA Firewalls IDS.
Intruders & Intrusion Detection Systems Intruders Three classes of intruders:Three classes of intruders: An individual who is not authorized to.
Firewalls 1.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Intrusion Detection System
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Role Of Network IDS in Network Perimeter Defense.
Computer and Information Security Chapter 8 Advanced Cryptanalysis 1.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Ch. 23, 25 Q and A (NAT and UDP) Victor Norman IS333 Spring 2015.
Chapter Seven: Authorization 2013Term 2 INTRODUCTION Additional forms of Access Control CAPTCHAs, which are designed to restrict access to humans Firewalls,
Network Devices and Firewalls Lesson 14. It applies to our class…
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Computer Data Security & Privacy
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Firewalls.
Topic 5: Communication and the Internet
Lecture 3: Secure Network Architecture
Network hardening Chapter 14.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

1 Computer Science 653 Lecture Inference Control Professor Wayne Patterson Howard University Fall 2009

2 Inference Control Example Suppose we query a database  Question: What is average salary of female CS professors at XYZ University?  Answer: $95,000  Question: How many female CS professors at XYZ University?  Answer: 1 Specific information has leaked from responses to general questions!

3 Inference Control and Research For example, medical records are private but valuable for research How to make info available for research and protect privacy? How to allow access to such data without leaking specific information?

4 Naïve Inference Control Remove names from medical records? Still may be easy to get specific info from such “anonymous” data Removing names is not enough  As seen in previous example What more can be done?

5 Less-naïve Inference Control Query set size control  Don’t return an answer if set size is too small N-respondent, k% dominance rule  Do not release statistic if k% or more contributed by N or fewer  Example: Avg salary in Bill Gates’ neighborhood  Used by the US Census Bureau Randomization  Add small amount of random noise to data Many other methods  none satisfactory

6 Inference Control: The Bottom Line Robust inference control may be impossible Is weak inference control better than no inference control?  Yes: Reduces amount of information that leaks and thereby limits the damage Is weak crypto better than no crypto?  Probably not: Encryption indicates important data  May be easier to filter encrypted data

7 CAPTCHA

8 Turing Test Proposed by Alan Turing in 1950 Human asks questions to one other human and one computer (without seeing either) If human questioner cannot distinguish the human from the computer responder, the computer passes the test The gold standard in artificial intelligence No computer can pass this today

9 Eliza Designed by Joseph Weizenbaum, Simulates human conversation

10 CAPTCHA CAPTCHA  Completely Automated Public Turing test to tell Computers and Humans Apart Automated  test is generated and scored by a computer program Public  program and data are public Turing test to tell…  humans can pass the test, but machines cannot pass the test Like an inverse Turing test (sort of…)

11 CAPTCHA Paradox “…CAPTCHA is a program that can generate and grade tests that it itself cannot pass…” “…much like some professors…” Paradox  computer creates and scores test that it cannot pass! CAPTCHA used to restrict access to resources to humans (no computers) CAPTCHA useful for access control

12 CAPTCHA Uses? Original motivation: automated “bots” stuffed ballot box in vote for best CS school Free services  spammers used bots sign up for 1000’s of accounts  CAPTCHA employed so only humans can get accts Sites that do not want to be automatically indexed by search engines  HTML tag only says “please do not index me”  CAPTCHA would force human intervention

13 CAPTCHA: Rules of the Game Must be easy for most humans to pass Must be difficult or impossible for machines to pass  Even with access to CAPTCHA software The only unknown is some random number Desirable to have different CAPTCHAs in case some person cannot pass one type  Blind person could not pass visual test, etc.

14 Do CAPTCHAs Exist? Test: Find 2 words in the following Easy for most humans Difficult for computers (OCR problem)

15 CAPTCHAs Current types of CAPTCHAs  Visual Like previous example Many others  Audio Distorted words or music No text-based CAPTCHAs  Maybe this is not possible…

16 CAPTCHA’s and AI Computer recognition of distorted text is a challenging AI problem  But humans can solve this problem Same is true of distorted sound  Humans also good at solving this Hackers who break such a CAPTCHA have solved a hard AI problem Putting hacker’s effort to good use! May be other ways to defeat CAPTCHAs…

17 Firewalls

18 Firewalls Firewall must determine what to let in to internal network and/or what to let out Access control for the network Internet Internal network Firewall

19 Firewall as Secretary A firewall is like a secretary To meet with an executive  First contact the secretary  Secretary decides if meeting is reasonable  Secretary filters out many requests You want to meet chair of CS department?  Secretary does some filtering You want to meet President of US?  Secretary does lots of filtering! Malware programs are now being renamed “Salahis”

20 Firewall Terminology No standard terminology Types of firewalls  Packet filter  works at network layer  Stateful packet filter  transport layer  Application proxy  application layer  Personal firewall  for single user, home network, etc.

21 Packet Filter Operates at network layer Can filter based on  Source IP address  Destination IP address  Source Port  Destination Port  Flag bits (SYN, ACK, etc.)  Egress or ingress application transport network link physical

22 Packet Filter Advantage  Speed Disadvantages  No state  Cannot see TCP connections  Blind to application data application transport network link physical

23 Packet Filter Configured via Access Control Lists (ACLs)  Different meaning of ACL than previously AllowInsideOutsideAny80HTTP AllowOutsideInside80> 1023HTTP DenyAll Action Source IP Dest IP Source Port Dest Port Protocol Intention is to restrict incoming packets to Web responses Any ACK All Flag Bits

24 TCP ACK Scan Attacker sends packet with ACK bit set, without prior 3-way handshake Violates TCP/IP protocol ACK packet pass thru packet filter firewall  Appears to be part of an ongoing connection RST sent by recipient of such packet Attacker scans for open ports thru firewall

25 TCP ACK Scan Packet Filter Trudy Internal Network ACK dest port 1207 ACK dest port 1208 ACK dest port 1209 RST Attacker knows port 1209 open thru firewall A stateful packet filter can prevent this (next)  Since ACK scans not part of established connections

26 Stateful Packet Filter Adds state to packet filter Operates at transport layer Remembers TCP connections and flag bits Can even remember UDP packets (e.g., DNS requests) application transport network link physical

27 Stateful Packet Filter Advantages  Can do everything a packet filter can do plus...  Keep track of ongoing connections Disadvantages  Cannot see application data  Slower than packet filtering application transport network link physical

28 Application Proxy A proxy is something that acts on your behalf Application proxy looks at incoming application data Verifies that data is safe before letting it in application transport network link physical

29 Application Proxy Advantages  Complete view of connections and applications data  Filter bad data at application layer (viruses, Word macros) Disadvantage  Speed application transport network link physical

30 Application Proxy Creates a new packet before sending it thru to internal network Attacker must talk to proxy and convince it to forward message Proxy has complete view of connection Prevents some attacks stateful packet filter cannot  see next slides

31 Firewalk Tool to scan for open ports thru firewall Known: IP address of firewall and IP address of one system inside firewall  TTL set to 1 more than number of hops to firewall and set destination port to N  If firewall does not let thru data on port N, no response  If firewall allows data on port N thru firewall, get time exceeded error message

32 Firewalk and Proxy Firewall Dest port 12345, TTL=4 Dest port 12344, TTL=4 Dest port 12343, TTL=4 Time exceeded Trudy Packet filter Router This will not work thru an application proxy The proxy creates a new packet, destroys old TTL Router

33 Personal Firewall To protect one user or home network Can use any of the methods  Packet filter  Stateful packet filter  Application proxy

34 Firewalls and Defense in Depth Example security architecture Internet Intranet with Personal Firewalls Packet Filter Application Proxy DMZ FTP server DNS server WWW server

35 Intrusion Detection Systems

36 Intrusion Prevention Want to keep bad guys out Intrusion prevention is a traditional focus of computer security  Authentication is to prevent intrusions  Firewalls a form of intrusion prevention  Virus defenses also intrusion prevention Comparable to locking the door on your car

37 Intrusion Detection In spite of intrusion prevention, bad guys will sometime get into system Intrusion detection systems (IDS)  Detect attacks  Look for “unusual” activity IDS developed out of log file analysis IDS is currently a very hot research topic How to respond when intrusion detected?  We don’t deal with this topic here

38 Intrusion Detection Systems Who is likely intruder?  May be outsider who got thru firewall  May be evil insider What do intruders do?  Launch well-known attacks  Launch variations on well-known attacks  Launch new or little-known attacks  Use a system to attack other systems  Etc.

39 IDS Intrusion detection approaches  Signature-based IDS  Anomaly-based IDS Intrusion detection architectures  Host-based IDS  Network-based IDS Most systems can be classified as above  In spite of marketing claims to the contrary!

40 Host-based IDS Monitor activities on hosts for  Known attacks or  Suspicious behavior Designed to detect attacks such as  Buffer overflow  Escalation of privilege Little or no view of network activities

41 Network-based IDS Monitor activity on the network for  Known attacks  Suspicious network activity Designed to detect attacks such as  Denial of service  Network probes  Malformed packets, etc. Can be some overlap with firewall Little or no view of host-base attacks Can have both host and network IDS

42 Signature Detection Example Failed login attempts may indicate password cracking attack IDS could use the rule “N failed login attempts in M seconds” as signature If N or more failed login attempts in M seconds, IDS warns of attack Note that the warning is specific  Admin knows what attack is suspected  Admin can verify attack (or false alarm)

43 Signature Detection Suppose IDS warns whenever N or more failed logins in M seconds Must set N and M so that false alarms not common Can do this based on normal behavior But if attacker knows the signature, he can try N-1 logins every M seconds! In this case, signature detection slows the attacker, but might not stop him

44 Signature Detection Many techniques used to make signature detection more robust Goal is usually to detect “almost signatures” For example, if “about” N login attempts in “about” M seconds  Warn of possible password cracking attempt  What are reasonable values for “about”?  Can use statistical analysis, heuristics, other  Must take care not to increase false alarm rate

45 Signature Detection Advantages of signature detection  Simple  Detect known attacks  Know which attack at time of detection  Efficient (if reasonable number of signatures) Disadvantages of signature detection  Signature files must be kept up to date  Number of signatures may become large  Can only detect known attacks  Variation on known attack may not be detected

46 Anomaly Detection Anomaly detection systems look for unusual or abnormal behavior There are (at least) two challenges  What is normal for this system?  How “far” from normal is abnormal? Statistics is obviously required here!  The mean defines normal  The variance indicates how far abnormal lives from normal

47 What is Normal? Consider the scatterplot below x y White dot is “normal” Is red dot normal? Is green dot normal? How abnormal is the blue dot? Stats can be tricky!

48 How to Measure Normal? How to measure normal?  Must measure during “representative” behavior  Must not measure during an attack…  …or else attack will seem normal!  Normal is statistical mean  Must also compute variance to have any reasonable chance of success

49 How to Measure Abnormal? Abnormal is relative to some “normal”  Abnormal indicates possible attack Statistical discrimination techniques:  Bayesian statistics  Linear discriminant analysis (LDA)  Quadratic discriminant analysis (QDA)  Neural nets, hidden Markov models, etc. Fancy modeling techniques also used  Artificial intelligence  Artificial immune system principles  Many others!

50 Anomaly Detection (1) Spse we monitor use of three commands: open, read, close Under normal use we observe that Alice open,read,close,open,open,read,close,… Of the six possible ordered pairs, four pairs are “normal” for Alice: (open,read), (read,close), (close,open), (open,open) Can we use this to identify unusual activity?

51 Anomaly Detection (1) We monitor use of the three commands open, read, close If the ratio of abnormal to normal pairs is “too high”, warn of possible attack Could improve this approach by  Also using expected frequency of each pair  Use more than two consecutive commands  Include more commands/behavior in the model  More sophisticated statistical discrimination

52 Anomaly Detection (2) Over time, Alice has accessed file F n at rate H n H0H0 H1H1 H2H2 H3H Is this “normal” use? We compute S = (H 0  A 0 ) 2 +(H 1  A 1 ) 2 +…+(H 3  A 3 ) 2 =.02 And consider S < 0.1 to be normal, so this is normal Problem: How to account for use that varies over time? Recently, Alice has accessed file F n at rate A n A0A0 A1A1 A2A2 A3A

53 Anomaly Detection (2) To allow “normal” to adapt to new use, we update long-term averages as H n = 0.2A n + 0.8H n Then H 0 and H 1 are unchanged, H 2 =.2 .3+.8 .4=.38 and H 3 =.2 .2+.8 .1=.12 And the long term averages are updated as H0H0 H1H1 H2H2 H3H

54 Anomaly Detection (2) The updated long term average is H0H0 H1H1 H2H2 H3H Is this normal use? Compute S = (H 0  A 0 ) 2 +…+(H 3  A 3 ) 2 =.0488 Since S =.0488 < 0.1 we consider this normal And we again update the long term averages by H n = 0.2A n + 0.8H n New observed rates are… A0A0 A1A1 A2A2 A3A

55 Anomaly Detection (2) The starting averages were H0H0 H1H1 H2H2 H3H The stats slowly evolve to match behavior This reduces false alarms and work for admin But also opens an avenue for attack… Suppose Trudy always wants to access F 3 She can convince IDS this is normal for Alice! After 2 iterations, the averages are H0H0 H1H1 H2H2 H3H

56 Anomaly Detection (2) To make this approach more robust, must also incorporate the variance Can also combine N stats as, for example, T = (S 1 + S 2 + S 3 + … + S N ) / N to obtain a more complete view of “normal” Similar (but more sophisticated) approach is used in IDS known as NIDES NIDES includes anomaly and signature IDS

57 Anomaly Detection Issues System constantly evolves and so must IDS  Static system would place huge burden on admin  But evolving IDS makes it possible for attacker to (slowly) convince IDS that an attack is normal!  Attacker may win simply by “going slow” What does “abnormal” really mean?  Only that there is possibly an attack  May not say anything specific about attack!  How to respond to such vague information? Signature detection tells exactly which attack

58 Anomaly Detection Advantages  Chance of detecting unknown attacks  May be more efficient (since no signatures) Disadvantages  Today, cannot be used alone  Must be used with a signature detection system  Reliability is unclear  May be subject to attack  Anomaly detection indicates something unusual  But lack of specific info on possible attack!

59 Anomaly Detection: The Bottom Line Anomaly-based IDS is active research topic Many security professionals have very high hopes for its ultimate success Often cited as key future security technology Hackers are not convinced!  Title of a talk at Defcon 11: “Why Anomaly-based IDS is an Attacker’s Best Friend” Anomaly detection is difficult and tricky Is anomaly detection as hard as AI?

60 Access Control Summary Authentication and authorization  Authentication  who goes there? Passwords  something you know Biometrics  something you are (or “you are your key”) Something you have

61 Access Control Summary Authorization  are you allowed to do that?  Access control matrix/ACLs/Capabilities  MLS/Multilateral security  BLP/Biba  Covert channel  Inference control  CAPTCHA  Firewalls  IDS