GrIDS -- A Graph Based Intrusion Detection System For Large Networks Paper by S. Staniford-Chen et. al.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

REFLEX INTRUSION PREVENTION SYSTEM.. OVERVIEW The Reflex Interceptor appliance is an enterprise- level Network Intrusion Prevention System. It is designed.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
1 Software Testing and Quality Assurance Lecture 33 – Software Quality Assurance.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Managing Agent Platforms with the Simple Network Management Protocol Brian Remick Thesis Defense June 26, 2015.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
Lesson 19: Configuring Windows Firewall
DIDS part II The Return of dIDS 2/12 CIS GrIDS Graph based intrusion detection system for large networks. Analyzes network activity on networks.
seminar on Intrusion detection system
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Understanding Active Directory
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Installing Samba Vicki Insixiengmay Jonathan Krieger.
A Policy-based Approach to Wireless LAN Security Management George Lapiotis, Byungsuk Kim, Subir Das, Farooq Anjum Speaker: George Lapiotis
Database Design – Lecture 16
Lecture On Database Analysis and Design By- Jesmin Akhter Lecturer, IIT, Jahangirnagar University.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Software Testing and Quality Assurance Lecture 33 – Software Quality Assurance.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Windows 7 Firewall.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
SOFTWARE CONFIGURATION MANAGEMENT. Change is inevitable when computer software is built. And change increases the level of confusion among software engineers.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
CINBAD CERN/HP ProCurve Joint Project on Networking 26 May 2009 Ryszard Erazm Jurga - CERN Milosz Marian Hulboj - CERN.
Open-Eye Georgios Androulidakis National Technical University of Athens.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Introduction to Active Directory
Vignesh Ravindran Sankarbala Manoharan. Infrastructure As A Service (IAAS) is a model that is used to deliver a platform virtualization environment with.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
A Blackboard-Based Learning Intrusion Detection System: A New Approach
1 Introduction to Active Directory Directory Services Uniquely identify users and resources on a network Provide a single point of network management.
Aaron Corso COSC Spring What is LAMP?  A ‘solution stack’, or package of an OS and software consisting of:  Linux  Apache  MySQL  PHP.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
DIVYA K 1RN09IS016 RNSIT1. Cloud computing provides a framework for supporting end users easily through internet. One of the security issues is how to.
Some Great Open Source Intrusion Detection Systems (IDSs)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Towards a High Performance Extensible Grid Architecture Klaus Krauter Muthucumaru Maheswaran {krauter,
1 Policy Based Systems Management with Puppet Sean Dague
Network Virtualization Ben Pfaff Nicira Networks, Inc.
Ch.22 INTRUSION DETECTION
BGP 1. BGP Overview 2. Multihoming 3. Configuring BGP.
Security Methods and Practice CET4884
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
A Real-time Intrusion Detection System for UNIX
An Introduction to Computer Networking
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
دیواره ی آتش.
Intrusion Detection system
Introduction to Active Directory Directory Services
Database System Architectures
Presentation transcript:

GrIDS -- A Graph Based Intrusion Detection System For Large Networks Paper by S. Staniford-Chen et. al

10/06 Overview General facts about GrIDS Scalability Architecture Management Additional features Limitations

10/06 Security Policy Used to detect & analyze large-scale attacks Anomaly detection Can report on per-host basis –Worms –Network sweeps –User specified patterns of attack

10/06 GrIDS -- Environment Runs on Unix hosts connected by IP nets Intended for large networks (thousands of hosts & hundreds of IP sub-nets) Assumes that network belongs to single organization with autonomous departments No part of network is “actively hostile”

10/06 What does GrIDS do? Graph-based Intrusion Detection System Records network activity Aggregates data of interest Builds activity graphs Performs pattern matching Determines “unexpected” behavior

10/06 Scalability via Aggregation Models an organization as hierarchy of departments (composed of computers) Each department builds & evaluates graphs of activity within the department Sub-graphs are embedded in larger graphs, so an entire department may be represented by a single node in a high- level graph

10/06 Scalability via Aggregation Graphs scale & are always manageable  Low level graphs depict part of organization  High levels summarize information found in low level graphs GrIDS aggregates data; can it see low level intrusion?

10/06 Architecture of GrIDS Module controller process - on each host Comprised of modules with standardized interfaces: –data sources: monitor activity on hosts & networks; –graph engine: builds graphs & passes them up the hierarchy –software manager: manages state of hierarchy & distributed modules

10/06 Data Sources Monitor net: Network sniffers Monitor the OS/net: Point IDSs (single host or LAN IDSs) Includes extensible mechanism which allows data to be gathered from other security tools without significant change to the tool or to GrIDS

10/06 Graph Engine Nodes represent hosts or departments Edges represent network traffic between nodes Graph has global attributes which maintain state information about the graph as a whole Graphs are built based on rule sets

10/06 Rule Sets Executable specification of a kind of graph (contains preconditions, combining rules) Each rule set maintains a graph space containing multiple graphs Rules operate independently of one another

10/06 Rule Sets Used to –Determine if incoming report (partial graph) should be incorporated into existing graphs –Decide if two graphs should combine –Compute the attributes of the combined graph –Decide what actions to take, if any A rule set is inherited by all descendents of the node to which it is applied

Engine Receives Report In Form of Partial Graph Meets Rule Set’s Preconditions? Discard NO YES Meets Rule Set’s Combining Conditions? NO New Graph Formed in Rule Set’s Graph Space YES Incoming Graph Combined With Existing Graph Updating Graphs

Example Rule Combine node rule { res.node.combine = !empty({new.node.alerts, cur.node.alerts}) && abs(cur.node.time - new.node.time) < 30; res.node.alerts ={cur.node.alerts,new.node.alerts}; res.node.time = max({cur.node.time, new.node.time}); }

Example Assessment Rule assessments rule { (!empty(res.global.alerts)) || (res.global.nnodes >= 8) || (res.global.nedges >= 13) ==> alert(), report-graph(); (3 < res.global.nnodes < 8) || (5 report-graph(); }

10/06 Management Modules User interface modules for management functions and display of alerts Central organizational hierarchy server which has a global view of the topology of the hierarchy, and is responsible for ensuring that changes to the hierarchy happen in a consistent manner

10/06 Managing the Hierarchy Organizational hierarchy server maintains a global picture of hierarchy Access control system controls who can view and manage the hierarchy  ACL resides at each node & states who can access that node or any node in the sub-tree rooted there System managers perform “transactions”

10/06 Transactions Typical transactions include: moving a department adding a new host changing the location of the graph engine, etc.

10/06 Limitations Not secure against attacks targeting GrIDS: –substituting in hacked versions of GrIDS at the module level –denial of service attacks –disruptions of the network time protocol –networks or computers faults Widespread attacks which progress slowly might not be diagnosed by aggregation mechanism

10/06 Backup

10/06 Additional Features: Policy Enforcement Policies are compiled into rule sets which build graphs & evaluate for policy violations Currently, GrIDS only allows for policies stated with respect to a single graph edge (network connection) Rule takes form of a tuple: (action, time, source, destination, protocol, stage, status,....)