Advanced Intrusion Defense Joel Snyder Opus One. Acknowledgements Massive Support from Marty Roesch, Ron Gula,

Slides:



Advertisements
Similar presentations
Intrusion Detection System(IDS) Overview Manglers Gopal Paliwal Gopal Paliwal Roshni Zawar Roshni Zawar SenthilRaja Velu SenthilRaja Velu Sreevathsa Sathyanarayana.
Advertisements

Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection Aaron Beach Spring 2004.
Snort: Overview Chris Copeland What is an Intrusion Detection System (IDS)? An intrusion detection system is any system which can identify a network.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
System Security Scanning and Discovery Chapter 14.
Defense-in-Depth, Part 2: Advanced Intrusion Defense Joel Snyder Opus One
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Vulnerability Analysis Borrowed from the CLICS group.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
SELECTING AND IMPLEMENTING VULNERABILITY SCANNER FOR FUN AND PROFIT by Tim Jett and Mike Townes.
seminar on Intrusion detection system
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Lecture 11 Intrusion Detection (cont)
Using Argus Audit Trails to Enhance IDS Analysis Jed Haile Nitro Data Systems
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
Installing Samba Vicki Insixiengmay Jonathan Krieger.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
More on the IP Internet Protocol. Internet Layer Process Transport layer process passes EACH TCP segment to the internet layer process for delivery Transport.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Introduction to our On-Line Self Service Center at
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
IIT Indore © Neminah Hubballi
Intrusion Detection: Snort. Basics: History Snort was developed in 1998 by Martin Roesch. It was intended to be an open-source technology, and remains.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Power Projection Systems Department Zombie Scan Judy Novak Vern Stark David Heinbuch June 12, 2002.
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!
Intrusion Detection and Prevention. Objectives ● Purpose of IDS's ● Function of IDS's in a secure network design ● Install and use an IDS ● Customize.
CIS 450 – Network Security Chapter 3 – Information Gathering.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Snort & Nmap Mike O’Connor Eric Tallman Matt Yasiejko.
Hybrid Approaches Towards Optimized Network Discovery Techniques By David Meltzer.
Lecture 11 Page 1 CS 236 Online Customizing and Evolving Intrusion Detection A static, globally useful intrusion detection solution is impossible –Good.
Chapter 5: Implementing Intrusion Prevention
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Trinity Uses Nmap, shouldn’t you?. From “The Art of War” "... knowing your enemy 100% of the time, you will win your battle 100% of the time, knowing.
Network Security: Lab#5 Port Scanners and Intrusion Detection System
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Intrusion Detection on a Shoestring Budget Shane Williams UT Austin Graduate School of Library and Information Science Oct. 18, 2000 SANS Network Security.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Thanks for joining! We will begin in just a few minutes as more people.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
IS3220 Information Technology Infrastructure Security
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
IDS Intrusion Detection Systems
Port Scanning James Tate II
Vulnerability Scanning with Credentials
Putting It All Together
Putting It All Together
Intrusion Detection Systems (IDS)
Presentation transcript:

Advanced Intrusion Defense Joel Snyder Opus One

Acknowledgements Massive Support from Marty Roesch, Ron Gula, Robert Graham Products from ISS, Cisco, and Tenable Cash and Prizes from Andy Briney and Neil Roiter

This is an IDS alert… IDS saw a packet aimed at a protected system IDS magic decoder technology correctly identifies this as “Back Orifice!”

This IDS alert ain’t no good Last time I checked, FreeBSD 4.9 was not one of the supported platforms for BackOrifice…

Please don’t call that a False Positive IDS developers will jump down your throat “False Positive” means the IDS cried wolf when there was no such attack  Usually the result of poorly written signatures Instead, let’s invent a complex multisyllable term: “non-contextual alert”

The IDS lacks “context” IF the IDS knew that the destination system was not running Windows… IF the IDS knew that the destination system was not running Back Orifice… IF the IDS knew that there was no such destination system… IF the IDS knew that the destination system was more hops away then TTL allowed…

IF IF IF the IDS knew more… THEN the IDS could tell the IDS operator more about this attack Ron Gula (Tenable) says that alerts are “raw intelligence.” They are data, but are not information yet. We need to turn them into “well-qualified intelligence” to start a war.

Roesch: “Target-Based IDS” Target-based IDS Sensor  The sensor has knowledge about the network  The sensor has knowledge about the hosts Target-based Event Correlation  The output of the sensor is compared to knowledge of vulnerabilities Target-based IDS has two components

Target-based IDS sensor Network Flight Recorder (NFR) and Internet Security Systems (ISS) claim to be shipping IDS sensors that have target- based IDS technology in them Sourcefire is working on putting this into its sensor Other vendors may be including this technology (but I don’t know about them)

Target-based IDS Consoles Information Security asked me to look at three “Target-based IDS” consoles  Internet Security Systems “Fusion”  Cisco “Cisco Threat Response”  Tenable Security “Lightning Console”

Start with a normal IDS… 1. IDS sensors generate enormous dinosaur- sized piles of alerts; alerts are sent to the IDS console 2. Operator gets enormous dinosaur- sized headache looking at hundreds of thousands of alerts … and add brains!

Brains=knowledge + process Knowledge Somehow figure out lots of information about  What systems are out there  What software they are running  What attacks they are vulnerable to Process Evaluate each alert with the additional contextual knowledge and decide  To promote the alert  To demote the alert  That we don’t know

Approach 1: ISS Fusion 1. NetMgr schedules scanning using ISS Scanner 2. Scan info, including ports & vulnerabilities, flow into SiteProtector 3. Sensor alerts also flow into SiteProtector 4. Fusion reads alerts and assigns priorities for the operator

Variation 2: Tenable Lightning 1. NetMgr schedules “active scans” using Nessus or NeWT 2. Results are sent to Lightning Console 3. Passive scan results are collected by NeVO 4. Passive results are sent to Lightning

What is “Passive Scanning?” By simply watching the traffic fly by, you can learn a great deal TCP connections have “fingerprints”  Fingerprints are useful for identifying the TCP stack (hence: the O/S) involved  Existence proof Applications (client & server) have “banners”  Banners can reveal application names, version numbers, and patch levels

Tenable (continued) 5. IDS sensors send alerts to console (Bro, Snort, ISS, Enterasys, NAI) 6. Lightning compares every alert to the known vulnerability database, rejecting all that don’t match an identified vulnerability

Approach 3: Cisco CTR 1. IDS sensors send alerts to their native console 2. Copies of alerts also go to CTR 3. CTR investigates alerts 4. Alerts plus investigation are available to operator

Scan before vs after If you scan before…  You can’t verify that an attack actually succeeded  Your scan will always be out of date If you scan/verify after…  You can verify that an attack did something  You might be a day late (and a dollar short) to catch things  You potentially can create a DoS condition

Do they work? Yes, but…  Be careful what you wish for All products had a significant reduction in IDS alerts Caveats  CTR - rolling window of only 1000 events!  Lightning - only shows events with matched vulnerabilities!

What about scanning? When you scan is important How you scan is important Where you scan is important Caveats  Scanning after the fact can be a problem  Scanning before the fact can be a problem  Passive scanning can miss things  Active scanning can miss things

Can this quiet my IDS down? It could… But none of the products I looked at have a feedback loop to the IDS! Why don’t the scanners tell the IDS what ports to look on? Why don’t the scanners tell the IDS what signatures to ignore?

Is this right for you? YES! “I already have an IDS and I care about the alerts and I need some way to help prioritize them because I am drowning in alerts!” “I need to get an IDS for alerts but don’t have the manpower to analyze the alerts.” NO! “If I get this, my IDS will be a self-tuning smooth- running no-maintenance machine.” “I have no network security policy that says what to do when an alert occurs.”

Advanced Intrusion Defense Joel Snyder Opus One

Questions? Submit your questions to Joel by clicking on the Ask A Question link on the lower left corner of your screen.

More information Thank you for participating in this SearchSecurity webcast. For more information on intrusion defense, visit our Featured Topic: