Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Third Edition
Advertisements

FIREWALLS Chapter 11.
Personal Info 1 Prepared by: Mr. NHEAN Sophan  Presenter: Mr. NHEAN Sophan  Position: Desktop Support  Company: Khalibre Co,. Ltd 
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
1. AGENDA History. WHAT’S AN IDS? Security and Roles Types of Violations. Types of Detection Types of IDS. IDS issues. Application.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Guide to Network Defense and Countermeasures Second Edition
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
INTRUSION DETECTION SYSTEM
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
APA of Isfahan University of Technology In the name of God.
Storage Security and Management: Security Framework
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
1 Guide to Network Defense and Countermeasures Chapter 2.
IIT Indore © Neminah Hubballi
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
BUSINESS B1 Information Security.
Monitoring for network security and management Cyber Solutions Inc.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
Module 11: Designing Security for Network Perimeters.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Cryptography and Network Security Sixth Edition by William Stallings.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Eric Van Horn Cosc 356.  Nearly every organization in todays era uses computers and a network to send, receive, and store information  Very important.
Security Methods and Practice CET4884
Network System Security - Task 2. Russell Johnston.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Securing Information Systems
CompTIA Security+ Study Guide (SY0-401)
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Working at a Small-to-Medium Business or ISP – Chapter 8
Security in Networking
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-501)
Intrusion Prevention Systems
Intrusion Detection system
Introduction to Network Security
Presentation transcript:

Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.

WHAT IS SECURITY ISO defines five security services ISO defines five security services –Confidentiality (secrecy) –Authentication (identify verification) –Integrity –Access control Users also would likely include Users also would likely include –Preventing spam –Preventing denial of service –Privacy –…

Security Terminology Vulnerabilities Vulnerabilities –security flaws in systems Attacks Attacks –means of exploiting vulnerabilities Countermeasures Countermeasures –technical or procedural means of addressing vulnerabilities or thwarting specific attacks Threats Threats –motivated adversaries capable of mounting attacks which exploit vulnerabilities

Types of violation Attack Attack –Attempts to exploit a vulnerability –Ex: denial of service, privilege escalation Intrusion Intrusion –Masquerading as another legitimate user Misuse Misuse –User abuses privileges –Often called the “insider threat”

Intrusion “Any intentional event where an intruder gains access that compromises the confidentiality, integrity, or availability of computers, networks, or the data residing on them.” Credit: CERT-CC Security Improvement Module 8: Responding to Intrusions

Why Systems Are Vulnerable Contemporary Security Challenges and Vulnerabilities

Use of fixed Internet addresses through use of cable modems or DSL Lack of encryption with most Voice over IP (VoIP) Widespread use of and instant messaging (IM) Internet Vulnerabilities: Why Systems Are Vulnerable (Continued)

Intrusion Detection and Computer Security Computer security goals: Computer security goals: –Confidentiality, integrity, and availability Intrusion is a set of actions aimed to compromise these security goals Intrusion is a set of actions aimed to compromise these security goals Intrusion prevention (authentication, encryption, etc.) alone is not sufficient Intrusion prevention (authentication, encryption, etc.) alone is not sufficient Intrusion detection is needed Intrusion detection is needed

Intrusion Examples Intrusions : Any set of actions that threaten the integrity, availability, or confidentiality of a network resource Intrusions : Any set of actions that threaten the integrity, availability, or confidentiality of a network resource Examples Examples –Denial of service (DoS): attempts to starve a host of resources needed to function correctly –Worms and viruses: replicating on other hosts

Intrusion Detection Intrusion detection: The process of monitoring and analyzing the events occurring in a computer and/or network system in order to detect signs of security problems Intrusion detection: The process of monitoring and analyzing the events occurring in a computer and/or network system in order to detect signs of security problems Primary assumption: User and program activities can be monitored and modeled Primary assumption: User and program activities can be monitored and modeled Steps Steps –Monitoring and analyzing traffic –Identifying abnormal activities –Assessing severity and raising alarm

IDS Architecture Sensors (agent) Sensors (agent) –to collect data and forward info to the analyzer  network packets  log files  system call traces Analyzers (detector) Analyzers (detector) –To receive input from one or more sensors or from other analyzers –To determine if an intrusion has occurred User interface User interface –To enable a user to view output from the system or control the behavior of the system

Intrusion Detection Model Credit: IETF: Intrusion Detection Message Exchange Requirements (Internet Draft) Data Source Sensor Administrator Manager Operator Analyser Sensor Security Policy Response Activity Event Alert Notification

Intrusion Detection Systems Detect intrusive behaviour in an automated fashion Detect intrusive behaviour in an automated fashion Monitor activity both across networks (NIDS) and within hosts (HIDS) Monitor activity both across networks (NIDS) and within hosts (HIDS) Analyse activity for signs of intrusion Analyse activity for signs of intrusion –Signature based –Anomaly based Respond to predetermined triggers by: Respond to predetermined triggers by: –Blocking specific actions

Common Defense Strategies Firewalls Firewalls Intrusion Detection Systems Intrusion Detection Systems Anti-virus technology (in hosts and in mail gateways) Anti-virus technology (in hosts and in mail gateways) Anti-spam technology (in hosts and in mail gateways) Anti-spam technology (in hosts and in mail gateways) Periodic penetration testing (enterprise nets) Periodic penetration testing (enterprise nets) Centralized patch management (enterprise nets) Centralized patch management (enterprise nets) Anti-DOS mechanisms (ISPs) Anti-DOS mechanisms (ISPs)

Defining Policy Consider this example Consider this example –A hospital deploys a database system for patient records. The system consists of a centralized DB server accessed by client systems in the hospital. Clients access the information through a network of connected PCs and via wireless PDAs What sorts of policy statements can we make about the hardware? Software? Users? What sorts of policy statements can we make about the hardware? Software? Users?

Defining Policy Possible statements Possible statements –The DB server software will be kept up to date –Unused network services (ports) on the DB server will be disabled –Wireless access will employ strong cryptographic protocols –Users are prohibited from examining records of patients not in their care Machine readable policy is very hard problem Machine readable policy is very hard problem –Particularly for misfeasance (i.e. insiders)

Info Case studyCourse :Intrusion detection and hacker exploits Case studyCourse :Intrusion detection and hacker exploits Presented to: Dr. Lo’ai Tawalbeh Presented to: Dr. Lo’ai Tawalbeh Homepage: ople/aclark/questnet2003-ac-ids.ppt Homepage: ople/aclark/questnet2003-ac-ids.ppt

Presented to: Dr. lo’ai tawalbeh Presented to: Dr. lo’ai tawalbeh Course :Intrusion detection and hacker Course :Intrusion detection and hacker exploits exploits