Intruders Detection Systems Presently there is much interest in systems, which can detect intrusions, IDS (Intrusion Detection System). IDS are of very.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Intrusion Detection System(IDS) Overview Manglers Gopal Paliwal Gopal Paliwal Roshni Zawar Roshni Zawar SenthilRaja Velu SenthilRaja Velu Sreevathsa Sathyanarayana.
Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
Intrusion Detection Systems. Tecniche di Sicurezza dei Sistemi2 Intrusion Detection Systems Presently there is much interest in systems, which can detect.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Fusing Intrusion Data for Pro-Active Detection and Containment Mallikarjun (Arjun) Shankar, Ph.D. (Joint work with Nageswara Rao and Stephen Batsell)
Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Report on statistical Intrusion Detection systems By Ganesh Godavari.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Host Intrusion Prevention Systems & Beyond
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Penetration Testing Security Analysis and Advanced Tools: Snort.
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
Network Flow-Based Anomaly Detection of DDoS Attacks Vassilis Chatzigiannakis National Technical University of Athens, Greece TNC.
IIT Indore © Neminah Hubballi
Network Intrusion Detection Systems Ali Shayan October 2008.
Intrusion Detection: Snort. Basics: History Snort was developed in 1998 by Martin Roesch. It was intended to be an open-source technology, and remains.
Intrusion Detection Systems. A properly implemented IDS is watched by someone besides your system administrators, such as security personnel.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
FEATURES & FUNCTIONALITY. Page 2 Agenda Main topics Packet Filter Firewall Application Control Other features.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Intrusion Detection and Prevention. Objectives ● Purpose of IDS's ● Function of IDS's in a secure network design ● Install and use an IDS ● Customize.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Intrusion Detection Presentation : 2 OF n by Manish Mehta 02/07/03.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
Linux Networking and Security
Breno de MedeirosFlorida State University Fall 2005 Network Intrusion Detection Systems Beyond packet filtering.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Lesson Introduction
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Network Intrusion Detection System (NIDS)
Lecture 21: Network Primer 7/9/2003 CSCE 590 Summer 2003.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
An Introduction To Gateway Intrusion Detection Systems Hogwash GIDS Jed Haile Nitro Data Systems.
Security Methods and Practice CET4884
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
NETWORKS Fall 2010.
Red Team Exercise Part 3 Week 4
Intrusion Detection system
Presentation transcript:

Intruders Detection Systems Presently there is much interest in systems, which can detect intrusions, IDS (Intrusion Detection System). IDS are of very different character. Some focus on one machine and try to stop the intruder from doing damage, such is LIDS for Linux. Some can detect a worm attack from the way it spreads from machine to machine, like GrIDS. Several are actually data mining, they determine from logfiles if there is an intrusion based on reasoning by an expert system, NSTAT is an example. Many IDS implementations are listening passively to some LAN segment, look at the traffic and detect an intrusion. Snort IDS is a popular freeware program of this Network IDS-type. Other IDS solutions protect one machine by access controls.

What is Intrusion Detection Intrusion detection systems (IDSs) are designed for detecting, blocking and reporting unauthorized activity in computer networks. “The life expectancy of a default installation of Linux Red Hat 6.2 server is estimated to be less than 72 hours.” “The fastest compromise happened in 15 minutes (including scanning, probing and attacking)” “Netbios scans affecting Windows computers were executed with the average of 17 per day” (source: Honeynet Project)

Unauthorized Use of Computer Systems Within Last 12 Months (source CSI/FBI Study) 1.Motivation for Intrusion Detection

In year 2002 most common attacks were: Virus (78%) Insider Abuse of Net Access (78%) Laptop theft (55%) Denial of Service and System Penetration (40%) Unauthorized Access by Insiders (38%) Most Common Attacks (source CSI/FBI) 1.Motivation for Intrusion Detection ( Red color shows the attack types, which IDS can decrease)

Application IDS –Watch application logs –Watch user actions –Stop attacks targeted against an application Advantages –Encrypted data can be read Problems –Positioned too high in the attack chain (the attacks reach the application) Different Types of IDSs There are Application-, Host- and Network IDS

Host IDS –Watch kernel operations –Watch network interface –Stop illegal system operations –Drop attack packets at network driver Advantages –Encrypted data can be read –Each host contributes to the detection process Problems –Positioned too high in the attack chain (the attacks reach the network driver) Different Types of IDSs Application-, Host- and Network IDS

Network IDS –Watch network traffic –Watch active services and servers –Report and possibly stop network level attacks Advantages –Attacks can be stopped early enough (before they reach the hosts or applications) –Attack information from different subnets can be correlated Problems –Encrypted data cannot be read –Annoyances to normal traffic if for some reason normal traffic is dropped Different Types of IDSs Application-, Host- and Network IDS

2. Different Types of IDSs Application-, Host- and Network IDS - Comparison

Diagram Simple Process Model for ID For example applications log network driver, or network cable Parse data, filter data and execute Detection Algorithms Drop packets, send alerts, update routing tables, kill processes etc.

Misuse Detection IDS principle of detection Alert tcp ! /24 any -> / (Content: “| A5|”;msg:”External Mountd access”;) – Search attack signatures, which are patterns, byte code or expressions belonging to a specific attack. – often called signature-based detection – A signature is created by analysing an attack method –The patterns are stored inside the IDS Example Rule: There are two basic methods used by ID Systems: misuse detection and anomaly detection.

Example of a NIDS, snort Enable NIDS mode of Snort #./snort -dev -l./log -h /24 - c snort.conf The above command means that let Snort work as NIDS for the network /24 according to the rules inside snort.conf file. Sample rule: alert udp any any -> / (content:"|01 6a 42 c8|"; msg: “SIP session signaling";) The rules are modular and it is easy to add new rules. Typically the rules make alarms of all old security breaches so that you cannot notice any new breaches.

Anomaly Detection IDS principle of detection “Distinguish abnormal from normal” Threshold Detection X events in Y seconds triggers the alarm Statistical Measures Current traffic profile matches the ”normal” profile Rule-Based Methods Jack never logs in at 6 to 8 AM If Jack just sent from Espoo office, he should not send from New York office at the same time

Example: ( anomaly detection engine---SPADE) [**] [104:1:1] spp_anomsensor: Anomaly threshold exceeded: [**] 08/22-22:37: :3246 -> VICTIM.HOST:80 TCP TTL:116 TOS:0x0 ID:25395 IpLen:20 DgmLen:48 DF ******S* Seq: 0xEBCF8EB7 Ack: 0x0 Win: 0x4000 TcpLen: 28 TCP Options (4) => MSS: 1460 NOP NOP SackOK [**] [104:1:1] spp_anomsensor: Anomaly threshold exceeded: [**] 08/22-22:22: :2065 -> VICTIM.HOST:27374 TCP TTL:108 TOS:0x0 ID:10314 IpLen:20 DgmLen:48 DF ******S* Seq: 0x63B97FE2 Ack: 0x0 Win: 0x4000 TcpLen: 28 TCP Options (4) => MSS: 1460 NOP NOP SackOK [**] [104:1:1] spp_anomsensor: Anomaly threshold exceeded: [**] 08/23-23:04: VICTIM.HOST: > :3486 TCP TTL:255 TOS:0x0 ID:0 IpLen:20 DgmLen:40 DF ***A*R** Seq: 0x0 Ack: 0x22676B9 Win: 0x0 TcpLen: 20 [**] [104:1:1] spp_anomsensor: Anomaly threshold exceeded: [**] 09/02-01:30: VICTIM.HOST:515 -> :1189 TCP TTL:64 TOS:0x0 ID:0 IpLen:20 DgmLen:60 DF ***A**S* Seq: 0x16FC5A7F Ack: 0x529F8CE7 Win: 0x16A0 TcpLen: 40 TCP Options (5) => MSS: 1460 SackOK TS: NOP TCP Options => WS: 0

Anomaly/Misuse Detection – Comparison IDS principle of detection

Responses IDS response principles Alerts and notifications: , SMS, pager (important issue: alert path must be bulletproof) Increase Surveillance: log more Throttling: slow down malicious traffic Blocking Access: drop data, update firewall/router Make Counterattack: Eye for an eye tactics Honey Pots and Padded Cells: route the hacker to a fake system and let him play freely

Detection problems IDS problems in the detection stage True positive, TP, is a malicious attack that is correctly detected as malicious. True negative, TN, is a not an attack and is correctly classified as benign. False positive, FP, is not an attack but has been classified as an attack. False negative, FN, is an attack that has been incorrectly classified as a benign. Detection rate is obtained by testing the IDS against set of intrusive scenarios “…The false alarm rate is the limiting factor for the performance in an IDS”.

Advanced IDS Techniques Stream Reassembly: follow connections and sessions Traffic Normalization: see that protocols are followed Bayesian Networks: Data mining and decision networks Graphical IDSs (for example GrIDS): use graphs to model attacks Feature equality heuristics: port stepping, packet gap recognition Genetic Programming, Human immune systems Tens of research systems exist For Protection For Attacks Evasion methods (fragmentation, mutation etc.) IDS trashing (DoS tools to like stick/snot to crash IDS capability

Detecting Intruders Commercially the most used IDS systems are probably misuse based Network ID Systems, but Host-level IDS is also needed. As an example of a Host-level IDS let us look at LIDS for Linux. The philosophy of LIDS is to have a three layer protection: –Firewall –PortSentry –LIDS The firewall limits access to only allowed ports. In a Web-server only the TCP port 80 is absolutely necessary. Disable ports which are not used, for instance by removing the daemons or by modifying /etc/inetd.conf. Leave only the basic activities needed.

Detecting Intruders PortSentry is put to some port, which is often scanned but not used in the system. One should find suitable ports where to put PortSentry by looking at ports which are scanned often, like 143 or 111. Typically nowadays hackers do sweep scanning looking at only one port in several machines. PortSentry monitors activity on specific TCP/UDP ports. The PortSentry can take actions, like denying further access to the port. This is based on the assumption that the hacker will first probe with a scanner the machine for weaknesses. You install PortSentry in TCP-mode by portsentry -tcp ports are in portsentry.conf -file.

Detecting Intruders LIDS LIDS is an intrusion detection system that resides in the Linux kernel. It basically limits the rights of a root user to do modifications. It limits root access to direct port access, direct memory access, raw access, modification of log files, limits access to file system. It also prevents installation of sniffers or changing firewall rules. An administrator can remove the protection by giving a password to LIDS, but if a hacker breaks into the root, he cannot without LIDS password do much damage. Is this good? it certainly makes the life of a hacker more difficult, but what about a hacker getting into the kernel? How nice it is being an administrator using LIDS?