Intrusion Detection Issues Presented by Deepa Srinivasan CSE581, Winter 2002, OGI.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection Aaron Beach Spring 2004.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Guide to Network Defense and Countermeasures Second Edition
1 Reading Log Files. 2 Segment Format
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Intrusion Detection Systems and Practices
Common IS Threat Mitigation Strategies An overview of common detection and protection technologies Max Caceres CORE Security Technologies
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Examining IP Header Fields
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Bro: A System for Detecting Network Intruders in Real-Time Presented by Zachary Schneirov CS Professor Yan Chen.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
1 Issues in Benchmarking Intrusion Detection Systems Marcus J. Ranum.
Sales Kickoff - ARCserve
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
CCI through Firewall TNG 2.4 Updated April 16, 2002.
COEN 252 Computer Forensics
Network Intrusion Detection Systems Ali Shayan October 2008.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Intrusion Detection and Prevention. Objectives ● Purpose of IDS's ● Function of IDS's in a secure network design ● Install and use an IDS ● Customize.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Breno de MedeirosFlorida State University Fall 2005 Network Intrusion Detection Systems Beyond packet filtering.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Chapter 5: Implementing Intrusion Prevention
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Active Mapping: Resisting NIDS Evasion Without Altering Traffic writen by Umesh Shankar University of California at Berkeley presented.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
1 HoneyNets, Intrusion Detection Systems, and Network Forensics.
DoS/DDoS attack and defense
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-1 Lesson 10 Attack Guards, Intrusion Detection, and Shunning.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Role Of Network IDS in Network Perimeter Defense.
Network Intrusion Detection System (NIDS)
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Active Mapping: Resisting NIDS Evasion Without Altering Traffic Authors: Umesh Shankar (UC – Berkeley) & Vern Paxson (ICSI) Network Intrusion Detection:
Security Methods and Practice CET4884
Domain 4 – Communication and Network Security
Host of Troubles : Multiple Host Ambiguities in HTTP Implementations
Introduction to Networking
Get rid of the ambiguities in the traffic stream
Detecting Evasion Attack at High Speed without Reassembly
Presentation transcript:

Intrusion Detection Issues Presented by Deepa Srinivasan CSE581, Winter 2002, OGI

Papers on this topic Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection (Jan ‘98) Network Intrusion Detection: Evasion, Traffic Normalization and End - End semantics (‘01) IP Fragmentation and fragrouter (Dec ‘00) An Achilles’ Heel in Signature-based IDS: Squealing False Positives in SNORT (‘01)

Agenda Introduction to IDS –Some popular IDSs Problems with IDSs Normalizer IP Fragmentation & fragrouter “Squealing” in SNORT

Introduction to IDS Intrusion attempt or a threat: potential possibility of a deliberate unauthorized attempt to access/manipulate information, or render a system unreliable or unusable. Types of IDS –Host-based –Network IDS Example IDSs –ISS RealSecure, WheelGroup NetRanger, Network Flight Recorder, Snort

Principles of IDSs Common Intrusion Detection Framework –Event generators –Analysis Engines –Storage Mechanisms –Countermeasures

Principles of IDSs Common Intrusion Detection Framework

Principles of IDSs Passive monitoring Signature Analysis Need for reliable ID –accuracy: false positives and false negatives –“fail-open”: if an attacker disables the IDS, entire network is still accessible –forensic value of information

Fundamental problems of IDSs Deployed on a different box Could be on a different network segment Protocol implementation ambiguities –different protocol stacks have different behavior NIDS could see a different stream of packets than host

Fundamental problems of IDSs False positives –incorrectly identify an intrusion when none has occurred False negatives –incorrectly fail to identify an intrusion that has actually occurred

Attacks on IDSs Insertion –IDS thinks packets are valid; end system rejects these Evasion –end system accepts packets that IDS rejects Denial of Service –resource exhaustion Examples

Popular problems/attacks TCP/IP Options fields TCB Creation/Teardown TCP Stream Reassembly IP Fragmentation –overlapping fragments

Specific attacks Invalid MAC addresses? Invalid headers –Permissive in receiving, frugal in sending? –Bad IP checksum will be dropped? –IP options IP TTL ambiguity –Packer received or not?

Specific attacks Packet size –Packet too large for downstream link? Source-routed packets –Will destination reject such packets? Fragment or TCP handshake time-out –Will other parts of fragment/TCB still be at destination? Overlapping segments –Rewrite old data or not?

Specific attacks Weird TCP options –Destination might be configured to drop Old TCP timestamps (PAWS) –Destination might be configured to drop TCP RSTs with weird sequence numbers –Is connection reset? Addition of interpreted characters (“^H”) –How does OS interpret?

IP Fragmentation Allows IP traffic over different network media with different max packet sizes IP stacks do not handle reassembly well –can lead to DOS (teardrop, jolt2) Fragrouter –NIDS testing tool –accepts IP packets routed from another system –fragments these packets according to various schemes

Popular problems/attacks Resource Exhaustion –CPU, Memory, Network Bandwidth –CPU: Data-structure attack via fragments –Memory: Space attack via fragments –Network: Targeted DoS to disrupt TCP reassembly Abusing reactive IDS –attack to generate false positives –IDS shuts down valid connections, blocks valid traffic etc. –Results in IDS triggering a DOS

IP Fragmentation Allows IP traffic over different network media with different max packet sizes IP stacks do not handle reassembly well –can lead to DOS (teardrop, jolt2) Fragrouter –NIDS testing tool –accepts IP packets routed from another system –fragments these packets according to various schemes

Popular problems/attacks Resource Exhaustion –CPU, Memory, Network Bandwidth Abusing reactive IDS –attack to generate false positives –IDS shuts down valid connections, blocks valid traffic etc. –Results in IDS triggering a DOS

Methodology Black-box testing PHF attack –exploits a CGI script - phf to gain access to web servers Software Used –CASL –FreeBSD 2.2 –netcat –tcpdump

Results

Discussion Questions?

Network Intrusion Detection: Traffic Normalization & End-End Protocol Semantics "Transport and Application Protocol Scrubbing"

Recap of previous paper –IDSs are vulnerable to attacks –fundamental problems: IDS sees different streams than target host protocol implementation ambiguities

Introduction Paper introduces concept of “normalizer” Approach & implementation Performance

Normalizer

Sits directly in path of traffic into a site Patch up or normalize the packet stream Result: same traffic and unambiguous behavior for NIDS and host Differs from a firewall Other approaches –host-based IDS, details of intranet, bifurcating analysis

Normalization Tradeoffs Protection –not meant to but can act as a firewall Need to preserve End-End Semantics Impacts end-end performance Stateholding attack –create excess state than Normalizer can handle Inbound vs Outbound traffic

Other Considerations Cold Start –is a “real world” requirement –what happens to existing connections? –Initiate state for connections from trusted network Attacking the normalizer itself

Systematic Approach Walk through packet headers of each protocol Identify what is the “correct” normalization

Example Attack IP Identifier and stealth port scans

Normalization for this Solution for patsy –Scramble ids of incoming and outgoing packets –Breaks diagnostic protocols Solution for victim –Reliable RSTs –Normalizer sends “keep-alive” packet to host to determine if connection was actually closed

Implementation Code in C - uses libpcap user-level application attention to completeness, correctness & performance Evaluated using trace-driven approach –NetDuDE

Performance Platform: 1.1GHz AMD Athlon, FreeBSD 4.2, 133 MHz SDRAM a normalizer implemented in kernel mode (as a click module) could forward traffic at line-speed on bi-directional 100 Mbps link

Discussion Questions?

An Achilles’ Heel to Signature-Based IDS: Squealing False Positives in Snort (‘01)

Paper documents attacking Snort using false positives Snort : open-source, free, lightweight NIDS Squealing –noise made by pigs during periods of distemperment Boy cried wolf too many times –additionally, boy may not recognize the wolf when it actually appears! Introduction

Attacking Snort Limitation is not in correctly identifying attacks, but in the ability to suppress false positives PCP –Tool for generating false positives –packet writing and argument parsing

Squeal Attack types Noise-masked attacks –diverts attention from a covert attack Attack misdirection –source of attack is spoofed Evidence Reputability Target Conditioning Statistical Poisoning –when training an IDS

How easy is it? Using SOCK_RAW LIBNET, Nemesis Script-driven tools available (snot, stick, trichinosis)

Proposed Solutions Adaption –changing the signature-matching algorithms rapidly State awareness –make IDS have a “context” which checking packets

Conclusions IDSs have been around for more than a decade Several fundamental problems identified in IDS IDSs themselves are vulnerable to attacks –and fail-open Upcoming paper groups

References online.securityfocus.com/ids