POC: Wayne Campbell 402-293-3967 Traditional Indications and Warnings for Host Based Intrusion Detection.

Slides:



Advertisements
Similar presentations
Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Advertisements

C6 Databases.
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
Access Control Methodologies
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Access Control Chapter 3 Part 5 Pages 248 to 252.
Appendix B: Designing Policies for Managing Networks.
1. AGENDA History. WHAT’S AN IDS? Security and Roles Types of Violations. Types of Detection Types of IDS. IDS issues. Application.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Intrusion Detection Systems and Practices
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
1 Intrusion Detection CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 4, 2004.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
IBM Security Network Protection (XGS)
seminar on Intrusion detection system
Maintaining and Updating Windows Server 2008
2  A system can protect itself in two ways: It can limit who can access the system. This requires the system to implement a two-step process of identification.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Network security policy: best practices
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Correlations, Alarms and Policies
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
IIT Indore © Neminah Hubballi
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Client: The Boeing Company Contact: Mr. Nick Multari Adviser: Dr. Thomas Daniels Group 6 Steven BromleyJacob Gionet Jon McKeeBrandon Reher.
Chapter 5: Implementing Intrusion Prevention
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
Cryptography and Network Security Sixth Edition by William Stallings.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Module 12: Configuring and Managing Storage Technologies
Module 10: Implementing Administrative Templates and Audit Policy.
Understand Audit Policies LESSON Security Fundamentals.
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Maintaining and Updating Windows Server 2008 Lesson 8.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
CompTIA Security+ Study Guide (SY0-401)
Intrusion Control.
Operating system Security
THE STEPS TO MANAGE THE GRID
Evaluating a Real-time Anomaly-based IDS
A Real-time Intrusion Detection System for UNIX
Intrusion Detection Systems
Firewalls and Security
Intrusion Detection system
Intrusion Detection Systems
Presentation transcript:

POC: Wayne Campbell Traditional Indications and Warnings for Host Based Intrusion Detection

Intrusion Detection Systems Network Based –external threat –commonly used Host Based –internal threat –2% of corporate America uses –FBI survey - 86% had attacks by employees

Network Based IDS Packet Sniffer Signature or scenario based –historical protection –updated frequently Limited historical evidence

Host Based IDS Site specific –up front work required Analysis of audit or log data Real time or batch analysis Distributed processing

Indication and Warning Methodology Developed by military organizations Used to predict aggression by an enemy –extensive historical analysis –current trend analysis Repository of significant events

I&W Recent History Cold War United States Development –sophisticated alert system for tracking –determination of critical events Continuous analysis by experts –events and possible actions –prioritized and weigh events

I &W Warnings Multiple indicators are required to be triggered –sequence of events is irrelevant –indicators could set higher level indicators Warnings of potential –prediction, not fact –snap shoot in time, estimate

I &W Warnings (cont'd) Strategic Decision Makers –experienced analyst –big picture view Defined/recommended actions –I & W data –supporting data

War on Cyber Crime Use I&W techniques to predict behavior Techniques are used in post-attack research Post-mortem –determine attack characteristics –physical, social engineering, system level Security Indications and Warnings (SIW)

Security Indications and Warnings Premise - historical events, can be used as indicators current of activity. Host-based Intrusion Detection –why? audit log analysis –network based possible Not scenario matching

Indicators Event or group of events Historically important events Building blocks of SIW Non-critical events –alone inconsequential –example: large number of prints occurring

Indicators (cont'd) Hierarchical –lowest level barriers boundaries –mid level gauges (counters) –top level criteria and indicators

Event Categories Security Organization –written site policy –derived and stated Why? Ease of rule generation Suggested Minimum –AdministrativeLimited Usage –Role SpecificDaily/Routine –Policy Limits

Event Categories (cont'd) Prioritize events per category Cost vs. Performance –more events slower response (volume) costlier (time/resources) –limited events threats undetected –balanced, manageable level

Barriers A computer resource or process that when used, misused or compromised suggest that a security breach or operating system misuse may be occurring or has been attempted. –operating system specific –security relevant –example:.rhosts file

Boundaries A computer resource or process that when used, misused or compromised indicates that the site’s security policy or normal operating procedures may have been violated. –operating system or application events –defined within site policy –example: accessing a restricted directory

Barriers and Boundaries Clearly and unambiguously activated –computer trends –level of significance Response definition –barriers - may require aggressive actions –boundaries - further investigation Both need to be monitored

Level of Significance All events are not created equal –weighing occurs naturally –importance defines significance Site defines and sets Unique or unusual events –quickly raise attention of security Example: production vs. development

SIW Approach Security Policy Response definition Categorizing of events Prioritizing events Barriers and Boundaries Rule generation Levels of significance

Policy Statement #1 No user shall have direct access to the prices files for job proposal submissions; access to theses files is only permitted via the corporate directed tools. –all price files are in /proposal/prices –corporate tool is PropGen –price files have a “.ppf” extension

Policy Statement #2 No individual shall be able to assume another user’s identity on any production machine. On development machines, developers may assume the “root” role –IP range of dev. systems [0-20] –no direct login as root is permitted –“root” can not change to a user’s ID

Policy Statement #3 No user shall attempt to obtain root or administrative privileges through covert means. –prohibits attempts to get administrative privileges –stolen password –buffer overflows –operating system specific weaknesses

Statement #1 Responses Assumptions – copying, removing of price file prohibited – reading of price files, except by PropGen is prohibited. –accessing /proposal can be a sign of browsing

Statement #1 Responses (cont'd) Alert messages –Attempt to copy sensitive price schedules –Attempt to delete sensitive price schedules –Illegal access of the price schedules –Unauthorized browsing of restricted resources

Statement #2 Responses Assumptions –root log ins are not permitted Alert messages –Illegal root login –Unauthorized use of su() command –Root assumed a user’s identity –Unauthorized transition to a new user ID

Statement #3 Responses Assumptions –all acquisition of root privileges should be made known to security personnel Alert messages –Illegal transition to root (buffer overflow) –Root shell attack has occurred –Undefined root acquisition

Defining Barriers Knowledgeable of basic system security –vulnerabilities –version specific data Know your system setup –What have you added? deleted?

Barrier Breakdown Audit daemon –primary barrier su() command –used to change effective UID Login Service –limits user log in capabilities

Barrier Breakdown (cont'd) /etc/passwd –user information Development systems –IP address specific Audit ID –unique identifier

Boundary Breakdown “ppf” files –contain price schedules /proposal directory –repository of company sensitive root privilege –limited to a few individuals PropGen application

Rule Generation Limitation of presentation paper –not all rules –not all circumstances Two step process –initial definition –refinement

Sample Rules Successful use of su() and “root” login at console –ba2 and ba3(root) Successful use of su() and you’re not a development machine –ba2 and not ba5

Sample Rules (cont'd) Successful use of su() and on the development platform and your current ID is not root –(ba2 and ba5) and not ba6(root)

Rule Threshold Numeric values as levels Trigger value assumption –ba2 = 5ba3 = 1 –ba5 = 4ba6 = 3 Level of Significance –SF =.25

Refined Equation ba2 and ba3 => 6 ba2 and not ba5 => 9 (ba2 and (ba5*SF)) and not ba6 => 12 –allows 4 su() before alerting on development systems –alert message severity level

Advantages Proven methodology Flexibility –levels of significance –prioritization of events Multiple levels - one to many relation Attack signature is not required Historical analysis

Disadvantages Number of possible enemies to monitor –traditional I&W had a few enemies –SIW has potentially thousands of enemies System requirements –memory –disk space

Summary Consistent with IDS requirements –warns of potential attacks Implementation –manual –automatic Guidance for security professional