Intrusion Detection Karthikeyan Mahadevan. Intrusion Detection What is Intrusion? Simply put, an intrusion is someone attempting to break into or misuse.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
1 Reading Log Files. 2 Segment Format
Anomaly Detection Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
1. AGENDA History. WHAT’S AN IDS? Security and Roles Types of Violations. Types of Detection Types of IDS. IDS issues. Application.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
1 Protection Protection = access control Goals of protection Protecting general objects Example: file protection in Linux.
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Firewalls and Intrusion Detection Systems
Intrusion Detection Systems and Practices
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
IT Security Doug Brown Jeff Bollinger. What is security? P.H.P. People Have Problems Security is the mitigation and remediation of human error in information.
Buffer Overflow. Process Memory Organization.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Intrusion Detection - Arun Hodigere. Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
FIREWALL Mạng máy tính nâng cao-V1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Security Exploiting Overflows. Introduction r See the following link for more info: operating-systems-and-applications-in-
IIT Indore © Neminah Hubballi
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Honeypot and Intrusion Detection System
Intrusion Detection and Prevention. Objectives ● Purpose of IDS's ● Function of IDS's in a secure network design ● Install and use an IDS ● Customize.
OSI and TCP/IP Models And Some Vulnerabilities AfNOG th May 2011 – 10 th June 2011 Tanzania By Marcus K. G. Adomey.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
DoS Suite and Raw Socket Programming Group 16 Thomas Losier Paul Obame Group 16 Thomas Losier Paul Obame.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Cryptography and Network Security Sixth Edition by William Stallings.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
DoS/DDoS attack and defense
Intrusion Detection System
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Role Of Network IDS in Network Perimeter Defense.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Network Security SUBMITTED BY:- HARENDRA KUMAR IT-3 RD YR. 1.
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
NETWORKS Fall 2010.
Managing Secure Network Systems
Principles of Computer Security
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Intrusion Detection system
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Intrusion Detection Karthikeyan Mahadevan

Intrusion Detection What is Intrusion? Simply put, an intrusion is someone attempting to break into or misuse your system What is an ID? An intrusion detection system, or IDS for short, makes an attempt to find out these illegal exploits made on the system

Types of IDS Host Based ID Network Based ID Layered Defense Knowledge Based ID Behavior Based ID

Host Based ID It involves loading piece/pieces of software on a system to be monitored i.e. the data source is the host. Detected by: An audit file produced by the software Enables administrator to be informed of any attack that the system may have suffered...

Network Based Id These type of systems monitor the traffic on a particular network segment. Detection is based on this network info. It can be effectively seen as a packet monitoring system. In lay-man terms, it is similar to a sensor monitoring the packets. Sensor considers a packet as a potential threat iff its signature is pre-classified. The primary signatures of interest in Network Based Ids are string signatures, port signatures, and header condition signatures.

Signatures String Signatures : Packet has a text string that indicates a possible attack. e.g “cat”++” > /.rhosts Port Signatures: monitor the well known and/or frequently attacked ports. e.g telnet (TCP 23), FTP (TCP 20/21) etc. Header signatures: Look for dangerous or/and illogical combinations in packet header e.g A TCP packet with SYN and FIN flag set

Layered Defense Multiple “Layers” of security is employed Most popular misconception: A Firewall can thwart intrusions. But… it could protect only a part of the system. So? - A security model is needed. Following are the layers: –Security policy of your organization –Host system security –Auditing –Router security –Firewalls –Intrusion detection systems –Incident response plan

Knowledge Based ID Apply the knowledge accumulated about specific attacks and system vulnerabilities. ID has prior knowledge about what these attacks look like. Completeness and competency of such a system depends on the knowledge base.

Behavior Based ID Underlying assumption: Intrusion can be detected based on a deviation from normal or expected behavior. Again, success of such a system depends on the definition of “normal” or “expected”. The data pertaining to what constitutes normal behavior is gathered.

Computer Security Breaches- Statistics Denial of service attacks - 32%. Sabotage of data or networks - 19%. Financial fraud - 14%. Insider abuse of Internet access privileges (for example, downloading pornography or pirated software or engaging in inappropriate use of systems) - 97%. –This increase indicates that the danger of entanglement in civil liability suits is also on the rise. Virus contamination - 90%. Laptop theft - 69%.

Types of Attacks I Denial of Services (DoS) : On the Internet, a denial of service (DoS) attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have DDoS: On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users

Types of Attacks II Buffer Overflow: Occurs when a program or process tries to store more data in a buffer than it was intended to hold. Buffers are defined to hold limited data. If the limit is exceeded, data can overflow into adjacent buffers, thereby corrupting or overwriting valid data held in them. Could be unintentional through programming error. Buffer overflow is an increasingly common type of security attack on data integrity. In buffer overflow attacks, the extra data may contain codes designed to trigger specific actions, in effect sending new instructions to the attacked computer

Sample Code - Buffer Over Flow char shellcode[] = Architecture Dependent Shell Code char large_string[128]; void main() { char buffer[96]; int i; long *long_ptr = (long *) large_string; for (i = 0; i < 32; i++) *(long_ptr + i) = (int) buffer; for (i = 0; i < strlen(shellcode); i++) large_string[i] = shellcode[i]; strcpy(buffer,large_string); }

Why is the previous code dangerous?? What we have done above is filled the array large_string[] with the address of buffer[], which is where our code will be. Then we copy our shellcode into the beginning of the large_string string. strcpy() will then copy large_string onto buffer without doing any bounds checking, and will overflow the return address, overwriting it with the address where our code is now located. Once we reach the end of main and it tried to return it jumps to our code, and execs a shell. -- CERT Reports say 65 % of threats are buffer overflows

Other attacks There are innumerable types of other attacks. Focus is on the two discussed here, since they constitute many of the major headlines today. A vast majority of other types of attacks are caused by programming flaws. –Bad programming in C is also a reason, there are functions that don’t check bounds.

Solutions - Existing There are infinite (exaggeration!!) number of ID’s available in the market. Approach –is to monitor the network traffic. Packet Signature analysis –based on a database with information about all the known types of attacks and signatures

Secure Programming This is one of the hottest field of research in the security area. There are compilers available, that test code and mark out the parts that are insecure e.g Cyclone Focus: Make the existing code error free. That is, the libraries which use functions that don’t check bounds.

System Call traces Any task performed on a system is a sequence of system calls. The task is cut out. We have to build a profile (into a database) with the known sequences of system calls. Based on this knowledge we can deterministically say whether or not a sequence of calls is a intrusion or not.

System Call Traces - Cont’d Profiling a database with normal sequences is easy. Then we have to develop synthetically, a database that has profiles of unused programs or those rarely used. The next step is categorization of normal and deviation from normal.

Future Work How effectively this can be done in order that there is no false alarm (report a normal event as intrusion-false negative),. and no intrusion is missed (false positive) Existing methods trigger a human intervention - Automated ID’s