An Intrusion Detection System to Monitor Traffic Through the CS Department Christy Jackson, Rick Rossano, & Meredith Whibley April 24, 2000.

Slides:



Advertisements
Similar presentations
Intrusion Detection System(IDS) Overview Manglers Gopal Paliwal Gopal Paliwal Roshni Zawar Roshni Zawar SenthilRaja Velu SenthilRaja Velu Sreevathsa Sathyanarayana.
Advertisements

Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
Net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
IDS Colloquium 2001John Kristoff - DePaul University1 Intrusion Detection Systems (IDS) John Kristoff DePaul University.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion Detection CS-480b Dick Steflik. Hacking Attempts IP Address Scans scan the range of addresses looking for hosts (ping scan) Port Scans scan.
Report on statistical Intrusion Detection systems By Ganesh Godavari.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Firewall Slides by John Rouda
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
USENIX LISA ‘99 Conference © Copyright 1999, Martin Roesch Snort - Lightweight Intrusion Detection for Networks Martin Roesch.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Penetration Testing Security Analysis and Advanced Tools: Snort.
COEN 252 Computer Forensics
Chapter 6: Packet Filtering
Network Forensics: When conventional forensic analysis is not enough Manuel Humberto Santander Peláez GIAC GCFA Gold, GNET Silver, GCIA Gold.
Intrusion Detection: Snort. Basics: History Snort was developed in 1998 by Martin Roesch. It was intended to be an open-source technology, and remains.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Honeypot and Intrusion Detection System
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Snort & Nmap Mike O’Connor Eric Tallman Matt Yasiejko.
Linux Networking and Security
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
1 Quick Overview Overview Network –IPTables –Snort Intrusion Detection –Tripwire –AIDE –Samhain Monitoring & Configuration –Beltaine –Lemon –Prelude Conclusions.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Network Security: Lab#5 Port Scanners and Intrusion Detection System
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
Reducing false positives in intrusion detection systems by means of frequent episodes Lars Olav Gigstad.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
An overview.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Intrusion Detection on a Shoestring Budget Shane Williams UT Austin Graduate School of Library and Information Science Oct. 18, 2000 SANS Network Security.
Snort - Lightweight Intrusion Detection for Networks YOUNG Wo Sang Program Committee, PISA
Network Security Major Problems Network Security Major Problems Why Firewall? Why Firewall? Problems with Firewalls Problems with Firewalls What is.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Role Of Network IDS in Network Perimeter Defense.
Network Intrusion Detection System (NIDS)
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
DETECTING INTRUSIONS By Matthew Morrow. WHAT ARE INTRUSIONS? Definition: “To compromise a computer system by breaking the security of such a system or.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
IDS Intrusion Detection Systems
Snort – IDS / IPS.
Backdoor Attacks.
Wireless Network Security
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
SNORT.
Network Forensics: When conventional forensic analysis is not enough
NETWORK SECURITY LAB Lab 9. IDS and IPS.
Intrusion Detection Systems (IDS)
Intrusion Detection Systems
Presentation transcript:

An Intrusion Detection System to Monitor Traffic Through the CS Department Christy Jackson, Rick Rossano, & Meredith Whibley April 24, 2000

Overview of Project Introduction Setting Up the IDS Types of Attacks Development of Rule File Computer Demo Analyze Statistics Recommendations & Conclusion

Purpose of System Paco proposed the question: Is it worth it to set up a filter on the CS router? Research potential attacks Attempt to develop an adequate rule file for network Gather statistics on the number of iffy/bad packets received a day

Development of the IDS Looked in to possible filtering tools tcpdump, Snoop, Shadow IDS Settled on IP Filter (recommended) Easy implementation, nice tools to gather statistics & easy logging However, only hears broadcast packets & packets addressed to our machine, Grendel Back to square one

Development of IDS Snort came to our rescue Similar to a tcpdump tool Lightweight NIDS Small - roughly 100 KB compressed Easily compiled and installed Free! & minimal time for configuration Lots of plug-ins Rule-based logging Allows logging to separate files and has real-time alerting capability

Rule File Paco supplied a Cisco rule set for packets he wanted to monitor Using the Snort format, we developed an equivalent rule set Rule ex.: log TCP any any -> any 69 (logto: “logs/tftp-port69”;)

What We Were Attempting to Log Existing OS Weaknesses finger (port 79) portmapper (port 111) snmp (port 161) Known Cracker Attacks Ganabus, NetBus, Back Orifice, Whackamole (ports 12345, 12346, 20034, 31337)

Logging Denial of Service Attacks Echo (port 7) Chargen (port 19) Syslog (port )

Computer Demo

Memory Statistics Total Amount of Data Received Daily: approx. 7.2 GB This data is packet headers, doesn’t include actual data in packets Total Number of Packets Per Day: 48,724,609

Example of Suspicious Packet We received one packet on port 0 (which should never be used) 04/23-02:46: : > :0 TCP TTL:50 TOS:0x0 ID:10900 DF ******** Seq: 0x10000 Ack: 0xB617 Win: 0xFFFF Packet from: hover.demon.nl Attempted Attack???

Recommendations Currently we are logging only packets that come in on a certain insecure port Snort allows the capability to read the actual data and analyze whether the intent of the packet on that port is questionable This info can be alerted in real-time Disadvantages of this on the CS switch: Heavy traffic would cause the dropping of many packets However, what are the odds of those packets being an attack?

Recommendations Configuration of WWW rules (port 80) Need to create specifically for our server, based on the applications and systems running on server Many attacks can occur through this port Setup more robust machine that could hold complete packet information This would allow us to witness the “hacker’s” actions once in the network

Conclusions

Was our IDS worth it? Yes. Statistics suggest that a router filter would be overkill. This is what we wanted to hear! However, would work as an internal IDS system This system could easily be run on a regular basis. An alert would gain our attention & could easily be investigated using Snort

References IDS Information: Snort’s web-site This site provides entire rule files that you can use on your system. Good up-to-date info on IDS security trends

Questions ?