Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS-2010 13 Sept 2004.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Guide to Network Defense and Countermeasures Second Edition
Intrusion Detection Systems and Practices
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
DIYTP Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Hacker Zombie Computer Reflectors Target.
IIT Indore © Neminah Hubballi
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Guide to Network Defense and Countermeasures
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Securing networks and systems Aleksandr Lenin. Outline Networking (recap) – Networks, Isolation domains: VLAN, subnets – CIDR/VLSM, Network zoning Firewalls.
Intrusion Detection System
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Some Great Open Source Intrusion Detection Systems (IDSs)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
IDS Intrusion Detection Systems
Click to edit Master subtitle style
Outline Introduction Characteristics of intrusion detection systems
Firewalls.
Intrusion Detection Systems (IDS)
Intrusion Prevention Systems
FIREWALL.
Presentation transcript:

Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004

Agenda The Problem Protection Firewall vs. IDS IDS Basics –Types Host Host Network Network –Passive and reactive systems Conclusion

The Problem Hackers –Internal –External Inherent holes in your security set up –Not configured properly –Patches not up to date or available –Virus definitions not up to date or available

The Problem "There's nothing on my system that anybody would want anyway". that anybody would want anyway". Legal Liability –Inappropriate content (child pornography, hosting illegal files such as.mp3 files, etc.) –You are potentially liable for damages caused by a hacker using your machine. Must be able to prove to the court that you took "reasonable" measures to defend yourself from hackers (i.e. cyber bank robbery from your computer as the host).

How do you protect yourself? Layered security setup –IDS –Firewall –Antivirus Applying the 3 basic security principles –Vulnerabilities –Threats –Countermeasures

Firewall vs. IDS Firewall: Software that is designed to restrict access to an organization's network or its Intranet (The Fence) IDS: A system that tries to identify attempts to hack or break into a computer system or to misuse it. IDS's may monitor packets passing over the network, monitor system files, monitor log files, or set up deception systems that attempt to trap hackers (The Guard Dog)

Why do we need both? Firewalls as stated are designed to block unwanted traffic. A common misunderstanding is that firewalls recognize attacks and block them. This is not true. The firewall administrator carefully adds "rules" that allow specific types of traffic to go through the firewall. For example, a typical corporate firewall allowing access to the Internet would stop all UDP, stops incoming TCP connections, but allows outgoing TCP connections. This stops all incoming connections from Internet hackers, but still allows internal users to connect in the outgoing direction. Firewalls only limit access they don’t “recognize” but merely block what the administrator tells it to.

Why do we need both? firewalls are only at the boundary to your network. Roughly 80% of all financial losses due to hacking come from inside the network! –A firewall at the perimeter of the network sees nothing going on inside; it only sees that traffic which passes between the internal network and the Internet IDS capabilities –Double-checks misconfigured firewalls –Catches attacks that firewalls legitimately allow through (such as attacks against web servers and internal attacks) –Catches attempts that fail –Catches insider hacking

Why do we need both? Hackers are much more capable than you think; the more defense you have, the better. And they still won't protect you from the determined hacker. They will, however, raise the bar on determination needed by the hackers.

Types of IDS Host Based Network Based (NIDS)

Host Based IDS Host based Intrusion Detection Systems role is to identify tampering or malicious activity occurring on the system. –Monitors log files, users, and the file system for evidence of malicious or suspicious application activity in real time. –Monitors log files, users, and the file system for evidence of malicious or suspicious application activity in real time. –Can use system logs, application logs, host traffic, key system files, and in some instances firewall logs as its data source.

Host Based Some of the activities that Host based can monitor include: –user specific actions –Access to system log files, running processes, and files system –success/failure of an attack –Attacks that use NIDS evasion techniques i.e. makes it through firewall, undetected by NIDS and has a successful attack on system/network

Network Based Monitor both incoming and outgoing traffic. Typically deployed on standalone systems in front of firewalls or at key network choke points for large or complicated networks. Typically deployed on standalone systems in front of firewalls or at key network choke points for large or complicated networks. There are two forms of NIDS, –Pattern Matching –Anomaly based. NIDS use network traffic as its source; monitoring network traffic in real time, and alerting in near real time.

Network Based Pattern matching –Most IDS follow this standard. –Is a Knowledge based system –The intrusion detection system contains prior information about specific attacks and vulnerabilities. –Applies this to incoming and outgoing traffic by inspecting each packet against its signature database. –When such a condition is met, an alarm is triggered and the administrator is notified. The accuracy of a Knowledge based system relies on its signature databases

Network Based Anomoly matching –Creates a profile of normal network traffic. –Any anomalous/irregular traffic that is seen will be considered suspicious, thus an alarm is generated. –Detection of suspicious events can be implemented in various ways i.e. Protocol analysis/decoding, traffic doesn't comply with normal traffic criteria. –Detection of suspicious events can be implemented in various ways i.e. Protocol analysis/decoding, traffic doesn't comply with normal traffic criteria.

Passive and Reactive IDS Host and Network based systems can either be passive systems or reactive based systems Most network-based systems are passive with reactive capabilities Passive –detect possible attacks, log the information and issue an alert Reactive –attempt to react in some way to the malicious content it has spotted such as change firewall settings and/or permissions as appropriate –Though reactive systems implement nice defensive mechanisms, they are still prone to false positives

Reactive Network Based Have the ability to react while watching the network, instead of a per system basis. Authority to be reactive for a wide range of systems. More control per one intrusion detection system Methods of preventing/reacting –prevent known network/host based attacks from occurring –Insertion of Firewall rules –Packet Scrubbing

Reactive Host Based Events are entered into log files after completion, thus to rely on reading log files for reactive tactics won't work. Reactive host based systems tend to watch the actual file system (i.e. kernel) for malicious or illegal content –Improper privilege escalation While watching system calls and the kernel, an attempt to escalate privileges can be seen, a reactive host based IDS can attempt to defeat this by ending the process. –Logging off malicious users If activity is encountered that appears to be malicious, a reactive system can log the offending user off the system and block him from accessing the system until further notice and inform an administrator of that host.

Conclusion Problem –Hackers –Protecting yourself –Legal liability IDS vs. Firewall –Need for both the “Fence” and the “Guard Dog” Host and Network based IDS Passive and Reactive IDS

Questions?