Intrusion Detection Cyber Security Spring 2010. Reading material Chapter 25 from Computer Security, Matt Bishop Snort –http://snort.orghttp://snort.org.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Security Administration Tools and Practices Amit Bhan Usable Privacy and Security.
Guide to Network Defense and Countermeasures Third Edition
Greg Williams CS691 Summer Honeycomb  Introduction  Preceding Work  Important Points  Analysis  Future Work.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Intrusion Detection CS461/ECE422 Spring Reading Material Chapter 8 of the text.
Anomaly Detection Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
Guide to Network Defense and Countermeasures Second Edition
Presented by Justin Bode CS 450 – Computer Security February 17, 2010.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
seminar on Intrusion detection system
Host Intrusion Prevention Systems & Beyond
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEM
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Computer Security Fundamentals by Chuck Easttom Chapter 9: Computer Security Software.
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
Lesson 7 Intrusion Prevention Systems. UTSA IS 3523 ID & Incident Response Overview Definitions Differences Honeypots Defense in Depth.
Intrusion Detection Chapter 12.
Intrusion Detection Chapter 12.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Guide to Network Defense and Countermeasures
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Chapter 5: Implementing Intrusion Prevention
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Network Security Architecture CS461/ECE422 Computer Security I Fall 2010.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
CompTIA Security+ Study Guide (SY0-401)
IDS Intrusion Detection Systems
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Principles of Computer Security
CompTIA Security+ Study Guide (SY0-401)
NETWORK SECURITY LAB Lab 9. IDS and IPS.
Intrusion Detection Systems (IDS)
Intrusion Prevention Systems
How to Detect Attacks and Supervise Rail Systems?
Intrusion Detection system
Presentation transcript:

Intrusion Detection Cyber Security Spring 2010

Reading material Chapter 25 from Computer Security, Matt Bishop Snort – Distributed IDS – DShield – Dark address space – dark_address_space.pdfhttp:// dark_address_space.pdf

Goal of Intrusion Detection Holy Grail: Detect and correct “bad” system behaviour Detection can be viewed in two parts –Anomaly detection: Use statistical techniques to determine unusual behaviour –Mis-use detection: Use signatures to determine occurrence of known attacks Detection can be performed on host data (HIDS), network data (NIDS), or a hybrid of both

Intrusion Detection Use audit trail React rather than directly prevent –Find “bad actions” –Work with access control mechanisms to stop them from happening May be hindered by confidentiality mechanisms –Like access control may not be able to see enough of traffic stream to detect

IDS Architecture Net Events Agent Log Events Agent Behavi oral Events Agent Director notifier Router Update

IDS Architecture Agents run at the lowest level gathering data. Agents send data to a Director that performs more significant processing of the data. –Potentially there is a hierarchy of agents and directors Directors invoke Notifiers to perform some action in response to a detected attack –Popup a window on a screen –Send an or a page –Send a new syslog message elsewhere. –Access control mechanism to block future action from the attacker Update firewall config BGP blackhole

Classical NIDS deployment

NIDS Remediation Options Log the event Drop the connection Reset the connection Change the configuration of a nearby router or firewall to block future connections

Mis-use/Signature Detection Fixed signatures are used in most deployed IDS products –E.g., Cisco, ISS, Snort, Bro Like virus scanners, part of the value of the product is the team of people producing new signatures for newly observed malevolent behaviour –Dedicated attacker can adjust his behaviour to avoid matching the signature. –Cannot find what we don’t know about The volume of signatures can also result in many false positive. –Must tune the IDS to match the characteristics of your network –Can result in IDS tuned too low to miss real events –Can hide real attacks in the mass of false positives

Example Signature Signature for port sweep –A set of TCP packets attempting to connect to a sequence of ports on the same device in a fixed amount of time In some environments, the admin might run nmap periodically to get an inventory of what is on the network –You would not want to activate this signature in that case

Example Snort Rule Rule header up to ‘(‘ –Identifies packets of interest Rule options after ‘(‘ –What to do to matching packets

Anomaly/statistical detection Seems like using statistics will result in a more adaptable and self-tuning system –Statistics, neural networks, data mining, etc. How do you characterize normal? –Create training data from observing “good” runs E.g., Forrest’s program system call analysis –Use visualization to rely on your eyes How do you adjust to real changes in behavior? –Gradual changes can be easily addressed. Gradually adjust expected changes over time –Rapid changes can occur. E.g., different behavior after work hours or changing to a work on the next project

Intrusion Protection Systems (IPS) Another name for inline NIDS Requires very fast signature handling –Slow signature handling will not only miss attacks but it will also cause the delay of valid traffic –Specialized hardware required for high volume gateways The inline intrusion detector can take direct steps to remediate If you move IDS into the network processing path, how is this different from really clever firewalling?

Network IPS scenario

Free vs Commercial IDS What do you get by paying? –Better hardware –Better signature and alert management tools –Timely and reviewed signatures

Host Based IDS Tripwire – Very basic detection of changes to installed binaries More recent HIDS. Look at patterns of actions of system calls, file activity, etc. to permit, deny, or query operations –Cisco Security Agent –Symantec –McAfee Entercept

Cisco Security Agent Architecture

Honey Pots Attract attacks with “fake” system Target must interact to some degree –Ensure target does not become a nusiance Honeyd – Virtually presents an entire network - Honey Net – Tools to create a real network of honey pots-

Netflow as an IDS basis Netflow is a logging format that tracks connections (source, destination, protocol and ports) –Original developed to support traffic engineering –Emerged as a good source of IDS traffic analysis Arbor Networks – –Analyzes router netflow data –Uses patented algorithms to detect anomalous activity Netflow visualization –NVisionIP and VisFlowConnect projects at NCSA –

Large Scale IDS Internet Storm Center and dshield.org –A very coarse level statistical analysis to find outliers in port activity –Uses a donated firewall logs from people all over the internet –Detect new worms or other widespread malware –

More large scale IDS Dark addresses are routable addresses that are not completely connected. May be routable from one part of the internet but not another Any traffic in the dark address space is invalid –It is a random target of a worm attack –It is a temporarily or locally routable address that is being used as the non-traceable source of an attack Hone in on activity on these dark address spaces –Internet motion detectors and network telescopes propose placing sensors at strategic points in the Internet –Use the information on these sensors as early warnings for emerging attacks.