Intrusion Detection Reuven, Dan A. Wei, Li Patel, Rinku H.

Slides:



Advertisements
Similar presentations
Lesson 3-Hacker Techniques
Advertisements

12-1 Last time Security in Networks Threats in Networks.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
System Security Scanning and Discovery Chapter 14.
Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Intrusion Detection Systems and Practices
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Department Of Computer Engineering
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
COEN 252 Computer Forensics
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Survey “Intrusion Detection: Systems and Models” “A Stateful Intrusion Detection System for World-Wide Web Servers”
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Honeypot and Intrusion Detection System
Software Security Testing Vinay Srinivasan cell:
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Linux Networking and Security
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
CHAPTER 9 Sniffing.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Cryptography and Network Security Sixth Edition by William Stallings.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Introduction to Security Dr. John P. Abraham Professor UTPA.
Computer Security By Duncan Hall.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Role Of Network IDS in Network Perimeter Defense.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
CompTIA Security+ Study Guide (SY0-401)
CSCE 548 Student Presentation By Manasa Suthram
Top 5 Open Source Firewall Software for Linux User
Chapter 7: Identifying Advanced Attacks
Secure Software Confidentiality Integrity Data Security Authentication
Lesson Objectives Aims You should be able to:
Firewalls.
Security in Networking
CompTIA Security+ Study Guide (SY0-401)
Intrusion Detection system
Test 3 review FTP & Cybersecurity
Presentation transcript:

Intrusion Detection Reuven, Dan A. Wei, Li Patel, Rinku H.

Background

Definition of Intrusion Detection ▪ A device dedicated to monitoring network and system resources of a company for signs of malicious activity or unauthorized access ▪ Can be hardware or software ▪ IDS differs from other vulnerability assessment tools in that it provides real time metrics ▪ A Detective Control

Who needs to be involved in determining What ids is best for your company? ▪ Information Security Officers ▪ Network Administrators ▪ Database Administrators ▪ Senior Management ▪ Operating System Administrators ▪ Data owners

Why Doesn’t Everyone Have One? ▪ Numerous different types of IDS’s ▪ Can be very expensive ▪ Requires periodic maintenance ▪ Difficult to configure ▪ Numerous false positives

Unauthorized Access ▪ Outsider – Someone does not have authorized access privileges ▪ Gain Access ▪ Gain possession of valid system credentials ▪ Social Engineering ▪ Guessing Username & Password ▪ Exploit system vulnerability lead to high- privileged access ▪ Administrator account (Windows) ▪ Root-equivalent account (Unix, Linux) ▪ Steal data ▪ Attack other systems VirusWormBackdoor Trojan horse User- level root kit Kernel- level root kit Blended malware

Attackers and Motives Script kiddy MercenaryJoy rider Nation- state backed ▪ Script Kiddy ▪ Little or no skills ▪ Download and utilize others’ exploits ▪ Joy Rider ▪ Potentially significant skills ▪ For “Pleasure” ▪ Mercenary ▪ Possess skills ▪ Sell them to purchaser ▪ Computer Crime ▪ Nation-state Backed: ▪ Against other nations ▪ Malware injection ▪ System compromises

Risks

Most Common Attacks Ping of death SYN Flood TCP/IP spoofing Man in the middle Port scan DNS Hijack

Ping of death  First detected in 1996  Ping:  Command to test a machine for reachability  Fragmented and sent over network  Resembled at the destination  Size of the packets > Internal buffer overflow  Bad Impact:  Operating System hard to react  Crash, System abort, or hang up

SYN Flood  TCP/IP - Three-hand shake  Using sequence- number prediction techniques  Device run out of memory to crash

TCP/IP spoofing  Attackers use a spoofed IP address  Impair the service or crash the system

Man in the middle  Hackers discover services they can break into  Well-known ports  Find potential weakness that can be exploited Port scan

DNS Hijack  Gain access to an upstream DNS server  Divert traffic to a fake web page  Modify DNS record  Queries for the original web site divert to fake web site  People land on a spoofed site at another IP address

Legal and regulatory requirements Involve electronic environment and electronic system Accounting regulations: SOX Privacy regulations Court rules Managing public and stakeholder expectations Affected by major or minor computer incidents Exposure of confidential information Unavailability of systems Unreliable information Dependency on information systems Increased outage cost Delay of detection and response to an outage will cost significant amounts of money Integrity Confidentiality Availability Risks

Control

IDS Log Contents Focus ON… DetectionRecognitionIdentificationConfirmationProsecution

Techniques Intrusion Systems Architectures

Active VS Passive Active Automatically block suspected and active attacks in progress Requires little to no human interaction once configured Passive Alert an operator in the event of a suspected or active attack Incapable of performing any protective or corrective functions on its own

Network-based vs Host-based Network-based Hardware with a network interface card (NIC) dedicated to operating in promiscuous mode segregated across different network segments. Monitors multiple computers simultaneously Host-based Intended to monitor only the system it is actively running on Not concerned with other network traffic

Knowledge vs Behavior Based Knowledge- based References a known constantly updated database of known and recorded malicious software to match against active network traffic. More common than behavior based Also known as signature based Behavior- Based Performs deep packet inspection on real time network activity Determines malware based on a heuristic approach.

Knowledge Based Scanning Cheaper and easier to operate Less false alarms Will only be able to detect known viruses and malware Requires constant updates Depends on file signatures o Many known viruses can bypass through an IDS’s defenses with obfuscation

Behavior & Heuristic Scanning Involves first running the file under scrutiny in a virtual/sandboxed environment Does not rely on signatures, attempts to analyze what the file does Highly dependent on artificial intelligence Can cause network delays during peak hours Capable of detecting malware that has yet to be discovered Does not require constant updates

Heuristic Scanning Disadvantages Share of inconveniences Long time the scan takes Depend on data too much Increased number of false positives

Thank You