CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Greg Williams CS691 Summer Honeycomb  Introduction  Preceding Work  Important Points  Analysis  Future Work.
Intrusion Detection CS461/ECE422 Spring Reading Material Chapter 8 of the text.
Anomaly Detection Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
Intrusion Detection Systems and Practices
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 Intrusion Detection CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 4, 2004.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
seminar on Intrusion detection system
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Building Survivable Systems based on Intrusion Detection and Damage Containment Paper by: T. Bowen Presented by: Tiyseer Al Homaiyd 1.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
APA of Isfahan University of Technology In the name of God.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Intrusion Detection Dr. Gregory Vert. Intrusion Detection Definition: –Detection of an attack While it is going on Shortly after it has occurred.
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 11 Nov 22, 2011 Intrusion Detection, Firewalls & VPN Auditing.
IIT Indore © Neminah Hubballi
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Signature Based and Anomaly Based Network Intrusion Detection
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 10 Nov 06, 2012 Intrusion Detection, Firewalls & VPN Auditing.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Presented by Nathalie Baracaldo Lecture 3 Sept 18, 2013 Intrusion Detection,
Intrusion Control. CSCE Farkas2 Readings Lecture Notes Pfleeger: Chapter 7.5.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Lecture 11 Page 1 CS 236 Online Customizing and Evolving Intrusion Detection A static, globally useful intrusion detection solution is impossible –Good.
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
7.5 Intrusion Detection Systems Network Security / G.Steffen1.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
Intrusion Detection State of the Art/Practice Anita Jones University of Virginia.
S E C U R E C O M P U T I N G Not For Public Release 1 Intrusion Tolerant Server Infrastructure Dick O’Brien OASIS PI Meeting July 25, 2001.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Lecture 13 Page 1 CS 236 Online Styles of Intrusion Detection Misuse intrusion detection –Try to detect things known to be bad Anomaly intrusion detection.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 12 April 10, 2013 Intrusion Detection, Firewalls & VPN Auditing.
Jason Ewing. What is an Intrusion Why Detecting Signs of Intrusion is Important? Types of Intrusion Detection Systems (IDS) Approaches for Detection Anomaly.
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
Some Great Open Source Intrusion Detection Systems (IDSs)
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Ch.22 INTRUSION DETECTION
Intrusion Control.
Intrusion Detection Systems
Principles of Computer Security
IS 2150 / TEL 2810 Introduction to Security
Intrusion Detection & Prevention
Intrusion Detection Systems (IDS)
Intrusion Detection Systems
Intrusion Detection system
Intrusion Detection.
Presentation transcript:

CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection

CS526, Fall Intrusion Detection/Response Denning: Systems under attack fail to meet one or more of the following characteristics: 1.Actions of users/processes conform to statistically predictable patterns 2.Actions of users/processes do not include sequences of commands to subvert security policy 3.Actions of processes conform to specifications describing allowable actions

CS526, Fall Intrusion Detection Idea: Attack can be discovered by one of the above being violated –Problem: Definitions hard to make precise Practical goal of intrusion detection systems: –Detect a wide variety of intrusions –Detect in a timely fashion –Present in a useful manner –Be (sufficiently) accurate

CS526, Fall IDS Types: Anomaly Detection Compare characteristics of system with expected values –report when statistics do not match Threshold metric: when statistics deviate from normal by threshold, sound alarm Statistical moments: based on mean/standard deviation of observations Markov model: based on state, expected likelihood of transition to new states

CS526, Fall Anomaly Detection: How do we determine normal? Capture average over time –But system behavior isn’t always average Correlated events Machine learning approaches

CS526, Fall IDS Types: Misuse Modeling Does sequence of instructions violate security policy? –Problem: How do we know all violating sequences? Solution: capture known violating sequences –But won’t the attacker just do something different? Often, no –kiddie scripts Rootkit, … Alternate solution: State modeling –Known “bad” state transition from attack –Capture when transition has occurred (user  root)

CS526, Fall Specification Modeling Does sequence of instructions violate system specification? –What is the system specification? Need to formally specify operations of potentially critical code –trusted code Verify postconditions met

CS526: Information Security Chris Clifton December 2, 2003 Intrusion Response

CS526, Fall IDS Architecture Similar to Audit system –Log events –Analyze log Difference: happens real-time –timely fashion (Distributed) IDS idea: –Agent generates log –Director analyzes logs –Notifier decides how to handle result

CS526, Fall Where is the Agent? Host based IDS –watches events on the host –Often uses existing audit logs Network-based IDS –Packet sniffing –Firewall logs

CS526, Fall IDS Problem: Base Rate Fallacy IDS useless unless accurate –Significant fraction of intrusions detected –Significant number of alarms correspond to intrusions Assume 99% of intrusions detected –1% of non-intrusions generate alarm –1 in 10,000 events really an intrusion 1% of alarms “real” false positives false negatives

CS526, Fall Intrusion Response Incident Prevention –Stop attack before it succeeds –Measures to detect attacker Honeypot / Jailing Intrusion handling –Contain attack –Eradicate attack –Recover to secure state –Punish attacker

CS526, Fall Containment Passive monitoring –Track intruder actions –Eases recovery and punishment Constraining access –Downgrade attacker privileges –Protect sensitive information –Why not just pull the plug?

CS526, Fall Eradication Terminate network connection Terminate processes Block future attacks –Close ports –Disallow specific IP addresses –Wrappers around attacked applications

CS526, Fall Follow-Up Legal action –Trace through network Cut off resources –Notify ISP of action Counterattack –Is this a good idea?