KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT390-01 Intrusion Detection and Incidence.

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Third Edition
Advertisements

1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Guide to Network Defense and Countermeasures Second Edition
Firewalls and Intrusion Detection Systems
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion Detection MIS ALTER 0A234 Lecture 3.
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Security Guidelines and Management
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
UNIT 4 SEMINAR Unit 4 Chapter 4 in CompTIA Security + Course Name – IT Introduction to Network Security Instructor – Jan McDanolds, MS Contact Information:
APA of Isfahan University of Technology In the name of God.
FIREWALL Mạng máy tính nâng cao-V1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Penetration Testing Security Analysis and Advanced Tools: Snort.
COEN 252 Computer Forensics
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Agenda Review route summarization Cisco acquire Sourcefire Review Final Exam.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Securing Wired Local Area Networks(LANs)
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Unit 4 IT 484 Networking Security Course Name – IT Networking Security 1203C Term Instructor.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Security fundamentals Topic 13 Detecting and responding to incidents.
Cryptography and Network Security Sixth Edition by William Stallings.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Security Log Visualization with a Correlation Engine: Chris Kubecka Security-evangelist.eu All are welcome in the House of Bytes English Language Presentation.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
DETECTING INTRUSIONS By Matthew Morrow. WHAT ARE INTRUSIONS? Definition: “To compromise a computer system by breaking the security of such a system or.
By: Surapheal Belay ITEC 6322 / Spring ABSTRACT NIST , guide to intrusion detection and prevention systems (IDPS), discusses four types of.
Security Methods and Practice CET4884
CompTIA Security+ Study Guide (SY0-401)
IDS Intrusion Detection Systems
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Working at a Small-to-Medium Business or ISP – Chapter 8
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
CompTIA Security+ Study Guide (SY0-401)
Chapter 27: System Security
Intrusion Prevention Systems
Presentation transcript:

KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence Response Instructor – Jan McDanolds, MS, Security+ Contact Information: AIM – JMcDanolds – Office Hours: Tuesday, 7:00 PM ET or Wednesday, 8:00 PM ET

UNIT 8 Chapter 7 – Maximizing Your IDS Download Chapter 7 in the Wiley ebook – Doc Sharing, Document Sharing Categories, IT390_eBook_Files – list will display Correlating data from multiple sources Investigation Verifying and testing “The holy grail, so to speak, of monitoring and detection is to be able to demonstrate from the point at which an attacker’s packets entered the external perimeter of your network exactly what was done, when and how.”

UNIT 7 REVIEW REVIEW of Chapter 6 - Deploying IDS Selecting the best product for your needs Establishing goals Identifying specific objectives Determining requirements Planning for deployment of your intrusion detection system Monitoring alerts generated by your system Fine-tuning the system to your environment Each IDS provides default rule groups – the configuration of these groups depends on the individual goals for your IDS

UNIT 7 REVIEW Unit 7 Review Quick Check #1 Name two objectives (goals) for your IDS #2 What is one important rule for monitoring and managing alerts from your IDS? #3 Snort has a large number of rules that are updated by the VRT (Sourcefire Vulnerability Research Team) as well as info on malware. What is new in May/June 2012? html

UNIT 8 Chapter 7 Correlating Data From Multiple Sources Building a database Push information to a central database Different sources have different types of data to be stored Data fields commonly used include event date and time, event type, importance rating (e.g., priority, severity, impact, confidence), and prevention action performed (if any). Specific types of IDPSs log additional data fields, such as network-based IDPSs performing packet captures and host-based IDPSs recording user IDs, packet payloads, etc. Evaluate the vendor’s implementation (if available) or use scripting language like Perl to parse the text file and push to Oracle Vendors may use dashboard software to coordinate information

UNIT 8 Correlating Data From Multiple Sources IDEP – IETF standards drafts

UNIT 8 Correlating Data From Multiple Sources Identifying data sources Table 7-1

UNIT 8 Correlating Data From Multiple Sources Additional sources: Implementing a key logging for critical hosts to provide information not obtained from another source Others:

UNIT 8 Investigation The Example Attack – page 197 (pg 9 in.pdf) An external attacker managed to execute a buffer overflow against the DNS server. This gave root access to the DNS server. The DNS server access was used to transfer tools used to collect password information from the local subnet. The password information was used to log into the web server. The web server’s access to the internal network for connectivity was used to gain entry to the internal network.

UNIT 8 Example Attack Path of attack. Investigation

UNIT 8 Investigation Border router – discards unwanted traffic and logs via syslog to IDS sensor 1. Forwarded to IDS console using SSH. Firewall – forwarding logs to IDS sensor 3. Hosts – hosts in DMZ are running HIDs. HIDS alerts are transmitted to the IDS console via encrypted communications. Also all DMZ hosts forward copies of logs to IDS sensor 2 via syslog down an SSH pipe – include OS, app and target-based logs.

UNIT 8 Investigation Detection The attacker manages to access the database server before the attacker is detected. Suspicious activity between the web server and the database is detected. The passing of shell commands is detected. IDS sensor 3 alert: “unusual connectivity to database server!” The attempted connection is to an unusual port on the web server (port 41449). Inspection of the logs with a filter for the port. Observation of the addition of two new users – one with admin rights. Identification of dsniff (d sniff) indicates password compromise. Verified using syslog files on DNS server. Review of IP address on Whois and ARIN.

UNIT 8 Verification and Testing It will be tested by you or an attacker… Duplicate your production environment for testing Flooding attack – use of Stick or Snot, etc. Intrusion Detection-- Fun with Packets: Designing a Stick “The paper outlines a denial-of-service attack against not the computer network, but the human processes that support intrusion detection.” Host IDS Evasions Revisited

UNIT 8 Verification and Testing Use of attack tools for accuracy testing Attack testing: buffer overflows, DoS, DDoS, back doors, Trojans, etc. Use of vulnerability scanning software Vulnerability scanning software best used to test scalability Example: Evasion testing Whisker Fragrouter Host IDS Evasions Revisited

UNIT 8 Web Readings Guide to Intrusion Detection and Prevention Systems by NIST Special Publication – 127 pages “Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents.” This publication discusses the following four types of IDPS technologies: -Network-Based, which monitors network traffic for particular network segments or devices and analyzes the network and application protocol activity to identify suspicious activity -Wireless, which monitors wireless network traffic and analyzes it to identify suspicious activity involving the wireless networking protocols themselves -Network Behavior Analysis (NBA), which examines network traffic to identify threats that generate unusual traffic flows, such as distributed denial of service (DDoS) attacks, certain forms of malware, and policy violations (e.g., a client system providing network services to other systems) -Host-Based, which monitors the characteristics of a single host and the events occurring within that host for suspicious activity.

UNIT 8 Web Readings SANS article Measuring Effectiveness in Information Security Controls by Manuel Humberto Santander Peláez “How can we show the effectiveness of those controls? One way is to perform a risk analysis process to determine the controls to be implemented. The risk analysis process defines the critical variables that, when monitored, shows the risk exposure level and then determine the metrics that will measure the effectiveness of the controls. This paper shows a proposal on how to measure the effectiveness of implanted information security controls as part of the corporate Information Security process.”

UNIT 8 Readings Unit 8 Readings: Chapter 7 Wiley ebook From Doc Sharing Maximizing Your IDS ALSO Web Readings from NIST and SANS

UNIT 8 Unit 8 Assignment Cisco icons in Doc Sharing. Review the rubric to see the point totals.

UNIT 8 Unit 8 Assignments Download chapter from Doc Sharing Read chapter and web readings Post to Discussion Attend Seminar Complete Assignment – review rubric any questions: Or you can call me