Hardened IDS using IXP Didier Contis, Dr. Wenke Lee, Dr. David Schimmel Chris Clark, Jun Li, Chengai Lu, Weidong Shi, Ashley Thomas, Yi Zhang  Current.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Network II.5 simulator ..
Bro: A System for Detecting Network Intruders in Real-Time Vern Paxson Lawrence Berkeley National Laboratory,Berkeley, CA A stand-alone system for detecting.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
© 2006 Cisco Systems, Inc. All rights reserved. Module 4: Implement the DiffServ QoS Model Lesson 4.8: Understanding WAN Link Efficiency Mechanisms.
Chapter 8 Hardware Conventional Computer Hardware Architecture.
Guide to Network Defense and Countermeasures Second Edition
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Students:Gilad Goldman Lior Kamran Supervisor:Mony Orbach Network Sniffer.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
1 Network Packet Generator Characterization presentation Supervisor: Mony Orbach Presenting: Eugeney Ryzhyk, Igor Brevdo.
RDMA ENABLED WEB SERVER Rajat Sharma. Objective  To implement a Web Server serving HTTP client requests through RDMA replacing the traditional TCP/IP.
ECE 526 – Network Processing Systems Design
Gnort: High Performance Intrusion Detection Using Graphics Processors Giorgos Vasiliadis, Spiros Antonatos, Michalis Polychronakis, Evangelos Markatos,
Chapter 9 Classification And Forwarding. Outline.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection - Arun Hodigere. Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from.
System Architecture A Reconfigurable and Programmable Gigabit Network Interface Card Jeff Shafer, Hyong-Youb Kim, Paul Willmann, Dr. Scott Rixner Rice.
INTRUSION DETECTION SYSTEM
Interconnection Protocol Mustafa Kara Term Work.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
RAID2005 CardGuard: Towards software-based signature detection for intrusion prevention on the network card Herbert Bos and Kaiming Huang presented by.
Workpackage 3 New security algorithm design ICS-FORTH Heraklion, 3 rd June 2009.
ICS-FORTH WISDOM Workpackage 3: New security algorithm design FORTH-ICS The next six months Cork, 29 January 2007.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Workpackage 3 New security algorithm design ICS-FORTH Paris, 30 th June 2008.
COEN 252 Computer Forensics
Network Intrusion Detection Systems on FPGAs with On-Chip Network Interfaces Christopher ClarkGeorgia Institute of Technology Craig UlmerSandia National.
1 GAIA VoIP traffic generator and analyzer Presentation by Amrut Bang Ashish Deshpande Vijay Gabale Santosh Patil Sponsored by GS Lab Pvt. Ltd Pune Institute.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
LiNK: An Operating System Architecture for Network Processors Steve Muir, Jonathan Smith Princeton University, University of Pennsylvania
COEN 252 Computer Forensics Collecting Network-based Evidence.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Para-Snort : A Multi-thread Snort on Multi-Core IA Platform Tsinghua University PDCS 2009 November 3, 2009 Xinming Chen, Yiyao Wu, Lianghong Xu, Yibo Xue.
The NE010 iWARP Adapter Gary Montry Senior Scientist
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
RiceNIC: A Reconfigurable and Programmable Gigabit Network Interface Card Jeff Shafer, Dr. Scott Rixner Rice Computer Architecture:
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
SNORT Feed the Pig Vicki Insixiengmay Jon Krieger.
What is a “Network Intrusion Detection System (NIDS)"?
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Vladimír Smotlacha CESNET Full Packet Monitoring Sensors: Hardware and Software Challenges.
Securing and Monitoring 10GbE WAN Links Steven Carter Center for Computational Sciences Oak Ridge National Laboratory.
Linux Networking and Security
Srihari Makineni & Ravi Iyer Communications Technology Lab
Para-Snort : A Multi-thread Snort on Multi-Core IA Platform Tsinghua University PDCS 2009 November 3, 2009 Xinming Chen, Yiyao Wu, Lianghong Xu, Yibo Xue.
An Architecture and Prototype Implementation for TCP/IP Hardware Support Mirko Benz Dresden University of Technology, Germany TERENA 2001.
4/19/20021 TCPSplitter: A Reconfigurable Hardware Based TCP Flow Monitor David V. Schuehler.
Vladimír Smotlacha CESNET High-speed Programmable Monitoring Adapter.
Hot Interconnects TCP-Splitter: A Reconfigurable Hardware Based TCP/IP Flow Monitor David V. Schuehler
Lecture 12: Reconfigurable Systems II October 20, 2004 ECE 697F Reconfigurable Computing Lecture 12 Reconfigurable Systems II: Exploring Programmable Systems.
Workpackage 3 New security algorithm design ICS-FORTH Ipswich 19 th December 2007.
Kargus: A Highly-scalable software-based network intrusion detection awoo100 Anthony Wood.
Authors: Danhua Guo 、 Guangdeng Liao 、 Laxmi N. Bhuyan 、 Bin Liu 、 Jianxun Jason Ding Conf. : The 4th ACM/IEEE Symposium on Architectures for Networking.
1 Flexible, High-Speed Intrusion Detection Using Bro Vern Paxson Computational Research Division Lawrence Berkeley National Laboratory and ICSI Center.
ICS-FORTH WISDOM Workpackage 3: New security algorithm design FORTH-ICS Update and plans for the next six months Heraklion, 4 th June 2007.
James S. Rothfuss, Computer Protection Program COMPUTING SCIENCES NETS Network Equipment Tracking System.
Technical Overview of Microsoft’s NetDMA Architecture Rade Trimceski Program Manager Windows Networking & Devices Microsoft Corporation.
Network Processing Systems Design
CompTIA Security+ Study Guide (SY0-401)
Snort – IDS / IPS.
Principles of Computer Security
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
CompTIA Security+ Study Guide (SY0-401)
Northbound API Dan Shmidt | January 2017
ECE 671 – Lecture 8 Network Adapters.
Presentation transcript:

Hardened IDS using IXP Didier Contis, Dr. Wenke Lee, Dr. David Schimmel Chris Clark, Jun Li, Chengai Lu, Weidong Shi, Ashley Thomas, Yi Zhang  Current Network Intrusion Detection Systems (NIDS) are software based. They have a number of issues and limitations, including: An inability to keep up with throughput significantly greater than 100 Mb/s An inability to deal with encrypted traffic (VPN) An inability to utilize knowledge of network topology and OS Not easily scalable as network becomes more complex and higher speedMotivation  Create a new generation of network hardware based IDS / Firewall sensor, integrated on the Network Card  Take advantage of the hardware and the network sensors to create a global distributed and adaptable IDS The Vision  Implementation of a proof of concept: 1.Port open-source software IDS systems such as Bro or Snort on the StrongArm 2.Offload some of the CPU intensive functions of these software IDS to the Micro-Engines (CRC checksums, Defragmentation, Sanity checks) 3.Investigate the use of FPGA based co-processor to work with the IXP1200, to perform some specific tasks (TCP state-tracking and reassembly) Current Project Packet stream Filtered pkt stream Event stream Alerts Policy script Event control tcpdump filters Host NIC Event Engine Network Libpcap Policy Script Interpreter Conventional Software based IDS Filtered pkt stream Event stream Alerts Policy script Event control tcpdump filters StrongARM  Engines Event Engine: ip-defrag, tcp reassembly, event generation Network: header analysis, filtering Libpcap: compatibility w/ existing IDSs Policy Script Interpreter Host Current Implementation of an IXP based IDS Lan Host IDS Analysis: Pattern Matching Behavioral model Re-programmable Co-processors: TCP Stream Reassembly … Network Card Capture of Network Traffic (e.g. receive of ethernet frames) IP Packet Preprocessing: CRC check IPDefrag IP options check Functions performed at the micro-engine level IXP1200 Packet Alerts Proposed implementation of an IXP based IDS with FPGAs Ack/Seq Tracking Unit Buffer Connection – State-Machine Input State-Machine enabledata_in CLK Payload data TCP/IP header elements exception_flags Memory Gateway read server data_valid data_out SelectRAM Client  Server 1,2,3,8,16 kB SelectRAM Server  Client 1,2,3,8,16 kB Block diagram of the reassembly unit  A TCP reassembly unit has been implemented in VHDL and mapped to a Xilinx XCV1000. This prototype is currently being ported to the Celoxica FPGA environment A dynamically re-configurable FPGA implementation permits adaptive allocation of detection resources and therefore a more accurate and efficient pattern-matching or behavorial analysis. TCP Reassembly in Hardware  In parallel, some micro-code are being developed to off- load some of the cpu intensive functions of the IDS: IP Defragmentation CRC Checksums at Layer 4 Packet decoding  ACE + Micro-Engine C Compiler = Faster learning Cycle BUT  The PCI interface between the Board and the Host, as well as the current drive appears as a bottleneck  The ACE SDK generates too much overhead on the StrongArm Current Status & Lessons Learned  Implementation of a fully distributed IDS  Adaptation in the NIDS Integration of detection and response Agile context dependent reconfiguration multiple of IDS methods such as pattern-matching and behavioral models.  Unified framework for network policies Common response mechanisms for QoS, Fault Detection, NIDS Load Balancing Future Steps