Presentation is loading. Please wait.

Presentation is loading. Please wait.

Guide to Operating System Security Chapter 12 Security through Monitoring and Auditing.

Similar presentations


Presentation on theme: "Guide to Operating System Security Chapter 12 Security through Monitoring and Auditing."— Presentation transcript:

1 Guide to Operating System Security Chapter 12 Security through Monitoring and Auditing

2 2 Guide to Operating System Security Objectives Understand the relationship between baselining and hardening Explain intrusion-detection methods Use audit trails and logs Monitor logged-on users Monitor a network

3 3 Guide to Operating System Security Baselining and Hardening Baselines  Measurement standards for hardware, software, and network operations  Used to establish performance statistics under varying loads or circumstances

4 4 Guide to Operating System Security Overview of Intrusion Detection Detects and reports possible network and computer system intrusions or attacks Main approaches  Passive  Active  Network-based  Inspectors  Auditors  Decoys and honeypots

5 5 Guide to Operating System Security Passive Intrusion Detection Detects and records intrusions; does not take action on findings Effective as long as administrator checks logs  Can create filters or traps Examples of monitored activities  Login attempts  Changes to files  Port scans

6 6 Guide to Operating System Security Third-Party Passive Intrusion-Detection Tools Klaxon Loginlog Lsof Network Flight Recorder RealSecure Dragon Squire PreCis

7 7 Guide to Operating System Security Active Intrusion Detection Detects an attack and sends alert to administrator or takes action to block attack May use logs, monitoring, and recording devices

8 8 Guide to Operating System Security Third-Party Active Intrusion-Detection Tools Entercept AppShield Snort SecureHost StormWatch

9 9 Guide to Operating System Security Active Intrusion Detection

10 10 Guide to Operating System Security Host-based Intrusion Detection Software that monitors the computer on which it is loaded  Logons  Files and folders  Applications  Network traffic  Changes to security Host wrappers and host-based agents

11 11 Guide to Operating System Security Host-based Intrusion Detection

12 12 Guide to Operating System Security Network-based Intrusion Detection Monitors network traffic associated with a specific network segment Typically places NIC in promiscuous mode

13 13 Guide to Operating System Security Network-based Intrusion Detection

14 14 Guide to Operating System Security Inspector Examines captured data, logs, or other recorded information Determines if an intrusion is occurring or has occurred Administrator sets up inspection parameters, for example:  Files changed/created under suspicious circumstances  Permissions unexpectedly changed  Excessive use of computer’s resources

15 15 Guide to Operating System Security Auditor Tracks full range of data and events – normal and suspicious, for example:  Every time services are started and stopped  Hardware events or problems  Every logon attempt  Every time permissions are changed  Network connection events Records information to a log

16 16 Guide to Operating System Security Decoys and Honeypots Fully operational computers that contain no information of value Draw attackers away from critical targets Provide a means to identify and catch or block attackers before they harm other systems

17 17 Guide to Operating System Security Using Audit Trails and Logs A form of passive intrusion detection used by most operating systems:  Windows 2000/XP/2003  Red Hat Linux 9.x  NetWare 6.x  Mac OS X

18 18 Guide to Operating System Security Viewing Logs in Windows 2000/XP/2003 (Continued) Accessed through Event Viewer Event logs can help identify a security problem Filter option can help quickly locate a problem

19 19 Guide to Operating System Security Viewing Logs in Windows 2000/XP/2003 (Continued) Principal event logs  System  Security  Application Event logs for installed services  Directory Service  DNS Service  File Replication

20 20 Guide to Operating System Security Event Viewer in Windows Server 2003

21 21 Guide to Operating System Security Viewing an Event in Windows Server 2003

22 22 Guide to Operating System Security Viewing Logs in Red Hat Linux 9.x (Continued) Offers a range of default logs Log files  Have four rotation levels  Managed through syslogd

23 23 Guide to Operating System Security Viewing Logs in Red Hat Linux 9.x (Continued) Two ways to view default logs  Open LogViewer (Main Menu – System Tools – System Logs) Enables creation of a filter on the basis of a keyword (eg, failed, denied, rejected)  Use Emacs or vi editors or use cat command in a terminal window

24 24 Guide to Operating System Security Red Hat Linux 9.x Default Logs (Continued) Log NameLocation and Filename Description Boot Log/var/log/boot.log.xContains messages about processes and events that occur during bootup or shutdown Cron Log/var/log/cron.xProvides information about jobs that are scheduled to run or that have already run Kernel Startup Log /var/log/dmesg.xShows startup messages sent from the kernel Mail Log/var/log/maillog.xContains messages about mail server activities News Log/var/log/spooler.xProvides messages from the news server

25 25 Guide to Operating System Security Red Hat Linux 9.x Default Logs (Continued) Log NameLocation and Filename Description RPM Packages Log /var/log/rpmpkgs.xShows list of software packages currently installed; updated each day through a job scheduled via cron command Security Log/var/log/secure.xProvides information about security events and processes System Log/var/log/messages.xContains messages related to system activities Update Agent Log /var/log/up2date.xShows updates that have been performed by the Update Agent XFree86 Log/var/log/xfree86.x.logContains information about what is installed from XFree86

26 26 Guide to Operating System Security Viewing Logs in Red Hat Linux 9.x

27 27 Guide to Operating System Security Viewing Logs in NetWare 6.x (Continued) Log NameLocation & FilenameDescription Access LogSYS:NOVONYX\SUITESPOT\ ADMIN-SERV\LOGS\ACCESS.TXT Contains information about access services to the NetWare server Audit LogSYS:ETC\AUDIT.LOGContains an audit trial of user account activities Console Log SYS:ETC\CONSOLE.LOGTraces activities performed at the server console Error LogSYS:NOVONYX\SUITESPOT\ ADMIN-SERV\LOGS\ERROR.TXT Contains error information recorded for the NetWare server

28 28 Guide to Operating System Security Viewing Logs in NetWare 6.x (Continued) Log NameLocation & FilenameDescription Module LogSYS:ETC\CWCONSOL.LOGContains a listing of modules that have been loaded NFS Server Log SYS:ETC\NFSSERV.LOGProvides information about NFS server services, including changes to a service and communications through TCP and UDP Schema Instructions Log SYS:ETC\SCHINST.LOGTracks schema events, including changes to the schema

29 29 Guide to Operating System Security Viewing Logs in Red Hat Linux 9.x

30 30 Guide to Operating System Security Viewing Logs in Mac OS X (Continued) Log NameLocation and FilenameDescription FTP Service Log/var/log/ftp.logContains information about FTP activity, including sessions, uploads, downloads, etc. Last.Login Log/var/log/lastlogProvides information about last login activities Directory Service Log /var/log/lookupd.logProvides log of lookupd (look up directory services) daemon, including requests relating to user accounts, printers, and Internet resources Mail.Service Log/var/log/mail.logStores messages about e-mail activities

31 31 Guide to Operating System Security Viewing Logs in Mac OS X (Continued) Log NameLocation and FilenameDescription Network Information Log /var/log/netinfo.logTracks messages related to network activity Print Service Log /var/log/lpr.logContains information about printing activities Security Log/var/log/secure.logProvides information about security events System Log/var/log/system.logContains information about system events, including processes that are started or stopped, buffering activities, console messages, etc.

32 32 Guide to Operating System Security Viewing Logs in Mac OS X

33 33 Guide to Operating System Security Reasons for Monitoring Logged-on Users Assess how many users are typically logged on at given points in time  Baseline information  To determine when a shutdown would have the least impact Be aware of security or misuse problems

34 34 Guide to Operating System Security Monitoring Users in Windows 2000/XP/2003 Use Computer Management tool to access Shared Folders  Shared Folder options Shares Sessions Open Files Use Task Manager (Windows XP and Windows Server 2003)

35 35 Guide to Operating System Security Monitoring Users in Windows XP Professional

36 36 Guide to Operating System Security Monitoring Users in Windows 2000 Server

37 37 Guide to Operating System Security Monitoring Users in Windows XP Professional

38 38 Guide to Operating System Security Monitoring Users in Red Hat Linux 9.x Use the who command

39 39 Guide to Operating System Security who Command Options OptionDescription -aDisplays all users -bShows the time when the system was last booted -iShows the amount of time each user process has been idle -qProvides a quick list of logged-on users, and provides a user count -rShows the run level -sDisplays a short listing of usernames, line in use, and logon time -uDisplays the long listing of usernames, line in use, logon time, and process number --helpDisplays help information about the who command -HDisplays who information with column headers

40 40 Guide to Operating System Security Monitoring Users in Red Hat Linux 9.x

41 41 Guide to Operating System Security Monitoring Users in NetWare 6.x MONITOR  Connections  Loaded modules  File open/lock  Other server-monitoring functions NetWare Remote Manager  View current connections  View files opened by particular users  Send messages to a particular user or all users  Clear connections

42 42 Guide to Operating System Security Monitoring Users in Mac OS X Use the who command in a terminal window  Supports few options (primarily -H and -u) Process Viewer

43 43 Guide to Operating System Security Monitoring a Network Network Monitor  Network monitoring software with the most features  Comes with Windows 2000 Server and Windows Server 2003

44 44 Guide to Operating System Security Why Network Monitoring Is Important Networks are dynamic Administrator must distinguish an attack from an equipment malfunction Establish and use benchmarks to help quickly identify and resolve problems

45 45 Guide to Operating System Security Using Microsoft Network Monitor Uses Network Monitor Driver to monitor network from server’s NIC (promiscuous mode) Sample activities that can be monitored  Percent network utilization  Frames and bytes transported per second  Network station statistics  NIC statistics  Error data

46 46 Guide to Operating System Security Network Monitor Driver Detects many forms of network traffic Captures packets and frames for analysis and reporting by Network Monitor

47 47 Guide to Operating System Security Using Microsoft Network Monitor Start from Administrative Tools menu Four panes of information  Graph  Total Statistics  Session Statistics  Station Statistics View captured information

48 48 Guide to Operating System Security Using Microsoft Network Monitor

49 49 Guide to Operating System Security Network Monitor Panes PaneInformation Provided in Pane GraphProvides bar graphs for %Network Utilization, Frames Per Second, Bytes Per Second, Broadcasts Per Second, and Multicasts Per Second Total Statistics Provides total statistics about network activity that originates from or is sent to the computer (station) using Network Monitor; includes statistics for Network Statistics, Captured Statistics, Per Second Statistics, Network Card (MAC) Statistics, and Network Card (MAC) Error Statistics Session Statistics Provides statistics about traffic from other computers on the network: MAC (device) address of each computer's NIC and data about number of frames sent from and received by each computer Station Statistics Provides total statistics on all communicating network stations: Network (device) address of each communicating computer, Frames Sent, Frames Received, Bytes Sent, Bytes Received, Directed Frames Sent, Multicasts Sent, and Broadcasts Sent

50 50 Guide to Operating System Security Viewing Capture Summary Data

51 51 Guide to Operating System Security Creating a Filter in Network Monitor Two property types  Service Access Point (SAP)  Ethertype (ETYPE)

52 52 Guide to Operating System Security Using Capture Trigger Software performs a specific function when a predefined situation occurs

53 53 Guide to Operating System Security Using Network Monitor to Set Baselines From the Graph pane  % Network Utilization  Frames Per Second  Broadcasts Per Second  Multicasts Per Second

54 54 Guide to Operating System Security Summary (Continued) Creating baselines to help quickly identify when an attack is occurring Intrusion-detection methods  Employed through an operating system  Third-party software Using auditing and logging tools to track intrusion events

55 55 Guide to Operating System Security Summary Monitoring user activities  GUI-based Computer Management tool in Windows 2000/XP/2003  who command in Red Hat Linux and Mac OS X Network monitoring with Microsoft Network Monitor


Download ppt "Guide to Operating System Security Chapter 12 Security through Monitoring and Auditing."

Similar presentations


Ads by Google