CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Intrusion Detection & Prevention (IDPS)

Size: px
Start display at page:

Download "CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Intrusion Detection & Prevention (IDPS)"

Transcription

1 CSE 4482 Computer Security Management: Assessment and Forensics Protection Mechanisms: Intrusion Detection & Prevention (IDPS) Instructor: N. Vlajic, Fall

2 Required reading: Management of Information Security (MIS), by Whitman & Mattord Chapter 10, pp Recommended reading: Principles of Information Security, by Whitman & Mattord Chapter 7, pp

3 Learning Objectives Upon completion of this material, you should be able to: Explain the phases of a typical intrusion process and a typical intrusion detection process. Identify the components of an intrusion detection system. Discuss the key differences between host-based and network-based intrusion detection systems. Explain the common uses of Snort IDS tool, be able to use Snort and write Snort rules. 3

4 4

5 Introduction Intrusion event in which attacker attempts to gain entry or disrupt normal state & operation of an information system examples of intrusive activities: password cracking and access violation unauthorized operation on data altering deletion creation transmission unauthorized operation on hosts/systems configuration changes on a system installation on software (malware) denial of service compromising a system by sending huge amounts of useless data 5

6 Introduction (cont.) Stages of most (successful) intrusions involve an Intrusion (Attack) the following 5 steps/stages: initial reconnaissance passive stages of an intrusion intruder uncovers as much info as possible about the company s (target) network e.g. company s range of IP addresses, machine names, etc. scanning intruder uses more invasive techniques to scan for information e.g. by doing ping sweep and port scanning of the network IP addresses to seek out potential target machines and open ports at this stage, still no (formally) illegal activity has taken place! be aware, however, that in some countries (e.g. Germany, England, Singapore) port scanning is 6 considered illegal

7 Introduction (cont.) Stages of an Intrusion (Attack) active stages of an intrusion gaining access intruder commits what is technically a computer crime by exploiting possible holes on the target machine, and gains access to a system maintaining access & covering tracks after gaining the foothold in the network, the intruder usually first installs a set of tools that will help him maintain access & remove any evidence of the attack e.g. install programs that clean up log files (rootkits) exploit intruder takes advantage of his position and performs one of the following: steals confidential data, defaces web pages, launches attacks at other sites, 7

8 Anti-Intrusion Techniques/Approaches Intrusions can be dealt with at various stages: before, during, after they occur. Intrusion activities that deter an intrusion or Prevention / reduce likelihood of its success, e.g.: Preemption employ preventative tools (e.g. use firewalls that drop all malicious looking packets external prevention) implement of good security policies (e.g. use hard-tobreak passwords internal prevention) 8

9 Anti-Intrusion Techniques/Approaches (cont.) Intrusion activities that detect/discriminate Detection ongoing intrusions from normal activity AND alert authorities e.g., monitor incoming traffic and alert authorities if rate of incoming requests exceeds some threshold e.g., alert authorities if one attempts to access/change configuration files of a machine alerts/alarms can be audible or visual, or can be sent via & pagers to the system administr. Intrusion activities aimed to make an intruder Deflection believe that he has succeeded in accessing a system, whereas he has been attracted to a specially prepared control environment honeypots and honeynets 9

10 Anti-Intrusion Techniques/Approaches (cont.) 10

11 Anti-Intrusion Techniques/Approaches (cont.) Intrusion aka countermeasures - activities Reaction / aimed to limit overall loss from a Response detected/ongoing intrusion & return operation to normal state asap session snipping disrupt the communication between the attacker and target by, e.g., forging RST packets post-attack cleanup scanning for files placed on the the system during the attack and deleting them 11

12 Introduction (cont.) Example: Intrusion prevention, detection, deflection and response Intrusion deflection (Honey Pot) 12

13 Noise alarm events that are accurate and noteworthy but do not pose a significant threat to information security e.g. unintentional scanning activity by a network user without intent to do harm Intrusion Detection Terminology Alert or indication that a system has just been Alarm attacked True Attack truly malicious event that triggers Stimulus an alarm and causes IDS to react could be a real attack or an exercise in which security personnel are using hacker tools to test the IDS False Attack event that triggers an alarm when Stimulus no actual attack is in progress

14 Intrusion Detection Terminology (cont.) False Positive alarm that occurs when IDS mistakes normal system activity for an attack many false positives tend to make user insensitive to alarms, thus reducing their reactivity False Negative failure of an IDS to react to an actual attack stimulus/event most grievous failure, since the purpose of IDS is to detect actual attacks Tuning process of adjusting an IDS to maximize its efficiency in detecting true positives while minimizing both false negatives 14 & false positives

15 Intrusion Detection Terminology (cont.) Example: In the context of an IDS, we define: false positive - the IDS generates an alarm to a condition that is actually benign; false negative - the IDS fails to generate an alarm when an alertworthy condition is in effect. Assume an IDS in which unacceptable behavior are defined by a set of rules. Using the below diagram, depict two curves that roughly indicates the frequency/probability of false positive & false negative, respectively, as a function of the given set of rules. set of rules not acceptable behavior acceptable behavior false negative false positive 15

16 Intrusion Detection Terminology (cont.) Example: Assume two overlapping Bell-shaped distributions one representing the pdf of authorized and one representing the pdf of unauthorized users. The overlapping area of the two pdf-s represents the region in which there is the potential for false positives and false negatives. An idealized case of such distributions is shown below. 16

17 Measurable behavior parameter Intrusion Detection Terminology (cont.) Example (cont.): Now, suppose a particular case where there is 2 actual intrusion for every 2000 authorized users, and the overlapping area covers 1% of the authorized users and 50% of the intruders. a) Depict two event distributions as two overlapping graphs. b) What is the probability that an event that occurs in this region is that of an authorized user? Event distribution profile of intruder behavior profile of authorized user behavior overlap in observed or expected behavior Assume there is a total of 2000 authorized users 2 unauthorized users 20 authorized & 1 unauthorized user in the overlap region p authorized = 20/ (95%) p unauthorized = 1/ (5%) 17

18 Intrusion Detection Terminology (cont.) Example: The CEO of XYZ company recently read an article describing the risks of inadequate computer security. She is suddenly very concerned about the company s computer security and wants to reevaluate the company s network IPS. The current system has a false-positive rate of 20 incidents per months and a false-negative rate of 1 incident every 6 months. It takes the company s Network Normalization & Neutralization Department (N3D).25 hours to resolve any false positive. Falsenegatives (and subsequent infections) take 4 hours to clean up. In the special case of an infection on a computer in the Strategic Development (SD) department, it takes N3D 10 hours to do a cleanup. SD has 0.5% of the computers in XYZ. 18

19 Intrusion Detection Terminology (cont.) (a) Write an expression for the total number of hours spent by N3D on false-positive and false-negative resolution in a year. N3D_hours/year = %-non-sd-computers * (#FP*time FP + #FN*time FN ) + + %-SD-computers * (#FP*time FP + #FN*time FN ) = 0.995*(20*12* *4) *(20*12* *10) = 0.995*(60 + 8) *( ) = =

20 Intrusion Detection Terminology (cont.) (b) The current IPS has an option where the system sensitivity can be increased. Enabling this option reduces the number of false negatives by half but causes 5 times as many falsepositives. Write an expression for the amount of time per year that N3D would spend with the sensitivity option enabled N3D_hours/year_sensitivity = %-non-sd-computers * (#FP*time FP + #FN*time FN ) + + %-SD-computers * (#FP*time FP + #FN*time FN ) = 0.995*(5*20*12* ½*2*4) *(5*20*12* ½*2*10) = *(304) *(310) =

21 Intrusion Detection Terminology (cont.) (c) In addition to time spent by N3D, an forensics specialist (FS) has to be called in for 100 hours to deal with infections on a SD computer. Write two expressions one for the amount of time per year the forensics specialist would spend with the sensitivity option enabled and one without. FS_hours/year_no_sensitivity = 2*0.005*100 = 1 FS_hours/year_sensitivity = 1*0.005*100 =

22 Intrusion Detection Terminology (cont.) (d) The FS s time is worth 20 times as much as N3D time. Considering overall cost (N3D+FS), decide whether it is worth enabling the sensitivity option? no_sensitivity: *1 = = 88 sensitivity: *0.5 = = 314 However, we have not considered the actual loss associated with the infection of a SD computer! 22

23 Intrusion Detection System Intrusion system designed to monitor all in- Detection & out- bound network activity and System identify any suspicious patterns (IDS) passive security solution! IDS components: network sensors collect & analyze net. traffic alert system / management server receives & analyzes input from sensors; sends out alerts database of attack signatures or behaviors helps in identifying suspicious traffic command console/interface used to view alerts IDPS Intrusion Detection & Prevention System detect & prevent intrusion from succeeding = detect & react (to minimize) end impact 23 active security solution!

24 Intrusion Detection System (cont.) Why Should we Use an IDP System? preventative duringattack (a) increase perceived risk of discovery & punishment for those who would attack aid in preventing problems (b) detect preambles to attacks, i.e. doorknob rattling activities, in order to prepare for a potential attack doorknob rattling: process of gathering information about a network, such as its hosts & services offered (e.g. address and port scanning) (c) detect & deal with security violations that are not prevented by other security measures e.g. a firewall alone may not be able to predict whether an incoming packet will cause a buffer overflow on a machine post attack (d) collect forensics data for after-attack review 24

25 Intrusion Detection System (cont.) IDPS CANNOT do the following: (1) compensate for a weak identification and authentication mechanisms if you expect your IDPS to deal with computer break-ins, it might be too late and too costly intruder may compromised the data by the time IDPS generates an alarm (2) compensate for weakness in network protocols if you expect your IDPS to deal with protocol-based DDoS-s, it might be too late and too costly DDoS may already crash the server by the time IDPS generates an alarm (3) detect new/unknown intrusions IDPS base their decision on the banks of accumulated (previous) knowledge 25

26 IDPS Components 26

27 IDPS Components: Sensors IDPS Sensors eyes of an IDS monitor traffic passing in and out of network in real time sensors can be built in software and placed in a firewall or switch (aka inline sensors) do not require additional hardware can block traffic when detected traffic must pass through sensor (slow down the network/traffic) sensors can also be built as stand-alone hardware devices (aka passive sensors or network taps) monitor a copy of network traffic - traffic 27 does not pass through the device (fast)

28 IDPS Components: Sensors Example: Network tap network-tap-devices itap-2-port-aggregator 28

29 IDPS Components: Sensors Sensors Deployment / Positioning detect intrusions by authorized users focus on specific services and protocols low processing burden observe raw traffic and actual number of attempted attacks very high processing burden focus on specific machines and protocols low processing burden discover problems with firewall policy monitor attacks on specific servers with less processing burden 29

30 IDPS Components: Sensors Sensors Deployment / Positioning (cont.) LOCATION 1: behind external firewall advantages see attacks, originating from outside world, that penetrate the network s perimeter defenses highlights problems with the network firewall policy or performance see attacks that might target the Web or FTP server (DMZ) LOCATION 2: in-front of external firewall advantages document the number and type of attacks originating on the Internet that target the network

31 IDPS Components: Sensors Sensors Deployment / Positioning (cont.) LOCATION 3: on backbone network that supports internal servers & database resources advantages detect unauthorized activity by authorized (as well as outside) users within the organization s perimeter can be tuned to specific protocols and attack types, thus reducing processing burden LOCATION 4: on LANs that support personnel advantages can tuned to specific protocols and attack types 31

32 IDPS Components: Alert System 32

33 IDPS Components: Alert System (cont.) Alert System analyses input received from (Management sensors & triggers an alarm when Server) detecting a suspicious activity Computer & info. security handbook By John R. Vacca type of triggers/alarms anomaly-based detection aka profile-based detection system sends an alarm when it detects an event that deviates from normal behavior requires the use of statistical methods to create profile(s) of normal behavior misuse detection aka signature- or rule- based detection system sends an alarm when it detects a signature/pattern typical of a known attack e.g. doorknob rattling involves use of ICMP, 33 DNS querying

34 IDPS Components: Alert System (cont.) Anomaly-Based focuses on characterizing past Detection behavior of individual user and detecting significant deviations audit records are generally used to define typical behavior challenge 1: deciding on quantitative metrics to measure user behavior, e.g. counter (# logins, # command executions) interval timer (between 2 related events) resource utilization, etc. challenge 2: choice of tests to decide whether current activity is within acceptable limits mean and standard deviation multivariate / correlation 34 Markov processes, etc.

35 IDPS Components: Alert System (cont.) 35 Computer Security: Principles and Practice, 2 nd edition, Stallings, pp. 260

36 IDPS Components: Alert System (cont.) Misuse Detection focuses on finding a pattern (signature) which matches closely a known intrusion activity examples of pattern-matching techniques: stateless / single packet matching: look for a fixed sequence of bytes within a single packet, e.g. destination port 12570, and string madison in payload stateful / multiple packet matching: look for a specific sequence distributed over several packets of a stream 36

37 IDPS Components: Alert System (cont.) unpredictable for attacker require long(er) setup time adaptable can learn to detect new intrusions good against (unique type of) insider intrusions can start to work right away easy to understand and configure complexity: must be able to intelligently incorporate new knowledge, without becoming unstable must be continually (proactively) updated with new signatures does not recognize brand new attacks may require considerable storage space 37 for signature files

38 IDPS Components: Alert System (cont.) 38

39 IDPS Components: Databases 39

40 IDPS Components: Databases (cont.) Database of User Behaviors anomaly-detection database should be built gradually, by observing network traffic over period of time example: Securify by McAfee network_security/network_user_behavior_analys is.html 40

41 IDPS Components: Databases (cont.) Database of Attack Signatures in order to build a detailed upto-date attack signature database administrator must proactively seek information good starting points: 1) response/attacksignatures/ 2) 41

42 IDPS Components: Console Command Console software that provides a GUI (Management end to a IDS Interface) in large systems, IDS command console should enable administrat. to 1) keep up with large volume of data 2) take countermeasures quickly examples of consoles that display events generated by Snort Network IDPS Engine Aanval SAS RasorBack projects/razorback/ 42

43 IDPS Components: Console Example: Aanval SAS console 43

44 Steps in Intrusion Detection Step 1: Install IDS System includes installation of IDS hardware, software & database of user profiles or attack signatures 44

45 Steps in Intrusion Detection (cont.) Step 2: Data Gathering sensors placed throughout the network observe passing packets, state of OS and files, etc. 45

46 Steps in Intrusion Detection (cont.) Step 3: Sending Alert Messages sensors detection software transmit: 1) event descriptors to IDS server (centralized IDS) and then the server generates an alarm/alert, or 2) alert messages to IDS console (distributed IDS) 46

47 Steps in Intrusion Detection (cont.) Step 4: Immediate IDS Responds in addition to generating an alarm message, IDS may also be configured to take level-one defense actions, e.g. drop suspicious packet, stop suspicious process 47

48 Steps in Intrusion Detection (cont.) Step 5: automated IDS response (Step 4) includes min Administrator Assesses Damage set of defensive measures; before more serious actions are taken, system administrator must make sure that the alarm is not a false positive 48

49 Steps in Intrusion Detection (cont.) Step 6: in the case of true positive, further defensive Subsequent Escalation Procedure measure may have to be taken, e.g. completely block any further traffic from a particular host 49

50 Steps in Intrusion Detection (cont.) Step 7: Logging and Reviewing the Event enter the alert in IDS log file, in order to determine whether a slow (over long-term) pattern of misuse has been occurring, e.g. a series of log-on attempts that occur only once every few days 50

51 Types of IDS: HIDS Host-Based consists of software / agents IDS (HIDS) residing on selected hosts inside the network perimeter (computer, server, firewall, router, ) and monitoring activity of that host only information monitored/gathered by HIDS packets generated and received by the host file access application logs CPU use & system processes state and change in system registries 51

52 Types of IDS: HIDS 52

53 Types of IDS: HIDS Places of HIDS in some networks, HIDS agents Deployment may be deployed only on sensitive & mission-critical hosts cost prohibitive to install agent on every host HIDS centralized: HIDS agent sends all raw Configurations gathered data to a central location (console) for analysis host performance not affected by IDS alert messages do not occur in real time distributed: each HIDS agent analyses data on its own, and sends only alerts (not data) to the command console alert messages generated without delay performance reduction, as host processes 53 all data

54 Types of IDS: HIDS Example: Centralized vs. distributed HIDS client server client server 54

55 Types of IDS: HIDS Example: HIDS software Free: OSSEC - Open Source Host-based IDS Tripwire AIDE - Advanced Intrusion Detection Environment Prelude Hybrid IDS Not Free: IBM Proventia Desktop Cisco CSA Checkpoint Integrity Tripwire Enterprise Symantec Endpoint Protection McAfee Host Intrusion Prevention 55

56 Types of IDS: HIDS Example: Symantec Endpoint Protection For more on Symantec Endpoint Protection systems: 56

57 Types of IDS: HIDS Advantages of Host-Based IDS 1) Can detect events on host systems and attacks that might evade an NIDS. a single malicious packet hidden in a stream of traffic may be hard to spot intent clear only when packet s content executed 2) Encrypted traffic is decrypted on the host and available for processing. 3) Can compare audit logs to detect inconsistencies in how applications and programs are used useful in detection of less aggressive/obvious intrusions useful in detection of (e.g.) bot-virus infection victim machine starts generating larger than usual volume of legitimate looking packets 57

58 Types of IDS: HIDS Disadvantages of Host-Based IDS 1) More sensors & more management issues. an agent needs to be configured and managed on each monitored host 2) Vulnerable to direct attacks and attacks against host OS. 3) Not aware of subtle attacks that span multiple devices in the network. e.g. cannot detect IP sweeps across parts of the network 4) Could reduce host s system performance below acceptable levels. 58

59 Types of IDS: NIDS Network-Based comprises of a number of IDS (NIDS) passive (or inline) sensors placed at critical locations in the network & a command console sensors monitor passing traffic on that network segment, looking for indication of an ongoing attack, e.g. large volume of related traffic indicating a DDoS exchange of related packets in a certain pattern, e.g. ip sweep or port scan command console and primary management & analysis software are often installed on a dedicated computer 59

60 Types of IDS: NIDS (cont.) Network-Based IDS (NIDS) cont. information monitored/gathered by NIDS packet protocol type (network, transport, application) source/destination IP addresses/ports connection or session IDs state-related information size of transmission in bytes timestamps. 60

61 Types of IDS: NIDS (cont.) Sensor behind firewall, in DMZ: 1) Sees attacks that originate from outside. 2) Sees attacks that might target the Web or FTP server. 3) By observing outgoing traffic, possible to recognize that a server has been compromised. Sensor on critical subnet: 1) Detects attacks targeting critical systems. 2) Allows organizations with limited resources to focus resources on network assets of greatest value. Sensor on major LAN backbone: 1) Monitors large amount of traffic thus increasing chances of spotting an attack. 2) Detect unauthorized activity by authorized users. 61

62 Types of IDS: NIDS (cont.) Advantages of Network-Based IDS 1) Good network design & placement of NIDS sensors can enable organization to use few devices to monitor entire (large) network. 2) In most cases, NIDS sensors are passive devices and cause little to no disruption to normal network operation. 3) NIDS are not usually susceptible to direct attacks & may not be detectable by attackers. 62

63 Types of IDS: NIDS (cont.) Disadvantages of Network-Based IDS 1) Can be overwhelmed by network volume and fail to recognize attacks. 2) Cannot analyze encrypted packets. 3) Cannot reliably ascertain if an attack was successful or not. 4) Might not be able to detect attacks involving fragmented packets. (more no pp. 75) 63

64 Types of IDS: NIDS (cont.) Example: Misuse/Signature vs. Anomaly NIDS Which of the two approaches would be more suitable when building a NIDS for the following types of attacks: attack network-layer reconnaissance & attacks transport-layer reconnaissance & attacks application-layer reconnaissance & attacks DoS attacks Appropriate NIDS implementation misuse misuse misuse anomaly look for packets that carry certain protocols (ICMP) carry certain content (TCP SYN-flood) scan for certain ports and services 64

65 Types of IDS: NIDS (cont.) Example: NIDS software Free: Snort! Not Free: Shadow Dragon NFR RealSecure NetProwler 65

66 Network Traffic Signatures Network set of characteristics such as IP Traffic numbers and options, TCP flags and Signature port numbers used to define a type network activity some NIDS assemble database of normal traffic/signatures while others assemble database of well-known attack signatures Signature Analysis process of analyzing a TCP/IP communication in order to determine whether it is legitimate or suspicious 66

67 Network Traffic Signatures (cont.) Example: Norton Symantec signature 67

68 Network Traffic Signatures (cont.) Categories of Suspicious Traffic where suspicious content is placed Bad Header Information malformed data in IP/TCP header can cause end system to stall or crash (bad checksum, a missing fragment, ) Suspicious Data Payload most viruses and Trojans have wellrecognizable sequence of characters in packet payload (e.g., ANA BILGI in CyberEYE trojan)

69 Network Traffic Signatures (cont.) Categories of Suspicious Traffic (cont.) in how many packets suspicious content appears Single-Packet (Atomic) Attack a number of adversary activities can accomplished by sending (and receiving) a single packet from client to host example: ICMP packet in an IP packet with Options 7 (record return route) reveals IP addresses of all routers within a network Multiple-Packet (Atomic) Attack require/use a series of normal-looking packets to complete an attack example: DoS and DDoS attacks, port scans, IP scans, etc. 69

70 Network Traffic Signatures (cont.) Packet Sniffer software and hardware that monitors traffic going into or out of a network device; e.g. Snort Wireshark Tcpdump Snoop NetStumbler (wireless, ) 70

71 Network Traffic Signatures (cont.) Example: Signature of Ping Sweep attack scan all machines in a network Guide to Network Defense and Countermeasures, 3 rd Edition, Weaver, pp

72 Network Traffic Signatures (cont.) Example: Signature of Port Scan attack

73 Network Traffic Signatures (cont.) Example: Signature of Random Back Door Scan In Random Back Door scan (version of Port Scan), the attacker probes a computer to see if any ports, that are used by well known Trojan programs, are open and listening. 73

74 Network Traffic Signatures (cont.) Example: Signature of Random Back Door scan (cont.)

75 Eluding Network IDS Fragroute a packet shaping tool that intercepts, modifies, and rewrites egress traffic destined for a specific host features a simple ruleset language to perform the following set of operation on a packet destined to a particular host delay duplicate drop fragment overlap reorder segment source-route 75

76 Eluding Network IDS (cont.) Example: Fragroute code & output 76

77 Eluding Network IDS (cont.) Fragroute most NIDS are pattern based and Lessons look for a specific combination of flags in a header or a set pattern in a payload however, what NIDS sees may not be what the end system gets it is critical that NIDS perform full reassembly of monitored packets 77

78 Hybrid IDS Hybrid IDS combine features of HIDSs & NIDSs to gain flexibility and increase security advantage: monitor network as a whole with NIDS sensors, and monitor attacks on each individual computer with HIDS sensors two systems compliments each other well disadvantage: complications in getting various components to work together data gathered from two systems can be difficult to absorb and analyze 78

79 Hybrid IDS (cont.) Example: Centralized Hybrid IDS Advantages: Lower Cost and Better Control There is only one management system, and all reports appear at one location easier to recognize network-wide (largescale) attacks. 79

80 Hybrid IDS (cont.) Example: Fully Distributed Hybrid IDS Advantages: Real-Time Response Since IDPS does not have to wait for a response from a centralized control facility, reaction to attacks is greatly speeded up. 80

81 Hybrid IDS (cont.) Example: Partially Distributed Hybrid IDS Advantages: Best of Both Worlds Individual agents can respond to local threats in real-time, while reporting to a central facility enables detection of widespread attacks. 81

82 Choosing Right IDPS Product Questions to Consider When Choosing IDS Product 1) Is Product Sufficiently Scalable for Your Environment? some IDS cannot function in a large or widely distributed enterprise networks 2) What is User Level of Expertise Targeted by Product? different IDS vendors target users with different level of technical and security expertise 3) What Are Support Provisions for Product? Is technical support included? What is the cost? Are subscriptions to signature & software updates included? How quickly after a new attack is made public will the vendor ship a new signature? How quickly will software updates & patches be issued after a problem is reported to the vendor? 82

83 Snort: NIDS Tool 83

84 Snort: NIDS tool Snort free and open-source NIDS tool, created by M. Roesch in 1998 now developed by Sourcefire in 2009, Snort was entered into InfoWorld s Open Source Hall of Fame as one of the greatest open source software of all time easily deployed on most nodes of a network (host, server, router) efficient operation that uses small amount of memory and processor time easily configured by system administrators who need to implement a specific security solutions in a short amount of time 84

85 Snort: NIDS tool (cont.) Snort consists of 4 logical components Architecture packet decoder: captures each passing packet & identifies/isolates packet headers detection engine: analyzes packets based on a set of rules defined by the sec. administr. logger: stores selected packets in human readable or binary format for later analysis alerter: sends event notification for selected packets 85

86 Snort: NIDS tool (cont.) Snort can be used in 3 different modes Mode of Basic Packet Sniffer / Logger Operation reads network packets and displays them on the console, or logs them in a file Network Intrusion Detection Sensor implemented as passive sensor monitors network traffic and analyzes it against a ruleset defined by the user may or may not log packets, may or may not generate alert messages Network Intrusion Prevention Sensor implemented as inline sensor can monitor & log, but also block packets 86

87 Snort: NIDS tool (cont.) Snort does not have its own GUI to display Interface alerts, but many complementary tools exist IDScenter (Windows), BASE (Linux) 87

88 Snort: NIDS tool (cont.) Snort is intended for installation on a computer positioned at the network parameter; though, it can also function on a dedicated computer on a home or small business network Snort comes with an extensive set of preconfigured rules rule files are text-based and written in a simple description language rule files are easy to edit and customize 88

89 Snort: NIDS tool (cont.) Snort Rules rule header + rule options important!!! must end with ; alert tcp any any -> / (content:" a5 "; msg: "mountd access";) header options rule header consists of: rule action defines what to do in case that a packet with all attributes indicated in the rule shows up * available actions: alert, log, pass, 89 * drop, reject, sdrop only available in inline mode

90 Snort: NIDS tool (cont.) Computer Security, 2 nd Edition, Stallings, pp

91 Snort: NIDS tool (cont.) Snort Rules rule header + rule options alert tcp any any -> / (content:" a5 "; msg: "mountd access";) rule header consists of: protocol snort supports IP, TCP, UDP & ICMP source and destination address you can use word any to specify any IP address, and negation (!X) to specify any IP address except X source and destination port port numbers can be defined a number of ways, including a specific port, any port, port ranges and by negation direction operator (->, <-, <>) indicates the 91 orientation/direction of the traffic that the rule applies to

92 Snort: NIDS tool (cont.) Snort Rules rule header + rule options alert tcp any any -> / (content:" a5 "; msg: "mountd access";) rule options define more precisely what needs to be done upon a detection of a particular packet they are enclosed in parentheses and separated by a semicolon and a blank space major categories of rule options are: meta-data provide information about the rule payload look for data inside the packet payload non-payload look for non-payload data post detection rule specific triggers that happen after a rule has matched a packet 92

93 Snort: NIDS tool (cont.) Computer Security, 2 nd Edition, Stallings, pp

94 Snort: NIDS tool (cont.) Example: Snort rules in network /24 alert tcp / > any any \ (content: "confidential"; msg: "Detected confident.";) Generate an alert message whenever detecting a packet that has originated from an FTP server in the network /24, & contains the word confidential. alert icmp![ /24] any -> any any \ (ttl :> 100; msg: Ping with TTL>100";) Generate an alert message for all ping requests coming from outside of your network. alert tcp /24 any ->![ /24] any \ (content: "GET"; msg: "GET matched";) Generate an alert message whenever detecting a HTTP request that is going to an address that is not a part of the given network. 94

Intrusion Detection System (IDS)

Intrusion Detection System (IDS) Intrusion Detection System (IDS) Characteristics Systems User, Process predictable actions describing process under that actions what pattern subvert actions attack of correspond the systems processes

More information

IDS / IPS. James E. Thiel S.W.A.T.

IDS / IPS. James E. Thiel S.W.A.T. IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

IntruPro TM IPS. Inline Intrusion Prevention. White Paper IntruPro TM IPS Inline Intrusion Prevention White Paper White Paper Inline Intrusion Prevention Introduction Enterprises are increasingly looking at tools that detect network security breaches and alert

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2. Intrusion Detection and Prevention Systems

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2. Intrusion Detection and Prevention Systems FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 13 Intrusion Detection and Prevention Systems By Whitman, Mattord, & Austin 2008 Course Technology Learning Objectives Describe

More information

Taxonomy of Intrusion Detection System

Taxonomy of Intrusion Detection System Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use

More information

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Network- vs. Host-based Intrusion Detection

Network- vs. Host-based Intrusion Detection Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of

Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code

More information

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts

More information

Introduction of Intrusion Detection Systems

Introduction of Intrusion Detection Systems Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:

More information

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics

More information

Intrusion Detections Systems

Intrusion Detections Systems Intrusion Detections Systems 2009-03-04 Secure Computer Systems Poia Samoudi Asli Davor Sutic Contents Intrusion Detections Systems... 1 Contents... 2 Abstract... 2 Introduction... 3 IDS importance...

More information

Network Based Intrusion Detection Using Honey pot Deception

Network Based Intrusion Detection Using Honey pot Deception Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.

More information

Performance Evaluation of Intrusion Detection Systems

Performance Evaluation of Intrusion Detection Systems Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection

More information

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project. Our Security Ways we protect our valuables: By Edith Butler Fall 2008 Locks Security Alarm Video Surveillance, etc. History about IDS It began in 1980, with James Anderson's paper: History of IDS Cont

More information

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Passive Logging. Intrusion Detection System (IDS): Software that automates this process Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion

More information

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) ISCA Journal of Engineering Sciences ISCA J. Engineering Sci. Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) Abstract Tiwari Nitin, Solanki Rajdeep

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information

Name. Description. Rationale

Name. Description. Rationale Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.

More information

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow IDS 4.0 Roadshow Module 1- IDS Technology Overview Agenda Network Security Network Security Policy Management Protocols The Security Wheel IDS Terminology IDS Technology HIDS and NIDS IDS Communication

More information

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12 Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

CSCI 4250/6250 Fall 2015 Computer and Networks Security

CSCI 4250/6250 Fall 2015 Computer and Networks Security CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP

More information

Network Defense Tools

Network Defense Tools Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds ravikantvanjara@gmail.com What is Firewall? A firewall

More information

Course Title: Penetration Testing: Security Analysis

Course Title: Penetration Testing: Security Analysis Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced

More information

How To Protect A Network From Attack From A Hacker (Hbss)

How To Protect A Network From Attack From A Hacker (Hbss) Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment

More information

THE ROLE OF IDS & ADS IN NETWORK SECURITY

THE ROLE OF IDS & ADS IN NETWORK SECURITY THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker

More information

Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC

Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC Intrusion Detection and Intrusion Prevention Ed Sale VP of Security Pivot Group, LLC Presentation Goals Describe IDS and IPS Why They Are Important Deployment and Use Major Players The IT Security Camera

More information

Role of Anomaly IDS in Network

Role of Anomaly IDS in Network Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,

More information

How To Protect Your Network From Attack From A Hacker On A University Server

How To Protect Your Network From Attack From A Hacker On A University Server Network Security: A New Perspective NIKSUN Inc. Security: State of the Industry Case Study: Hacker University Questions Dave Supinski VP of Regional Sales Supinski@niksun.com Cell Phone 215-292-4473 www.niksun.com

More information

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013 CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access

More information

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls CSE 4482 Computer Security Management: Assessment and Forensics Protection Mechanisms: Firewalls Instructor: N. Vlajic, Fall 2013 Required reading: Management of Information Security (MIS), by Whitman

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware

Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware 1 Corresponding Author: lawal5@yahoo.com 1 O.B. Lawal Computer Science Department,

More information

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

Intruders & Intrusion Hackers Criminal groups Insiders. Detection and IDS Techniques Detection Principles Requirements Host-based Network-based

Intruders & Intrusion Hackers Criminal groups Insiders. Detection and IDS Techniques Detection Principles Requirements Host-based Network-based Lecture Outline Intruders & Intrusion Hackers Criminal groups Insiders Detection and IDS Techniques Detection Principles Requirements Host-based Network-based Honeypot Madartists Intruders significant

More information

Intruders and viruses. 8: Network Security 8-1

Intruders and viruses. 8: Network Security 8-1 Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds

More information

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) 1 of 8 3/25/2005 9:45 AM Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Intrusion Detection systems fall into two broad categories and a single new one. All categories

More information

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion

More information

Denial of Service Attacks, What They are and How to Combat Them

Denial of Service Attacks, What They are and How to Combat Them Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Final exam review, Fall 2005 FSU (CIS-5357) Network Security Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection

More information

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 59 CHAPETR 3 DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 3.1. INTRODUCTION The last decade has seen many prominent DDoS attack on high profile webservers. In order to provide an effective defense against

More information

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,

More information

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT WHAT S INSIDE: 1. GENERAL INFORMATION 1 2. EXECUTIVE SUMMARY 1 3. BACKGROUND 2 4. QUESTIONS FOR CONSIDERATION

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) : Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh Written Exam in Network Security ANSWERS May 28, 2009. Allowed aid: Writing material. Name (in block letters)

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall

More information

IDS : Intrusion Detection System the Survey of Information Security

IDS : Intrusion Detection System the Survey of Information Security IDS : Intrusion Detection System the Survey of Information Security Sheetal Thakare 1, Pankaj Ingle 2, Dr. B.B. Meshram 3 1,2 Computer Technology Department, VJTI, Matunga,Mumbai 3 Head Of Computer TechnologyDepartment,

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Contents Motivation and basics (Why and what?) IDS types and detection principles Key Data Problems

More information

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method

More information

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security

More information

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection

More information

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion

More information

Chapter 8 Security Pt 2

Chapter 8 Security Pt 2 Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for

More information

Barracuda Intrusion Detection and Prevention System

Barracuda Intrusion Detection and Prevention System Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

A Review on Network Intrusion Detection System Using Open Source Snort

A Review on Network Intrusion Detection System Using Open Source Snort , pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India Sharmasakshi1009@gmail.com,

More information

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7 20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic

More information

Intrusion Detection and Prevention Systems in the Industrial Automation and Control Systems Environment

Intrusion Detection and Prevention Systems in the Industrial Automation and Control Systems Environment Intrusion Detection and Prevention Systems in the Industrial Automation and Control Systems Environment Chris Martin Senior Director Product Strategy Industrial Defender Inc. Agenda Overview of IDS/IPS

More information

Getting Ahead of Malware

Getting Ahead of Malware IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph 0925910 I MCA

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph 0925910 I MCA INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph 0925910 I MCA OVERVIEW Introduction Overview The IDS Puzzle Current State of IDS Threats I have a good firewall, why do I need an IDS? Expectations

More information

INTRUSION DETECTION SYSTEM

INTRUSION DETECTION SYSTEM INTRUSION DETECTION SYSTEM INTRUSION DETECTION AND PREVENTION using SAX 2.0 and WIRESHARK Cain & Abel 4.9.35 Supervisor Dr. Akshai Kumar Aggarwal Director School of Computer Sciences University of Windsor

More information

Firewalls & Intrusion Detection

Firewalls & Intrusion Detection Firewalls & Intrusion Detection CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration 2007, 2008 Robert H. Sloan Security Intrusion

More information

Intrusion Detection 1 / 46. Intrusion Detection. Motivation Defenses Just an Overview Generic Architecture Fundamental Choices Location Type Actions

Intrusion Detection 1 / 46. Intrusion Detection. Motivation Defenses Just an Overview Generic Architecture Fundamental Choices Location Type Actions Motivation Defenses Just an Overview Generic Architecture Fundamental Choices Type Actions 1 / 46 Motivation Motivation Defenses Just an Overview Generic Architecture Fundamental Choices Type Actions We

More information

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015) s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware

More information

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

CYBER ATTACKS EXPLAINED: PACKET CRAFTING CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices

More information

Managing Latency in IPS Networks

Managing Latency in IPS Networks Application Note Revision B McAfee Network Security Platform Managing Latency in IPS Networks Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they

More information

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

ITEC441- IS Security. Chapter 15 Performing a Penetration Test 1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and

More information

Analyzing Intrusion Detection System Evasions Through Honeynets

Analyzing Intrusion Detection System Evasions Through Honeynets Analyzing Intrusion Detection System Evasions Through Honeynets J.S Bhatia 1, Rakesh Sehgal 2, Simardeep Kaur 3, Siddharth Popli 4 and Nishant Taneja 5 1 Centre for Development of Advanced Computing 2,

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features

More information

Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?

Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection? Contents Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Motivation and basics (Why and what?) IDS types and principles Key Data Problems with

More information

Segurança Redes e Dados

Segurança Redes e Dados Segurança Redes e Dados I N T R U S Õ E S 2 0 1 2 / 2 0 1 2 M A N U E L E D U A R D O C O R R E I A P E D R O B R A N D Ã O Slides are based on slides by Dr Lawrie Brown (UNSW@ADFA) for Computer Security:

More information

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis Agenda Richard Baskerville P Principles of P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Principles Kim, et al (2004) A fuzzy expert system for

More information

Firewalls Overview and Best Practices. White Paper

Firewalls Overview and Best Practices. White Paper Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not

More information

Network Security Management

Network Security Management Network Security Management TWNIC 2003 Objective Have an overview concept on network security management. Learn how to use NIDS and firewall technologies to secure our networks. 1 Outline Network Security

More information

Announcements. Lab 2 now on web site

Announcements. Lab 2 now on web site Lab 2 now on web site Announcements Next week my office hours moved to Monday 4:3pm This week office hours Wednesday 4:3pm as usual Weighting of papers for final discussion [discussion of listen] Bro:

More information

From Network Security To Content Filtering

From Network Security To Content Filtering Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals

More information

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1 Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology Project Proposal 1 Project Proposal 2 Abstract Honeypot systems are readily used by organizations large and

More information

Fuzzy Network Profiling for Intrusion Detection

Fuzzy Network Profiling for Intrusion Detection Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie A. Dickerson (julied@iastate.edu) Electrical and Computer Engineering Department Iowa State University

More information

Security Mgt. Tools and Subsystems

Security Mgt. Tools and Subsystems Security Mgt. Tools and Subsystems some attack and defense security tools at work Reconaissance Passive Active Penetration Classes of tools (network-bound) Passive Reconaissance Passively listen and analyze

More information

Network Intrusion Detection Systems. Beyond packet filtering

Network Intrusion Detection Systems. Beyond packet filtering Network Intrusion Detection Systems Beyond packet filtering Goal of NIDS Detect attacks as they happen: Real-time monitoring of networks Provide information about attacks that have succeeded: Forensic

More information

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How Network Security Is Breached Network Security Policy

More information