Kingston University London

Size: px
Start display at page:

Download "Kingston University London"

Transcription

1 Kingston University London Analysis and Testing of Intrusion Detection/Prevention Systems (IDS/IPS) XYLANGOURAS ELEFTHERIOS Master of Science in Networking and Data Communications THESIS

2 Kingston University London Thesis Title Analysis and Testing of Intrusion Detection/Prevention Systems (IDS/IPS) Dissertation submitted for the Degree of Master of Science in Networking and Data Communications By XYLANGOURAS ELEFTHERIOS SUPERVISOR Dr. PANAYIOTIS KOTZANIKOLAOU KINGSTON UNIVERSITY, FACULTY OF COMPUTING, INFORMATION SYSTEMS & MATHEMATICS ΤEI OF PIRAEUS, DEPARTMENTS OF ELECTRONICS AND AUTOMATION JULY 2011

3 Table of Contents Chapters Pages 1 Introduction Review The Intrusion Detection Systems Misuse Detection Anomaly Detection Host-based Intrusion Detection Systems (HIDS) System Logs System Call File System Monitoring Advantages Disadvantages of HIDS Network Intrusion Detection Systems (NIDS) Topology Packet Sniffing Advantages Disadvantages of NIDS Popular IDS OSSEC Bro Suricata Network scanning Network scanning tools Nemesis Nesus Practical Experience System Analysis and Configuration Network analysis Security Policy Firewall Configuration Router Configuration Test-Bed Environment Snort Overview Snort Configuration... 27

4 Setting up the network variables Configuration of the decoder Configuration of the Base detection engine Configuration of the dynamic loaded libraries Configuration of the preprocessors Output Plug-in configuration Customization of the rule set Customization of the preprocessors and the decoder rule set Customization of shared object Nmap Nmap Features Performance Test Scan Detection Host Discovery Port Scanning Fragmentation False Alarms FTP server protection Internal Network Protection Conclusions References Table of Figures Figures Pages 2.1 Network intrusion Detection System Architecture Enterprise Network DMZ and Internal Network of the Enterprise Network Test-Bed Environment (VMware workstation) Virtual Machine (Windows XP) Virtual Machine (Backtrack 5) Nmap sp scan for host with IP address sp scan on the DMZ Snort detects the sp Nmap scan... 32

5 4.3 sp scan on the Internal Network Snort detects the sp Nmap scan SYN scan for the ftp server Snort detects the SYN scan FIN scan for the client of the Internal Network with the IP address Snort detects the FIN scan NULL scan for client of the Internal Network with the IP address Snort detects the NULL scan Xmas scan for the client of Internal Network with the IP address Snort detects the Xmass scan Nmap scans the port Snort detects the scan that performed on port SYN scan for the ftp server with the fragmentation option enabled Snort detects the SYN scan despite the fragmentation Snort detects a client that is visiting the web site: 46

6 Abstract Intrusion Detection Systems (IDS) are network security tools that were developed in order to detect and identify possible intrusions. This dissertation presents an overview of the IDS/IPS technology along with their various categories. It also presents the implementation of Snort on a test-bed environment. Snort is one of the most popular IDS. The test-bed environment will be used for the performance test of Snort. Snorts ability to detect intrusion will be tested with the use of a specialized scanning tool (Nmap) that will generate attacks. The results from these tests will be discussed and analyzed to provide a general view of IDS technology.

7 1. Introduction History has shown that in our world individuals always tried to protect their privacy and their valuable resources. History has also shown that the security measures that individuals use in order to protect their privacy or their valuable resources will somehow fail. The same thing happens with the computers networks. No matter how much money are spend for the protection of a computers network there is always the probability of failure. The computers networks security tools are designed according to three basic principles: the first principle is the prevention of possible attacks; the second one is the detection of any malicious activities the last but not least the active response to any kind of attack (Kizza, Joseph 2005). Many tools have been developed over the years for the protection of computer networks. One of the most common security tools that is installed almost in every computers network is the firewall. It is the first line of protection. It works like a filter that filters the incoming traffic and allows only the requested data to enter the protected system. On the other hand there are specific tools that are developed in order to automate attacks against protected networks that use firewalls. These tools can trick the firewall, for example by masquerade the attacker s profile. If the intruder manages to enter the system without being recognized then he can act like an authorized user and trigger the attack. As was mentioned in the previous paragraph there are not security measures that will last forever. It is certain that the battle against malicious attacks will go on forever. The best way to defend a computer system is to accept that the intruder will somehow enter the protected system. The ability of detecting a possible intrusion is the key element to an integrated protection against any kind of malicious attacks. There are tools that are made for detecting and preventing any kind of malicious attack. These tools are well known as Intrusion Detection Systems (IDS). They are used by network administrators in order to detect possible unauthorized intrusion made in their protected network. 1

8 The first publication about Intrusion Detection Systems was made back in 1980 where the authors tried to present the importance of monitoring systems in order to audit trails that lead to misuse (Kizza, Joseph 2005). The Intrusion Detection tools are sets of techniques that are made for identifying any kind of malicious activities (Vokorokos et al. 2006). The IDS systems provides: (a) continuous monitoring of the actions made by the users of a network system or an individual user, (b) configuration of the security mechanisms of a system, (c) control the integrity of valuable resources, detect possible attacks by comparing with patterns of well known attacks, (c) analysis of any abnormal activities and (e) operation system management. There are two main categories for the IDS systems; the Host-Based and the Network-Based systems. The host-based systems are used for the protection of a single computer and they use information related to the computers operating system (Yeung, Yuxin 2003). On the contrary the network-based systems use information from the packets that travel over the network (Wang et al. 2010). In both cases the system sends alarm to the system administrator. The alarms can be visual or audible signs or even s that inform the administrator about a possible intrusion. Except from the Intrusion Detection Systems there are also security tools that not only detect malicious activities but also prevent them. These tools are well known as Intrusion Prevention Systems and were first presented in the late 90s. Intrusion Prevention and Intrusion Detection Systems have similar operations, the IPS is considered to be an extension of the IDS (Rowan, Tom 2007). There are two main techniques for the Intrusion Detection Systems, the anomalybased and the signature analysis detection. IDS systems can use both techniques and in some cases at the same time. The first technique, the anomaly-based detection, detects the not normal activities of a system (Kizza, Joseph 2005). For example, a web server has the 90% of its traffic load during the day, in this case an unexpected increase of data traffic during the night it is considered to be a not normal activity. For that mechanism a list of normal and expected activities (statistical description) is compulsory in order to configure the IDS. Although there are cases of false alarms 2

9 for the IDS systems that use the anomaly based mechanism. In many cases system s behavior is out of the ordinary without being attacked. The administrators who choose to use the anomaly-based configuration face the problem caused by false alarms. The signature-based detection uses a database in order to detect possible attacks. The database contains attack signatures and the IDS system compares these signatures with the patterns made by audit files (Jia, Chen 2009). Every time the IDS system finds a match it triggers the alarm. As with the anomaly-based detection, there is always the possibility of a false alarm. Moreover, both mechanisms may fail to detect a possible intrusion. As was mentioned in the first paragraph there are no security measures that guarantee the protection against all possible attacks. This dissertation focuses on the protection provided by Intrusion Detection and Intrusion Prevention Systems against malicious attacks. In more details, this dissertation analyses the IDS/IPS systems by testing their performance against malicious attacks provided by specialized attack tools. Chapter 1 of this thesis describes how the IDS and IPS systems work along with the related work of the subject. The following chapter (Chapter 2) describes a test-bed environment suitable for the testing of the IDS/IPS systems. The installation of an IDS system on a personal computer is likely to cause problems to its latter use due to the changes made by the IDS to the ports of the system. For that reason the tests for the IDS performance will take place on a virtual machine. Chapter 3 part presents the implementation of an IDS/IPS system on the test-bed environment that was mentioned on the previous part. The IDS system that will be used for the dissertation is snort. It is an open source IDS developed by Sourcefire. 3

10 Then the IDS system will be tested against a specialised attack tool. The results of these tests will be gathered and presented analytical. The last chapter (Chapter 4) of this dissertation provides the conclusions from these tests and the performance analysis of the IDS/IPS system. 2. Review 2.1 The Intrusion Detection Systems Intrusion Detection Systems are systems that provide security protection against malicious attacks. They were developed in order to monitor the normal operation of computer systems or networks and detect suspicious events. The IDS alerts the administrator of the protected computer system/network when an intrusion has occurred but sometimes the IDS generates false alarms. The false alarms are produced by non malicious events that triggered the detection mechanism of the IDS. An IDS is usually an additional security measure for computer networks that already use a firewall for their protection. The IDSs do not always manage to detect all the possible intrusions because attackers use techniques that can trick both firewalls and IDSs. Computer administrators use IDSs for two main reasons; the first is that firewalls do not provide enough protection against malicious attacks (there are several firewall bypass techniques) and the second one is that they do not know if they do not know if they succeeded to protect the system or not. The IDSs are systems that can protect both networks and its hosts. There are two major categories; the Host-based Intrusion Detection Systems (HIDS) and the Network-based Intrusion Detection Systems (NIDS). A HIDS analyzes the files and the applications of the operating system while a NIDS analyzes the packets that travel through the network. Both types use the same techniques for detection. The first technique is the misuse detection where the IDS searches to for something already known by using misuse patterns; and the anomaly detection where the IDS searches inside the system for out of the ordinary operations (Bace, Mell 2001). 4

11 2.2 Misuse Detection The misuse detection technique compares the events of the system with the events of a predefined pattern characterized as malicious. For every positive result produced by the comparison the IDS informs the administrator of the system for a possible attack. These predefined patterns are also called signatures. Each signature defines a specific attack. The misuse detection technique is also known as signature-based detection. This technique does not produce false alarms very often. It can also detect with precision the attack technique that tries to penetrate the protected system. The precise detection helps the administrator to deal better with the attack. Moreover the misuse technique can help system administrators with lack of experience in the security field to effectively protect a system (Bierman et al. 2001). The signature-based technique detects only the known threats, in other words it can detect only the modeled threats (Mutz et al. 2003). This technique works like the antivirus, it must be up to date during its operation in order to provide maximum protection to the user. In addition, the design of this technique makes sometimes the protected system vulnerable to common threats. 2.3 Anomaly Detection The Anomaly Detection method focuses on the behavior of the system, the IDS in this case triggers the alarm for every behavior that is considered to be out of the ordinary. The theory for this detection method is that malicious activities can be detected due to their abnormal behavior. In other words, the attacks have different activity than the normal procedures of the system (Kizza, Joseph 2005). In order to do that, the IDSs that use the anomaly detection technique, creates a profile that has all the characteristics of a legitimate user of the system and they compare its behavior with any other from inside the system. The construction of this profile requires data from the normal operation of the system during a period of time. There are many measures and techniques that are used by the detection systems for the anomaly detection technique. One common technique that is used in many commercial IDSs is the threshold detection. In this technique the behavior of the 5

12 system is measured by counts. For example, how many times a user tries to login to the system, the number of file queries made in a certain amount of time, the amount of memory (RAM) that was used for a specific procedure. For all these examples the IDS has an acceptable level that defines the normal activity, any activity that exceeds these level is characterized as a malicious attack (Aydin et al.2009). Another common technique used by the commercial IDSs is the statistical measure technique. There are two cases for this technique. In the first case the attributes of the user s profile should agree with a specific pattern that indicated the legitimate profiles of the users. The second case uses patterns that are made by a collection of data from a reasonable amount of time. These statistical measures are parametric and non parametric respectively. The IDSs can also use rule-based measures that use rule patterns instead of the patterns that are used in the non-parametric technique which uses countable values. There are also other measure techniques that are used by the non-commercial IDSs that contains generic algorithms. The main drawback of anomaly detection is that it produces a great number of false alarms. It is very difficult to represent the normal activity with the use of a static pattern. The behavior of a legitimate user inside a system can be sometimes out of the ordinary. In addition, the construction of a legitimate profile requires a great amount of historical data in order to represent the normal behavior. On the other hand the anomaly detection method can detect common and specialized attacks without the use of detailed information about them. Furthermore, it can be used in order to create signatures used by detection systems that use the misuse detection technique (Bace, Mell 2001)(Bierman et al. 2001). 2.4 Host-based Intrusion Detection Systems (HIDS) The Host-based Intrusion Detection Systems are used to protect a single host. HIDSs use information form an individual system. The most popular detection 6

13 technique for HIDS is the signature recognition. The signatures are patterns that are recognized as possible attacks by the administrator of the computer system. In other words, signatures are rules that describe events and also how these events interact with each other. The signatures are pre-defined by the detection policy made by the computer administrator (Bierman et al. 2001) System logs The IDSs use the system log files as a source of information. The IDSs usually perform log monitoring and alert the administrator every time they find anomalies in the sequence of events System Call The HIDSs can also use the kernel of the operating system in order to observe the system calls. From this point of view the HIDS can alert the administrator (security officer) for suspicious requests made by programs of the computer systems. The HIDS spots the system calls that are supposed to be suspicious according to the detection policy File System Monitoring Except from the systems calls and logs the HIDS can also detect malicious activities by observing the files of the file system. In particular the HIDS monitors the size and the attributes of the files that consists the file system of the computer. This technique has a major advantage against the others; it has a very fast response to malicious attacks Advantages and Disadvantages of HIDS The HIDSs have the ability to detect intrusions that the Network-based IDSs fail to detect since they have the ability to use information about the use of the applications or the access to files of the system. They can also analyze packets that are used for encrypted communication between hosts (the Network-based IDSs do not have this ability). Moreover, they can be used for the detection of malicious attacks that involve integrity breaches (Kozushko 2003). 7

14 The HIDS is part of the computer system that protects; in a successful attack against the system, the intruder could also disable the operation of the HIDS. They only analyze the packets that reach their host; they are unable to analyze the traffic of the rest of the network so they are vulnerable to network attacks. In addition, they are vulnerable to denial of service attacks. Sometimes the HIDSs may have to deal with a great amount of information (HIDS monitor trails of the operation system), in that case they must use additional storage resources. The use of additional storage resources along with process resources affects the performance of the computer system they protect. 2.5 Network Intrusion Detection Systems (NIDS) Most of the intrusion detection systems are made for network protection; two of the most popular network intrusion detection systems is snort and Bro. These systems monitor the data traffic inside the network. The position of the IDS inside a network is very important. The IDS must be able to collect information from all the hosts of the network without affecting the performance of the entire network. As a result, the location of the NIDS differs from network to network. The NIDS may look like an internet firewall but it is not. There are some critical differences between these two security tools. Firewalls make binary decisions according to the rules that they use in order to protect a network. The IDS systems perform further analysis of the data that travel through the network and warn the users for possible attacks (Davies 2002). The firewalls work like doors. Every door opens with a specific key. If the intruder has the key he can enter the protected system and act like an authorised user. The NIDS, on the other hand, works like a security camera that monitors the protected area 24 hours a day and detects the out of the ordinary behaviour. Most protected networks use both firewalls and NIDS in order to provide its users with further protection. Firewall and NIDS supplement each other. 8

15 2.5.1 Topology It is not easy for the network designers to decide for the location of a NIDS inside their network. The decision needs serious consideration. The NIDS uses sensors in order to collect information about the traffic inside the network. The NIDS is supposed to control the data traffic of the entire network which usually contains besides its hosts, routers and switches, servers and other components. If the sensor is placed at the end of a line that caries several of these components then it would be difficult for the NIDS to have a clear view of the traffic. The correct implementation of an NIDS starts with a question: which are the valuable sources of the network? The NIDS should be designed according to the security policy of the network. The position of the NIDS is chosen according to following parameters (Beale 2003): The topology of the network (ring, star etc.) The position of the firewall inside the network If it is necessary to filter traffic both before and after the firewall The components of the network (routers, switches, servers etc.) Figure2.1 shows a network that is protected by an NIDS system. As it is shown the multiple NIDSs are placed in strategic locations inside the network. There are three NIDSs, the first one is used for monitoring the data traffic from and to the Server1 and 2. Another NIDS is used for the analysis of data form and to the clients of the networks. And the last NIDS is used for the protection of a single server (Server 3). Each NIDS is configured in order to protect the hosts of the subnet that is installed. The more NIDS are used the merrier because each NIDS can be configured according to the services used by the hosts of the network. 9

16 Figure2.1. Network that uses NIDS for its protection Packet Sniffing Packet sniffing is one of the most effective ways to perform detection over a network. The NIDS uses the promiscuous mode of the interfaces in order to sniff packets that travel through the network wires. The promiscuous mode is one of the most common techniques of packet sniffing but there are also other techniques that are used for the same reason. A Network Interface Card (NIC) that is set to work in promiscuous mode accepts all the packets that are passing through its interface even those which are not addressed to it (Ansari 2002). Many intruders are aware of packet sniffing and they use techniques in order to avoid being sniffed by the NIDS. Most of the evasion techniques split payload into packets that are undetectable from the NIDS since they do not carry enough information to trigger the alarm, this techniques are also known as fragmentation attacks. As a result IDSs use techniques that detect fragmentation by collecting the packets (fragments) and put them in the right order so that they represent the original payload. Intruders then must find other ways to trick the reassembling capability of the IDS and the battle goes on and on. 10

17 2.5.3 Advantages and Disadvantages of NIDS The Network-based IDSs like all the security tools have some advantages against intrusions and some drawbacks. The advantages are: 1. Large networks do not require a great number of IDSs for their protection. The location of the IDSs inside a network will be according to a specific strategy. 2. Moreover, the implementation of an NIDS has little impact on the networks performance. The IDS do not actually affect the way that data travel through the network wires since they are passive systems. 3. In addition, NIDSs are invisible to intruders. There are no security tools that can identify whether a network is protected by an NIDS or not. The NIDSs have also some major drawbacks: 1. The NIDSs usually fail to detect attacks over busy networks. Most NIDSs are unable to process all the packets of a network during the high traffic hours. Although there are hardware NIDSs that have the requisite process power to perform effective packet processing under high traffic periods. The hardware NIDS increases the overall cost of the network and also affects its scalability. 2. The performance of a NIDS sensor is affected by the operation limits of a network component. Some network switches do not use universal monitoring for their ports which means that the monitoring of sensor over a single host will be limited. In addition, in some cases single ports are unable to mirror the whole amount of data that travel through the switch (Kozushko 2003). 3. The NIDS do not have the ability of analyzing encrypted data. 4. The NIDS is able to inform the network administrator for a possible attack but on the other hand is unable to tell if the attack was successful. Each time the NIDS generates the alarm, the network administrator must search for 11

18 penetration evidence in order to determine whether the attack was successful or not. 2.6 Popular Intrusion Detection Systems The most intrusion detection systems are open source programs, like most security tools, that can be used for free by user who want to protect their systems. Four of the most popular of them are Snort, OSSEC HIDS, Bro and Suricata (Paxson 2004) (Hay et al. 2008)( This paragraph focuses on the presentation of the last three IDSs; snort will be analyzed briefly on the next paragraph OSSEC HIDS OSSEC is an open source Host-based Intrusion Detection System which was generally developed by Daniel Cid along with several others developers. It is a very popular security tool that thousands of users use for free in order to protect their systems. The OSSEC HIDS uses a analysis and correlation engine and can check file s integrity, analyze the log files. It can also perform monitoring for the Windows registry and is designed to use a policy with a centralized architecture. Moreover, as an HIDS its alerts are on real-time and its responses are also active. Despite the fact that the OSSEC was originally developed to work as an HIDS it can also be used for analyzing logs (authentication logs), firewalls, other IDSs or even web servers. The OSSEC is suitable for many operating systems (Windows Microsoft, Mac, Linux and others). There are three installation types for the OSSEC HIDS, the local, the agent and the server installation. The first installation is the most common installation for all the IDSs and is designed to provide protection to a single host. The agent installation is used by several hosts which report to an OSSEC server. The last installation is made to a server that collects information from hosts that use the agent installation. As most of the open source software tools the OSSEC has its own web page where developers from around the world can submit bugs or suggests for the further 12

19 development of the tool. In general, OSSEC is a scalable security tool that becomes better through time Bro This security tool is a Network Intrusion Detection System (NIDS) based on Unix. Bro uses the anomaly detection technique in order to detect possible threats. In other words, it compares network traffic with rules that characterize malicious events. It uses a very effective technique for packet filtering which makes it suitable for monitoring the traffic of a site over an internet connection. The hardware required for this job is similar with the hardware of a common personal computer. The Bro IDS monitors network traffic like the others NIDSs. Some of the features of the Bro NIDS are: the syntax of scripts is made with the use of its own language, the Bro Language. It does not require additional installations on every single computer host. In addition, the Bro language, which is considered to be a very rich language, provides the ability to this NIDS to have a very strong signature matching facility. It can also store information from previous activities and use them for the analysis of signatures. Another interesting feature of Bro is that it contains a snort2bro tool that can convert signatures of Snort into signatures suitable for Bro. The main drawback of this tool is that the actions made by Bro are made through the operating system of the protected system Suricata Suricata is one of the newest open source Intrusion Detection Systems and represents the next generation of security tools. Suricata can work as an IDS and IPS as well, it use the misuse detection technique for detection which generates alerts during events that are characterized as suspicious. The developers of Suricata wanted to create an IDS/IPS that will be used in combination with other security tools in order to create a more secure environment. For that reason Suricata is compatible with many others security tools and can also use calls from these tools for the detection of threats. Suricata is suitable for detecting multiple threats and due to its ability to perform fast analysis of data it can be used effectively for the traffic analysis of networks. This IDS/IPS has the unique ability to have keywords not only 13

20 for the common protocols (IP, TCP, UDP etc.) but also for HTTP, FTP or even SMB. It is clear that Suricata will provide the users with more detection abilities based on the application layer. Another usnique feature of the Suricata IDS/IPS is that it can save the information of traffic in a variable in order to use it for a match at a later time. The Suricata IDS was designed to be able to take advantage of the high process power of a system and easily implemented in any computer system. 2.7 Network Scanning The techniques that intruders use in order to attack a computers system are similar to those used by burglars. The burglars inspect every possible entrance of the house that they want to brake in before their attack. They collect information about all the doors of the house like where that door lead to, how difficult is to break in through that door and if that door triggers some kind of alarm. After that the burglar is ready to perform a successful attack and with the less possibilities of being caught. The same thing happens with the attacks performed by intruders that want to enter a computer system. They use specified tools for the collection of information that they will use later during their attack. This process is called network scanning and is usually by intruders that want to discover possible targets (active hosts of the network). The network scanning tools can give important information about the host like services that he uses, the active ports that those services use and information about the applications that run on the host s computer along with the operating system that is implemented. These information are gathered through four network scanning techniques, the network mapping, the port scanning the service and version detection and the operating system detection ( The network mapping is the first process during the attack because it discovers all the possible targets. The targets are hosts that reply to requests made by the intruder that performs a network scanning. Network mapping use ICMP, TCP and UDP protocols in order to create requests for the possible targets. The next step during the intrusion is the port and service scanning. After the port scanning the attacker will know which ports of the target s system are used and for 14

21 what reason. The same thing happens with the service scanning. There are three main techniques for the port and service scanning the connect scan, the half open scan and the stealth scan. During the connect scan the intruder generates a three way TCP handshake in order to establish a connection with the target. The half-open scan on the other hand waits only for the SYN/ACK of the target and then breaks the communication (also known as SYN scan). The stealth scan is more sophisticated methods like fragmentation, flag settings in order to perform an undetected scan. Some popular stealth scans are the SYN/ACK scan, the XMAS scan, the NULL and the FIN scan. The first scanning method can be easily stopped by firewalls or IDSs, the second one which performs uncompleted connections that are not being logged by the host s system can be detected only by systems that use IDS. The stealth scans are far more difficult to be detected, although most IDSs are designed to protect systems against these kinds of scans. The operation systems detection is a process where the intruder gathers information about the operating system of the host. It is also called fingerprinting and is performed by sending packets to the target that have different settings. In this dissertation the Nmap is used as a network scanning tool that will be used for the attack. The next paragraph describes the operation of Nmap along with its basical features Network scanning tools There are many scanning tools that can be used in order to provide information about networks or single hosts. In this dissertation the Nmap scanning tool is used which is described briefly in the next chapter. Bellow some other popular scanning tools are described that can also be used instead of Nmap Nemesis Nemesis is a packet crafting tool designed for UNIX and Windows Microsoft operating systems. It is used as an attack tool by network administrators who want to test the security mechanisms of their networks. Nemesis is a command-line utility 15

22 that can craft packets of the following protocols: DNS, ETHERNET, ARP, ICMP, IP, IGMP, OSPF, RIP, UDP, and TCP. The Nemesis has the ability to produce almost any kind of packet ( Nessus Nessus is a specialised tool that is used for vulnerability assessments over networks and was first presented in It is a ubiquitous scanner that works perfectly with any kind of networks. This vulnerability scanner is connected to a community of users large enough to provide updates when it is necessary (Rogers et al. 2008). 2.8 Practical Experience There are many publications about Intrusion Detection Systems since the early 80s where the first IDS was designed. The most recent of them present testing techniques and tools that can evaluate the performance of the IDS. The most common testing method is to generate attacks by using attack tools (usually packet craft tools). The results should be taken after various kinds of intrusions generated and several changes on the IDS s configuration in order to simulate a great range of attacks. In the An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems (2003) a basic method for testing an IDS is presented. The paper analyzes the results after the attack on several IDSs. For that reason the attacks are generated by a tool named Mucus which uses the signatures of Snort in order to create traffic that will force the IDSs to generate their alarms. The attack technique in this paper is to randomize the synthetic events of a modeled attack. The results show that most Intrusion Detection Systems fail to detect this kind of attacks (Mutz et al. 2003). In Testing Network-based Intrusion Detection Signatures Using Mutant Exploits another testing method for Intrusion Detection Systems is presented. This paper describes the attack generated by mutant users. These mutant users attack a single host that runs the IDS with several attack techniques. The results from the different kind of attacks are analyzed in order to evaluate the performance of the IDS (Vigna et al. 2004). 16

23 3. System Analysis and Configuration 3.1 Network Analysis This dissertation analyses and describes how Snort, a Network Intrusion Detection System, reacts during the attacks made by attackers that use network scanning tools (Nmap). A specified scenario is necessary in order to demonstrate the operation of Snort under these situations. For that reason in the next paragraphs the architecture of a network is described that will be used for the analysis of Snort reactions. As was mentioned in the previous chapter (Chapter 2) the Network Intrusion Detection Systems, in many cases, can analyse all the traffic that pass through the network s wires. They can also have custom settings that can make their operation more effective according to the characteristics of the network that they protect. The network that will be used in this dissertation is a small enterprise network and it is shown in Figure 3.1. The enterprise network has an ftp server and four hosts. All the clients can have access to the enterprise server and also have access to the internet. In addition the ftp server should be accessible only to the network s clients. Figure3.1. Enterprise Network Architecture 17

24 As it is shown in Figure3.1 the network consists of an enterprise router that is connected to the internet via a modem and between them there is a firewall that protects all the network elements of the enterprise. The router uses two gateways to connect the server and the hosts. The first gateway is dedicated to the server and the other one is dedicated to the clients. The server is the network element of the demilitarized zone (DMZ). The hosts are placed on the internal network which is part of the enterprise network. The purpose of this architecture is to separate the hosts from the two servers in order to provide additional security to the server s subnet. In addition this architecture enables Snort to analyze data traffic in a more efficient way with two sensors, each for every subnet. Since the two subnets have different types of data traffic, the configuration of the two sensors is not the same. An alternative implementation of Snort can be done with a single sensor placed behind the firewall, although a single sensor will affect the performance of the network. The process power of two sensors and their customized configuration outweighs the one sensor. The Figure 3.2 shows the location of the sensors inside the network. DMZ FTP server INTERNET MODEM Snort Sensor Firewall Snort Sensor INTERNAL NETWORK Switch Router Computer Computer Computer Computer Figure3.2. DMZ and Internal Network 18

25 3.2 Security Policy Before the implementation of any security tool it is important to address the security policy of the network. The security policy describes the rules for the behavior of every element of the network. The rules set constraints on the behavior of the users of the network and also control the access of the network from the outside world. The goals of the security policy are: Protect the clients and the services of the network from any kind of malicious attacks and abuse. Establish security mechanisms that will detect and prevent any of these malicious attacks. The enterprise network consists of four clients and one ftp server. All clients are connected to a switch which is connected to the enterprise router (client subnet). The server is also connected to a connected to the enterprise router. This subnet will be the DMZ of the network. The enterprise router is also connected to the internet. All the clients of the network must be able to access the internet. For the protection of the network a firewall and a Network Intrusion Detection System are used. The firewall is placed at the edge of the network and must provide security to both clients and servers of the network. The NIDS will use two sensors one for every subnet. The subnet of the DMZ is: /24 The subnet of the internal network is: / Firewall configuration The firewall must protect both clients and the server of the network. On the other hand it must use rules that will not affect the operation of the ftp server from the clients of the server. The network does not have servers that are reachable from the outside world, for that reason all the well known (0-1023) ports will be closed. There are although 19

26 many other ports above the 1023 that are open for the services used by the clients of the network. In addition, the firewall will must be able to block several web sites that the clients are not allowed to visit. These web sites are and As a result the firewall blocks all the traffic from these two servers by using their IP. The IP address of the miniclip web site is The facebook on the other hand has more than one IP addresses in order to share the traffic to different servers. The IP addresses which are used by the facebook web site are , , , and Router configuration The router enables traffic from the DMZ to the internal network and backwards. On the other hand it blocks any traffic from and to the internet for the ftp server. The clients of the internal network are able to connect to the internet. The name of the interface of the router which is connected to the internet is eth1. The eth2 and the eth3 are the interfaces of the DMZ and the internal network respectively. The configuration for the interface of the enterprise router for the DMZ is: # Accept tcp packets on destination port 21 (ftp) from internal network # The subnet of the internal network is /24 iptables -A INPUT -p tcp -s /24 --dport 21 -j ACCEPT # Block all the incoming packets from the interface eth1 iptables -I INPUT -i eth1 -s -j DROP The configuration for the interface of the enterprise router for the internal network is: # Accept traffic from both interfaces iptables -I INPUT -i eth1 -s -j ACCEPT iptables -I INPUT -i eth2 -s -j ACCEPT 3.5 Test-bed Environment In this dissertation the operation of Snort is presented under the attack by a network scanning tool. The network scanning tool that will be used is Nmap and it will perform various scans in order to test the detection abilities of Snort. 20

27 For that reason a safe test-bed environment is needed. In order to create a safe test bed environment for the test a virtual machine is installed on a computer that will contain two different hosts. The first host will operate the Nmap and the other one will operate the Snort. The software that will be used as the test bed environment is VMware workstation. The VMware workstation has the ability to run virtualised two or more operation systems at the same time. Figure 3.3 shows the user s interface of the VMware workstation. Figure3.3. Test-bed Environment (Vmware Workstation) The test-bed environment of this dissertation requires two individual hosts, for that reason two virtual machines are installed on the VMware workstation. The BackTrack 5 is installed on the first virtual machine because it is an operating system that contains the Nmap. On the other virtual machine the Microsoft s Windows XP is installed. The Snort will be then installed on the virtual machine that contains the 21

28 Windows XP operating system. In Figures 3.4 and 3.5 it is shown the VMware workstation after the installations of Windows XP and BackTrack 5 respectively. Figure3.4. Virtual Machine (Microsoft Windows XP) Figure3.5. Virtual Machine (Backtrack5) 22

29 The use of this test bed environment allows any kind of configuration on the operating systems of the two hosts without warring for any malefaction that may occur after the use of Nmap or Snort. The computer that will run the virtual machines will not be affected from any of the two virtual systems. 3.6 Snort Overview Snort is an Intrusion Detection System designed for network protection (NIDS) and can be used for packet sniffer and packet logger as well. It uses several techniques in order to monitor traffic, set security rules and generate alarms for every possible attack. The Snort has many add-on programs that can provide the user with many different features. It mainly works with the TCP/IP protocol but it can also work with other protocols that are used in networks. Martin Roesch (Marty), the developer of the Snort, wanted to create a security tool flexible and compatible with the majority of the operating systems. He also created a packet sniffer that can layout both hex and ASCII formats of the packets in a solid format. The Snort is a quite flexible tool but it has some system requirements for its implementation. These requirements depend on the size of the network that needs to be protected. The larger the network the more Snort sensors will be used for implementation of the Snort. The alerts generated by Snort can be thousands in a small time space. Disk space and process power are also some of the Snort s requirements in order to work properly. The alerts generated by Snort can be thousands in a small time space (Yang 2010). The disk space is used by Snort for the storage of its alerts; the process power along with the memory depends on the traffic of the network and the selected features that are being monitored. Snort inspects the packets that pass through its sensors and alerts the administrator of the system whenever it finds a malicious behaviour. In order to do that the Snort compares the data traffic with a set of behaviours that are specified as malicious. These specified behaviours can be customised by the rules that are selected by the administrator. The packet decoder is the first stop for the packets that arrive at the Snort s sensors. The decoder identifies the protocol used by the packet and it can also 23

30 trigger the alarm if the protocol is characterized as part of a malicious attack. The packet decoder can also generate the alarm for excessively long packets and errors on protocol s headers. The packet that passes through the packet decoder for parsing reaches the pre-processors. Snort may use more than one pre-processors, each preprocessor is a plug-in which helps the administrator s to inspect the incoming packets in a more detailed way. Without the pre-processors the Snort inspects each packet separately from the other packets. This means that the Snort will be unable to detect sophisticated attacks that use fragmentation techniques. The fragmentation techniques overwrite data in several packets that do not have the expected order. The pre-processors can help the Snort on the detection of these attacks. The final destination of the data is the detection engine where the rules set there by the administrator justify their legitimacy (Paxson 2004) Snort Configuration As was mentioned in the first chapter of this dissertation, no matter how many security mechanisms are installed on the network there will always be some weaknesses. For this reason the configuration of Snort must focus on these security weaknesses in order to eliminate the vulnerabilities of the protected system. The enterprise network that is tested uses two different snort sensors placed strategically inside the network. Their positions ease Snort along with the analysis of data due to the fact that they use different configurations since they analyze different kind of data. The first Snort sensor analyzes the data from and to the ftp server and the second one the data that travel from and to the internal network. The configuration of Snort has many option, is one of the privileges that its user have. There are nine basic steps for the customization of the configuration of Snort. Some of the changes that can be made are critical for the customization, although there are many parts of the configuration that remain the same in most occasions. Here are the nine steps for the configuration of Snort: 24

31 Setting up the network variables This step is used in order to set the variables of the network. In this step actually the Snort is introduced to the network. The only modification has to do with the address of the network that is protected. # Setup the address of the protected network var HOME NET any In the case of the sensor that protects the ftp server # Setup the address of the protected network var HOME NET /24 In the case of the sensor that protects the internal network # Setup the address of the protected network var HOME NET /24 There are many other modifications like the address of the external network, the addresses of any servers that may be installed on the network and even set the ports that are used for services. At the end of this step it is very important to set the path where the Snort rules are inside the system. # Setup the address of the protected network var HOME NET any # Setup the address of the external network var EXTERNAL NET any # Give the path of the folder where the rule files are # Snort is installed on a computer that uses the Microsoft Windows XP so the path needs to be absolute var RULE PATH c:\snort\rules var SO RULE PATH c:\snort\so_rules var PREPROC RULE PATH c:\snort\preproc_rules 25

32 Configuration of the decoder The first process that the packets pass through is the decoding made by the decoder of Snort. Here the underlying protocols of the packets are determined. The decoder saves these data and the same think happens with the location of the payload which is then processed by the preprocessors and the dynamic engine. The decoder generates alerts for anomalies that may occur on the header of the payload or for packets that have the wrong size according to the decoders configuration Configuration of the Base detection engine Here are the rules that are used by the snort in order to work as an NIDS. The detection engine receives the data from the packet decoder and the preprocessors and compares them with the rules from the snort.conf file. The default configuration of the detection engine will generate an alert when the first match is produced after the comparison between packets and rules. There is also the opportunity to generate more than one alert for a packet by enabling the multiple matching mode of Snort. This mode does not stop at the first match but compares the packets with all the available rules and then generates the alarms according to the matches that where caused (there will be no changes at this step, Snort will use the default settings) Configuration of the dynamic loaded libraries In this step the path of preprocessor libraries, preprocessor engine, dynamic rules libraries is defined Configuration of the preprocessors The preprocessors are very important for the well operation of Snort. They are used for reassembling the packets or decoding protocols. In other words they inspect data in order to find packets that their original form has been alternate. A common technique that is used by attackers that they want to hide their tracks is fragmentation. Attackers brake their packets into pieces so it is not detectable by the IDS. The preprocessors gather all the broken pieces together and reassemble the original packet. For the protection of the enterprise network all the preprocessors will be used for maximum security. For example without the use of the preprocessor 26

Intrusion Detections Systems

Intrusion Detections Systems Intrusion Detections Systems 2009-03-04 Secure Computer Systems Poia Samoudi Asli Davor Sutic Contents Intrusion Detections Systems... 1 Contents... 2 Abstract... 2 Introduction... 3 IDS importance...

More information

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,

More information

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of

More information

Intrusion Detection System (IDS)

Intrusion Detection System (IDS) Intrusion Detection System (IDS) Characteristics Systems User, Process predictable actions describing process under that actions what pattern subvert actions attack of correspond the systems processes

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics

More information

IDS / IPS. James E. Thiel S.W.A.T.

IDS / IPS. James E. Thiel S.W.A.T. IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods

More information

Taxonomy of Intrusion Detection System

Taxonomy of Intrusion Detection System Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

Introduction of Intrusion Detection Systems

Introduction of Intrusion Detection Systems Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) 1 of 8 3/25/2005 9:45 AM Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Intrusion Detection systems fall into two broad categories and a single new one. All categories

More information

Traffic Analyzer Based on Data Flow Patterns

Traffic Analyzer Based on Data Flow Patterns AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System

More information

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem

More information

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013 CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access

More information

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

IntruPro TM IPS. Inline Intrusion Prevention. White Paper IntruPro TM IPS Inline Intrusion Prevention White Paper White Paper Inline Intrusion Prevention Introduction Enterprises are increasingly looking at tools that detect network security breaches and alert

More information

Network Based Intrusion Detection Using Honey pot Deception

Network Based Intrusion Detection Using Honey pot Deception Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.

More information

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions

More information

A Review on Network Intrusion Detection System Using Open Source Snort

A Review on Network Intrusion Detection System Using Open Source Snort , pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India Sharmasakshi1009@gmail.com,

More information

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

CSCI 4250/6250 Fall 2015 Computer and Networks Security

CSCI 4250/6250 Fall 2015 Computer and Networks Security CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12 Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

Detection of illegal gateways in protected networks

Detection of illegal gateways in protected networks Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia firstname.lastname@ccdcoe.org 1. Introduction In this

More information

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

CYBER ATTACKS EXPLAINED: PACKET CRAFTING CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure

More information

Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware

Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware 1 Corresponding Author: lawal5@yahoo.com 1 O.B. Lawal Computer Science Department,

More information

Chapter 15. Firewalls, IDS and IPS

Chapter 15. Firewalls, IDS and IPS Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet

More information

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Firewall Design Principles

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Firewall Design Principles Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations

More information

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 59 CHAPETR 3 DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 3.1. INTRODUCTION The last decade has seen many prominent DDoS attack on high profile webservers. In order to provide an effective defense against

More information

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com Intrusion Detection & SNORT Fakrul Alam fakrul@bdhbu.com Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied promptly enough Antivirus signatures not up to date 0- days get through

More information

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they

More information

Network Defense Tools

Network Defense Tools Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds ravikantvanjara@gmail.com What is Firewall? A firewall

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security

More information

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance

More information

Snort Installation - Ubuntu FEUP. SSI - ProDEI-2010. Paulo Neto and Rui Chilro. December 7, 2010

Snort Installation - Ubuntu FEUP. SSI - ProDEI-2010. Paulo Neto and Rui Chilro. December 7, 2010 December 7, 2010 Work Proposal The purpose of this work is: Explain a basic IDS Architecture and Topology Explain a more advanced IDS solution Install SNORT on the FEUP Ubuntu distribution and test some

More information

Course Title: Penetration Testing: Security Analysis

Course Title: Penetration Testing: Security Analysis Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced

More information

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion

More information

Performance Evaluation of Intrusion Detection Systems

Performance Evaluation of Intrusion Detection Systems Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection

More information

Fuzzy Network Profiling for Intrusion Detection

Fuzzy Network Profiling for Intrusion Detection Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie A. Dickerson (julied@iastate.edu) Electrical and Computer Engineering Department Iowa State University

More information

Name. Description. Rationale

Name. Description. Rationale Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.

More information

SURVEY OF INTRUSION DETECTION SYSTEM

SURVEY OF INTRUSION DETECTION SYSTEM SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT

More information

Intrusion Detection for Mobile Ad Hoc Networks

Intrusion Detection for Mobile Ad Hoc Networks Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering tchen@engr.smu.edu http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems

More information

Network- vs. Host-based Intrusion Detection

Network- vs. Host-based Intrusion Detection Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477

More information

IDS : Intrusion Detection System the Survey of Information Security

IDS : Intrusion Detection System the Survey of Information Security IDS : Intrusion Detection System the Survey of Information Security Sheetal Thakare 1, Pankaj Ingle 2, Dr. B.B. Meshram 3 1,2 Computer Technology Department, VJTI, Matunga,Mumbai 3 Head Of Computer TechnologyDepartment,

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015) s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware

More information

From Network Security To Content Filtering

From Network Security To Content Filtering Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals

More information

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information

Development of a Network Intrusion Detection System

Development of a Network Intrusion Detection System Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/

More information

Firewalls and Intrusion Detection

Firewalls and Intrusion Detection Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall

More information

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science A Seminar report On Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org

More information

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Passive Logging. Intrusion Detection System (IDS): Software that automates this process Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion

More information

Firewalls, IDS and IPS

Firewalls, IDS and IPS Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not

More information

AN EFFICIENT INTRUSION DETECTION SYSTEM FOR NETWORKS WITH CENTRALIZED ROUTING

AN EFFICIENT INTRUSION DETECTION SYSTEM FOR NETWORKS WITH CENTRALIZED ROUTING AN EFFICIENT INTRUSION DETECTION SYSTEM FOR NETWORKS WITH CENTRALIZED ROUTING Paulo F. Andrade, Fernando Mira da Silva, Carlos Ribeiro Instituto Superior Técnico, Universidade Técnica de Lisboa, Lisboa,

More information

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann

More information

Network Security Management

Network Security Management Network Security Management TWNIC 2003 Objective Have an overview concept on network security management. Learn how to use NIDS and firewall technologies to secure our networks. 1 Outline Network Security

More information

Intrusion Detection in AlienVault

Intrusion Detection in AlienVault Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Advanced Computer Networks 2007 Reinhard Wallner reinhard.wallner@student.tugraz.at Outline Introduction Types of IDS How works an IDS Attacks to IDS Intrusion Prevention Systems

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005

Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005 Firewall Testing Cameron Kerr Telecommunications Programme University of Otago May 16, 2005 Abstract Writing a custom firewall is a complex task, and is something that requires a significant amount of

More information

Firewall implementation and testing

Firewall implementation and testing Firewall implementation and testing Patrik Ragnarsson, Niclas Gustafsson E-mail: ragpa737@student.liu.se, nicgu594@student.liu.se Supervisor: David Byers, davby@ida.liu.se Project Report for Information

More information

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

CS2107 Introduction to Information and System Security (Slid. (Slide set 8) Networks, the Internet Tool support CS2107 Introduction to Information and System Security (Slide set 8) National University of Singapore School of Computing July, 2015 CS2107 Introduction to Information

More information

THE ROLE OF IDS & ADS IN NETWORK SECURITY

THE ROLE OF IDS & ADS IN NETWORK SECURITY THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker

More information

Fuzzy Network Profiling for Intrusion Detection

Fuzzy Network Profiling for Intrusion Detection Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie A. Dickerson (julied@iastate.edu) Electrical and Computer Engineering Department Iowa State University

More information

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device Ch.9 Firewalls and Intrusion Prevention Systems Firewalls: effective means of protecting LANs Internet connectivity is essential for every organization and individuals introduces threats from the Internet

More information

Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory

Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory A Little Context! The Five Golden Principles of Security! Know your system! Principle

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Analyzing Intrusion Detection System Evasions Through Honeynets

Analyzing Intrusion Detection System Evasions Through Honeynets Analyzing Intrusion Detection System Evasions Through Honeynets J.S Bhatia 1, Rakesh Sehgal 2, Simardeep Kaur 3, Siddharth Popli 4 and Nishant Taneja 5 1 Centre for Development of Advanced Computing 2,

More information

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical

More information

A Protocol Based Packet Sniffer

A Protocol Based Packet Sniffer Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons

More information

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion

More information

Role of Anomaly IDS in Network

Role of Anomaly IDS in Network Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

Firewalls. Ahmad Almulhem March 10, 2012

Firewalls. Ahmad Almulhem March 10, 2012 Firewalls Ahmad Almulhem March 10, 2012 1 Outline Firewalls The Need for Firewalls Firewall Characteristics Types of Firewalls Firewall Basing Firewall Configurations Firewall Policies and Anomalies 2

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall

More information

B database Security - A Case Study

B database Security - A Case Study WHITE PAPER: ENTERPRISE SECURITY Strengthening Database Security White Paper: Enterprise Security Strengthening Database Security Contents Introduction........................................................................4

More information

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose

More information

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT Network Security s Access lists Ingress filtering s Egress filtering NAT 2 Drivers of Performance RequirementsTraffic Volume and Complexity of Static IP Packet Filter Corporate Network The Complexity of

More information

Network Forensics: Detection and Analysis of Stealth Port Scanning Attack

Network Forensics: Detection and Analysis of Stealth Port Scanning Attack International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 33 42 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Network

More information

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) ISCA Journal of Engineering Sciences ISCA J. Engineering Sci. Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) Abstract Tiwari Nitin, Solanki Rajdeep

More information

Intruders and viruses. 8: Network Security 8-1

Intruders and viruses. 8: Network Security 8-1 Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds

More information

Host Fingerprinting and Firewalking With hping

Host Fingerprinting and Firewalking With hping Host Fingerprinting and Firewalking With hping Naveed Afzal National University Of Computer and Emerging Sciences, Lahore, Pakistan Email: 1608@nu.edu.pk Naveedafzal gmail.com Abstract: The purpose

More information

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International. www.radware.

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International. www.radware. Radware s Smart IDS Management FireProof and Intrusion Detection Systems Deployment and ROI North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware

More information

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..

More information

Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware

Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware 1 Corresponding Author: lawal5@yahoo.com 1 O.B. Lawal Computer Science Department,

More information

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor -0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University

More information

Chapter 8 Security Pt 2

Chapter 8 Security Pt 2 Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

Detecting Threats in Network Security by Analyzing Network Packets using Wireshark

Detecting Threats in Network Security by Analyzing Network Packets using Wireshark 1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,

More information