The ORCHIDS Intrusion Detection Tool
|
|
|
- Dulcie Wheeler
- 10 years ago
- Views:
Transcription
1 The ORCHIDS Intrusion Detection Tool Julien Olivain Jean Goubault-Larrecq LSV/CNRS UMR 8643 & INRIA Futurs projet SECSI & ENS Cachan 61 avenue du président-wilson, F Cachan Cedex Phone: Fax: Abstract. ORCHIDS is an intrusion detection tool based on techniques for fast, on-line model-checking. Temporal formulae are taken from a temporal logic tailored to the description of intrusion signatures. They are checked against merged network and system event flows, which together form a linear Kripke structure. Introduction: Misuse Detection as Model-Checking. ORCHIDS is a new intrusion detection tool, capable of analyzing and correlating events over time, in real time. Its purpose is to detect, report, and take countermeasures against intruders. The core of the engine is originally based on the language and algorithm in the second part of the paper by Muriel Roger and Jean Goubault-Larrecq [6]. Since then, the algorithm evolved: new features (committed choices, synchronization variables), as well as extra abstract interpretation-based optimizations, and the correction of a slight bug in op.cit., appear in the unpublished report [1]. Additional features (cuts, the without operator) were described in the unpublished deliverable [2]. Finally, contrarily to the prototype mentioned in [6], ORCHIDS scales up to real-world, complex intrusion detection. The starting point of the ORCHIDS endeavor is that intrusion detection, and specifically misuse detection, whereby bad behavior (so-called attacks) is specified in some language and alerts are notified when bad behavior is detected, is essentially a modelchecking task. The Kripke model to be analyzed is an event flow (collected from various logs, and other system or network sources), and complex attack signatures are described in an application-specific temporal logic. Let us give an example of a modern attack [5]. Far from being a gedankenexperiment, this really works in practice and has already been used to penetrate some systems. We also insist that, as systems get more and more secure, we are faced with more and more complex attacks, and [5] is just one representative. The schema on the right displays what a modular kernel (e.g., Linux) does when a user program (here with pid ) calls an unimplemented functionality. Malicious program pid = 100 socket(af_security,...) (unimplemented system functionality) errno=enosys Kernel mode Not implemented Search for a matching kernel module Fail User mode pid=101 modprobe (kernel privileges) not found Partially supported by the RNTL Project DICO, the ACI jeunes chercheurs Sécurité informatique, protocoles crypto. et détection d intrusions and the ACI cryptologie Psi-Robuste.
2 3 The kernel will search for a kernel module that implements this functionality, calling the modprobe utility to search and install the desired module. If modprobe does not find any matching module, an error code is reported to the user program. Malicious program Kernel mode User mode Malicious program Kernel mode User mode pid = 100 socket(af_security,...) Not implemented socket(af_security,...) Not implemented (unimplemented system call) Search for a matching kernel module pid=101 (unimplemented system call) Search for a matching kernel module pid=101 modprobe 1 modprobe 1 Kernel updates rights pid 101 : root, root (kernel privileges) 2 ptrace(ptrace_attach, 101) Insert shellcode Kernel updates rights pid 101 : root, root (kernel privileges) 2 Shellcode runs with root privileges not found exec ("/bin/sh") errno=enosys Fail Attacker has root privileges. While this is how this is meant to work, some versions of Linux suffer from a race condition (above, left): while modprobe has all kernel privileges, the kernel updates the owner tables to make modprobe root-owned while modprobe has already started running. So there is a small amount of time where the malicious program has complete control over the kernel process modprobe: between timepoints 1 and 2. The malicious program takes this opportunity to attach the modprobe process through the standard Unix debugging API function ptrace, inserting a shellcode (malicious code) inside modprobe s code. When modprobe resumes execution, it will execute any code of the intruder s choosing, with full root privileges (above, right). Challenges in On-Line, Real-Time Model-Checking. Intrusion detection requires specific logics to describe attack signatures, and specific model-checking algorithms. Compared to standard misuse detection tools, a temporal logic allows one to describe behavior involving several events over time: standard misuse detection tools (e.g., anti-virus software or simple network intrusion detection systems) match a library of patterns against single events, and emit an alert once single so-called dangerous events occur. More and more attacks nowadays involving complex, correlated sequences of events, which are usually individually benign. In the ptrace attack, no individual event (calling an unimplemented system call, or ptrace, etc.) is dangerous per se. The signature language of ORCHIDS extends [6, Section 4]. Among other things, it allows one to write temporal formulas of the typical form, where is the strict there exists in the future operator. In general, more complex formulae can be written, using operators resembling Wolper s ETL [7] except going through a transition denotes either no time-passing at all ( -transitions), or (not as in ETL). Such formulae are described internally as automata; we just give a signature for the ptrace exploit as an illustration. (Some other attacks such as the do_brk exploit [3] require committed choices, or other features of ORCHIDS not described in [6]. To save space, we don t recount them here.) A formula matching the ptrace exploit is the following automaton, described in slightly idealized form: "!"! #%$'&)(+*,.-/, "5 6%$7( : ;7<=$=#=>">?(+*,.-@1 3 A%6!=B 6 C7<D(+*,.-E1 (1) 3 FDGH 6!%6 5"!I(+*, J 6! #%$'&)(+*,.-91 where K, L, M are existentially quantified first-order variables meant to match the attacker s pid, the target s pid (i.e., modprobe s pid), and the attacker s effective uid 2
3 respectively; where N?OPOIQSR TUVKXWYLW'M9 abbreviates a formula (not shown) matching any single event displaying a call to ZSOP[\QSR ] by process K owned by M, on process L, with the ATTACH command, ^?_I]IRSL` matches single events where /sbin/modprobe is ]D_S]IR ed with pid L, and the remaining formulas match single events where process K issues a call to ZSOP[\QSR ] on target L, with respective commands SYSCALL, GETREGS, POKETEXT (used to insert the shellcode), and DETACH. Compared to other more standard uses of model-checking, the logic of ORCHIDS is constrained to only specify eventuality properties. This is because the model-checker needs to to work on-line, that is, by always working on some finite (and expanding over time) prefix of an infinite sequence of events. Compared to standard model-checking algorithms, e.g., based on Büchi automata for LTL, the model-checker is not allowed to make multiple passes over the sequence of events (e.g., we cannot rebuild a product automaton each time a new event is added); in general, intrusion detection tasks are submitted to very stringent efficiency requirements, both in time and in space. Second, the logic of ORCHIDS includes some first-order features. As witnessed by the use of variables K, L, M in (1), this logic can be seen as an existential fragment of a first-order temporal logic. Finally, such a model-checker cannot just report the existence of matches, but must enumerate all matches among a given representative subset, with the corresponding values of the existential variables, build an alert for each match and possibly trigger countermeasures. This is the raison d être behind the a?]7op[s]db)civkxwyld formula in (1); if we only wanted a yes/no answer, this would just be redundant, and could be erased from the automaton; here, this is used to be able to report whether the attacker issued at least one call to ZIOP[IQSR ] (PTRACE_GETREGS) or not during the attack. The model-checking task for the logic of ORCHIDS is NP-hard (it includes that of [6, Section 4]), but can be done using an efficient, on-line and real-time algorithm [2, 1]. Moreover, this algorithm is optimal in the following sense: for every attack signature (formula ), if at least one attack (sequence of possibly non-contiguous events) is started at event e f that matches, then exactly one attack is reported amongst these, the one with the so-called shortest run. The latter is usually the most meaningful attack among all those that match. The notion of shortest run was refined in ORCHIDS, and now appears as a particular case of cuts [2]; this gives more control as to which unique attack we wish to isolate amongst those that match. Related Work. There are many other formalisms attempting to detect complex intrusion detection scenarios, using means as diverse as Petri nets, parsing schemata, continuous data streams, etc. Perhaps one of the most relevant is run-time monitoring (or cousins: F. Schneider s security automata and variants, and security code weaving), where the event flow is synchronized at run-time with a monitor automaton describing paths to bad states. The ORCHIDS approach is certainly close to the latter (although arrows in e.g., (1) are more complex than simple automaton transitions); shortest runs and cuts, which introduce priorities between paths in the monitor, and the fact that only one optimal path among equivalent paths is reported, is a useful refinement. Implementation. The ORCHIDS engine is implemented in C. At the core of ORCHIDS lies a fast virtual machine for a massively-forking virtual parallel machine, and a bytecode compiler from formulae (such as (1)) to this virtual machine. ORCHIDS uses a 3
4 hierarchy of input modules to subscribe to, and to parse incoming events, classified by input source and/or event format. A main event dispatcher reads from polled and realtime I/O, reads sequences of events in syslog format, snare, sunbsm, apache and other various formats, coming from log files or directly through dedicated network connections, and feeds the relevant events to the core engine. ORCHIDS is able to do both system-level and network-based intrusion detection, simultaneously. Here are a few figures of ORCHIDS on an instance of the ptrace attack: Time : Real time : 1267s CPU Time : s CPU usage : 29.27% Resources : Memory (peak) : MB Signalisation network load : 1.5 GB Analyzer : Loading and rule compilation : g 5 ms Processed events : h fyijlkm' To stress the detection engine, the attack was hidden in the middle of a huge amount of normal ptrace debugging events, generated by tracing the compilation of the whole GCC C Compiler (with the command line tar xzvf gcc tar.gz ; cd gcc ;./configure ; cd gcc ; strace -F -f make). Conclusion. The ZSO?[IQSR ] attack above is one of the typical attacks that ORCHIDS can detect. Experiments are going on at LSV to test ORCHIDS on actual network traffic and system event flows. From the point of view of security, a good news is that, contrarily to most misuse intrusion detection systems, ORCHIDS is able to detect intrusions that were not previously known (contrarily to popular belief on misuse IDSs). E.g., the signature we use for the do_brk attack [3], which tests whether some process managed to gain root privilege without calling any of the adequate system calls, detected the recent (Jan. 2005) Linux uselib attack. For more information, see the Web page [4]. References 1. J. Goubault-Larrecq. Un algorithme pour l analyse de logs. Research Report LSV-02-18, Lab. Specification and Verification, ENS de Cachan, Cachan, France, Nov pages. 2. J. Goubault-Larrecq, J.-P. Pouzol, S. Demri, L. Mé, and P. Carle. Langages de détection d attaques par signatures. Sous-projet 3, livrable 1 du projet RNTL DICO. Version 1, June pages. 3. A. Morton and P. Starzetz. Linux kernel do_brk function boundary condition vulnerability. Dec References CAN (CVE), BugTraq Id J. Olivain. ORCHIDS real-time event analysis and temporal correlation for intrusion detection in information systems W. Purczyński. Linux kernel privileged process hijacking vulnerability. securityfocus.com/bid/7112, Mar BugTraq Id M. Roger and J. Goubault-Larrecq. Log auditing through model checking. In Proc. 14th IEEE Computer Security Foundations Workshop (CSFW 01), Cape Breton, Nova Scotia, Canada, June 2001, pages IEEE Comp. Soc. Press, P. Wolper. Temporal logic can be more expressive. Information and Control, 56(1/2):72 99,
5 A Appendix A.1 Tool demonstration The demonstration will emphasize the most important aspects of the intrusion detection tool ORCHIDS. Our emphasis is to show that slightly deviant model-checking tasks can profitably be used for actual security applications, in real time, detecting real, sophisticated, and hard-to-detect attacks. Our aim in demonstrating ORCHIDS is not as a proof-of-concept for some modelchecking algorithm. The stress is not on algorithmic novelty (although ORCHIDS implements new things such as committed choices, or cuts, or the without operator), rather on the usability of an actual tool based on some ideas in model-checking. This is in particular why we submit this as a tool presentation. Because this is a tool presentation, we have chosen to stress its application domain, and the challenges it has to meet, rather than any fancy algorithmic feature that had better be presented in a regular paper. Of course, this does not mean that we won t describe any of the fancy new features of ORCHIDS if asked so, in particular compared to the proof-of-concept algorithm of [6]: committed choices, cuts, notably. We just feel that it is not the purpose of a tool presentation to stress these points. In addition to the points stressed in the tool paper itself, and in particular the challenges that have to be met for an on-line, real-time model-checker in such specific environments, we want to show: The large range of data sources and types: ORCHIDS can extract data and events from multiple distributed sources (kernel system calls, network firewall actions, web server, mail server, etc.) This wide variety of events enables ORCHIDS to correlate many events over time and over different event sources, a particularly welcome asset in a modern intrusion detection system. The demonstration shows the modularity of ORCHIDS; it currently recognizes 400 data fields from about 50 data sources. On-line analysis: ORCHIDS continuously receives events from sources, as soon as possible after their creation date (the delay depends of the communication method for reporting events, either local or remotely, through udp). The analysis has to be done in one pass, incrementally, over the event flow. The event flow, as seen by the analyzer, will be shown during the demonstration. Real-time detection and coutermeasure: ORCHIDS collects data, computes information, and executes actions at any given instant of the detection process. ORCHIDS is organized so as to react as quickly as possible to an attack, and must therefore announce that an attack has been detected as soon as the last characteristic event of the attack has been received. Additionally, ORCHIDS is able to generate intermediate reports, when only part of a temporal formula has been matched, i.e., when it is only likely that a given attack is currently being perpetrated. If the temporal formula eventually matches in whole, ORCHIDS will eventually confirm that the attack occurred, through a complementary report. Moreover, we shall demonstrate that ORCHIDS is able to take countermeasures against attackers by killing compromised processes, closing suspect user accounts, or blocking network connections by inserting new rules into a firewall. 5
6 These features will be demonstrated by running ORCHIDS itself, and by inspecting the formulae, the currently monitored instances of these formulae (the threads), the current event flow, through ORCHIDS administration interface (see Figure 1). It is to be noted, too, that the attacks we shall demonstrate are no toy examples. They are recent, sophisticated attacks, which have already been used in practice (by hackers), and whose detection is particularly challenging. The demonstration is done on a single laptop. Demonstrating a distributed intrusion detection system working on just one computer entails some specific difficulties or deviations from real behavior: The analyzer runs on the audited computer; so it will analyze its own event flow, as well as its sensors. Some precautions have to be taken to avoid the analyzer to loop, analyzing itself and therefore generating new events that have to be monitored,..., recursively. The real attacks we shall demonstrate are launched against the operating system kernel, which can then end up in an unstable state. We have been careful to craft our attacks so as to be perfect (from the attacker point of view), i.e., to steal the target resource without crashing the whole system. In actual deployments (and in our testbed at LSV), ORCHIDS would naturally be running on a remote machine with only in connections to receive event flows, so that crashing an audited system would not crash ORCHIDS. The activity of a single host is much less intense than that of an entire network. To simulate the event flow in a realistic network environment, we shall use the EvtGen tool (which we designed specifically to this end) to generate fake events, too, simulating normal behaviour with randomly interspersed errors or anomalies. The figure on the right shows how differents components interact on the demonstration computer. Real attacks Generic simulator Admin interface Event flow Sensors Orchids analyzer The complete presentation of the tool consists in launching a few attacks, once with ORCHIDS disabled to show that the attacks really work and allow us to gain illegitimate root access; and a second time to show that the same attacks will be detected and countered by ORCHIDS. We do not require any specific equipment other than a videoprojector; we shall use a laptop of our own, with all necessary tools installed. We illustrate just one attack here, corresponding to the one described in the paper. Figure 2 shows an intruder logging in through ssh on a machine (which will just be localhost in the demonstration), compiling a ptrace attack and getting root privileges. (As the # sign at the final prompt shows.) Note that the attack is particularly verbose, for pedagogical reasons, and explains every step it does: see the lines starting with [+]. (An actual attack would not be as verbose.) 6
7 Fig. 1. The ORCHIDS administration interface 7
8 Fig. 2. Running a ptrace attack without ORCHIDS Fig. 3. ORCHIDS counters the ptrace attack 8
9 When ORCHIDS is enabled, the same attack produces the response shown in Figure 3. The illegal connection is closed, and the account is closed (the intruder cannot log in again). The reason for the latter is that the attack actually succeeded, and there is a risk that the intruder managed to install a setuid bit shell, which would allow him to regain root privileges without even replaying an attack. Figure 4 shows excerpts from the detailed report that ORCHIDS produces. Look at the first event that matched the attack (top). This is the call to ptrace (see field 23, rawsnare.syscall) using the ATTACH command (see field 50, rawsnare.ptrace_req) by process 2987 (field 28, rawsnare.pid) with effective uid 501 (field 24, rawsnare.euid) on process 2988 (field 51, rawsnare.ptrace_pid). The last event matching the attack, namely, the DETACH event is event 6 in the report (not shown). Compared to the idealized formula (1), the formula contains additional transitions to track actions that follow the last characteristic event of the attack. Event 7 (not shown) in particular is a call from the (malicious) shellcode to chown, and event 8 (shown) is a call from the shellcode to chmod, indicating that the intruder managed to install the setuid bit on some (now root-owned) file before it got kicked out by ORCHIDS: the value of the protection bits (field 35, rawsnare.createmode) is decimal 3565, i.e. octal 6755, aka. -rwsr-sr-x in more readable Unix notation. This confirms our guess (above) that the intruder produced a setuid bit shell. A.2 Status ORCHIDS is currently in a prototype status. It is deployed experimentally in the network of the laboratory where it was designed and implemented (LSV), consisting of about 150 equipments (servers, workstations and routers). It supports common standards to make deployment easier (Unix syslog, sendmail, apache logs, snmp protocol, etc.) OR- CHIDS is designed so as to run as autonomously as possible. Naturally, it still requires a systems or security administrator. It has been deployed for local, real-conditions testing on the network of the lab since September, We do not want to publicize this yet, as this kind of announcement invariably attracts script kiddies. Since ORCHIDS is still a prototype, this would only augment the chances that our network be hacked into. A.3 Availability As of today, ORCHIDS is not available in source form. The single-laptop demonstration version is however available free of charge for academic use only, in binary form (compiled for Linux with glibc; current version is known to work on Linux , , and ), upon request to the authors. The attacks demonstrated are known to work on Linux , Red Hat release 7.3 (Valhalla). The ptrace attack will not work on higher versions. In general, the demonstrated versions will not work on up-to-date versions of Linux: we will not demonstrate attacks that have not been countered already. The mod_ssl attack (a network attack allowing an intruder to gain access to a remote computer, which we shall demonstrate as a preparation for launching a ptrace 9
10 ... Fig. 4. Report on the ptrace attack 10
11 attack; not described here for space reasons) requires the Apache Web server v (exactly), the mod_ssl Apache SSL extension (exact version again), and the cryptographic package openssl-0.9.6b-18 (again, exact version). We do not wish to distribute the attacks, whether in source or binary code, for obvious reasons. See the Web page for more information on ORCHIDS. 11
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/ Fall 2010 Sonja Buchegger [email protected] Lecture 13, Dec. 6, 2010 Auditing Security Audit an independent review and examination
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Passive Vulnerability Detection
Page 1 of 5 Passive Vulnerability Detection "Techniques to passively find network security vulnerabilities" Ron Gula [email protected] September 9, 1999 Copyright 1999 Network Security Wizards
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
Homeland Security Red Teaming
Homeland Security Red Teaming Directs intergovernmental coordination Specifies Red Teaming Viewing systems from the perspective of a potential adversary Target hardening Looking for weakness in existing
Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers
Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers Seyed Ali Mirheidari 1, Sajjad Arshad 2, Saeidreza Khoshkdahan 3, Rasool Jalili 4 1 Computer Engineering Department, Sharif
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
Chapter 15 Operating System Security
Operating Systems: Internals and Design Principles Chapter 15 Operating System Security Eighth Edition By William Stallings System Access Threats System access threats fall into two general categories:
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
Marlicia J. Pollard East Carolina University ICTN 4040 SECTION 602 Mrs. Boahn Dr. Lunsford
Intrusion Detection Marlicia J. Pollard East Carolina University ICTN 4040 SECTION 602 Mrs. Boahn Dr. Lunsford For this term paper I will be discussing the subject of Intrusion detection. I will be going
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01
How to build and use a Honeypot By Ralph Edward Sutton, Jr DTEC 6873 Section 01 Abstract Everybody has gotten hacked one way or another when dealing with computers. When I ran across the idea of a honeypot
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf, K. R. Kendall,
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Designing and Coding Secure Systems
Designing and Coding Secure Systems Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class covers secure coding and some design issues from a language neutral approach you can
Monitoring, Tracing, Debugging (Under Construction)
Monitoring, Tracing, Debugging (Under Construction) I was already tempted to drop this topic from my lecture on operating systems when I found Stephan Siemen's article "Top Speed" in Linux World 10/2003.
An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/
An Integrated CyberSecurity Approach for HEP Grids Workshop Report http://hpcrd.lbl.gov/hepcybersecurity/ 1. Introduction The CMS and ATLAS experiments at the Large Hadron Collider (LHC) being built at
The Comprehensive Guide to PCI Security Standards Compliance
The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
How To Protect Your Network From Attack From Outside From Inside And Outside
IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Building accurate intrusion detection systems. Diego Zamboni Global Security Analysis Lab IBM Zürich Research Laboratory
Building accurate intrusion detection systems Diego Zamboni Global Security Analysis Lab IBM Zürich Research Laboratory Outline Brief introduction to intrusion detection The MAFTIA project Accurate intrusion
CorreLog Alignment to PCI Security Standards Compliance
CorreLog Alignment to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
Firewall Builder Architecture Overview
Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002 Introduction Characteristics of intrusion detection systems Some sample intrusion detection systems Page 1 Page
Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.
Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Network & Agent Based Intrusion Detection Systems
Network & Agent Based Intrusion Detection Systems Hakan Albag TU Munich, Dep. of Computer Science Exchange Student Istanbul Tech. Uni., Dep. Of Comp. Engineering Abstract. The following document is focused
Cisco Application Networking Manager Version 2.0
Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
Web Application Security
Web Application Security Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http://www.cs.ucsb.edu/~rsg www.cs.ucsb.edu/~rsg/
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred
DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides
Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs
Security Engineering Part III Network Security Intruders, Malware, Firewalls, and IDSs Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection
Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection Martin Leucker Technische Universität München (joint work with Andreas Bauer, Christian Schallhart et. al) FLACOS
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Hackers: Detection and Prevention
Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik
Executable Integrity Verification
Executable Integrity Verification Abstract Background Determining if a given executable has been trojaned is a tedious task. It is beyond the capabilities of the average end user and even many network
Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs
Intrusion Detection Systems Oussama El-Rawas History and Concepts of IDSs Overview A brief description about the history of Intrusion Detection Systems An introduction to Intrusion Detection Systems including:
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
Threat Modelling for Web Application Deployment. Ivan Ristic [email protected] (Thinking Stone)
Threat Modelling for Web Application Deployment Ivan Ristic [email protected] (Thinking Stone) Talk Overview 1. Introducing Threat Modelling 2. Real-world Example 3. Questions Who Am I? Developer /
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
Where can I install GFI EventsManager on my network?
Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
Enabling NetFlow on Virtual Switches ESX Server 3.5
Technical Note Enabling NetFlow on Virtual Switches ESX Server 3.5 NetFlow is a general networking tool with multiple uses, including network monitoring and profiling, billing, intrusion detection and
B database Security - A Case Study
WHITE PAPER: ENTERPRISE SECURITY Strengthening Database Security White Paper: Enterprise Security Strengthening Database Security Contents Introduction........................................................................4
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
IDS : Intrusion Detection System the Survey of Information Security
IDS : Intrusion Detection System the Survey of Information Security Sheetal Thakare 1, Pankaj Ingle 2, Dr. B.B. Meshram 3 1,2 Computer Technology Department, VJTI, Matunga,Mumbai 3 Head Of Computer TechnologyDepartment,
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION
18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK
Algorithmic Software Verification
Algorithmic Software Verification (LTL Model Checking) Azadeh Farzan What is Verification Anyway? Proving (in a formal way) that program satisfies a specification written in a logical language. Formal
Security and privacy in public WLAN networks
Security and privacy in public WLAN networks Savio Lau [email protected] March 01, 2005 Roadmap Introduction of public WLAN networks Network security User privacy Experiments and analysis Conclusion March
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph 0925910 I MCA
INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph 0925910 I MCA OVERVIEW Introduction Overview The IDS Puzzle Current State of IDS Threats I have a good firewall, why do I need an IDS? Expectations
Learning More About Load Testing
Welcome to this introduction to application performance testing and the LoadRunner load testing solution. This document provides a short overview of LoadRunner s features, and includes the following sections:
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Yacov Y. Haimes and Barry M. Horowitz Zhenyu Guo, Eva Andrijcic, and Joshua Bogdanor Center
Traffic Analyzer Based on Data Flow Patterns
AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
Automated deployment of virtualization-based research models of distributed computer systems
Automated deployment of virtualization-based research models of distributed computer systems Andrey Zenzinov Mechanics and mathematics department, Moscow State University Institute of mechanics, Moscow
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
How To Use The Correlog With The Cpl Powerpoint Powerpoint Cpl.Org Powerpoint.Org (Powerpoint) Powerpoint (Powerplst) And Powerpoint 2 (Powerstation) (Powerpoints) (Operations
orrelog SQL Table Monitor Adapter Users Manual http://www.correlog.com mailto:[email protected] CorreLog, SQL Table Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part
Firewall Security: Policies, Testing and Performance Evaluation
Firewall Security: Policies, Testing and Performance Evaluation Michael R. Lyu and Lorrien K. Y. Lau Department of Computer Science and Engineering The Chinese University of Hong Kong, Shatin, HK [email protected],
Improved metrics collection and correlation for the CERN cloud storage test framework
Improved metrics collection and correlation for the CERN cloud storage test framework September 2013 Author: Carolina Lindqvist Supervisors: Maitane Zotes Seppo Heikkila CERN openlab Summer Student Report
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Computer Networks & Computer Security
Computer Networks & Computer Security Software Engineering 4C03 Project Report Hackers: Detection and Prevention Prof.: Dr. Kartik Krishnan Due Date: March 29 th, 2004 Modified: April 7 th, 2004 Std Name:
How To Secure Cloud Computing
Resilient Cloud Services By Hemayamini Kurra, Glynis Dsouza, Youssif Al Nasshif, Salim Hariri University of Arizona First Franco-American Workshop on Cybersecurity 18 th October, 2013 Presentation Outline
OpenWIPS-ng A modular and Open source WIPS. Thomas d Otreppe, Author of Aircrack-ng
OpenWIPS-ng A modular and Open source WIPS Thomas d Otreppe, Author of Aircrack-ng 1 Agenda What is OpenWIPS-ng? Origin Architecture Internal design Release plan Demo ~# whoami Author of Aircrack-ng and
www.obrela.com Swordfish
Swordfish Web Application Firewall Web Application Security as a Service Swordfish Web Application Security provides an innovative model to help businesses protect their brand and online information, incorporating
