Intrusion Detection Systems. (slides courtesy Prof. Stolfo)
|
|
|
- Lisa Charles
- 10 years ago
- Views:
Transcription
1 Intrusion Detection Systems (slides courtesy Prof. Stolfo)
2 Motivation We can't prevent all break-ins There will always be new holes, new attacks, and new attackers We need some way to cope
3 Defense in Depth More generically, most single defenses can fail We always need defense in depth multiple layers, of different designs and philosophies One such layer: Intrusion Detection Systems
4 IDS Help An IDS alerted us to the sophisticated attack described last time We now know the machine had been penetrated at least as long ago as May But when the attacker tried to do more, he or she was detected by an IDS
5 Just an Overview This is just a short overview of the subject For more details, take COMS E6185
6 Elements of Intrusion Detection Primary assumptions: System activities are observable Normal and intrusive activities have distinct evidence Components of intrusion detection systems: From an algorithmic perspective: Features - capture intrusion evidence from audit data Models - piece evidence together; infer attack From a system architecture perspective: Audit data processor, knowledge base, decision engine, alarm generation and responses
7 Host-Based IDSs Using OS auditing mechanisms E.G., BSM on Solaris: logs all direct or indirect events generated by a user strace for system calls made by a program Monitoring user activities E.G., Analyze shell commands Monitoring execution of system programs E.G., Analyze system calls made by sendmail
8 Basic Audit Modules (Hosts) Windows Registry sensor EventLog - Uses the windows Event Logging system to track entries into all three of the windows event logs: System, Security, Application Netstat - Uses the information from the program netstat to provide information about network usage on the machine Health - Runs the program health to give current information about the system (CPU usage, mem usage, swap usage) Ps - Uses information from the /proc virtual file system as a data source
9 System Call Traces [pid 1286] execve 11:33:27;[pid 1286] open 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] open 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] munmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] close 11:33:27;[pid 1286] open 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] munmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] close 11:33:27;[pid 1286] open 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] munmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] close 11:33:27;[pid 1286] open 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] close 11:33:27;[pid 1286] open 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] munmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] close 11:33:27;[pid 1286] open 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] munmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] close 11:33:27;[pid 1286] open 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] munmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] close 11:33:27;[pid 1286] open 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] munmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] close 11:33:27;[pid 1286] open 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] munmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] close 11:33:27;[pid 1286] open 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] munmap 11:33:27;[pid 1286] mmap 11:33:27;[pid 1286] close 11:33:27;[pid 1286] close 11:33:27;[pid 1286] munmap 11:33:27;[pid 1286] open 11:33:27;[pid 1286] ioctl 11:33:27;[pid 1286] close 11:33:27;[pid 1286] nice 11:33:27;[pid 1286] auditon 11:33:27;[pid 1286] open 11:33:27;[pid 1286] ioctl 11:33:27;[pid 1286] close 11:33:27;[pid 1286] open 11:33:27;[pid 1286] ioctl
10 Windows Registry Accesses Smmc.exe SOpenKey SHKLM\Software\Microsoft\Windows_NT\CurrentVersion\FontLink\SystemLink SNOTFOUND S0 NORMAL_ Smmc.exe SOpenKey SHKLM\Software\Microsoft\Windows_NT\CurrentVersion\FontLink\SystemLink SNOTFOUND S0 NORMAL_ SREGMON.EXE SOpenKey SHKLM\System\CurrentControlSet\Services\WinSock2\Parameters SSUCCESS SKey:_0xE12F4580 NORMAL_ SREGMON.EXE SQueryValue SHKLM\System\CurrentControlSet\Services\WinSock2\Parameters\WinSock_Regi stry_version SSUCCESS S"2.0" NORMAL_ SREGMON.EXE SQueryValue SHKLM\System\CurrentControlSet\Services\WinSock2\Parameters\WinSock_Regi stry_version SSUCCESS S"2.0" NORMAL_ SREGMON.EXE SOpenKey SHKLM\System\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Cat alog9 SSUCCESS SKey:_0xE1F07580 NORMAL_ SREGMON.EXE SQueryValue SHKLM\System\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Cat alog9\serial_access_num SSUCCESS S0x4 NORMAL_
11 Network IDSs Deploying sensors at strategic locations E.G., Packet sniffing via tcpdump at routers Inspecting network traffic Watch for violations of protocols and unusual connection patterns Monitoring user activities Look into the data portions of the packets for malicious command sequences May be easily defeated by encryption Data portions and some header information can be encrypted Other problems
12 Network Connections 0,tcp,http,SF,181,5450,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,8,8,0.00,0.00,0.00,0.00, 1.00,0.00,0.00,9,9,1.00,0.00,0.11,0.00,0.00,0.00,0.00,0.00,normal. 0,tcp,http,SF,239,486,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,8,8,0.00,0.00,0.00,0.00,1.00,0.00,0.00,19,19,1.00,0.00,0.05,0.00,0.00,0.00,0.00,0.00,normal. 0,tcp,http,SF,235,1337,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,8,8,0.00,0.00,0.00,0.00, 1.00,0.00,0.00,29,29,1.00,0.00,0.03,0.00,0.00,0.00,0.00,0.00,normal. 0,tcp,http,SF,219,1337,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,6,6,0.00,0.00,0.00,0.00, 1.00,0.00,0.00,39,39,1.00,0.00,0.03,0.00,0.00,0.00,0.00,0.00,normal. 0,tcp,http,SF,217,2032,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,6,6,0.00,0.00,0.00,0.00, 1.00,0.00,0.00,49,49,1.00,0.00,0.02,0.00,0.00,0.00,0.00,0.00,normal. 0,tcp,http,SF,217,2032,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,6,6,0.00,0.00,0.00,0.00, 1.00,0.00,0.00,59,59,1.00,0.00,0.02,0.00,0.00,0.00,0.00,0.00,normal. 0,tcp,http,SF,212,1940,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,1,2,0.00,0.00,0.00,0.00, 1.00,0.00,1.00,1,69,1.00,0.00,1.00,0.04,0.00,0.00,0.00,0.00,normal. 0,tcp,http,SF,159,4087,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,5,5,0.00,0.00,0.00,0.00, 1.00,0.00,0.00,11,79,1.00,0.00,0.09,0.04,0.00,0.00,0.00,0.00,normal. 0,tcp,http,SF,210,151,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,8,8,0.00,0.00,0.00,0.00,1.00,0.00,0.00,8,89,1.00,0.00,0.12,0.04,0.00,0.00,0.00,0.00,normal. 0,tcp,http,SF,212,786,0,0,0,1,0,1,0,0,0,0,0,0,0,0,0,0,8,8,0.00,0.00,0.00,0.00,1.00,0.00,0.00,8,99,1.00,0.00,0.12,0.05,0.00,0.00,0.00,0.00,attack. 0,tcp,http,SF,210,624,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,18,18,0.00,0.00,0.00,0.00,1.00,0.00,0.00,18,109,1.00,0.00,0.06,0.05,0.00,0.00,0.00,0.00,normal.
13 Architecture of Network IDS Policy script Alerts/notifications Policy Script Interpreter Event control Event stream Event Engine tcpdump filters Filtered packet stream libpcap Packet stream Network
14 Firewall Versus Network IDS Firewall Active filtering Fail-close Network IDS Passive monitoring Fail-open IDS FW
15 Requirements of Network IDS High-speed, large volume monitoring No packet filter drops Real-time notification Mechanism separate from policy Extensible Broad detection coverage Economy in resource usage Resilience to stress Resilience to attacks upon the IDS itself!
16 Eluding Network IDS What the IDS sees may not be what the end system gets. Insertion and evasion attacks. IDS needs to perform full reassembly of packets. But there are still ambiguities in protocols and operating systems: E.G. TTL, fragments. Need to normalize the packets.
17 Insertion Attack End-System sees: IDS sees: A T X T A C A T T A C K K Attacker s data stream T X T C A A K Examples: bad checksum, TTL.
18 Evasion Attack End-System sees: A T T A C K IDS sees: A T T C K Attacker s data stream T T C A A K Example: fragmentation overlap
19 DoS Attacks on Network IDS Resource exhaustion CPU resources Memory Network bandwidth Abusing reactive IDS False positives Nuisance attacks or error packets/connections
20 Taxonomy of IDS s
21 Intrusion Detection Approaches Modeling Features: evidences extracted from audit data Analysis approach: piecing the evidences together Misuse detection (a.k.a. signature-based) Anomaly detection (a.k.a. statistical-based) Deployment: Network-based or Host-based Development and maintenance Hand-coding of expert knowledge Learning based on audit data
22 Components of Intrusion Detection System system activities are observable Audit Data Preprocessor Audit Records Activity Data Detection Models Decision Table Detection Engine Alarms Decision Engine normal and intrusive activities have distinct evidence Action/Report
23 A Generic IDS Information provided by a system concerning its inner workings and behavior System Vulnerability Analysis Portscanning, etc. Detector: Eliminates unneeded information from the audit trail. Countermeasure: Takes corrective action to either prevent the actions from being executed or changing the state of the system back to a secure state.
24 Characteristics of IDS Detection method: The characteristics of the analyzer. Behavior on detection: the response of the IDS to attack. Audit source location: The kind of input information that IDS analyzes. Detection paradigm: Detection mechanism. Usage frequency: Real-time or offline.
25 Detection Paradigm State-based versus transition-based IDS State-based: Identifies intrusions on the states Transition-based: Watches events that trigger transition from one state to another Non-perturbing versus pro-active analysis of state or transition Non-perturbing: Consists of the vulnerability assessment side Pro-active: Analysis by explicitly triggering events
26 IDS: Time aspect Real-time IDS Analyzes the data while the sessions are in progress Raises an alarm immediately when the attack is detected Off-line IDS Analyzes the data after the information has been already collected Useful for understanding the attackers behavior
27 Misuse Detection pattern matching Intrusion Patterns intrusion activities Example: if (src_ip == dst_ip) then land attack Can t detect new attacks
28 Misuse Detection The system is equipped with a number of attack descriptions ( signature ). Then matched against the audit data to detect attacks. Pro: less false positives (But there still some!) Con: cannot detect novel attacks, need to update the signatures often. Approaches: pattern matching, security rule specification.
29 Knowledge-based IDS Good accuracy, bad completeness Drawback: need regular update of knowledge Difficulty of gathering the information Maintenance of the knowledge is a time-consuming task Knowledge-based IDS Expert systems Signature analysis Petri nets State-transition analysis
30 Specification-based Detection Manually develop specifications that capture legitimate (not only previous seen) system behavior. Any deviation from it is an attack Pro: can avoid false-positive since the specification can capture all legitimate behavior. Con: hard to develop a complete and detailed specification, and error-prone. Approach: state machine, extended finite state automata (EFSA) Augment FSA with state variables Make transition on event that may have arguments
31 Example of specification-based IDS A gateway s behavior at IP layer State variables: src, dst. Event: pkt(ext_ifc, p), timeout. ext_ifc is the network interface on which packet received, and p is the packet content
32 Today s IT Security Tools We make lists of bad behavior Virus definitions SPAM filters and blacklists IDS signatures Policies We distribute the lists to applications and detection systems They flag behavior that fits the pattern The system is about to collapse Delays Administrative Overhead False positives
33 Behavior-based IDS Good completeness, bad accuracy Detect intrusion by observing a deviation from the normal or expected behavior of the system or the users Can detect attempts to exploit new and unforeseen vulnerabilities Behavior-based IDS Statistics Expert systems Neural networks User intention identification Computer immunology
34 Anomaly Detection Build models of normal behavior of a system using machine learning or data mining. Any large deviation from the model is thought as anomaly. Pro: can detect previous unseen attacks Con: have higher false positives, and hard to train a system for a very dynamic environment. Approaches: statistical methods, clustering, outlier detection, SVM
35 Anomaly Detection activity measures CPU Process Size probable intrusion normal profile abnormal Relatively high false positive rate - anomalies can just be new normal activities.
36 Data Mining System Perspective Internet User activity Host activity LAN/NOC/Peering Center activity Real-time attack recognition Audit data Knowledge Base of Signatures Analyst System activity Step 4A: Integrate new model with existing IDS Model Evaluation Predictive Detection Model Alert on known attacks Alert on new attacks Step 5: Detect new attacks with enhanced IDS Online Step 1: Log system behavior in data warehouse Data Warehouse Step 2: Mine data offline Step 3: Produce predictive detection model. Data Mining Step 4B: Produce new signature models. Offline
37 Anomaly Detection Model Generative / Discriminative Algorithm Supervised / unsupervised Compute online? Data source / feature selection Depends on expert knowledge now Cost Computation cost Feature audit and construction cost Damage cost Goal: detect attacks accurately and promptly
38 Data sources Single packet src and dst ip, port (most commonly used) All packet header fields (PHAD) A sequence of packets Follow the automaton for the protocols (specification- based) Reconstructed connections Connection status, frequency (commonly used) Application data Character distribution, keywords, etc. (ALAD, www ids) Traffic flows Volume / velocity. (signal analysis, k-ary sketch, PCAP)
39 Supervised Learning Statistical tests Build distribution model for normal behavior, then detect low probability events Outlier detection K-Nearest neighbor, Mahalanobis distance, LOF Self-Organizing Map (SOM) [Ramadas [ 03] Nonstationary model - PHAD/ALAD [Mahoney [ 02] Probability AD (PAD) [Stolfo, [ Eskin 04] SVM / OCSVM
40 Unsupervised Learning Outlier detection Clustering SmartSifter [Yamanishi [ 00] Online learning Histogram + Finite mixtures Wavelet analysis for change detection [Barford [ 02] OCSVM Most of them cannot used for real-time detection
41 Examples of IDS Misuse detection SNORT: : signature based commercial IDS STAT: : real time IDS using state transition analysis, attack scenarios specified by STATL. (Higher level signature, abstract from raw packet) [Vigna 03] Bro: : real time, events driven, security policy written in a specialized script language. [Paxson 99] Anomaly detection MADAM ID : use RIPPER ADAM: mining association rule + Bayes classifier Specification-based detection [Sekar[ 02]
42 Hybrid NIDS and HIDS Network Packets tcpdump Operating System Events BSM
43 Host-based Information Sources Must be real-time System sources Commands of Operating Systems don t offer a structural way of collecting and storing the audit information Accounting: Shared resources Untrustworthy for security purposes Syslog C2 security audit Reliable Trusted Computing Base (TCB)
44 Network-based information sources Simple Network Management Protocol (SNMP) Management Information Base (MIB) A repository of information Network packets Detection of network-specific attacks Can analyze the payload of the packet Router NetFlow records Can speed up and create log
45 Evaluation of IDS Accuracy Detection rate & false alarm Performance Completeness To predict new attacks Fault tolerance Timeliness
46 Key Performance Metrics Algorithm Alarm: A; Intrusion: I Detection (true alarm) rate: P(A I) False negative rate P( A I) False alarm rate: P(A I) True negative rate P( A I) Bayesian detection rate: P(I A) Architecture Scalable Resilient to attacks
47 Bayesian Detection Rate P( I) P( A I) P( I A) = P( I) P( A I) + P( I) P( A Base-rate fallacy Even if false alarm rate P(A I) ) is very low, Bayesian detection rate P(I A) ) is still low if base-rate P(I) ) is low E.g. if P(A I) ) = 1, P(A I) ) = 10-5, P(I) ) = , P(I A) = 66% Implications to IDS Design algorithms to reduce false alarm rate Deploy IDS to appropriate point/layer with sufficiently high base rate I)
48 Problems with (Commercial) IDS Cost of update and keeping current is growing Organizations lack internal expertise MSSP industry also suffering IDS systems suffer from False Negative Problem New augmented IDS with Anomaly Detectors are appearing in the commercial market Initial focus on protocols IDS are inherently noisy and chatty and suffer from the False Positive problem Volumes of alerts are crushing Honing in on most serious threats is hard NIDS positioned at the perimeter The most serious/predominant threat is the insider Host and LAN-based IDS now more crucial
49 What new solutions are needed for these problems? Maintenance problem Automatic Update Limited coverage problem False Negative/Zero Day Data Reduction problem Human can t be in the loop Insider problem Look inward, not only outward
50 Next Generation Detection Systems Behavior-based (like credit card fraud): Automated analysis Learn site specific characteristics (e.g., outbound traffic) and prioritize attacks per cost modeling Reduce time to update and deploy Increase analyst/security staff productivity Discover New Attacks Offload and load balance detection tasks among separate specialized modules Correlation among distributed sites provides new opportunities for Real-time global detection (early warning) Detecting attackers (deterrent)
51 The Reusability Issue Intrusion Detection exchange format Working Group (IDWG): Address the problem of communication between IDS and external components. Common Intrusion-Detection Framework (CIDF): Coordinate different IDS projects.
52 BEHAVIOR-BASED COMPUTER SECURITY Paradigm Shift IN IDS Signature-Based Human Expertise Generic Fragmented Attacks Defense Strategy Data Analysis System Architecture Coverage Detection Behavior-Based Machine Expertise Specific Distributed Cooperative Attacker
53 Collaborative Network Architecture Peering Center/ Gateways Peering Center/ Gateways Peering Center/ Gateways Peer Ctr Installation Peer Ctr Installation Peer Ctr Installation Enclave Installation Command Installation Enclave Installation Command Installation Enclave/ Local Network Host Enclave/ Local Network Enclave/ Local Network Provide information assurance through real-time sharing technology in a distributed, scalable and coordinated environment
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Intrusion Detection Systems
Intrusion Detection Systems Advanced Computer Networks 2007 Reinhard Wallner [email protected] Outline Introduction Types of IDS How works an IDS Attacks to IDS Intrusion Prevention Systems
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
How To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
Network Intrusion Detection Systems. Beyond packet filtering
Network Intrusion Detection Systems Beyond packet filtering Goal of NIDS Detect attacks as they happen: Real-time monitoring of networks Provide information about attacks that have succeeded: Forensic
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science
A Seminar report On Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org
Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila
Data Mining For Intrusion Detection Systems Monique Wooten Professor Robila December 15, 2008 Wooten 2 ABSTRACT The paper discusses the use of data mining techniques applied to intrusion detection systems.
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Intrusion Detection System (IDS)
Intrusion Detection System (IDS) Characteristics Systems User, Process predictable actions describing process under that actions what pattern subvert actions attack of correspond the systems processes
IntruPro TM IPS. Inline Intrusion Prevention. White Paper
IntruPro TM IPS Inline Intrusion Prevention White Paper White Paper Inline Intrusion Prevention Introduction Enterprises are increasingly looking at tools that detect network security breaches and alert
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing
An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing Partha Ghosh, Ria Ghosh, Ruma Dutta Abstract: The massive jumps in technology led to the expansion of Cloud Computing
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic
Network Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
Intrusion Detection Systems
Intrusion Detection Systems Intrusion Detection Systems Intrusion Detection Systems: Overview IDS Acronyms & Definition Components Recognition & Response Security Interoperability & Cooperation HIDS NIDS
IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow
IDS 4.0 Roadshow Module 1- IDS Technology Overview Agenda Network Security Network Security Policy Management Protocols The Security Wheel IDS Terminology IDS Technology HIDS and NIDS IDS Communication
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?
Contents Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Motivation and basics (Why and what?) IDS types and principles Key Data Problems with
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph 0925910 I MCA
INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph 0925910 I MCA OVERVIEW Introduction Overview The IDS Puzzle Current State of IDS Threats I have a good firewall, why do I need an IDS? Expectations
Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
1 of 8 3/25/2005 9:45 AM Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Intrusion Detection systems fall into two broad categories and a single new one. All categories
Web Application Security
Web Application Security Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http://www.cs.ucsb.edu/~rsg www.cs.ucsb.edu/~rsg/
Traffic Monitoring : Experience
Traffic Monitoring : Experience Objectives Lebah Net To understand who and/or what the threats are To understand attacker operation Originating Host Motives (purpose of access) Tools and Techniques Who
The Base Rate Fallacy and its Implications for the Difficulty of Intrusion Detection
The Base Rate Fallacy and its Implications for the Difficulty of Intrusion Detection Stefan Axelsson Presented by Kiran Kashalkar Agenda 1. 1. General Overview of of IDS 2. 2. Bayes Theorem and Base-Rate
Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Intrusion Detection for Grid and Cloud Computing
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal University of Santa Catarina, Brazil Content Type
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion
Passive Logging. Intrusion Detection System (IDS): Software that automates this process
Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion
White Paper. What Auditors Want Database Auditing. 5 Key Questions Auditors Ask During a Database Compliance Audit
5 Key Questions Auditors Ask During a Database Compliance Audit White Paper Regulatory legislation is increasingly driving the expansion of formal enterprise audit processes to include information technology
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
Security Intrusion & Detection. Intrusion Detection Systems (IDSs)
Security Intrusion & Detection Security Intrusion One or combination of security events in which an intruder gains (or attempts) to gain access to a system without having authorization to do so Intrusion
Building accurate intrusion detection systems. Diego Zamboni Global Security Analysis Lab IBM Zürich Research Laboratory
Building accurate intrusion detection systems Diego Zamboni Global Security Analysis Lab IBM Zürich Research Laboratory Outline Brief introduction to intrusion detection The MAFTIA project Accurate intrusion
Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.
Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA
Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline
IDS : Intrusion Detection System the Survey of Information Security
IDS : Intrusion Detection System the Survey of Information Security Sheetal Thakare 1, Pankaj Ingle 2, Dr. B.B. Meshram 3 1,2 Computer Technology Department, VJTI, Matunga,Mumbai 3 Head Of Computer TechnologyDepartment,
EVADING IDSS AND FIREWALLS AS FUNDAMENTAL SOURCES OF INFORMATION IN SIEMS
Evading IDSs and Firewalls as Fundamental Sources of Information in SIEMs 1 Chapter 7 EVADING IDSS AND FIREWALLS AS FUNDAMENTAL SOURCES OF INFORMATION IN SIEMS Sergio Pastrana, José Montero-Castillo, Agustín
Observation and Findings
Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network
A Proposed Architecture of Intrusion Detection Systems for Internet Banking
A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India [email protected]
CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM
59 CHAPETR 3 DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 3.1. INTRODUCTION The last decade has seen many prominent DDoS attack on high profile webservers. In order to provide an effective defense against
CSC574 - Computer and Network Security Module: Intrusion Detection
CSC574 - Computer and Network Security Module: Intrusion Detection Prof. William Enck Spring 2013 1 Intrusion An authorized action... that exploits a vulnerability... that causes a compromise... and thus
Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Part I: Attack Prevention Network Security Chapter 9 Attack prevention, detection and response Part Part I:
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
Intrusion Detection Systems with Correlation Capabilities
Intrusion Detection Systems with Correlation Capabilities Daniel Johansson [email protected] Pär Andersson [email protected] Abstract Alert correlation in network intrusion detection systems
How To Manage Sourcefire From A Command Console
Sourcefire TM Sourcefire Capabilities Store up to 100,000,000 security & host events, including packet data Centralized policy & sensor management Centralized audit logging of configuration & security
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory
Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory A Little Context! The Five Golden Principles of Security! Know your system! Principle
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC
Intrusion Detection and Intrusion Prevention Ed Sale VP of Security Pivot Group, LLC Presentation Goals Describe IDS and IPS Why They Are Important Deployment and Use Major Players The IT Security Camera
Intruders and viruses. 8: Network Security 8-1
Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Intrusion Detection from Simple to Cloud
Intrusion Detection from Simple to Cloud ICTN 6865 601 December 7, 2015 Abstract Intrusion detection was used to detect security vulnerabilities for a long time. The methods used in intrusion detection
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs
Intrusion Detection Systems Oussama El-Rawas History and Concepts of IDSs Overview A brief description about the history of Intrusion Detection Systems An introduction to Intrusion Detection Systems including:
AN EFFICIENT INTRUSION DETECTION SYSTEM FOR NETWORKS WITH CENTRALIZED ROUTING
AN EFFICIENT INTRUSION DETECTION SYSTEM FOR NETWORKS WITH CENTRALIZED ROUTING Paulo F. Andrade, Fernando Mira da Silva, Carlos Ribeiro Instituto Superior Técnico, Universidade Técnica de Lisboa, Lisboa,
Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.
Cyber Security. Environment, Solutions and Case study. Special Telecommunications Service David Gabriel, Buciu Adrian Contact: [email protected] [email protected] Environment Network/services can be damaged
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
Intrusion Detection Systems
Intrusion Detection Systems Sokratis K. Katsikas Dept. of Digital Systems University of Piraeus [email protected] Agenda Overview of IDS Intrusion prevention using game theory Reducing false positives Clustering
Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International. www.radware.
Radware s Smart IDS Management FireProof and Intrusion Detection Systems Deployment and ROI North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
How To Design An Intrusion Prevention System
INTRUSION PREVENTION SYSTEMS (IPS): NEXT GENERATION FIREWALLS A Spire Research Report March 2004 By Pete Lindstrom, Research Director SP i RE security Spire Security, LLC P.O. Box 152 Malvern, PA 19355
