A Proposed Architecture of Intrusion Detection Systems for Internet Banking



Similar documents
Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Taxonomy of Intrusion Detection System

Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

Intrusion Detection Systems

INTRUSION DETECTION SYSTEMS and Network Security

Network Based Intrusion Detection Using Honey pot Deception

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Performance Evaluation of Intrusion Detection Systems

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

How To Protect A Network From Attack From A Hacker (Hbss)

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

IDS : Intrusion Detection System the Survey of Information Security

IDS / IPS. James E. Thiel S.W.A.T.

Intruders and viruses. 8: Network Security 8-1

Common Cyber Threats. Common cyber threats include:

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Role of Anomaly IDS in Network

Science Park Research Journal

Intrusion Detection for Mobile Ad Hoc Networks

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Name. Description. Rationale

Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques

An Inspection on Intrusion Detection and Prevention Mechanisms

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Computer Networks & Computer Security

Don t Fall Victim to Cybercrime:

How To Protect Your Network From Attack From A Hacker On A University Server

Top tips for improved network security

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Intrusion Detection Systems

Network- vs. Host-based Intrusion Detection

WEB ATTACKS AND COUNTERMEASURES

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Remote Deposit Quick Start Guide

IPS Attack Protection Configuration Example

An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications

Introduction of Intrusion Detection Systems

Guideline on Auditing and Log Management

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Intrusion Detection System (IDS)

End-user Security Analytics Strengthens Protection with ArcSight

GFI White Paper PCI-DSS compliance and GFI Software products

Hackers: Detection and Prevention

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

USM IT Security Council Guide for Security Event Logging. Version 1.1

A Review on Network Intrusion Detection System Using Open Source Snort

Introducing IBM s Advanced Threat Protection Platform

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Defending Against Data Beaches: Internal Controls for Cybersecurity

Cisco IPS Tuning Overview

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Transaction Anomaly Protection Stopping Malware At The Door. White Paper

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION

Network Intrusion Detection System for Denial of Service Attack based on Misuse Detection

How To Manage Security On A Networked Computer System

AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN Siskiyou Boulevard Ashland OR 97520

FORBIDDEN - Ethical Hacking Workshop Duration

Incident Response Plan for PCI-DSS Compliance

IDS and Penetration Testing Lab ISA 674

Intrusion Detections Systems

Data Management Policies. Sage ERP Online

Fuzzy Network Profiling for Intrusion Detection

OIG Fraud Alert Phishing

Architecture Overview

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Data Security Incident Response Plan. [Insert Organization Name]

KEY STEPS FOLLOWING A DATA BREACH

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

The Key to Secure Online Financial Transactions

Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware

PROFESSIONAL SECURITY SYSTEMS

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Protecting your business from fraud

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Data Management & Protection: Common Definitions

Intrusion Detection from Simple to Cloud

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Transcription:

A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India Mehra_priti@yahoo.com Internet usage has increased exponentially and has managed to cover all geographical areas across the world. Business-to-business (B2B), business-to-consumer (B2C), Internet-based e- commerce transactions, and Internet banking have come of age and are facing serious threats of attack, penetration or intrusion, despite the best available firewalls. Efficient and modern security tools are required to prevent information and financial loss during internet banking and e-commerce transactions. One such tool that provides protective mechanism during internet based e-commerce transactions and banking is Intrusion Detection System. This paper discusses the types of attacks and how Intrusion Detection Systems can detect and prevent those attacks and intrusions during internet banking and other e-commerce based transactions. Further this paper proposes architecture of intrusion detection system in banks for secure internet banking. Index Terms: Anomaly detection, Intrusion, Intrusion detection system, MitM, MitB, misuse detection, Passive IDS, Phishing, Pharming, Reactive IDS I. INTRODUCTION With the rapid growth of Internet, computer attacks and intrusions are increasing and can cause financial loss to an organization or an individual. Detection of intrusions and attacks is an important issue during internet banking and e-commerce transactions. Intrusion Detection Systems have been proposed as an efficient solution to protect computers against intrusions and attacks. IDS deployed for internet banking in banks use techniques such as statistical analysis, fuzzy logic, ANN etc. II. TYPES OF ATTACKS An attack can be defined as an intended or planned visit to the system by an uninvited visitor who sneaks and spoils or defaces the system or web site. Several types of electronic fraud specifically target internet banking. Some of the more popular types of attacks are described below: A. Phishing attacks Phishing attacks use fake email messages from an agency or individual pretending to represent one s bank or financial institution. The email asks to provide sensitive information (name, password, account number, and so forth) and provides links to a counterfeit web site. If one follow the link and provide the requested information, intruders can access personal account information and finances. In some cases, pop-up windows can appear in front of a copy of a genuine bank web site. The real web site address is displayed; however, any information one type directly into the pop-up will go to unauthorized users. B. Pharming Pharming is a cyber attack intended to redirect a website's traffic to another, fake site. Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting 1 2015, IJAFRSE and ICCICT 2015 All Rights Reserved www.ijafrse.org

users to fraudulent Web sites without their knowledge or consent. In pharming, larger numbers of computer users can be victimized because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim. In one form of pharming attack, code sent in an e- mail modifies local host files on a personal computer. The host files convert URLs into the number strings that the computer uses to access Web sites. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected bookmark entry. C. Man-in-the-middle attack (MitM) It allows the hacker to see or even to modify the communication between the client and the bank. The attacker needs to have a trojan horse virus on the victim computer. D. Man-in-the browser attack (MitB) A MitB attack is carried out by infecting a user browser with a browser addon, or plug-in that performs malicious actions. In principle, as soon as a user's machine is infected with malware, the attacker can do anything the user can, and can act on their behalf. If a user logs into their bank account while infected, the attacker can make any bank transfer that the user can. By the virtue of being invoked by the browser during Web surfing, that code can take over the session and perform malicious actions without the user s knowledge. III. INTRUSION DETECTION SYSTEM Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or forthcoming threats of violation of computer security policies, acceptable use policies, or standard security practices. Incidents have many causes, such as malware (e.g., worms, spyware), attackers gaining unauthorized access to systems from the Internet during Internet Banking, and authorized users of systems who misuse their privileges or attempt to gain additional privileges for which they are not authorized. Intrusion Detection System (IDS) is a hardware or software or combinational system, with defensiveaggressive approach to protect information, systems and networks. It is usable on host, network and application levels. It analyzes the system or network traffic or controls the incoming connections to different ports, and then it detects the occurring attacks. It can detect known attacks, unusual traffic, harmful data, misuse and unauthorized access to the systems and networks by internal users or external intruders. It informs and notifies to the security manager by different types of warnings or notifications; sometimes, it disconnects the suspicious connections or blocks malicious traffic. In general, three main functionalities of IDSs include monitoring (evaluation), analyzing (detection) and responding (reporting) to the occurring attacks on computer systems and networks. IDSs use many methodologies to detect attacks. A. IDS Classification based on Detection Method IDSs can be classified into two types based on detection method. a. Signature Based or Misuse Detection Method: Signature-based detection is the process of comparing signatures against observed events to identify possible attacks. In this method, IDS gathers the properties of attacks and abnormal behaviors and then, make database of them. Signature-based detection is the simplest detection method because it just compares the current unit of activity, such as a packet or a log entry, to a database of signatures using string comparison operations. Essentially, 2 2015, IJAFRSE and ICCICT 2015 All Rights Reserved www.ijafrse.org

the IDS look for a specific attack that has already been documented. Like a virus detection system, detection software is only as good as the database of intrusion signatures that it uses to compare packets against. b. Anomaly based Detection Method: An Anomaly-Based Intrusion Detection System is a system for detecting computer intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous. The classification is based on heuristics or rules, rather than patterns or signatures, and attempts to detect any type of misuse that falls out of normal system operation. This is as opposed to signature based systems which can only detect attacks for which a signature has previously been created. B. IDS classification based on Architecture IDS are classified into two types depending on information gathering source or input data supplier. a. Network Intrusion Detection Systems (NIDS): Network Intrusion Detection Systems (NIDS) are placed at a strategic point or points within the network to monitor traffic to and from all devices on the network. It performs an analysis of passing traffic on the entire subnet, works in a promiscuous mode, and matches the traffic that is passed on the subnets to the library of known attacks. Once an attack is identified, or abnormal behavior is sensed, the alert can be sent to the administrator. b. Host Intrusion Detection System (HIDS): Host-based IDS systems consist of software agents installed on individual computers within the system. HIDS analyze the traffic to and from the specific computer on which the intrusion detection software is installed on. HIDS systems often provide features one can't get with network-based IDS. For example, HIDS are able to monitor activities that only an administrator should be able to implement. It is also able to monitor changes to key system files and any attempt to overwrite these files. Attempts to install Trojans or backdoors can also be monitored by a HIDS and stopped. These specific intrusion events are not always seen by a NIDS. C. IDS classification based on response method Based on response method, IDS are classified into two types. a. Passive System: In a passive system, the intrusion detection system (IDS) sensor detects a potential security breach, logs the information and signals an alert on the console or owner. b. Reactive System: In a reactive system, also known as an intrusion prevention system (IPS), the IPS auto-responds to the suspicious activity by resetting the connection or by reprogramming the firewall to block network traffic from the suspected malicious source. 3 2015, IJAFRSE and ICCICT 2015 All Rights Reserved www.ijafrse.org

IV. USING IDS IN INTERNET BANKING:THE PROPOSED ARCHITECTURE 1. Banking Network Security Firewalls can be configured in bank s network to block everything except specified traffic. Unfortunately, Internet attackers can easily evade firewall blocking techniques. So another security tool is used which is called Intrusion Detection. 2. Intrusion Detection The second level of bank s network security is Intrusion Detection Systems (IDS). These systems look for intrusions in process such as accessing a forbidden website or Trojan horse attempting to control a workstation. The IDS records each dangerous pattern and alerts network security personnel. This approach is highly effective in discovering illegitimate traffic. However, IDS must be carefully configured to send alerts only on hazardous traffic. A mistuned IDS often sends alerts on perfectly normal traffic, and may miss dangerous packets because it isn t looking for them. IDS can be used in Internet Banking security infrastructure at three places: Installing Host Intrusion Detection Systems on users' PCs (HIDS: Client-side): HIDS for Internet Banking uses a database of bank s client attack patterns. HIDS will remember its attributes (permissions, size, modification dates) and create a checksum of MD5 (cryptographic hash function) for the contents, if any. This information gets stored in a secure database for later comparison. Proposed Internet Banking IDS uses both anomalies based and misuse based Detection method for detecting attacks during online transaction at client computer. It monitors the bank client traffic and is based on passive response system. Installing Network Intrusion Detection System (NIDS) between firewall and Internet Banking systems (Internet Banking systems side): NIDS for Internet Banking uses a database of bank s attacks patterns. It monitors the bank network traffic using both anomalies based and misuse based detection method. The Proposed Internet Banking IDS uses Reactive Response system. Installing special Host Intrusion Detection System on the bank server which provides Internet Banking services and processes particular transactions. It is for bank s internal servers which have databases associated to the bank s financial servers' attacks patterns. It monitors the bank server traffic and uses hybrid technology based on anomaly detection and misuse detection with reactive response system. V. CONCLUSION AND FUTURE WORK Internet banking continues to present challenges to financial security and personal privacy. This paper suggests using IDS in Internet Banking security infrastructure for increasing the security of Online banking transactions. The proposed security solution for bank increases security and consistency of Internet Banking services and reduces the damages of fraud events. Future work will focus on selecting the best feature extraction technique to create database of attacks in anomaly based and misuse based network Intrusion detection system and host intrusion detection system to be used in three places of security infrastructure of banks. 4 2015, IJAFRSE and ICCICT 2015 All Rights Reserved www.ijafrse.org

VI. REFERENCES International Journal of Advance Foundation And Research In Science & Engineering (IJAFRSE) [1] http://www2.safenetinc.com/email/2010/mitb-2010/whitepaper_top-threat-to-financial- Service-Providers-in-2010_FINAL.pdf. [2] Denning, Dorothy E., "An Intrusion Detection Model," Proceedings of the Seventh IEEE Symposium on Security and Privacy, May 1986, pages 119 131. [3] Thomas Tjostheim and Vebjorn Moen; Vulnerabilities in Online Banks;European Committee for Banking Standards, Norway; 2003. [4] http://researchpub.org/journal/cstij/number/vol2-no2/vol2-no2-5.pdf [5] https://www.cocc.com/whitepaper/30/three-pillars-bank-network-security [6] Axelsson, S. Research in intrusion-detection systems: A survey. Technical report TR 98-17. Göteborg, Sweden: Department of Computer Engineering, Chalmers University of Technology., 1999 [7] Anderson, James P., "Computer Security Threat Monitoring and Surveillance," Washing, PA, James P. Anderson Co., 1980. [8] Wang, Ke. "Anomalous Payload-Based Network Intrusion Detection". Recent Advances in Intrusion Detection. Springer Berlin. doi:10.1007/978-3-540-30143-1_11. [9] Scarfone, Karen; Mell, Peter (February 2007). "Guide to Intrusion Detection and Prevention Systems (IDPS)". Computer Security Resource Center (National Institute of Standards and Technology) (800 94). [10] Lunt, Teresa F., "IDES: An Intelligent System for Detecting Intruders," Proceedings of the Symposium on Computer Security; Threats, and Countermeasures; Rome, Italy, November 22 23, 1990, pages 110 121. 5 2015, IJAFRSE and ICCICT 2015 All Rights Reserved www.ijafrse.org