Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University



Similar documents
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Taxonomy of Intrusion Detection System

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

CSCI 4250/6250 Fall 2015 Computer and Networks Security

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

Name. Description. Rationale

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls, Tunnels, and Network Intrusion Detection

How To Protect A Network From Attack From A Hacker (Hbss)

INTRUSION DETECTION SYSTEMS and Network Security

Intruders & Intrusion Hackers Criminal groups Insiders. Detection and IDS Techniques Detection Principles Requirements Host-based Network-based

IDS / IPS. James E. Thiel S.W.A.T.

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Intruders and viruses. 8: Network Security 8-1

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

Network- vs. Host-based Intrusion Detection

PROFESSIONAL SECURITY SYSTEMS

Introduction of Intrusion Detection Systems

Intrusion Detection System (IDS)

Network Based Intrusion Detection Using Honey pot Deception

Chapter 9 Firewalls and Intrusion Prevention Systems

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Intrusion Detection Systems

GFI White Paper PCI-DSS compliance and GFI Software products

IDS : Intrusion Detection System the Survey of Information Security

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

Network and Host-based Vulnerability Assessment

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Firewalls. CS 6v81 - Network Security. What is a firewall? Firewall capabilities. Firewall limitations. Firewall limitations, cont d

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

Architecture Overview

Performance Evaluation of Intrusion Detection Systems

Basics of Internet Security

Intrusion Detection and Prevention Systems in the Industrial Automation and Control Systems Environment

Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies

Role of Anomaly IDS in Network

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Intrusion Detection for Mobile Ad Hoc Networks

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International.

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Segurança Redes e Dados

FISMA / NIST REVISION 3 COMPLIANCE

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

B database Security - A Case Study

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

The SIEM Evaluator s Guide

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Section 12 MUST BE COMPLETED BY: 4/22

Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs

Science Park Research Journal

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Critical Security Controls

Computer Networks & Computer Security

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Intrusion Detection Systems

OS Security. Malware (Part 2) & Intrusion Detection and Prevention. Radboud University Nijmegen, The Netherlands. Winter 2015/2016

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2. Intrusion Detection and Prevention Systems

Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques

SURVEY OF INTRUSION DETECTION SYSTEM

Second-generation (GenII) honeypots

USM IT Security Council Guide for Security Event Logging. Version 1.1

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Fundamentals of Network Security - Theory and Practice-

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Firewalls and Intrusion Detection

Intrusion Detection from Simple to Cloud

Blacklist Example Configuration for StoneGate

Technology Blueprint. Protect Your VoIP/SIP Servers. Insulating your voice network and its servers from attacks and disruption

Locking down a Hitachi ID Suite server

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Guide to Intrusion Detection and Prevention Systems (IDPS) (Draft)

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware

How To Ensure The C.E.A.S.A

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Hackers: Detection and Prevention

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Transcription:

Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University

Outline 7.1 Threats to Computer System 7.2 Process of Intrusions 7.3 What Is Intrusion Detection 7.4 Methods of Intrusion Detection 7.5 Structure of IDS 7.6 HIDS and NIDS 7.7 Introduction to IPS Web Security : Theory And Applications 2 / 52

Outline 7.1 Threats to Computer System DoS Spoofing Eavesdrop 7.2 Process of Intrusions 7.3 What is Intrusion Detection 7.4 Methods of Intrusion Detection 7.5 Structure of IDS 7.6 HIDS and NIDS 7.7 Introduction to IPS Web Security : Theory And Applications 3 / 52

7.1 Threats to Computer System Threats to Computer System DoS Spoofing Eavesdrop Password Cracking Trojan Others:Buffer Overflow Web Security : Theory And Applications 4 / 52

Outline 7.1 Threats to Computer System 7.2 Process of Intrusions 7.3 What is Intrusion Detection 7.4 Methods of Intrusion Detection 7.5 Structure of IDS 7.6 HIDS and NIDS 7.7 Introduction to IPS Web Security : Theory And Applications 5 / 52

7.2 Process of Intrusions Information of the targets OS: Windows or Linux? Software version Active net service Bugs they have Its social information When to attack Guess the password Web Security : Theory And Applications 6 / 52

7.2 Process of Intrusions Conduct of the attack Afterwards Clear the footprints (logs and records) Open backdoors Web Security : Theory And Applications 7 / 52

Outline 7.1 Threats to Computer System 7.2 Process of Intrusions 7.3 What is Intrusion Detection Definition Function IDS and Firewall 7.4 Methods of Intrusion Detection 7.5 Structure of IDS 7.6 HIDS and NIDS 7.7 Introduction to IPS Web Security : Theory And Applications 8 / 52

7.3 What is Intrusion Detection Definition The act of detecting actions that attempt to compromise the Confidentiality, Integrity or Availability of a resource. Three classes of intruders Masquerader Pirates From outside Misfeasor Betrayers From inside Clandestine user Usurper Outside or inside Web Security : Theory And Applications 9 / 52

7.3 What is Intrusion Detection Threat Monitoring J. Anderson (University of Reading, Eng., 1980), Computer Security Threat Monitoring and Surveillance Web Security : Theory And Applications 10 / 52

7.3 What is Intrusion Detection Function Identify attacks already known Identify and block operations which is illegal or beyond the user s authority Check integrity of data Find vulnerability and bugs in the system Record legal behaviors Analyze illegal behaviors and intruders and record their features Web Security : Theory And Applications 11 / 52

7.3 What is Intrusion Detection Why do we need intrusion detection while we already have firewall For a firewall Attacks from outside Deployed at the frontline Static relatively Firewall Door and Lock Web Security : Theory And Applications 12 / 52

7.3 What is Intrusion Detection Why do we need intrusion detection while we already have firewall For an IDS Threats from inside Deployed in the building Intrusion Detection System Monitor Web Security : Theory And Applications 13 / 52

Outline 7.1 Threats to Computer System 7.2 Process of Intrusions 7.3 What is Intrusion Detection 7.4 Methods of Intrusion Detection Anomaly Detection Misuse Detection 7.5 Structure of IDS 7.6 HIDS and NIDS 7.7 Introduction to IPS Web Security : Theory And Applications 14 / 52

7.4 Methods of Intrusion Detection Two ways to tell whether a behavior is malicious How far from normal behaviors Anomaly Detection How similar to the attacks already known Misuse Detection Web Security : Theory And Applications 15 / 52

7.4 Methods of Intrusion Detection Anomaly Detection --Based on Behavior Behavioral Model Statistics Analysis Neural Network (Learning) Data Mining Web Security : Theory And Applications 16 / 52

7.4 Methods of Intrusion Detection Misuse (signature) Detection ---Based on Rules (Knowledge) Pattern matching Finding certain strings Simple but more false-alarms, higher system burden State transition Enhanced pattern matching Fast and flexible Depend on system states Expert system Web Security : Theory And Applications 17 / 52

Outline 7.1 Threats to Computer System 7.2 Process of Intrusions 7.3 What is Intrusion Detection 7.4 Methods of Intrusion Detection 7.5 Structure of IDS Information Gathering Analysis Engine Response Unit IDES & CIDF 7.6 HIDS and NIDS 7.7 Introduction to IPS Web Security : Theory And Applications 18 / 52

7.5 Structure of IDS Information gathering System and network logs Anomalous changes of system directories and files Anomalous behavior in program executing Analysis engine Pattern matching Statistics analysis Integrity analysis Response unit Alert Cut off connection Block user Change file attributes Web Security : Theory And Applications 19 / 52

7.5 Structure of IDS Information gathering System and network logs Login Authorization Anomalous changes of system directories and files Unexpected read, write and delete Changed log files Anomalous behavior in program executing Unexpected access for some processes to resources or data Web Security : Theory And Applications 20 / 52

7.5 Structure of IDS Analysis engine -- Methods of detection Pattern matching Statistics analysis Mean and standard deviation Operational model: large number of login in short period Multivariate: Operational model with multi variables Markov process: transition probabilities among various states Time series: whether an event happens at correct time and lasts regular period Integrity analysis Focus on files recently modified Files planted Trojans Web Security : Theory And Applications 21 / 52

7.5 Structure of IDS Response unit Alert Cut off connection Block user Change file attributes Web Security : Theory And Applications 22 / 52

7.5 Structure of IDS IDES, Intrusion Detection Expert System Dorothy Denning, 1986 NIDES, Next-Generation Intrusion Detection Expert System 1 Subjects 2 Objects 3 Audit records: <Object,Action,Object,Exception- Condition,Resource-Usage,Time-Stamp> 4 Activity Profile 5 Anomaly Record: <Event,Time-stamp,Profile> 6 Activity Rules Web Security : Theory And Applications 23 / 52

7.5 Structure of IDS CIDF, Common Intrusion Detection Framework CIDFTG, 1998 CDIF is an effort to develop protocols and application programming interfaces so that intrusion detection research projects can share information and resources and so that intrusion detection components can be reused in other systems. The Common Intrusion Detection Framework Architecture A Common Intrusion Specification Language Communication in the Common Intrusion Detection Framework Common Intrusion Detection Framework APIs Web Security : Theory And Applications 24 / 52

7.5 Structure of IDS The architecture of CIDF Event GIDO (generalized intrusion detection objects) Event generators Event analyzers Event databases Response units Event Generator gido Event Analyzer gido Response Unit action gido Event Database Web Security : Theory And Applications 25 / 52

Outline 7.1 Threats to Computer System 7.2 Process of Intrusions 7.3 What is Intrusion Detection 7.4 Methods of Intrusion Detection 7.5 Structure of IDS 7.6 HIDS and NIDS Host-Based IDS Network-Based IDS 7.7 Introduction to IPS Web Security : Theory And Applications 26 / 52

7.6 HIDS and NIDS Host-based IDS (HIDS) Monitor activities on the system Detect both external and internal intrusions Deployment (Distributed Host) Web Security : Theory And Applications 27 / 52

7.6 HIDS and NIDS Some potential threats to HIDS Abuse of privilege Temporary root Former employees Invisible account created by former administrator Access and modification on key information Student scores Individual information Coopetition Security configuration Guest account Nomadic user Screen saver not activated Web Security : Theory And Applications 28 / 52

7.6 HIDS and NIDS HIDS Advantages & Disadvantages Advantages Near targets of attacks No extra hardware devices Independent on network Deal with unencrypted messages Disadvantages Operating system dependent Burden on the host Limited to the host Complicated install and maintenance Web Security : Theory And Applications 29 / 52

7.6 HIDS and NIDS Network-based IDS (NIDS) Web Security : Theory And Applications 30 / 52

7.6 HIDS and NIDS Network-based IDS (NIDS) Typical NIDS includes : A number of sensors One or more servers for NIDS management functions One or more management consoles for human interface Web Security : Theory And Applications 31 / 52

7.6 HIDS and NIDS Network-based IDS (NIDS) Sensors Inline sensor IS Passive sensor PS Web Security : Theory And Applications 32 / 52

7.6 HIDS and NIDS Techniques: Signature Detection: Application layer: DHCP, IMAP, NFS, DNS, FTP Transport layer: SYN floods Network layer: spoofed IP address Anomaly Detection: DoS: significant increasing packet traffic or connection attempts Scanning: Worms: Web Security : Theory And Applications 33 / 52

7.6 HIDS and NIDS NIDS Advantages & Disadvantages Advantages Disadvantages Operating system independent Not influence the hosts Unable to deal with encrypted messages Capability problems Transparent to intruders Protect a domain Vulnerable to DoS Can detect lower layer attacks Original packets Web Security : Theory And Applications 34 / 52

7.6 HIDS and NIDS Making use of HIDS and NIDS Web Security : Theory And Applications 35 / 52

7.6 HIDS and NIDS Host-Based IDS vs Network-Based IDS Comparative analysis of HIDS vs. NIDS http://www.windowsecurity.com/articles/hids_vs_nids_part1.html Web Security : Theory And Applications 36 / 52

Outline 7.1 Threats to Computer System 7.2 Process of Intrusions 7.3 What is Intrusion Detection 7.4 Methods of Intrusion Detection 7.5 Structure of IDS 7.6 HIDS and NIDS 7.7 Introduction to IPS The need of IPS Security capabilities Types of IPS Compare IPS with IDS Web Security : Theory And Applications 37 / 52

7.7 Introduction to IPS What is an IPS (Intrusion Prevention System) IPS is a system that identify malicious activity, log information about malicious activity, attempt to block/stop malicious activity, and report malicious activity. Web Security : Theory And Applications 38 / 52

7.7 Introduction to IPS The need of IPS Users need an automate system to deal with Intrusion Users need a preferable system to remedy ( 补 救 ) IDS s defects Users need a high-performance system to keep the network s security Web Security : Theory And Applications 39 / 52

7.7 Introduction to IPS Security Capabilities Detect Intrusion Log Intrusion Stop Intrusion Report Intrusion Web Security : Theory And Applications 40 / 52

7.7 Introduction to IPS Detect Intrusion Signature-Based Detection Anomaly-Based Detection Stateful Protocol Analysis HoneyPot Evaluate the detect capabilities Threshold Blacklists & Whitelists Alert Setting Code Viewing and Editing Web Security : Theory And Applications 41 / 52

7.7 Introduction to IPS Log Intrusion IPS log information about the intrusion that they detect. The information is helpful to evaluate the intrusion and to find out an appropriate way to protect the target. Stop Intrusion Stop the attack independently Terminate the network connection Block the malicious packages Block the access to target Web Security : Theory And Applications 42 / 52

7.7 Introduction to IPS Changes the security environment The IPS could change the configuration of other security controls. For example: apply patches to a attacked host, alert the firewall to block the access of the intruders, etc. Change the attack s content The IPS could remove or replace malicious portions of an attack to make it benign Report Intrusion Report the Intrusion in detail or in summary depending on the require of users. When the intrusion begin, alert the manager as soon as possible. Web Security : Theory And Applications 43 / 52

7.7 Introduction to IPS Types of IPS Regardless of the types of IPS, all IPS will contain four major components: 1. Agent/Sensor 2. Management Server 3. Database Server 4. Console Web Security : Theory And Applications 44 / 52

7.7 Introduction to IPS Agent/Sensor Agent/Sensor monitor and analyze network s activity. The Agent is used for HIPS. The Sensor is used for NIPS Management Server A management server is a centralized device that receives information from the sensors or agents and manages them. Function: analyse the information identify the intrusion control the agents or sensors Web Security : Theory And Applications 45 / 52

7.7 Introduction to IPS Database Server A database server is a repository for event information. Particularly, the information is generate by agents or sensor. Console A console is a program provide administration and/or monitoring capabilities for the IDP s users and administrators. It s a interface between the IPS and the IPS s user and administrators Web Security : Theory And Applications 46 / 52

7.7 Introduction to IPS Host-Based Intrusion Prevention System, HIPS Web Security : Theory And Applications 47 / 52

7.7 Introduction to IPS Network-Based Intrusion Prevention System, NIPS In-line Web Security : Theory And Applications 48 / 52

7.7 Introduction to IPS NIPS - Passive Web Security : Theory And Applications 49 / 52

7.7 Introduction to IPS Compare IPS with IDS Usage: IPS is used to defend the outside attack while IDS is used to find out the attack. Security Policy: IDS will report the intrusion while IPS try to defend it automatically. Deployment: IPS is usually deployed on the network s boundary while IDS is deployed near to the center of the network. Web Security : Theory And Applications 50 / 52

References 1. The Practical Intrusion Detection Handbook, Paul E. Proctor 2. Computer Networks, fourth edition, Andrew S. Tanenbaum 3. Intrusion detection Wikipedia, http://en.wikipedia.org/wiki/intrusion_detection 4. Intrusion Detection System (IDS) : Dawn of the new Security http://zulcap.wordpress.com/2009/10/27/lecture-9-intrusiondetection-system-ids/ 5. Guide to Intrusion Detection and Prevention Systems(IDPS), Karen Scarfone, Peter Mell, Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-94 6. Intrusion prevention system, Wikipedia, http://en.wikipedia.org/wiki/intrusion_prevention_system Web Security : Theory And Applications 51 / 52

Thank you! Web Security : Theory And Applications 52 / 52