IntruPro TM IPS. Inline Intrusion Prevention. White Paper



Similar documents
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Chapter 9 Firewalls and Intrusion Prevention Systems

Intrusion Detection System (IDS)

Architecture Overview

Network- vs. Host-based Intrusion Detection

IDS / IPS. James E. Thiel S.W.A.T.

INTRUSION DETECTION SYSTEMS and Network Security

Intrusion Detection Systems

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Introduction of Intrusion Detection Systems

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

PROFESSIONAL SECURITY SYSTEMS

Name. Description. Rationale

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

Intrusion Detection Systems (IDS)

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

Firewalls, IDS and IPS

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Proxy Server, Network Address Translator, Firewall. Proxy Server

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Web App Security Audit Services

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Intrusion Detection Systems

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

CS5008: Internet Computing

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

CSCE 465 Computer & Network Security

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Taxonomy of Intrusion Detection System

Chapter 15. Firewalls, IDS and IPS

How To Protect Your Network From Attack From A Hacker On A University Server

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Radware s Behavioral Server Cracking Protection

Intrusion Detections Systems

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Fuzzy Network Profiling for Intrusion Detection

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

CTS2134 Introduction to Networking. Module Network Security

Fifty Critical Alerts for Monitoring Windows Servers Best practices

Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Course Title: Penetration Testing: Security Analysis

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Security 101: BIG-IP ASM and IPS Differences Defined

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International.

SANS Top 20 Critical Controls for Effective Cyber Defense

Computer Security: Principles and Practice

IDS : Intrusion Detection System the Survey of Information Security

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Barracuda Intrusion Detection and Prevention System

Computer Security DD2395

Intrusion Detection and Prevention Systems in the Industrial Automation and Control Systems Environment

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Network and Host-based Vulnerability Assessment

Training Course on Network Administration

Concierge SIEM Reporting Overview

Network Instruments white paper

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Firewall Firewall August, 2003

SURVEY OF INTRUSION DETECTION SYSTEM

Linux Network Security

Blended Security Assessments

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

Intrusion Detection Systems

May 11, (Revision 10)

IBM Managed Security Services Vulnerability Scanning:

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

McAfee Intrusion Prevention System

Chapter 8 Security Pt 2

GFI White Paper PCI-DSS compliance and GFI Software products

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Performance Evaluation of Intrusion Detection Systems

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

INTRODUCTION TO FIREWALL SECURITY

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Denial of Service Attacks, What They are and How to Combat Them

Computer Networks & Computer Security

Transcription:

IntruPro TM IPS Inline Intrusion Prevention White Paper

White Paper Inline Intrusion Prevention Introduction Enterprises are increasingly looking at tools that detect network security breaches and alert and protect networks from intrusion attacks. The Internet is a medium for fast, efficient communication and interchange of ideas, and an unbounded marketplace for corporations, customers and suppliers to conduct business. However, the limitless opportunities of the Internet come hand-in-hand with the risks of people who take malicious advantage of the openness of the Internet. Enterprise networked systems are inevitably exposed to the increasing threats posed by hackers as well as malicious users internal to a network. The consequences are compromised confidentiality and integrity of business systems, and diminished availability of the network. To counter these threats, organizations use tools and technology to secure their systems, through deployment of firewall and authentication systems, and by defining security policies and access control mechanisms. But with security breaches on the rise, and their associated high costs to businesses, enterprises are increasingly looking at tools that detect network security breaches and alert network administrators of intrusion attempts. Intrusion Detection systems (IDSs) fall in this category of security tools. Who are Intruders? Steps in Intrusion Attacks The common term for an intruder is a hacker or programmer who tries to break in and enter a computer system with malicious intent. Another category of intruders includes persons within a system misusing privileges to gain access to information and systems they are unauthorized to use. Intrusion attacks usually follow a logical sequence of events. The intruder will at first try to discover as much public information (such as domain name, DNS tables, machine names, and FTP sites) about a network as possible without risking detection. Next, the intruder will attempt to scan for more information, run utilities, look for CGI scripts, ping to get machine status, etc. By the end of this stage, the intruder will know the operating system and applications running on the victim s network. Once an intruder gets access to a user account or a machine, he/she tries to exploit possible vulnerabilities of the system by sending commands to CGI scripts, or malicious data to buffer-overrun holes. At this stage, the hacker may be able to gain control of the machine, and even crash the system. On gaining a foothold on a network, the intruder will cover tracks of the attack to delay discovery and install tools that displace the normal functioning of the system or vandalize the site, before moving to other connected networks. Copyright 2004, Intoto Inc. Inline Intrusion Protection White Paper Page 2

How is Intrusion Detected? Detection is possible through IDS right from the time the intruder probes and tries to scan for information. IDSs successfully detect and trap attacks at a premature stage and help enterprises avoid disruption in their systems and costs associated with the likely damage of successful attempts. An Intrusion is a deliberate unauthorized attempt to access information, manipulate information, and/or commit acts to render a system unreliable or unusable. There are several types of intrusions - common intrusion types are reconnaissances, exploits and DoSs. An Intrusion is a deliberate unauthorized attempt to access information and perform activities that adversely affect a system s reliability. Reconnaissance includes ping sweeps, DNS zone transfers, email reconnaissance, TCP/UDP scans, and indexing of public web servers for CGI holes. Exploits include taking advantage of software features and bugs to gain unauthorized access to the system, send large amounts of data to known bufferoverrun holes, checking login accounts by guessing passwords, spoofing packets to cause multiple replies to a host from a single packet, and so on. Denial-of-service (DoS) attacks are vandal attacks with intentions to disrupt the services in a system. These are usually by crashing services, or overloading the CPU or network links, or filling a disk to capacity. Intrusion detection is performed through two main checks Anomaly Detection, and Signature Recognition. Checking Signature Rules This is an exercise where the IDS looks for a signature or pattern. IDSs contain databases with strings based on patterns for known hacker techniques. IDSs examine the network traffic, looking for well-known patterns of attack. Detecting Anomalies Types of Intrusion Detection Systems This is by identifying statistical anomalies with reference to a baseline of statistics on activities like CPU utilization, user logins, file activity, disk activity, and so on. When there is an abnormal or unusually high or low value from the baseline, the IDS is able to detect it. Intrusion Detection Systems can be categorized based on several criteria deployment, scope and data processing. Copyright 2004, Intoto Inc. Inline Intrusion Protection White Paper Page 3

By Deployment Inline IDS Inline IDSs are placed in the line of packet transfer. IDS checks all packets passing through it for intrusions and if detected, alerts the network administrator. In addition, it can block the intrusion from going any further. Typically, IIDS are placed at the perimeter of the network, behind the firewall or along with the firewall. Sniffer IDS IDSs are either deployed on a network segment (Network IDS) or on a host computer (Host-based IDS). These are IDSs that snoop and examine packets within a network. Sniffer IDSs do not come in the way of packet transfer. Instead, they passively receive all the packets from the network and perform intrusion analysis on these packets. Typically, sniffers are placed in a location on the network where they can read all the packets flowing through the network. By Scope Network Intrusion Detection Systems (NIDS) Network Intrusion Detection Systems are deployed on a network segment to compare captured network data with a file of known malicious signatures. A network IDS uses network cards that sniff at all packets in a network segment. A typical network IDS has one or more sensors, and a console to aggregate and analyze data from the sensors. Host-Based IDS (HIDS) Host-based IDSs are deployed on a host computer, and watch processes inside the host. The HIDS operates by monitoring changes to a number of variables on the host system. This includes system processes, Registry entries, CPU usage, file access and integrity checks. Suspicious threshold values or file changes result in the IDS sending an alert. A system integrity verifier looks for evidence of changes to key files. If there is a match, the HIDS logs and send an alert to the network or security administrator. Hybrid IDS A hybrid IDS is a combination of a host IDS with a network IDS. The implementation varies from instance to instance and could range from IDSs placed at critical network aggregation and entry points and on hosts used for conducting business-critical functions. Copyright 2004, Intoto Inc. Inline Intrusion Protection White Paper Page 4

By Data Processing Raw Analysis Systems These perform signature analysis where the IDS capture frames of data from the network and compares them to strings from a database of attack signatures, looking for a match. The IDS only scans the raw date for patterns, and does not perform any processing on the data. Their limited scope makes them ideal candidates for deployment in network segments with low bandwidth utilization. Intoto s IntruPro TM IPS Intelligent Systems These systems not only capture the raw frames of data, but also are able to understand the protocols and rules governing their operation, and thus emulate the host and applications, based on the protocol traffic. Used for detecting complex attacks, Intelligent Systems perform considerable data processing and scale to meet the demands of network segments with high bandwidth utilization. General Description The IntruPro IPS solution from Intoto enables networking equipment manufactures to add enterprise-class IPS capability to their security products. IntruPro represents the next generation in intrusion prevention systems and is based on Intoto's unique patent-pending application-aware Inline IPS TM technology. IntruPro provides greater intrusion detection accuracy for reduced false alarms and higher performance than traditional IDS and IPS approaches Intoto s IntruPro IPS is a network IDS/IPS that performs intelligent analysis, provides powerful features with intrusion prevention measures. IntruPro TM sensors are located at the perimeter of a network, securing the network against intruder activities originating from within and outside the network. Inline IPS is a network IDS operating to detect, and sometimes protect, the vulnerabilities in traffic coming from external networks. Similarly, vulnerabilities internal to the network are detected and trapped when the data passes through the network to external networks. For implementations where there are several sub-networks comprising an enterprise network, the firewall and IDS can be located at the perimeter of the enterprise network, making it effective for detecting intrusion for all networks, without compromising performance. Inline IPS Technology Features Intoto s Inline IPS technology provides powerful features that exceed the standard features of a network IDS. Checking Signature Rules Inline IPS examines all the fields in individual data packets that enter a network, unlike firewalls limited to checking only IP addresses and ports. Additionally, Copyright 2004, Intoto Inc. Inline Intrusion Protection White Paper Page 5

Inline IPS examines payloads SMTP commands, HTTP URLs and headers - within a packet. This enables immediate detection of maliciously formed packets. Inline IPS detects a variety of intrusions, including buffer overflow, DoS attacks, and unauthorized CGI script use and changes. Inline IPS uses Signature rules, which are compositions of signatures of hacker techniques, for intrusion detection. Signature rules are categorized into application rules, transport rules and network (IP) rules. Inline IPS first verifies a no-match for application rules, followed by transport rules, and lastly, network rules. If a match is found, Inline IPS either alerts the network administrator or can even kill the session. Intoto provides easy language constructs to write signature rules. Intoto also provides selective downloadable signature rules. Checking for Traffic Anomalies Inline IPS uses anomaly checks to detect traffic intrusion attacks. A system can be configured with the characteristics of typical traffic flowing through the network. If the traffic does not conform to the parameters defined for typical traffic, Inline IPS will alert the network administrator and block the packet from going any further. Intoto s Inline IPS performs application decoding, effectively decreasing the number of signatures to check for incoming or outgoing packets, improving processing throughput. Intoto s Inline IPS supports rate limiting/detection functionality. Rate detection is used to detect anomalies in the traffic/session rate and protect the networks from being inundated with large amounts of data and sessions. For example, the network administrator can configure the threshold session rate of a web server to be 1000 sessions/hour. If this rate is exceeded, Inline IPS detects it and informs the administrator for required action. Checking for Application-Level Intrusion Inline IPS detects intrusion at the application level by effectively decoding applications for text strings of URLs for verification. It examines packet payload information of application protocols like HTTP and SMTP. This enables Inline IPS to detect any undue advantage that intruders may take of application vulnerabilities. HTTP URL decoding is further safeguarded from anti-ids techniques such as reverse traversal, self referencing directories, multiple slashes, method matching, premature request ending, HTTP mis-formatting, DOS directory syntax, case sensitivity, TCP splicing, and null method processing. Inline IPS, with HTTP protocol intelligence built-in, extracts the URL and decodes the URL to a simple text string and then matches URL strings in HTTP signature rules. Inline IPS, along with its IP reassembly and TCP in order streaming feature, protects networks from intelligent tools such as tools that perform TCP splicing, and tools that spread packet data across multiple IP fragments. Copyright 2004, Intoto Inc. Inline Intrusion Protection White Paper Page 6

Inline IPS allows signature rules to have HTTP fields such as HTTP method, HTTP URL, and HTTP version. Inline IPS SMTP supports keywords such as SMTP TO, SMTP FROM, and SMTP CC. Application decoding capabilities enable signature rules to be divided across applications. For supported applications, checks are made for application signatures before generic signatures, effectively reducing the number of rules needed in generic signatures, and the number of rules to be checked per packet. This enhances performance immensely. Searching Content Inline IPS checks the content of packets for a match with content strings preconfigured in signature rules for the system. The content can be in hexa-decimal form or a character string. Action parameters can be assigned for signature rules. If a match is found, the action specified in the signature rule is carried out. Detecting Reconnaissance Probes Inline IPS can detect and mislead intruders conducting reconnaissance probes such as port scans, OS fingerprinting probes, and ICMP probes right at the network. When a reconnaissance probe is detected, Inline IPS drops the packets in the session, thereby stopping the attacker from finding out the TCP/IP and OS vendors and versions. Next, Inline IPS informs the firewall to stop the traffic from/to a specified source IP/destination IP and service for a certain period of time. This misleads the intruder into believing the service in not available, and the network is successfully protected from getting any further packets sent by the intruder. Logging & Alerts Currently, Inline IPS uses syslog or email to inform administrators of detected attacks. Intoto plans for future versions to include IDWG standards such as IDMF XML-based log and IDXP to transfer these logs to the Inline IPS console. Advantages over other IDS products Stateful Inspection Most IDSs perform signature comparisons on all packets from all applications. This is because there is no classification at the application level for signature comparison. Intoto s Inline IPS reduces processing time by keeping track of the state of the application instance, and performing signature comparison only on relevant packets. It eliminates the need to check all application signature rules against all packets, thereby accelerating performance. Copyright 2004, Intoto Inc. Inline Intrusion Protection White Paper Page 7

Inline Intrusion Prevention Intoto s Inline IPS is inline with its firewall and a truly integrated security solution. The most significant advantage that Intoto s Inline IPS has over its competitors is in being inline with its firewall. Today, NIDS systems are integrated with generalpurpose firewalls. When they detect an attack, NIDS systems inform the firewall to block the traffic. And since NIDS and the firewall are in two different systems, the current packet, which caused the detection, can't be stopped. Intoto s Inline IPS is inline with the firewall. Hence, as soon as an attack is detected, it drops the malicious packet before it reaches the target machine/network. Since Inline IPS is inline with the packet flow, attacks originating from within a network to a destination outside the network can also be effectively intercepted and trapped. Illustration of Small Office Home Office IPS Deployment The figure displays a typical small office network connecting to the Internet via a router with Inline IPS. Illustration of Enterprise/Service Provider Deployment The figure displays a typical medium-to-large sized enterprise environment. Each divisions of the enterprise is a separate network. All the divisions communicate with each other through the L3 Switch with Inline IPS, protecting each division s network from intrusions internal to the enterprise, and from intrusions originating from outside the enterprise. Copyright 2004, Intoto Inc. Inline Intrusion Protection White Paper Page 8

A Service provider will have a similar configuration, with subscriber networks in the place of divisions. Conclusion Intrusions are attempted break-ins in violation of defined security policies in a system. They can also be masquerade attacks or impersonations of valid users, but with detectable atypical behavior profiles. Intrusions are usually engineered by penetration of the security control system after deliberate probes and scans to study specific patterns of activity. This is followed by acts that disrupt the regular functioning of the system and its resources. Intrusion Detection is mainly through two methods anomaly detection and signature recognition. Increased connectivity and business opportunities over the Internet also expose greater risks of subversion and endanger the information assets of enterprises. In this context, the use of Intrusion Detecting Systems on networks assumes enormous importance. IDSs detect and prevent attacks from malicious intruders on a network, and alert administrators of the attack. However, IDSs detect rather than react to attacks. Intoto s Inline IPS technology is delivered to OEM customers as the IntruPro IPS solution. IntruPro is a network-based IPS solution with powerful capabilities of detecting intrusion at network (IP), application and traffic levels, and provides comprehensive content searching, DoS attack detection and detection of reconnaissance probes. Intoto provides easy language constructs to write signature rules, and also provides selective downloadable signature rules. Since IntruPro is inline, it is not limited to mere detection of attacks, it is able to reactively stop attacks by terminating sessions and blocking malicious data packets from reaching their intended destination. Copyright 2004, Intoto Inc. Inline Intrusion Protection White Paper Page 9

IntruPro logs provide comprehensive information on intrusions and can be analyzed for information on the type and extent of attacks subverted, and the techniques used for attacks. 1 Intoto Inc. 3100 De La Cruz Blvd., Suite #300 Santa Clara, CA 95054-0480, USA Voice: 408.844.0480 Fax: 408.844.0488 www.intoto.com All trademarks and copyrights referred to are the property of their respective owners. Copyright 2004, Intoto Inc. Inline Intrusion Protection White Paper Page 10