Chapter 16 Attack Detection and Prevention



Similar documents
Attack Detection and Prevention

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

Firewalls and Intrusion Detection

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CS5008: Internet Computing

IDS / IPS. James E. Thiel S.W.A.T.

Introduction of Intrusion Detection Systems

CSCI 4250/6250 Fall 2015 Computer and Networks Security

CS 356 Lecture 16 Denial of Service. Spring 2013

A S B

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

Security: Attack and Defense

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Security vulnerabilities in the Internet and possible solutions

Chapter 8 Security Pt 2

Distributed Denial of Service (DDoS)

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Secure Software Programming and Vulnerability Analysis

Firewalls. Chapter 3

Security Technology White Paper

co Characterizing and Tracing Packet Floods Using Cisco R

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

1. Firewall Configuration

Firewalls, IDS and IPS

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Abstract. Introduction. Section I. What is Denial of Service Attack?

Strategies to Protect Against Distributed Denial of Service (DD

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Denial Of Service. Types of attacks

How To Protect Your Network From Attack From A Hacker On A University Server

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Network Based Intrusion Detection Using Honey pot Deception

DDoS Protection Technology White Paper

Firewalls. Ahmad Almulhem March 10, 2012

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Architecture Overview

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

DDoS Overview and Incident Response Guide. July 2014

Comparing Two Models of Distributed Denial of Service (DDoS) Defences

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

Denial of Service. Tom Chen SMU

Chapter 8 Network Security

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Barracuda Intrusion Detection and Prevention System

Survey on DDoS Attack Detection and Prevention in Cloud

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Linux Network Security

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

Analysis of Automated Model against DDoS Attacks

Firewalls Netasq. Security Management by NETASQ

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

Keywords Attack model, DDoS, Host Scan, Port Scan

Denial of Service Attacks, What They are and How to Combat Them

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Client Server Registration Protocol

Name. Description. Rationale

CIT 480: Securing Computer Systems. Firewalls

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

CMPT 471 Networking II

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Chapter 9 Firewalls and Intrusion Prevention Systems

Network Security Management

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Networks: IP and TCP. Internet Protocol

SURVEY OF INTRUSION DETECTION SYSTEM

information security and its Describe what drives the need for information security.

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Frequent Denial of Service Attacks

Transcription:

Chapter 16 Attack Detection and Prevention Attack Overview, Taxonomy, and Examples Attack Detection Principles of Intrusion Detection Systems Distributed attack detection Attack Prevention [NetSec], WS 2006/2007 16.1

Introduction Definition: Intrusion An Intrusion is unauthorized access to and/or activity in an information system. Definition: Intrusion Detection The process of identifying that an intrusion has been attempted, is occurring or has occurred. National Security Telecommunications Advisory Committee (NSTAC) Intrusion Detection Subgroup [NetSec], WS 2006/2007 16.2

Introduction Intrusion Detection Attack- / Invasion detection: Tries to detect unauthorized access by outsiders Misuse Detection: Tries to detect misuse by insiders, e.g. users that try to access services on the internet by bypassing security directives Anomaly Detection: Tries to detect abnormal states within a network, e.g. sudden appearance of never used protocols, big amount of unsuccessful login attempts Intrusion Prevention An IPS adds further functionality to an IDS. After detecting a possible attack the IPS tries to prevent the ongoing attack, e.g. by closing network connections or reconfiguring firewalls [NetSec], WS 2006/2007 16.3

Introduction [NetSec], WS 2006/2007 16.4

Categorizing Attacks Who / which device is attacking? Normal user device located outside the infrastructure: Examples: PC, PDA, mobile phone,... Commanded by a normal user not aware of what he is doing, or Hacked and commanded by a malicious attacker Device located inside the infrastructure: Examples: router, management workstation,... Either deliberately placed by an attacker inside the infrastructure, or Being part of the genuine infrastructure but hacked and commanded by a malicious attacker Which layer(s) is the attack aiming at? Physical, MAC / Data Link, Network, Transport, Application Which kind of attack is performed? Attacking user data PDUs: eavesdropping, replay, modification,... Resource depletion: TCP-SYN flood, SMURF attack,... [NetSec], WS 2006/2007 16.5

Availability: The Key Challenge for the Next Years Security of transmitted information in the sense of confidentiality, authenticity, etc. is well researched and many network security protocols have been developed & standardized during the past decade Examples: PPP/PPTP, L2TP, IPSec, SSL/TLS, SSH, GSM/GPRS/UMTS security protocols,... In infrastructure networks (like the Internet), routing threats can be effectively countered by deploying PKI-based approaches like S-BGP However, ensuring availability of our IT- and communication infrastructure requires more than can be realized by standard network security protocols, and thus turns out to be the major challenge for the next years of security research! [NetSec], WS 2006/2007 16.6

Denial of Service What is Denial of Service? Denial of Service (DoS) attacks aim at denying or degrading legitimate users access to a service or network resource, or at bringing down the servers offering such services Motivations for launching DoS attacks: Hacking (just for fun, by script kiddies,...) Gaining information leap ( 1997 attack on bureau of labor statistics server; was possibly launched as unemployment information has implications to the stock market) Discrediting an organization operating a system (i.e. web server) Revenge (personal, against a company,...) Political reasons ( information warfare )... [NetSec], WS 2006/2007 16.7

Denial of Service Attacking Techniques Resource destruction (disabling services): Hacking into systems Making use of implementation weaknesses as buffer overrun Deviation from proper protocol execution Resource depletion by causing: Storage of (useless) state information High traffic load (requires high overall bandwidth from attacker) Expensive computations ( expensive cryptography!) Resource reservations that are never used (e.g. bandwidth) Origin of malicious traffic: Genuineness of source addresses: either genuine or forged Number of sources: single source, or multiple sources (Distributed DoS, DDoS) [NetSec], WS 2006/2007 16.8

Examples: Resource Destruction Hacking: Exploiting weaknesses that are caused by careless operation of a system Examples: default accounts and passwords not disabled, badly chosen passwords, social engineering (incl. email worms), etc. Deviation from proper protocol execution: Example: exploit IP s fragmentation & reassembly Send IP fragments to broadcast address 192.168.133.0 Operating systems with origins in BSD often respond to this address as a broadcast address In order to respond, the packets have to be reassembled first If an attacker sends a lot of fragments without ever sending a first / last fragment, the buffer of the reassembling system gets overloaded As some routers use BSD-based TCP/IP stacks, even the network infrastructure can be attacked this way! [NetSec], WS 2006/2007 16.9

Countering Attacks: Three Principle Classes of Action Prevention: All measures taken in order to avert that an attacker succeeds in realizing a threat Examples: Cryptographic measures: encryption, computation of modification detection codes, running authentication protocols, etc. Firewall techniques: packet filtering, service proxying, etc. Preventive measures are by definition taken before an attack takes place Attention: it is generally impossible to prevent every potential attack! Detection: All measures taken to recognize an attack while or after it occurred Examples: Recording and analysis of audit trails On-the-fly traffic monitoring and intrusion detection Reaction: All measures taken in order react to ongoing or past attacks [NetSec], WS 2006/2007 16.10

Attack Strategy Scan for vulnerabilities Detection of vulnerable hosts and applications Compromising hosts Manual hacking Viruses, Trojans, Worms Distributed denial-of-service attack Bandwidth depletion Resource depletion [NetSec], WS 2006/2007 16.11

Port Scan Background Identification of vulnerable systems / applications Automated distribution of worms Scan types Vertical scan: sequential or random scan of multiple (5 or more) ports of a single IP address from the same source during a one hour period Horizontal scan: scan of several machines (5 or more) in a subnet at the same target port from the same source during a one hour period Coordinated scan: scans from multiple sources (5 or more) aimed at a particular port of destinations in the same /24 subnet within a one hour window; also called distributed scan Stealth scan: horizontal or vertical scans initiated with a very low frequency to avoid detection [NetSec], WS 2006/2007 16.12

Port Scan (2) Scan characteristics Port distribution Source distribution Scan rates for top 10 destination port categories between May-July, 2002. Distribution of coordinated, horizontal and vertical scans for the month of June, 2002 Source: [Yegneswaran2003] [NetSec], WS 2006/2007 16.13

Distributed Denial-of-Service Attacks Bandwidth depletion Resource depletion Flood UDP flood ICMP flood Amplification (i.e. using a reflector network) Smurf (ICMP echo request) Fraggle (UDP echo, e.g. chargen) Protocol exploit TCP SYN PUSH+ACK (to unload TCP buffer + ACK to overflow a receiver) Malformed packet attacks Usage of incorrect formatted IP packets to crash the victim system Sleep deprivation Rendering a pervasive computing device inoperable by draining the battery [NetSec], WS 2006/2007 16.14

TCP-SYN flood >90% of DDoS attacks use TCP [Moore2001] Several defense mechanisms SYN cache, SYN cookies, SynDefender, SYN proxying, stateful, have to be installed at victims FW, rely on traceback Flooding detection system (FDS) [Wang2002] Stateless, low computation overhead Relies on SYN-FIN/RST pairs Uses CUSUM (cumulative sum) algorithm Automated model approach [Tupakula2004] Controller-agent model #SYN - #ACK > limit? Agent sends an alarm to the controller Central controller verifies alarm signatures and issues countermeasures Basic idea: detection, source identification, firewall configuration [NetSec], WS 2006/2007 16.15

SYN Flood Protection: TCP SYN cookies SYN cookies as a reaction to an attack SYN cookies are a particular choice of the initial seq number. The server generates the initial sequence number α such as: α = h(s SYN, D SYN, K) S SYN : src addr of the SYN packet D SYN : addr of the server K: a secret key h is a cryptographic hash function. At arrival of the ACK message, the server calculates α again. Then, it verifies if the ack number is correct. If yes, it assumes that the client has sent a SYN message recently (considered as normal behavior), and allocates TCB memory. client SYN seq=x SYN seq= α, ACK x+1 server No resources are allocated here ACK α +1 connection established [NetSec], WS 2006/2007 16.16

Intrusion Detection Data collection issues Reliable and complete data Collection is expensive, collecting the right information is important Detection techniques Misuse detection (or signature-based or knowledge-based) Anomaly detection Response Counteracting an attack Evaluation System effectiveness, performance, network-wide analysis False-positive rate False-negative rate [NetSec], WS 2006/2007 16.17

Classification of Attack Detection Four dimensions Host based Knowledge based Anomaly detection Network based [NetSec], WS 2006/2007 16.18

Classification of Attack Detection (2) Host Intrusion Detection Systems (HIDS) Works on information available on a system, e.g. OS-Logs, application-logs, timestamps Can easily detect attacks by insiders, as modification of files, illegal access to files, installation of Trojans or rootkits Problems: has to be installed on every System, produces lots of information, often no realtime-analysis but predefined time intervals, hard to manage a huge number of systems Network Intrusion Detection System (NIDS) Works on information provided by the network, mainly packets sniffed from the network layer. Uses signature detection (stateful), protocol decoding, statistical anomaly analysis, heuristical analysis Detects: DoS with buffer overflow attacks, invalid packets, attacks on application layer, DDoS, spoofing attacks, port scans Often used on network hubs, to monitor a segment of the network [NetSec], WS 2006/2007 16.19

Placement of a Network Intrusion Detection System Monitors all incoming traffic High load High rate of false alarms Internet Monitors all traffic to and from systems in the DMZ Reduced amount of Data Can only detect Intrusions on these Computers Monitors all traffic within the corporate LAN Possible detection of misuse by insiders Possible detection of intrusion via mobile machines (notebooks...) DMZ LAN [NetSec], WS 2006/2007 16.20

Knowledge-based Detection Based on signatures or patterns of well-known attacks Working principles Scan for attacks using well known vulnerabilities, e.g. patterns to attack IIS web server or MSSQL databases Scan for pre-defined numbers of ICMP, TCP SYN, etc. packets Patterns can be specified at each protocol level Network protocol (e.g. IP, ICMP) Transport protocol (e.g. TCP, UDP) Application protocol (e.g. HTTP, SMTP) Pros Fast, requires few state information, low false-positive rate Cons Recognizes only known attacks Examples Snort, Bro [NetSec], WS 2006/2007 16.21

Snort OpenSource Support for Windows, UNIX, Linux,... Rule Based Intrusion Detection Ruleset can be edited individually Huge number of predefined rules Daily community rules update Reporting into: Logfiles, LogServer, Database Different formats for captured data supported: libpcap,... Supports packet de-fragmentation, protocol decoding, state inspection Possible reactions: TCP reset, ICMP unreachable, configuration of firewalls, alerting via email, pager, SMS (plugins) Graphical tools for administration and analysis are available [NetSec], WS 2006/2007 16.22

Snort (2) Mainly signature based, each intrusion needs a predefined rule alert tcp $HOME_NET any -> any 9996 \ (msg:"sasser ftp script to transfer up.exe"; \ content:" 5F75702E657865 "; depth:250; flags:a+; classtype: misc-activity; \ sid:1000000; rev:3) Three step processing of captured information (capturing is done by libpcap): Preprocessing (normalized and reassembled packets) Detection Engine works on the data and decides what action should be taken Action is taken (log, alert, pass) Modular structure allows to change many parts as Preprocessor, Detection, Action Modules [NetSec], WS 2006/2007 16.23

Anomaly Detection Based on the analysis of long-term and short-term traffic behavior Working principles Scan for anomalies in Traffic behavior Protocol behavior Application behavior Pros Recognizes unknown attacks as well Cons False-positive rate might be high Examples PHAD/ALAD, Emerald [NetSec], WS 2006/2007 16.24

Anomaly Detection (2) Generic anomaly detection system Source: [Estevez-Tapiador2004] [NetSec], WS 2006/2007 16.25

Anomaly Detection (3) Source: [Estevez-Tapiador2004] [NetSec], WS 2006/2007 16.26

Anomaly Detection (4) Classification criteria Source: [Estevez-Tapiador2004] [NetSec], WS 2006/2007 16.27

ALAD Application Layer Anomaly Detection (ALAD) [Mahoney2002] Extension to PHAD Five models: 1. P(src IP dest IP) Learns normal set of clients for each host, i.e. the set of clients allowed on a restricted service 2. P(src IP dest IP, dest port) Like (1), but one model for each server on each host 3. P(dest IP, dest port) Learns the set of local servers which normally receive requests 4. P(TCP flags dest port) Learns the set of TCP flags for all packets of a particular connection 5. P(keyword dest port) Examines the text in the incoming request (first 1000 bytes) [NetSec], WS 2006/2007 16.28

Defense Challenges Need for a distributed response at many points on the Internet Coordinated response is necessary for successful countermeasures Economic and social factors Deployment of response systems at parties that do not suffer direct damage from the DDoS attack Lack of detailed information Thorough understanding of attacks is required Lack of defense system benchmarks Difficulty of large-scale testing [NetSec], WS 2006/2007 16.29

Attack Prevention / Counteracting Anti-Spoof Mechanisms Filtering of forged packets Cryptographic authentication Traceback Counteracting DDoS attacks Counteracting TCP SYN flood Distributed Firewalling Congestion control [NetSec], WS 2006/2007 16.30

Address Spoofing The Spoofing Problem: Packet routing in IP networks is based on destination address information only, correctness of source address is not verified Most (D)DoS attacks consist of packets with spoofed or faked source addresses in order to disguise the identity of the attacking systems Identification of the attacking systems is needed for installing efficient defense mechanisms Some detection mechanisms also require valid information about the attack sources Further issues: legal prosecution of attackers and prevention of new attacks [NetSec], WS 2006/2007 16.31

Anti-Spoof Mechanisms Filtering of forged packets Ingress filtering: implementation of anti-spoof ACLs based on (static/dynamic) knowledge about own IP address range RPF: reverse path forwarding, known from multicast routing, fails for dynamic load-balancing SAVE: source address validity enforcement protocol [Li2002] Associates interfaces with valid source address ranges Also useful for RPF check, e.g. for multicast routing Cryptographic authentication IPSec authentication, problem: key management Traceback Real-time / Forensic methods Most promising solution! [NetSec], WS 2006/2007 16.32

Traceback (1) Goal: Identify the source address (or at least the ingress point) and the attack path of a packet without relying on the source address information Challenges: Short path reconstruction time Processing and storage requirements Scalability Compatibility with existing protocols [NetSec], WS 2006/2007 16.33

Traceback (2) Taxonomy of traceback mechanisms Traceback active passive packet insertion packet marking network reconfig. packet logging flow logging link testing backscatter analysis [NetSec], WS 2006/2007 16.34

Packet Insertion ICMP traceback (ITrace) [Bellovin2000]: For 1 out of 20.000 packets, routers send an ITrace message with router ID and information about original packet to the same destination packet P R1 R2 ITrace(R1, P) If a flow contains enough packets, the destination is likely to receive ITrace messages from every router on the path. Limitations: Router infrastructure has to be modified Requires large number of packets/flow long t.b. time for distributed low-rate attacks Destination has to store original packets for later comparison with ITrace message ITrace messages need to be authenticated, e.g. using PKI Inserted ICMP packets may influence network behavior ICMP traffic is often rate-limited by routers and preferentially dropped during congestion [NetSec], WS 2006/2007 16.35

References [Estevez2004] [Kemmerer2002] [Lee2004] [Li2002] [Mirkovic2004] [Paxson1999] [Porras1997] [Roesch1999] [Tupakula2004] [Wang2002] J. M. Estevez-Tapiador, P. Garcia-Teodoro, and J. E. Diaz-Verdejo, "Anomaly detection methods in wired networks: a survey and taxonomy," Computer Communications, vol. 27, July 2004, pp. 1569-1584. R. Kemmerer and G. Vigna, "Intrusion Detection: A Brief History and Overview," IEEE Computer - Special Issue on Security and Privacy, April 2002, pp. 27-30. R. B. Lee, "Taxonomies of Distributed Denial of Service Networks, Attacks, Tools, and Countermeasures," Princeton University, Technical Report, 2004. J. Li, J. Mirkovic, M. Wang, P. Reiher, and L. Zhang, "SAVE: Source Address Validity Enforcement Protocol," Proceedings of IEEE Infocom 2002, New York, USA, June 2002. J. Mirkovic and P. Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM Computer Communication Review, vol. 34, April 2004, pp. 39-53. V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Computer Networks, vol. 31, December 1999, pp. 2435-2463. P. A. Porras and P. G. Neumann, "EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances," Proceedings of National Information Systems Security Conference, October 1997. M. Roesch, "Snort: Lightweight Intrusion Detection for Networks," Proceedings of 13th USENIX Conference on System Administration, 1999, pp. 229-238. U. K. Tupakula, V. Varadharajan, and A. K. Gajam, "Counteracting TCP SYN DDoS Attacks using Automated Model," Proceedings of IEEE Globecom 2004, Dallas, TX, USA, December 2004. H. Wang, D. Zhang, and K. G. Shin, "Detecting SYN Flooding Attacks," Proceedings of IEEE INFOCOM 2002, 2002. [Yegneswaran2003] V. Yegneswaran, P. Barford, and J. Ullrich, "Internet Intrusions: Global Characteristics and Prevalence," Proceedings of ACM SIGMETRICS, June 2003. [NetSec], WS 2006/2007 16.36