Building accurate intrusion detection systems. Diego Zamboni Global Security Analysis Lab IBM Zürich Research Laboratory



Similar documents
Intrusion Detection for Mobile Ad Hoc Networks

CSCE 465 Computer & Network Security

Intrusion Detection via Static Analysis

Chapter 15 Operating System Security

Intrusion Detection Systems

Intrusion Detection System (IDS)

INTRUSION DETECTION SYSTEMS and Network Security

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Transparent Monitoring of a Process Self in a Virtual Environment

Taxonomy of Intrusion Detection System

Intrusion Detection for Grid and Cloud Computing

Intruders & Intrusion Hackers Criminal groups Insiders. Detection and IDS Techniques Detection Principles Requirements Host-based Network-based

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION. Integrated Information Systems Group, Ruhr University Bochum, Germany

Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002

Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

IDS / IPS. James E. Thiel S.W.A.T.

Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

SURVEY OF INTRUSION DETECTION SYSTEM

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Architecture Overview

Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Marlicia J. Pollard East Carolina University ICTN 4040 SECTION 602 Mrs. Boahn Dr. Lunsford

Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.

Data collection mechanisms for intrusion detection systems

Intruders and viruses. 8: Network Security 8-1

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Intrusion Detection from Simple to Cloud

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

How to Sandbox IIS Automatically without 0 False Positive and Negative

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

Performance Evaluation of Intrusion Detection Systems

Intrusion Detection Systems with Correlation Capabilities

Cloud Resilient Architecture (CRA) -Design and Analysis. Hamid Alipour Salim Hariri Youssif-Al-Nashif

Network Based Intrusion Detection Using Honey pot Deception

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

CHAPTER 1 INTRODUCTION

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Betriebssysteme KU Security

THE ROLE OF IDS & ADS IN NETWORK SECURITY

BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation

Host-based Intrusion Prevention System (HIPS)

Application of Data Mining Techniques in Intrusion Detection

Monitoring, Tracing, Debugging (Under Construction)

CSCI 4250/6250 Fall 2015 Computer and Networks Security

A Review on Network Intrusion Detection System Using Open Source Snort

Intrusion Detection Systems

How To Prevent Network Attacks

Korset: Code-based Intrusion Detection for Linux

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Development of a Network Intrusion Detection System

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Chapter 9 Firewalls and Intrusion Prevention Systems

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Web Application Security

Network- vs. Host-based Intrusion Detection

A very short history of networking

Name. Description. Rationale

JAVA FRAMEWORK FOR SIGNATURE BASED NETWORK INTRUSION DETECTION SYSTEM

Role of Anomaly IDS in Network

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Computational intelligence in intrusion detection systems

NETWORK SECURITY (W/LAB) Course Syllabus

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

The Truth about False Positives

CS Computer and Network Security: Intrusion Detection

Network and Host-based Vulnerability Assessment

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Automating Mimicry Attacks Using Static Binary Analysis

An Inspection on Intrusion Detection and Prevention Mechanisms

IDS : Intrusion Detection System the Survey of Information Security

MULTI LAYERS INTERFERENCE DETECTION SYSTEM IN WEB BASED SERVICES

Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques

Intrusion Detection Systems

Transcription:

Building accurate intrusion detection systems Diego Zamboni Global Security Analysis Lab IBM Zürich Research Laboratory

Outline Brief introduction to intrusion detection The MAFTIA project Accurate intrusion detection systems Our work (GSAL @ IBM ZRL) Skip

Why intrusion detection? Experience shows that...... users want features despite risks javascript, shared files, e-mail e attachments,...... it's hard to get rid of existing problems unsupported OS release, TCP/IP,...... new systems contain old vulnerabilities.... secure + secure secure.... people make mistakes. Real systems must deal with security problems

Intrusion detection Seminal paper in 1980 by Anderson Modern intrusion detection started in 1987 with paper by Dorothy Denning Is the new hot buzzword Many comercial products Many research projects No magical solution

Analogy: protecting your home Prevention Locked doors, secured windows, wall around property, etc. Detection Motion detectors, fire alarm, dog, etc. Detection ƒwe need both We may also need a response Call police, disable intruders, etc.

Diversity is a good thing Multiple specialized sensors vs Single large monolithic sensor But how to make sense of this diversity?

Characteristics of IDSs Knowledge-Based Audit Source Knowledge-Based Host Knowledge-Based Network Intrusion Detection System Knowledge-Based Method Usage Knowledge-Based Knowledge-Based Behavior-Based Sporadic Continuous Reaction Passive Active

Audit source Network Headers or content of network packets Behavior must be deducted Subject to insertion/evasion attacks Easier to deploy No performance impact Host Audit trails (log files)...or direct monitoring Can directly observe behavior More difficult to deploy Possible performance impact

Method Knowledge-based (aka misuse detection) Known events are suspicious (signatures) Behavior-based (aka anomaly detection) Unknown events are suspicious (profiles)

Outline Brief introduction to intrusion detection The MAFTIA project Accurate intrusion detection systems Our work (GSAL @ IBM ZRL)

MAFTIA Malicious and Accidental Fault Tolerance for Internet Applications How to build reliable and secure systems out of insecure components? European project 33 years 66 partners 66 technical workpackages

Why is ID a part of the picture? Things will go wrong Even when our system recovers or resists failures and attacks, we want to know that something happened IDSs need to be protected too How to prevent the IDS itself from being disrupted? Make sure what the IDS reports is true Who watches the watcher?

Outline Brief introduction to intrusion detection The MAFTIA project Accurate intrusion detection systems Our work (GSAL @ IBM ZRL)

(some) Limitations of existing IDSs Unable to detect unknown attacks sometimes not even known attacks! constant updating needed Large number of false alarms IDSs assume they cannot be corrupted

Characteristics we would like in an Intrusion Detection System Good coverage No false alarms Resilient sensors No training needed Capability for automatic updating

Outline Brief introduction to intrusion detection The MAFTIA project Accurate intrusion detection systems Our work (GSAL @ IBM ZRL)

Combining sensors to maximize coverage Recall (Coverage) Goal: find the combination of IDSes that meets our requirements (e.g. 80% coverage, 80% rating precision) Optima at concurrent 100% coverage and 100% rating precision Rating Precision

Dealing with false alarms (1/2) Problems: >95% false positives! Alarm flood worsens as number of signatures rises. Conclusion: This noise makes it impossible to correlate events of those sensors. We need to figure out how to automatically remove it.

Dealing with false alarms (2/2)

Building good intrusion detection sensors Host-based sensors Increased accuracy and access to good data Behavior-based sensors Can react to unknown attacks They tend to generate lots of false alarms

DaemonWatcher Detect suspicious behavior of UNIX processes Principle: A A process is characterized by the sequences (patterns) of system calls it generates The patterns can be used to model the normal behavior of a process Intrusions are assumed to exercise abnormal paths in the executable code

DaemonWatcher

DaemonWatcher: related work UNM The first to propose this approach Used fixed-length sequences of system calls CMU Analyzed the choice of sequence length CMU

Exorcist Detects code insertion attacks Buffer overflow, parasitic viruses Host-based Behavior-based, but no training phase Profile is built by static analysis Components: Analysis phase Sensor

Buffer overflow Return NNNNN...code Buffer code code...aaaaaaaa address low memory high memory

Parasitic virus

Exorcist overview Analysis phase Runtime Program executable Program Analysis open write close NFA Pattern matcher Operating system Alarm

Analysis phase The executable is analyzed using no external information Binary code transformed to Control Flow Graph End product is an NFA Very limited data flow analysis No dependencies on source code availability No training required Compiler, library and processor dependencies e.g. Assumes static linking, ELF files, gcc, glibc 2.x

Analysis phase int main(char **argv, int argc) { int fd=open("test", O_RDWR); char *stuff; if (fd >= 0) { stuff = "Howdy"; write(fd, stuff, strlen(stuff)); close(fd); } return 0; }

The Exorcist sensor Implemented in the Linux kernel User-space space sensor for testing (based on strace) Match against stream of syscalls, using an NFA Syscall parameters are not considered Signals caught and handled separately Threads are currently not handled

Sample Exorcist alarm

Other approaches Closely related work: stide (UNM), DaemonWatcher (IBM ZRL) David Wagner's static analysis (UC Berkeley) Policy-based protection: BlueBox (IBM Watson) RSBAC (Amon Ott, rsbac.org) LIDS Other buffer overflow protection mechanisms: StackGuard, StackGhost, PAX, etc.

Exorcist benefits and drawbacks No training needed Only update profile when program changes Sensor resistant to attacks False-positive free by design Detects new attacks Can potentially stop attacks Prone to mimicry attacks Currently requires patching the kernel

Exorcist present and future Being tested internally Performance tests, accuracy tests Windows version? (DLL + threads) Product or Open Source? Improve analysis phase ob. Autonomic Computing can identify new attacks can automatically protect new programs can be part of an immune system infrastructure