CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013



Similar documents
Intruders & Intrusion Hackers Criminal groups Insiders. Detection and IDS Techniques Detection Principles Requirements Host-based Network-based

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Segurança Redes e Dados

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Firewalls. CS 6v81 - Network Security. What is a firewall? Firewall capabilities. Firewall limitations. Firewall limitations, cont d

Chapter 9 Firewalls and Intrusion Prevention Systems

INTRUSION DETECTION SYSTEMS and Network Security

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Name. Description. Rationale

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Intrusion Detection Systems

Security Intrusion & Detection. Intrusion Detection Systems (IDSs)

Taxonomy of Intrusion Detection System

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

IDS / IPS. James E. Thiel S.W.A.T.

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Network- vs. Host-based Intrusion Detection

Network and Host-based Vulnerability Assessment

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

PROFESSIONAL SECURITY SYSTEMS

Architecture Overview

Second-generation (GenII) honeypots

Computer Security: Principles and Practice

Computer Security DD2395

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Network Based Intrusion Detection Using Honey pot Deception

Firewalls, Tunnels, and Network Intrusion Detection

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Intrusion Detections Systems

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

How To Protect A Network From Attack From A Hacker (Hbss)

IDS : Intrusion Detection System the Survey of Information Security

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Performance Evaluation of Intrusion Detection Systems

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

USM IT Security Council Guide for Security Event Logging. Version 1.1

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Intrusion Detection Systems

Intruders and viruses. 8: Network Security 8-1

Introduction of Intrusion Detection Systems

Intrusion Detection Systems (IDS)

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

The Self-Hack Audit Stephen James Payoff

Intrusion Detection System (IDS)

Information Technology Cyber Security Policy

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

INTRUDERS PART 6: SYSTEM SECURITY CHAPTER 20-1

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Description: Objective: Attending students will learn:

Computer Security DD2395

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

CTS2134 Introduction to Networking. Module Network Security

Penetration Testing Service. By Comsec Information Security Consulting

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Critical Controls for Cyber Security.

Marlicia J. Pollard East Carolina University ICTN 4040 SECTION 602 Mrs. Boahn Dr. Lunsford

Global Partner Management Notice

Intrusion Detection Systems

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Network Defense Tools

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

How To Protect Your Network From Attack From A Hacker On A University Server

Intrusion Detection for Mobile Ad Hoc Networks

Radware s Behavioral Server Cracking Protection

74% 96 Action Items. Compliance

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Computer Networks & Computer Security

Firewalls CSCI 454/554

Section 12 MUST BE COMPLETED BY: 4/22

Guideline on Auditing and Log Management

SURVEY OF INTRUSION DETECTION SYSTEM

B database Security - A Case Study

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Firewall Design Principles Firewall Characteristics Types of Firewalls

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Network Security Administrator

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Transcription:

CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013

Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database Security (skipped) Chapter 6 Malicious Software Networking Basics (not in book) Chapter 7 Denial of Service Chapter 8 Intrusion Detection

Chapter 8 Intrusion Detection

classes: Intruders l two most publicized threats to security are malware and intruders l generally referred to as a hacker or cracker masquerader likely to be an outsider an unauthorized individual who penetrates a system to exploit a legitimate user account misfeasor generally an insider legitimate user who misuses privileges clandestine user can be either insider or outsider individual who seizes supervisory control to evade auditing and access controls or to suppress audit collection

Examples of Intrusion remote root compromise web server defacement guessing / cracking passwords copying databases containing credit card numbers viewing sensitive data without authorization running a packet sniffer distributing pirated software using an unsecured modem to access internal network impersonating an executive to get information using an unattended workstation

Hackers motivated by thrill of access and/or status hacking community is a strong meritocracy status is determined by level of competence benign intruders consume resources and slow performance for legitimate users intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) are designed to help counter hacker threats can restrict remote logons to specific IP addresses can use virtual private network technology (VPN) intruder problem led to establishment of computer emergency response teams (CERTs)

1 select the target using IP lookup tools such as NSLookup, Dig, and others 2 map network for accessible services using tools such as NMAP 3 identify potentially vulnerable services (in this case, pcanywhere) 4 brute force (guess) pcanywhere password 5 install remote administration tool called DameWare 6 wait for administrator to log on and capture his password 7 use that password to access remainder of network

Criminals organized groups of hackers now a threat corporation / government / loosely affiliated gangs meet in underground forums common target is credit card files on e-commerce servers criminal hackers usually have specific targets once penetrated act quickly and get out IDS / IPS can be used but less effective sensitive data should be encrypted

Criminal Enterprise Patterns of Behavior act quickly and precisely to make their activities harder to detect exploit perimeter via vulnerable ports use Trojan horses (hidden software) to leave back doors for re-entry use sniffers to capture passwords do not stick around until noticed

Insider Attacks among most difficult to detect and prevent employees have access and systems knowledge may be motivated by revenge/entitlement employment was terminated taking customer data when moving to a competitor IDS / IPS can be useful but also need: enforcement of least privilege, monitor logs, strong authentication, termination process

Internal Threat Patterns of Behavior create network accounts for themselves and their friends access accounts and applications they wouldn't normally use for their daily jobs e-mail former and prospective employers perform large downloads and file copying visit web sites that cater to disgruntled employees, such as f'dcompany.com conduct furtive instant-messaging chats access the network during off hours

The following definitions from RFC 2828 (Internet Security Glossary) Security Intrusion: A security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system (or system resource) without having authorization to do so. Intrusion Detection : A security service that monitors and analyzes system events for the purpose of finding, and providing real-time or near real-time warning of, attempts to access system resources in an unauthorized manner.

Intrusion Detection Systems (IDSs) l host-based IDS l monitors the characteristics of a single host for suspicious activity l network-based IDS l monitors network traffic and analyzes network, transport, and application protocols to identify suspicious activity comprises three logical components: sensors - collect data analyzers - determine if intrusion has occurred user interface - view output or control system behavior

IDS Principles Probability density function profile of intruder behavior profile of authorized user behavior overlap in observed or expected behavior l assume intruder behavior differs from legitimate users average behavior of intruder average behavior of authorized user Measurable behavior parameter l overlap in behaviors causes problems Figure 8.1 Profiles of Behavior of Intruders and Authorized Users l false positives l false negatives

IDS Requirements run continually be fault tolerant resist subversion impose a minimal overhead on system scale to monitor large numbers of systems configured according to system security policies provide graceful degradation of service adapt to changes in systems and users allow dynamic reconfiguration

Host-Based IDS adds a specialized layer of security software to vulnerable or sensitive systems monitors activity to detect suspicious behavior primary purpose is to detect intrusions, log suspicious events, and send alerts can detect both external and internal intrusions

Host-Based IDS Approaches to Intrusion Detection anomaly detection threshold detection involves counting the number of occurrences of a specific event type over an interval of time profile based profile of the activity of each user is developed and used to detect changes in the behavior of individual accounts signature detection involves an attempt to define a set of rules or attack patterns that can be used to decide that a given behavior is that of an intruder

native audit records multiuser operating systems include accounting software that collects information on user activity advantage is that no additional collection software is needed disadvantage is that records may not contain the needed information or in a convenient form detection-specific audit record collection facility that generates records containing only information required by the IDS advantage is that it could be made vendor independent and ported to a variety of systems disadvantage is the extra overhead of having, in effect, two accounting packages running on a machine

Measures That May Be Used For Intrusion Detection

Signature Detection l rule-based anomaly detection l historical audit records are analyzed to identify usage patterns l rules are generated that describe those patterns l current behavior is matched against the set of rules l does not require knowledge of security vulnerabilities within the system l a large database of rules is needed rule-based penetration identification key feature is the use of rules for identifying known penetrations or penetrations that would exploit known weaknesses rules can also be defined that identify suspicious behavior typically rules are specific to the machine and operating system

USTAT Actions vs. SunOS Event Types

LAN Monitor Host Host Agent module Distributed Host- Router Based IDS Central Manager Internet Manager module Figure 8.2 Architecture for Distributed Intrusion Detection

OS audit information Distributed Host-Based Filter Host Audit Record Central Manager IDS Logic Alerts Query/ response Templates Notable activity Signatures Noteworthy sessions Modifications Agent Protocol Machine Figure 8.3 Agent Architecture

Network-Based IDS (NIDS) monitors traffic at selected points on a network examines traffic packet by packet in real or close to real time may examine network, transport, and/or application-level protocol activity comprised of a number of sensors, one or more servers for NIDS management functions, and one or more management consoles for the human interface analysis of traffic patterns may be done at the sensor, the management server or a combination of the two

NIDS Sensor Deployment Network traffic l inline sensor l inserted into a network segment so that the traffic that it is monitoring must pass through the sensor l passive sensors l monitors a copy of network traffic NIDS sensor Monitoring interface (no IP, promiscuous mode) Management interface (with IP) Figure 8.4 Passive NIDS Sensor (based on [CREM06])

internal server and data resource networks Internet 3 LAN switch or router internal firewall 2 workstation networks LAN switch or router 1 external firewall 4 LAN switch or router internal firewall service network (Web, Mail, DNS, etc.) Figure 8.5 Example of NIDS Sensor Deployment

Intrusion Detection Techniques signature detection at application, transport, network layers; unexpected application services, policy violations anomaly detection denial of service attacks, scanning, worms when a sensor detects a potential violation it sends an alert and logs information related to the event used by analysis module to refine intrusion detection parameters and algorithms security administration can use this information to design prevention techniques

Platform policies Adaptive feedback based policies Summary events Platform policies Platform policies Network policies Collaborative policies PEP events DDI events Platform events Distributed detection and inference gossip Platform events PEP = policy enforcement point DDI = distributed detection and inference Figure 8.6 Overall Architecture of an Autonomic Enterprise Security System

Operator Intrusion Data source Activity Sensor Detection Event Sensor Notification Exchange Event Analyzer Alert Response Format Security policy Security policy Manager Administrator Figure 8.7 Model For Intrusion Detection Message Exchange

Honeypot decoy systems designed to: lure a potential attacker away from critical systems collect information about the attacker s activity encourage the attacker to stay on the system long enough for administrators to respond filled with fabricated information that a legitimate user of the system wouldn t access resource that has no production value incoming communication is most likely a probe, scan, or attack outbound communication suggests that the system has probably been compromised once hackers are within the network, administrators can observe their behavior to figure out defenses

Internet 1 Honeypot Honeypot Deployment 3 LAN switch or router External firewall Honeypot LAN switch or router 2 Internal network Service network (Web, Mail, DNS, etc.) Honeypot Figure 8.8 Example of Honeypot Deployment

SNORT lightweight IDS real-time packet capture and rule analysis easily deployed on nodes uses small amount of memory and processor time easily configured Log Packet Decoder Detection Engine Alert Figure 8.9 Snort Architecture

SNORT Rules use a simple, flexible rule definition language each rule consists of a fixed header and zero or more options

Examples of SNORT Rule Options

Summary intruders masquerader misfeasor clandestine user intruder behavior patterns hacker criminal enterprise internal threat security intrusion/intrusion detection intrusion detection systems host-based network-based sensors, analyzers, user interface host-based anomaly detection signature detection audit records distributed host-based intrusion detection network-based sensors: inline/passive distributed adaptive intrusion detection intrusion detection exchange format honeypot SNORT