Application Intrusion Detection



Similar documents
Passing PCI Compliance How to Address the Application Security Mandates

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Audit/Logging Repudiation. Security Testing: Testing for What It s NOT supposed to do

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

8070.S000 Application Security

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Information Security Basic Concepts

Data Management Policies. Sage ERP Online

Web App Security Audit Services

Chap. 1: Introduction

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Data Security Incident Response Plan. [Insert Organization Name]

External Supplier Control Requirements

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

CRYPTUS DIPLOMA IN IT SECURITY

University of Pittsburgh Security Assessment Questionnaire (v1.5)

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications


Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Discovering passwords in the memory

GFI White Paper PCI-DSS compliance and GFI Software products

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Bitrix Software Security. Powerful content management with advanced security features

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

USM IT Security Council Guide for Security Event Logging. Version 1.1

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

Client Security Risk Assessment Questionnaire

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

INTRUSION DETECTION SYSTEMS and Network Security

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

Thick Client Application Security

Penetration Testing Service. By Comsec Information Security Consulting

Juniper Networks Secure

What is Web Security? Motivation

Projectplace: A Secure Project Collaboration Solution

Content Teaching Academy at James Madison University

ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Guide to Vulnerability Management for Small Companies

COSC 472 Network Security

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Midterm. Name: Andrew user id:

Network Security Audit. Vulnerability Assessment (VA)

Certified Ethical Hacker (CEH)

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

GE Measurement & Control. Cyber Security for NEI 08-09

Information Systems Security Assessment

Network Incident Report

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

A Decision Maker s Guide to Securing an IT Infrastructure

Hacking Database for Owning your Data

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

State of Vermont. Intrusion Detection and Prevention Policy. Date: Approved by: Tom Pelham Policy Number:

C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)

elearning for Secure Application Development

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Auditing a Web Application. Brad Ruppert. SANS Technology Institute GWAS Presentation 1

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Fifty Critical Alerts for Monitoring Windows Servers Best practices

locuz.com Professional Services Security Audit Services

ICTN Enterprise Database Security Issues and Solutions

Understanding Security Testing

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Security Testing. How security testing is different Types of security attacks Threat modelling

LINUX / INFORMATION SECURITY

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

Security Goals Services

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

How To Protect Your Data From Being Stolen

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing

Network Security and Firewall 1

Threat Modeling. Deepak Manohar

Web Application Security

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Incident Response Plan for PCI-DSS Compliance

EC-Council Ethical Hacking and Countermeasures

Security + Certification (ITSY 1076) Syllabus

PCI DSS Reporting WHITEPAPER

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

05.0 Application Development

California State University, Chico. Information Security Incident Management Plan

Transcription:

Application Intrusion Detection Drew Miller Black Hat Consulting

Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary

Introduction What is Application Intrusion Detection? Why would I use Application Intrusion Detection? What about IDS (Intrusion Detection Systems)? Exposures

What is Application Intrusion Detection? You design the application You know the operating constraints Your code performs checks to maintain stability and functionality Why not add code that allows your application to do something when it is being attacked?

What is Application Intrusion Detection? (cont.) Design explicitly Failure cases are attacks Functional vs. Security Detect deviations Notify Personnel

Explicit Design User requests must be defined State machine determines when requests can be made and by whom

Failure Cases if( request.length > 32 ) { // then do work } else { // buffer overflow attack in progress }

Failure Cases (cont.) if( request == Login ) { // check state machine if( user logged in == true ) { // out of state request, race condition or logical // attack in progress } }

Failure Cases (cont.) Testing vs. Real World Deployment Bugs or Hacks Functional failures in an application during runtime in deployment are security flaws, not just functional flaws, and they should be treated as such!

Notification Monitoring system is notified when attack possibilities are detected Notify People Number of attempts Type of attempt

Introduction (cont.) What is Application Intrusion Detection? Why would I use Application Intrusion Detection? What about IDS (Intrusion Detection Systems)? Exposures

Why would I use Application Intrusion Detection? Detection Prevention Protection

Detection Will users forget passwords? Yes. Will the authentication system notify such failures and security events? Yes. Can the system be tuned to allow a certain deviation in authentication failures so that a single user doesn t set off emergency alarms, but a brute force attack would? Yes.

Prevention The security event logs show that there is a massive amount of brute forcing of possible table indices for my web application. What does that mean? Verify that your authorization model doesn t allow access to records that the user should not access. Gives you time to add more defenses such as hashing (index+magic value) table indices to negate index brute forcing completely.

Protection Where are you protected? Where are you not protected? Real time auditing information that is generated from your application helps determine how well you are protected and gives you functional and even legally binding data about what is going on.

Introduction (cont.) What is Application Intrusion Detection? Why would I use Application Intrusion Detection? What about IDS (Intrusion Detection Systems)? Exposures

What about IDS (Intrusion Detection Systems)? Application layer packet filtering? Application layer state management? IDS must see data to analyze what if my data is encrypted (which it should be) Application level intrusion detection cannot be duplicated successfully by a network IDS.

Introduction (cont.) What is Application Intrusion Detection? Why would I use Application Intrusion Detection? What about IDS (Intrusion Detection Systems)? Exposures

Exposures An exposure is a general term that refers to the knowledge a hacker has. It allows him or her to gain more information or use your system in ways that are not intended given the user. Buffer Overflows Injections Information Leakage Replay Attacks Session Hijacking

Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary

Mitigating Exposures These are exposures that we know we are stopping and we should know that we stop them. Data Restrictions Buffer Overflows Injections Brute Forcing State Race Conditions Privilege Escalation Authorization

Data Restrictions Buffer Overflow Detection Demonstration A simple bounds checking routine will detect that a string is too large. If your client program was written to only allow the correct size, then someone is hacking your application.

Data Restrictions (cont.) Brute Forcing Detection Demonstration Never deny access for more than a few seconds, or else brute force attacks can be used to cause denial of service to your clients.

State Out-of-State User Request Demonstration Authorization models can be implemented with state machines to control who may access specific resources.

State (cont.) Authorization Failure Demonstration When users fail authorization checks, it makes you wonder if the application should even allow the user to make the request

Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary

Monitoring Exposures These are exposures that we know we can not stop which makes it more important to know when they occur Local Protection (Modification Detection) Log Files Secrets User Databases

Log Files Created during deployment Recreated immediately after backup Log files should always exist Applications should always append data and never overwrite data

Log Files (cont.) Log Files Demonstration Can t be modified without detection. Allow for non-repudiation in legal cases. Can help forensics when and if a system is exploited by a hacker.

Secrets If a secret can t be found, fail to close instead of fail to open. This is purposefully causing yourself denial of service. Is that better than allowing hackers to have a free for all with your network application?

User Databases Vulnerability A missing user database means free access? Solution Backup as often as performance allows when you are sure the system is clean. Deploy old backup to restore missing files deleted by hacker. Don t allow access to the application without authentication and authorization in place, even in such extreme situations as a worm or virus infecting your deployment system.

User Databases (cont.) User Database Demonstration System Administrator vs. Application System Administrator Backups and Deployment

Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary

Response Times Time to Hack vs. Time to Detect People Pager Notification Email Notification On Duty Security Personnel Authorities FBI, etc. Third-Party Vendors Credit Card Companies

Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary

Proactive Risk Analysis The Business Decision We will take the risk to deploy with a known vulnerability. Is detection as cheap as mitigation? Historical Data Limited budgets, resources and/or performance limit security infrastructure. Use historical data to monitor or mitigate your most vulnerable areas.

Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary

Summary Plan for exposure mitigation and monitoring Build common data, error handling, and auditing routines. Determine which exposures that are accessed by hackers should notify real people immediately. Build a response process to secure forensic data and restore the application to a known secure and working state after hackers attempt to break in.