Intrusion Detection. this is not the packet you are looking for, move along



Similar documents
Secure Web Applications. The front line defense

Securing EtherNet/IP Using DPI Firewall Technology

Managing Latency in IPS Networks

Introduction of Intrusion Detection Systems

NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC

IDS / IPS. James E. Thiel S.W.A.T.

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International.

Snort Installation - Ubuntu FEUP. SSI - ProDEI Paulo Neto and Rui Chilro. December 7, 2010

Network Security Management

IDS or IPS? Pocket E-Guide

Chapter 11 Cloud Application Development

Fail-Safe IPS Integration with Bypass Technology

CSCI Firewalls and Packet Filtering

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Security Advisory. Some IPS systems can be easily fingerprinted using simple techniques.

Cisco IPS Tuning Overview

Network Defense Tools

Protocols. Packets. What's in an IP packet

Firewalls, Tunnels, and Network Intrusion Detection

The principle of Network Security Monitoring[NSM]

Whitepaper. Simplifying the Payment Card Industry Data Security Standard. Abstract. A Security-Assessment.com Publication. Special points of interest:

Linux Network Security

IPv6 Security Best Practices. Eric Vyncke Distinguished System Engineer

Playing with Web Application Firewalls

GregSowell.com. Mikrotik Security

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Demystifying the Myth of Passive Network Discovery and Monitoring Systems

Chapter 15. Firewalls, IDS and IPS

MPLS for ISPs PPPoE over VPLS. MPLS, VPLS, PPPoE

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Solution of Exercise Sheet 5

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

VPN Lesson 2: VPN Implementation. Summary

SURVEY OF INTRUSION DETECTION SYSTEM

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

TECHNICAL NOTE 10/03 DEPLOYMENT GUIDANCE FOR INTRUSION DETECTION SYSTEMS

INTRUSION DETECTION SYSTEM

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

IP Filter/Firewall Setup

Stateful Firewalls. Hank and Foo

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

OS/390 Firewall Technology Overview

Safe network analysis

Achieving PCI Compliance Using F5 Products

Intrusion Detection in AlienVault

Architecture Overview

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Network Intrusion Detection Systems. Beyond packet filtering

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access

Configuring Snort as a Firewall on Windows 7 Environment

PROFESSIONAL SECURITY SYSTEMS

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

NETWORK SECURITY (W/LAB) Course Syllabus

How to Build a Massively Scalable Next-Generation Firewall

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Configuring Snort as a Firewall on Windows 7 Environment

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Cisco Intrusion Detection System Services Module (IDSM-2)

8 steps to protect your Cisco router

How To Protect A Web Application From Attack From A Trusted Environment

Application Note. Stateful Firewall, IPS or IDS Load- Balancing

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

May Palo Alto Networks 232 E. Java Drive Sunnyvale, CA

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Are Second Generation Firewalls Good for Industrial Control Systems?

Intrusion Detection Systems

Intro to Firewalls. Summary

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

GFI White Paper PCI-DSS compliance and GFI Software products

Secure Software Programming and Vulnerability Analysis

Computer Networks. Secure Systems

Introduction to Wireshark Network Analysis

Protocol Security Where?

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Implementation of Web Application Firewall

Learn Ethical Hacking, Become a Pentester

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Exploiting Cisco Systems (Even From Windows! ;-) ) Written by Cyvamp (with a few notes added by Raven) July 2000

CTS2134 Introduction to Networking. Module Network Security

White Paper. Intrusion Detection Deploying the Shomiti Century Tap

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

Specific recommendations

How to complete the Secure Internet Site Declaration (SISD) form

Load Balancing 101: Firewall Sandwiches

Intrusion Detections Systems

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Network Scanning. What is a Network scanner? Why are scanners needed? How do scanners do? Which scanner does the market provide?

Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.

Beginning BGP. Peter J. Welcher. Introduction. When Do We Need BGP?

Network Traffic Analysis

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

50. DFN Betriebstagung

Transcription:

Intrusion Detection this is not the packet you are looking for, move along

About Security-Assessment.com Specialise in high quality Information Security services throughout the Asia Pacific region Our aim is to provide the very best independent advice and a high level of technical expertise while creating long and lasting professional relationships with our clients We are committed to security research and development Identifying & responsibly publishing vulnerabilities in public and private software We are an Endorsed Commonwealth Government of Australia supplier Sit on the Australian Government Attorney-General's Department Critical Infrastructure Project panel Certified by both Visa and MasterCard under their Payment Card Industry Data Security Standard Programs

Agenda Prologue Basic Concepts Intrusion Detection Intrusion Prevention Limitations

About Me Have had the experience of both running and attacking large scale IDS installations. Thousands of sensors Multiple sites Millions of EOIs per day

Prologue Some things in here may seem obvious Looking at it as a complete system, braking it up into its components and discussing the vulnerabilities from the perspective of an attacker.

Basic Concepts An IDS sensor captures traffic and compares it to a rule to generate an Event of Interest which is [hopefully] looked at by an analyst.

Event of Interest An Event of Interest (EOI) is an output of the system that something may be wrong, different or require attention. An EOI is not necessarily an attack An attack doesn't necessarily generate an EOI Alternatively an attack may be thousands of EOI An EOI may trigger an active response

IDS A little history 1 st Generation: Gee that's going to hurt! 2 nd Generation: Gee that's going to hurt! - Yep it sure did 3 rd Generation: Gee that's going to hurt! - better ask them to stop 4 th Generation: Gee that's going to hurt! - better tell them to stop 5 th Generation: Gee that would have hurt!

Intrusion Detection Two main types of Detection Rule Based Heuristic Based Two running modes Real Time Batch Mode Generates an EOI that an analyst must action

Intrusion Prevention (as a technology) Same as IDS, except with an active response Sending reset (RST) packets Control of other filtering devices (such as a Firewall) Silently drop packet (sensor must be 'in-line')

Limitations An IDS sensor captures traffic and compares it to a rule to generate an Event of Interest which is [hopefully] looked at by an analyst. Potential Limitations are when the IDS: Captures traffic Compares it to a rule Generates an event Someone performs manual analysis

Traffic Capture If your attack doesn't go past the IDS, it wont see it. Consider: Network Design Is the IDS only at the top of the network? Only on Production Hosts? Route around it? Hop around it?

Traffic Capture Load Balancing Send half the attack through a different leg. Redundant Sites Does the hot site have an IDS too? Is it kept up to date? Is it looked at? ever?

Traffic Capture Traffic Load Its easy to overload an IDS. 'Stick' Database Packet loss

Traffic Capture Encryption SSL. no seriously. VPNs Application level However: sometimes the existence of a data stream can be enough.. like h4x0r.ru having an SSH (or similar) connection to / from really.important.host.company.com

Traffic Capture Confuse it If it can't decode the protocol you are using, It wont (usually) block you. Tell it lies Encode your attack Fragmentation etc.

Rules Rules are often not very good Commercial Vendors do not disclose them You can only write a rule for a known attack Generic rules are often easily bypassed

When the Rule is known (eg Snort) See what the rule is detecting port? header data? string (eg name of exploit) etc Find what it is and change it in the attack

Heuristic Rules Heuristic rules are still rules, they are just automatically generated. You must know the network well Most networks are under constant attack Outage / Change windows

Event of Interest (IPS) Intrusion prevention systems can actively respond to an EOI look for resets (and their TTL value) consider traffic load is availability or confidentiality more important? Island the IPS sensor In-line devices often fail open overload the sensor

The Analyst Analysts come in several forms: The Network / System Admin Doesn't have the time to care. Unless you start to ring the bells of Hell you'll be fine. The Security Admin Old / simple attacks will be picked up, but you can get away with things if you choose your timing well. The full time Security Administrator 24/7 environment. Usually asleep, playing X-box or out getting food

The Security Analyst. An Analyst will have so many attacks and potential attacks to look at, it's a all about prioritising. To do this, the Security Analyst will be looking for the following: Evidence of active targeting Identification of history Identification of technique Identification of intent Level of knowledge of the attacker Individual or group of attackers If you can trick the analyst into ignoring you, (often called an 'exception') you will be able to continue unhindered. (Exceptions can be created by src, dst, or EOI.)

To Recap.. It's not just about the technology There are many points of vulnerability to consider Only one part of the system needs to fail It is difficult, but it can be done

Thank you Questions..? Contact me : Declan.ingram @ security-assessment.com