Evaluation of Intrusion Detection Systems in Clouds



Similar documents
IDS / IPS. James E. Thiel S.W.A.T.

My FreeScan Vulnerabilities Report

Detection of virtual machine monitor corruptions

Altus UC Security Overview

SCADA Security Example

Automated Approach to Network Access Controls in a Virtual Infrastructure

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Chapter 11 Cloud Application Development

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

Fighting Advanced Persistent Threats (APT) with Open Source Tools

Payment Card Industry (PCI) Executive Report 08/04/2014

Introduction of Intrusion Detection Systems

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

Fighting Advanced Persistent Threats (APT) with Open Source Tools

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Configuring Security for FTP Traffic

Lesson 5: Network perimeter security

Firewalls (IPTABLES)

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Firewalls and Intrusion Detection

Divide and Conquer Real World Distributed Port Scanning

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Figure 41-1 IP Filter Rules

Linux Network Security

Architecture Overview

Intrusion Detection System

Internet Security and Acceleration Server 2000 with Service Pack 1 Audit. An analysis by Foundstone, Inc.

Security of Information Systems hosted in Clouds: SLA Definition and Enforcement in a Dynamic Environment

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Payment Card Industry (PCI) Executive Report 10/27/2015

Stateful Firewalls. Hank and Foo

Security Advisory. Some IPS systems can be easily fingerprinted using simple techniques.

Intrusion Detection Systems. Darren R. Davis Student Computing Labs

Securing Cloud Infrastructures with Elastic Security

How To Block A Ddos Attack On A Network With A Firewall

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Lab Objectives & Turn In

Configuring Security for SMTP Traffic

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Firewalls P+S Linux Router & Firewall 2013

Payment Card Industry (PCI) Executive Report. Pukka Software

Firewall Firewall August, 2003

A Comparison of Four Intrusion Detection Systems for Secure E-Business

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Software Vulnerability Assessment

How To Protect Your Network From Attack From Outside From Inside And Outside

Pre Sales Communications

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Chapter 15. Firewalls, IDS and IPS

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Introduction to Computer Security Benoit Donnet Academic Year

Development of a Network Intrusion Detection System

Devising a Server Protection Strategy with Trend Micro

1 Scope of Assessment

How To Protect Your Network From Attack From A Hacker On A University Server

Active Defense and Prevention

Directory and File Transfer Services. Chapter 7

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

ΕΠΛ 674: Εργαστήριο 5 Firewalls

FIREWALL POLICY November 2006 TNS POL - 008

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Fig : Packet Filtering

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

From Network Security To Content Filtering

A Case Study on Constructing a Security Event Management (SEM) System

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Firewalls, IDS and IPS

NAS 224 Remote Access Manual Configuration

Cisco IPS Tuning Overview

EXPLORER. TFT Filter CONFIGURATION

Firewall Testing Methodology W H I T E P A P E R

Linux MDS Firewall Supplement

Intrusion Detection in AlienVault

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS)

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

Intrusion Detection from Simple to Cloud

Intro to Firewalls. Summary

Linux MPS Firewall Supplement

CNS-301-3I ~ Citrix NetScaler 11 Advanced Implementation

Load Balance Mechanism

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Managing Latency in IPS Networks

Firewalls, Tunnels, and Network Intrusion Detection

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Application DDoS Mitigation

Intrusion Detection Systems

Cyber Essentials. Test Specification

Symantec Endpoint Protection Analyzer Report

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Transcription:

Problem statement Evaluation of Intrusion Detection Systems in Clouds Thibaut Probst, E. Alata, M. Kaâniche, V. Nicomette LAAS-CNRS - Dependable Computing and Fault Tolerance (TSF) team Journée SEC 2 - June 30th, 2015 Evaluation of Intrusion Detection Systems in Clouds 1 / 22

Problem statement 1 Problem statement 2 Cloning Analysis of accessibilities IDS/IPS evaluation 3 4 Evaluation of Intrusion Detection Systems in Clouds 2 / 22

Outline Problem statement 1 Problem statement 2 3 4 Evaluation of Intrusion Detection Systems in Clouds 3 / 22

Problem statement Context and problem statement Cloud computing Deploy and manage applications, development and execution platforms, virtual infrastructures hosted by a provider. On-demand self-service, broad network access, resource pooling, rapid elasticity, measured service. Security concerns Many actors and technologies many possible threats. Security mechanisms deployed in virtual infrastructures : firewalls (network filtering), IDS/IPS (attack detection). How to assess their efficiency? Evaluation of Intrusion Detection Systems in Clouds 4 / 22

Problem statement Overview of the Approach Objective Allow the automated evaluation and analysis of security mechanisms deployed in virtual infrastructures : Provide the client and provider security reports on network accessibilities and IDS/IPS performance. Main assumptions Service model : Infrastructure as a Service (IaaS). Considered firewall types : Edge firewall and Hypervisor-based firewall The audit process should not disturb client s business. Evaluation of Intrusion Detection Systems in Clouds 5 / 22

Problem statement Overview of the Approach Three-phase approach 1 Retrieval of information and cloning of infrastructure. 2 Determination of accessibilities in two ways and analysis of discrepancies in the results. 3 Construction and execution of attack campaigns. Evaluation of Intrusion Detection Systems in Clouds 6 / 22

Outline Problem statement Cloning Analysis of accessibilities IDS/IPS evaluation 1 Problem statement 2 Cloning Analysis of accessibilities IDS/IPS evaluation 3 4 Evaluation of Intrusion Detection Systems in Clouds 7 / 22

Problem statement Preparation of the infrastructure Cloning Analysis of accessibilities IDS/IPS evaluation Objective From the client ID/name, clone the virtual infrastructure (virtual datacenters, edge firewalls and virtual networks) Create the different VMs from a template Avoid IP conflicts due to cloning in external networks. Evaluation of Intrusion Detection Systems in Clouds 8 / 22

Problem statement Analysis of network access controls Cloning Analysis of accessibilities IDS/IPS evaluation Accessibility : Authorized service from a source to a destination. First support of attack vectors. Accessibility matrix : Set of VMs VMs and external location VMs accessibilities. User-defined in a security policy and implemented on equipments (firewalls) as filtering rules. 2 methods to derive it : Statically configured accessibilities. Dynamically observed accessibilities. Discrepancy : accessibility not noticed in all 3 matrices. Evaluation of Intrusion Detection Systems in Clouds 9 / 22

Static analysis Problem statement Cloning Analysis of accessibilities IDS/IPS evaluation Accessibility predicate : accessibility(x, SPORT, Y, PROTO, DPORT) Static analysis : determination of all accessibility predicates from cloud components configuration : configured accessibilities. Evaluation of Intrusion Detection Systems in Clouds 10 / 22

Dynamic analysis Problem statement Cloning Analysis of accessibilities IDS/IPS evaluation Dynamic analysis : network packet exchanges between VMs (client server) to determine accessibilities : observed accessibilities Design of an algorithm to perform all client-server sessions in a the smallest possible number of iterations run sessions in parallel when possible. Evaluation of Intrusion Detection Systems in Clouds 11 / 22

Evaluation trafic Problem statement Cloning Analysis of accessibilities IDS/IPS evaluation Automata based modelisation To generate and replay legitimate and malicious packets exchanges To avoid installing, running and stopping applications during the attack campaigns To be free of Windows licences Evaluation of Intrusion Detection Systems in Clouds 12 / 22

Evaluation trafic Problem statement Cloning Analysis of accessibilities IDS/IPS evaluation Automata generation Process before attack campaigns. Use of Metasploit (malicious trafic) and various tools (legitimate trafic) to interact with vulnerable applications Evaluation of Intrusion Detection Systems in Clouds 13 / 22

Attack campaigns Problem statement Cloning Analysis of accessibilities IDS/IPS evaluation Principle Execution of attacks and legitimate activity sessions for each accessibility discovered during the previous phase. Try to parallelize as much as possible the sessions Use of attacks dictionnary Alarms from the different NIDS are collected, backed-up and analysed to calculate usual IDS metrics Evaluation of Intrusion Detection Systems in Clouds 14 / 22

Attack campaigns Problem statement Cloning Analysis of accessibilities IDS/IPS evaluation NIDS metrics True Positive if : Duration between alarm and attack < Threshold. IP adresses, protocols and ports included in the alarm correspond to those of the attack. The alarm is serious. The CVEs of the alarm correspond to the CVE of the attack. False Positive if a raised alarm does not correspond to an attack False Negative if no alarm raised for an attack DR = PR = TP TP+FN. TP TP+FP. Evaluation of Intrusion Detection Systems in Clouds 15 / 22

Outline Problem statement 1 Problem statement 2 3 4 Evaluation of Intrusion Detection Systems in Clouds 16 / 22

Problem statement Testbed environment Evaluation of Intrusion Detection Systems in Clouds 17 / 22

Problem statement Dynamic analysis of accessibilities : example Evaluation of Intrusion Detection Systems in Clouds 18 / 22

Problem statement NIDS Evaluation : attacks dictionnary exploit id cve proto port date description N sl N sm 35660 2014-9567 TCP 80 2014-12-02 ProjectSend Arbitrary File Upload 3 3 34926 2014-6287 TCP 80 2014-09-11 Rejetto HttpFileServer Remote Command Execution 12 12 33790 N/A TCP 80 2014-05-20 Easy File Management Web Server Stack Buffer 7 8 Overflow 25775 2013-2028 TCP 80 2013-05-07 Nginx HTTP Server 1.3.9-1.4.0 - Chuncked Encoding 3 8 Stack Buffer Overflow 16970 2002-2268 TCP 80 2010-12-26 Kolibri 2.0 - HTTP Server HEAD Buffer Overflow 2 2 16806 2007-6377 TCP 80 2007-12-10 BadBlue 2.72b PassThru Buffer Overflow 9 3 28681 N/A TCP 21 2013-08-20 freeftpd PASS Command Buffer Overflow 11 4 24875 N/A TCP 21 2013-02-27 Sami FTP Server LIST Command Buffer Overflow 11 3 17355 2006-6576 TCP 21 2011-01-23 GoldenFTP 4.70 PASS Stack Buffer Overflow 13 7 16742 2006-3952 TCP 21 2006-07-31 Easy File Sharing FTP Server 2.0 PASS Overflow 11 6 16713 2006-2961 TCP 21 2006-06-12 Cesar FTP 0.99g MKD Command Buffer Overflow 11 6 16821 2007-4440 TCP 25 2007-08-18 Mercury Mail SMTP AUTH CRAM-MD5 Buffer 9 8 Overflow 16822 2004-1638 TCP 25 2004-10-26 TABS MailCarrier 2.51 - SMTP EHLO Overflow 6 6 16476 2006-1255 TCP 143 2006-03-17 Mercur 5.0 - IMAP SP3 SELECT Buffer Overflow 7 4 16474 2005-4267 TCP 143 2005-12-20 Qualcomm WorldMail 3.0 IMAPD LIST Buffer Overflow 2 2 Evaluation of Intrusion Detection Systems in Clouds 19 / 22

Problem statement NIDS evaluation : example with Snort and Suricata Detection rate and precision Snort detects more attacks than Suricata. Suricata is more accurate than Snort. Considering only serious alarms decreases the detection rate but improves the precision. Evaluation of Intrusion Detection Systems in Clouds 20 / 22

Outline Problem statement 1 Problem statement 2 3 4 Evaluation of Intrusion Detection Systems in Clouds 21 / 22

Problem statement Proposed approach Analysis of network access controls and evaluation of IDS/IPS. Fully automated process with no impact on the client s business. Contributions Cloning of virtual infrastructures Static analysis of network access controls. Dynamic analysis of network access controls. Construction and execution of attack campaigns through automata based methods. Ongoing work and perspectives Autonomous system to automatically launch security audits. Extend the prototypes to other cloud solutions (OpenStack...). Evaluation of Intrusion Detection Systems in Clouds 22 / 22