Yuan Fan Arcsight. Advance SQL Injection Detection by Join Force of Database Auditing and Anomaly Intrusion Detection



Similar documents
Web Forensic Evidence of SQL Injection Analysis

Preprocessing Web Logs for Web Intrusion Detection

Analysis of SQL injection prevention using a proxy server

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Guidelines for Web applications protection with dedicated Web Application Firewall

Double guard: Detecting Interruptions in N- Tier Web Applications

The SQL Injection and Signature Evasion

Check list for web developers

White Paper. What Auditors Want Database Auditing. 5 Key Questions Auditors Ask During a Database Compliance Audit

ICTN Enterprise Database Security Issues and Solutions

Web Application Security

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

Oracle Audit Vault and Database Firewall

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Automating SQL Injection Exploits

SQL Injection. The ability to inject SQL commands into the database engine through an existing application

Secret Server Qualys Integration Guide

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Worldwide Trends in Database Threats and Database Security

Security and Control Issues within Relational Databases

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY

Securing and Accelerating Databases In Minutes using GreenSQL

Data Breaches and Web Servers: The Giant Sucking Sound

Network- vs. Host-based Intrusion Detection

HTTPParameter Pollution. ChrysostomosDaniel

A B S T R A C T. Index Terms: DoubleGuard; database server; intruder; web server I INTRODUCTION

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Web Application Vulnerabilities and Avoiding Application Exposure

How To Prevent Hacker Attacks With Network Behavior Analysis

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS)

MatriXay Database Vulnerability Scanner V3.0

Testing Web Applications for SQL Injection Sam Shober

SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva

DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS

SQL Injection in web applications

Using Monitoring, Logging, and Alerting to Improve ICS Security ICSJWG 2015 Fall Meeting October 27, 2015

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Web Vulnerability Scanner by Using HTTP Method

SQL Injection for newbie

SECURING APACHE : THE BASICS - III

Repsheet. A Behavior Based Approach to Web Application Security. Aaron Bedra Application Security Lead Braintree Payments. tirsdag den 1.

Oracle Database 10g Express

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Web Application Security

AppWall SIEM Integration Guide

Radware s Behavioral Server Cracking Protection

Network Monitoring using MMT:

Intrusion Detection Systems

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Agenda. SQL Injection Impact in the Real World Attack Scenario (1) CHAPTER 8 SQL Injection

Implementing Database Security and Auditing

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Improved Penetration Testing of Web Apps and Databases with MatriXay

Thick Client Application Security

The New PCI Requirement: Application Firewall vs. Code Review

SQL Injection Signature Evasion Whitepaper The Wrong Solution to the Right Problem

Revisiting SQL Injection Will we ever get it right? Michael Sutton, Security Evangelist

Security for PCI Compliance Addressing Security and Auditing Requirements for In-scope Web Applications, Databases and File Servers

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions

Introduction to IT Security

Securing SharePoint 101. Rob Rachwald Imperva

Magento Security and Vulnerabilities. Roman Stepanov

VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso

Lecture 15 - Web Security

Turning your managed Anti-Virus

Intrusion Detection Systems

SQL Injection. By Artem Kazanstev, ITSO and Alex Beutel, Student

Time-Based Blind SQL Injection using Heavy Queries A practical approach for MS SQL Server, MS Access, Oracle and MySQL databases and Marathon Tool

Cross-site site Scripting Attacks on Android WebView

INTRUSION DETECTION SYSTEM FOR WEB APPLICATIONS WITH ATTACK CLASSIFICATION

Enhanced Model of SQL Injection Detecting and Prevention

Passing PCI Compliance How to Address the Application Security Mandates

Application Intrusion Detection

Monitoring System Status

End-user Security Analytics Strengthens Protection with ArcSight

WSF: An HTTP-level Firewall for Hardening Web Servers

Global Partner Management Notice

USM IT Security Council Guide for Security Event Logging. Version 1.1

Database Security. The Past, the Present, the Future. Mark Kraynak Director of Product Marketing Imperva

MULTI LAYERS INTERFERENCE DETECTION SYSTEM IN WEB BASED SERVICES

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

F5 ASM i DB Monitoring w ofercie NASK

SANS Top 20 Critical Controls for Effective Cyber Defense

Automating Attack Analysis Using Audit Data. Dr. Bruce Gabrielson (BAH) CND R&T PMO 28 October 2009

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

MySQL Security: Best Practices

Virtual Private Database Features in Oracle 10g.

Web Application Security

Exposed Database( SQL Server) Error messages Delicious food for Hackers

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

WEB Penetration Testing

SQL Server for developers. murach's TRAINING & REFERENCE. Bryan Syverson. Mike Murach & Associates, Inc. Joel Murach

Transcription:

Yuan Fan, CISSP, has worked in the network security area for more than 7 years. He currently works for ArcSight as a Software Engineer. He holds a Master of Computer Engineering degree from San Jose State University. The tool he is writing for master graduate research project related to this topic is a Java-based, multilayer anomaly intrusion detection system. Yuan Fan Arcsight Advance SQL Injection Detection by Join Force of Database Auditing and Anomaly Intrusion Detection This topic will present the proposal/idea/work from the author s master graduate project about effective detection of SQL Injection exploits while lowering the number of false positives. It gives detail analysis example of how database auditing could help this case, and also presents the challenge with anomaly detection for this attack and how the author tried to solve them. Finally a correlation between the two will be presented. black hat briefings

Advance SQL Injection detection by join force of Database Auditing and Anomaly intrusion detection Yuan Fan, CISSP BlackHat 2005 Related Topics Detection of Web Application Attacks [BlackHat 2004] This topic: 1. Presents an idea/work and a detailed example for database auditing to help SQL Injection detection. 2. Presents a master program project about anomaly intrusion detection for SQL Injection and correlation ideas between database auditing and anomaly intrusion detection. black hat briefings

black hat briefings Web Application Security Vulnerabilities Trends 700 600 500 400 300 200 100 0 July-Dec/2003 Proportion among all vulnerabilities July-Dec/2004 Web All other application vulnerabilities vulnerabilities Web application vulnerabilities What portion of production web applications do not use a database? What is SQL Injection? Source: Symantec Threat Report An attack method that exploits the vulnerability of web applications by using deliberate input data to generate a SQL query against the backend database to achieve goals such as unsolicited data exploitation and manipulation. Examples: SELECT Username FROM Users WHERE Username = '' OR ''='' AND Password = '' OR ''='.union select username from all_users where rownum<2;

Existing mechanisms to protect against SQL Injection Input validation from client side to server side Web Application IDS/Firewall Homegrown methods using raw regular expressions (A simplified signature-based detection plus a little fuzziness?) /\w*((\%27) (\'))((\%6F) o (\%4F))((\%72) r (\%52))/ix Quote: Either leads to many false positives or leads to too many signatures Limitations of Existing Signature- based Solutions Many false-positives No one looks at flood alerts anymore Vulnerable to attack evasion Unnecessary restrictions for the end user O Connor is no longer allowed as username or password? black hat briefings

black hat briefings Currently popular detection method Reverse Direction WebServer Attacks Suggested direction of detection/protection with correlation Database One Thing Never Forget for Web Applications Database No matter how powerful fragmentation, encoding and other advanced evasion techniques are After all, what does this attack turn to, and what does it target?

Database Auditing Auditing what? What we will suffer from SQL Injection attack! (Privilege escalation, unexpected actions, etc.) W W W W Who is doing what on which object at when Database Independent Oracle, MS SQL, etc. Start as a Process 1. Grant Set RIGHT privilege for the db account that is connecting from web application. 2. Define triggers 3. Audit! black hat briefings

black hat briefings Auditing Examples Audit DROP ANY TABLE BY WEB BY ACCESS; Audit NOT EXISTS; Auditing all SQL statements that fail because the target object does not exist. (Isn t t this very nice for the SQL Injection case?) Audit ALTER, DELETE, UPDATE ON SALARYTABLE; Audit SELECT ANY TABLE WHENEVER NOT SUCCESSFUL; Fine-grained audit using triggers Database Triggers can detect the number of rows returned; general audit cannot Triggers can expose the full SQL used by the user action (ora( ora_sql_txt function in 9i or dbms_fga in 10g) MS SQL Server: Trigger is one of very few choices available for fine-grained auditing.

Abnormal Web application attack Intrusion Detection Method 1. Modeling 2. Neural network training 3. Real time abnormal detection and scoring Abnormal Web Intrusion Detection Modeling Challenges of modeling How to score/digitalize items? UN/**/ION/**/ SE/**/LECT/**/ How to lower the number of false alarms while trying not to miss the real abnormal alert? black hat briefings

black hat briefings Abnormal Web Intrusion Detection Continued Value length Parameter abnormal score (see next slide) Status Code InTraffic OutTraffic Note: Every item is a number! Abnormal Web Intrusion Detection Continued Training - Web Log parsing, normalization, scoring (we also have TCPDUMP parsing module) - Each URL has its own pattern - How is the Parameter abnormal score generated? - Fuzzy but half awareness (eg( eg: : status code 500) Detection Neural network space distance

Abnormal Web Intrusion Detection Continued Sample web log: 2004-10-04 00:16:06 192.168.20.231-192.168.1.80 80 GET /nt80_21/nt80no/igetcodejs.asp 62166.39 200 0 448 0 Mozilla/4.0+(compatible;+MSIE+6.0;+Windows+ NT+5.0) http://192.168.1.80/nt80no/list.asp?lname=comp uternetwork'%20and%20%201=(select%20id%2 0from%20admin%20where%20len(name)>2)%2 0and%20'1'='1 Abnormal Web Intrusion Detection Continued Snippet of training results of HTTP request URL parameters <?xml version="1.0" encoding="utf-8"?> <WebCGIData version="0.1 0.1"> <entry URL="/nt80_21/nt80no/login.asp /nt80_21/nt80no/login.asp"" /> <entry URL="/nt80_21/nt80no/iGetCodeJS.asp /nt80_21/nt80no/igetcodejs.asp" paralength=" ="7" paraname=" ="NONAME" parascore=" ="18" " /> <entry URL="/nt80_21/nt80no/shop.asp /nt80_21/nt80no/shop.asp" paralength=" ="2" paraname=" ="id" parascore=" ="2" " /> <entry URL="/nt80_21/nt80no/bbs3.asp /nt80_21/nt80no/bbs3.asp" paralength=" ="14" paraname=" ="bbs2" parascore=" ="3" " /> <entry URL="/nt80_21/nt80no/cong.asp /nt80_21/nt80no/cong.asp" paralength=" ="5" paraname=" ="name" parascore=" ="3" " /> black hat briefings

black hat briefings Correlation What is common between attacks? An SQL Injection is not exceptional Timestamp (short range) is still the key, but you can do more. Web side: DB Audit log side: union select password from users where = No Success Normal and Abnormal Events user customerprofile catalog Order All_users

Visualization Normal vs. Abnormal Data Further Research/Work HTTP Post - Internal module for web server to intercept - Use TCPDump + ngrep + perl - Use Snort + HomeMadeHTTPPostRule More abnormal pattern detection on Database audit side (similar to the mechanism we used for web log!) More Real Attack Env Testing black hat briefings

black hat briefings Some Commercial Products ArcSight (SIM/SEM) Offers audit agents for Oracle, MSSQL, and other databases Aggregate events from devices, system and apps Correlate events between Web apps and db audits Visualization, Reports, Data-mining, Incident-mgmt Netcontinuum, Imperva,, etc. (Web IDS/firewall) Lumigent, apexsql (Database auditing) And many more References Timo Honkela: : Self-Organizing Maps in Natural Language Processing http://www.cis.hut.fi/~tho/thesis Anomaly Detection of Web-based Attacks Christopher Kruegel,, Giovanni Vigna http://www.securityfocus.com/infocus/1768 http://www.securityfocus.com/infocus/1714 Detection of Web Application Attacks.ppt ppt Blackhat 2004 http://asktom.oracle.com www.imperva.com/application_defense_center/white_papers/sql_i njection_signatures_evasion.html Symantec Internet Threat Report Volume VII, published March 2005

Many Thanks To: My professor Xiao, BlackHat & Everyone here and all my friends! Q&A black hat briefings