How To Protect Your Network From Attack From A Hacker On A University Server



Similar documents
IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

IDS / IPS. James E. Thiel S.W.A.T.

Introduction of Intrusion Detection Systems

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

INTRUSION DETECTION SYSTEMS and Network Security

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Development of a Network Intrusion Detection System

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Denial of Service. Tom Chen SMU

Network Incident Report

PROFESSIONAL SECURITY SYSTEMS

Seminar Computer Security

Security Toolsets for ISP Defense

CS5008: Internet Computing

CRYPTUS DIPLOMA IN IT SECURITY

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Network Security Forensics

CMPT 471 Networking II

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Firewall Firewall August, 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Firewalls and Intrusion Detection

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Architecture Overview

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Payment Card Industry (PCI) Data Security Standard

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Multi-Homing Dual WAN Firewall Router

Basics of Internet Security

Chapter 8 Security Pt 2

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Barracuda Intrusion Detection and Prevention System

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

Second-generation (GenII) honeypots

IDS : Intrusion Detection System the Survey of Information Security

CTS2134 Introduction to Networking. Module Network Security

PCI Security Scan Procedures. Version 1.0 December 2004

Overview. Firewall Security. Perimeter Security Devices. Routers

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

THE ROLE OF IDS & ADS IN NETWORK SECURITY

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Network Instruments white paper

Gaurav Gupta CMSC 681

AASTMT Acceptable Use Policy

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

Firewalls, Tunnels, and Network Intrusion Detection

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

Network- vs. Host-based Intrusion Detection

How To Prevent Hacker Attacks With Network Behavior Analysis

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland

Denial of Service (DoS) Technical Primer

COSC 472 Network Security

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report

Security: Attack and Defense

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Testing Network Security Using OPNET

How To Protect A Network From Attack From A Hacker (Hbss)

Fuzzy Network Profiling for Intrusion Detection

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

Network/Internet Forensic and Intrusion Log Analysis

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

Denial of Service Attacks, What They are and How to Combat Them

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Network Forensics: Log Analysis

Passive Vulnerability Detection

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

NETWORK SECURITY (W/LAB) Course Syllabus

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

Fifty Critical Alerts for Monitoring Windows Servers Best practices

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

How To Block A Ddos Attack On A Network With A Firewall

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Internet Security Firewalls

Distributed Denial of Service (DDoS)

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Modern Denial of Service Protection

Transcription:

Network Security: A New Perspective NIKSUN Inc.

Security: State of the Industry Case Study: Hacker University Questions

Dave Supinski VP of Regional Sales Supinski@niksun.com Cell Phone 215-292-4473 www.niksun.com

Needs: Reliance and dependency on e-business Need to interconnect networks Direct communication with suppliers and customers Risks: Sensitive information being compromised Increase number of intrusions and viruses Corporate policies being violated Constant attacks from sophisticated offenders

12 newborns would be given to the wrong parents each day. 291 pacemaker operations would be performed incorrectly. 315 entries in Webster's Dictionary will be misspelled. 3056 copies of tomorrow's Wall Street Journal would be missing one of the three sections. 18,322 pieces of mail would be mishandled every hour. 20,000 incorrect drug prescriptions would be written each year. 880,000 credit cards would have incorrect cardholder information on their magnetic strips.

1./ COST OF COMPUTER CRIME " & % $ # "! 3+2) 0*12 +/. (*),*- + 9/) 85,+76 5 /)14 ' '''' '' BASED ON RESPONSES FROM 538 SECURITY SPECIALISTS IN U.S. CORPORATIONS, GOVERNMENT AGENCIES AND UNIVERSITIES. SOURCE: 2001 COMPUTER SECURITY INSTITUTE/FBI COMPUTER CRIME AND SECURITY SURVEY

Expenses Associated With Electronic Crime Are High Hypothetical Scenario: $1 Million Stolen From a Small, Online Bank Source: Forrester Research

Who are the Hackers?

Employees Cause Most Digital Break-Ins BASED ON A SURVEY OF 1,600 SENIOR INFORMATION TECHNOLOGY PROFESSIONALS * MULTIPLE RESPONSES ACCEPTED, SOURCE: PRICEWATERHOUSECOOPERS AND INFORMATION WEEK E-commerce Firms At A Higher Risk

Three-Tier Security Approach Avoidance Apply protective mechanisms (technologies) to reduce unauthorized access and intrusion attacks Intrusion Detection Security Investigation Try to detect intrusions and attempted intrusions by reviewing audit logs and installing intrusion detection systems. Enable users to recover from security breach damage, prevent breaches from happening again, and prosecute offenders if necessary

Even the most sophisticated mechanisms have been compromised by sophisticated hackers Firewalls, VPNs, and encryption technologies are complex to deploy and manage leading to holes and vulnerabilities

Only detects attacks identified on the signature database Large number of false positives and no dealing with false negatives Low throughput rates Limited post-event analysis capabilities Limited evidence gathering

Requires lots of storage heavily used networks become a challenge Collects all information Advanced monitoring system required to find appropriate information quickly

Hackers usually come through back door Hijacking computers, Installation of Trojan Horses, Any hacker who breaks into a site erases all logs which are capable of tracking them Log analysis tools can be ineffective Correlation of log data is difficult because of lack of synchronization between systems Sifting through tons of log data / alarms requires trained resources and time No data for real evidence

Web Defacements Domain Name Service (DNS) Attacks Distributed Denial of Service (DDoS) Attacks Virus and Worms Routing Vulnerabilities Infrastructure Attacks Compound Attacks

12:13 Scan detected from host x.x.x.x 12:14 Buffer overflow on host y.y.y.y Internal hosts Internet x.x.x.x firewall NIDS r.r.r.r s.s.s.s t.t.t.t 12.13.01 tcp hosts x.x.x.x r.r.r.r 12.13.02 tcp hosts x.x.x.x s.s.s.s 12.13.03 tcp hosts x.x.x.x t.t.t.t 12.13.04 tcp hosts x.x.x.x y.y.y.y 12.14.13 tcp hosts x.x.x.x y.y.y.y 12.14.15 tcp hosts x.x.x.x y.y.y.y 13.00.45 tcp hosts x.x.x.x y.y.y.y 13.00.55 tcp hosts x.x.x.x y.y.y.y y.y.y.y

12:13 Denial of service attack Internal hosts NIDS x.x.x.x Service Provider router ISP router firewall Block tcp packets to address x.x.x.x Packet-level analysis to reconfigure ISP router 12:13 tcp traffic to x.x.x.x detailed data 12:14 tcp traffic to x.x.x.x detailed data 12:15 tcp traffic to x.x.x.x detailed data 12:16 tcp traffic to x.x.x.x detailed data 12:17 tcp traffic to x.x.x.x detailed data 12:18 tcp traffic to x.x.x.x detailed data 12:19 tcp traffic to x.x.x.x detailed data 12:20 tcp traffic to x.x.x.x detailed data 12:21 tcp traffic to x.x.x.x detailed data

Crime Scene: Hacker University Case: Student bringing down the grade server Verdict: Guilty of penetration, creation of a backdoor, leaving files behind, and launching a DoS attack

Proverbial Friday Morning Linux Server is not responding Incident Response plan is activated!

The screen shows all the traffic during 12:44 pm - 12:49 pm. Most of the traffic monitored was IP (99.91%). The plot reveals a relatively low level of activity and a sudden spike in traffic load at about 12:48:16. Analyzing this traffic segment in more detail reveals in a large number of ICMP packets generated from 205.152.118.182 as shown in the ICMP plots.

To discover what machines are out there on the network, applications like telnet or ping are employed. We first filter on all telnet traffic to see who was using telnet. The top 20 host pair connections are shown. Notice that there are lots of telnet sessions that involved the IP address 139.92.137.2 with a lot of other machines. All the other machines reside on two known local subnets, 171.64.250.xx and 130.237.15.xx. This clearly indicates that a user on an external host, 139.92.137.2, was trying to find a particular machine on the university's local subnets.

By filtering on all IP traffic involving the host 139.92.137.2, we can focus on everything that this particular user did. The user performed a variety TCP transactions and sent or received two UDP packets. The time plots suggest that the user surfed around, looking for a vulnerable machine, then broke in somewhere and performed some data transfers (as shown in the traffic spikes on the right hand side).

Next, we list out all the TCP flows that the attacker was engaged in. Here, we clearly see the sequential progression of actions that the attacker took. First the attacker was hunting for a particular machine to penetrate. In total, 15 different IP hosts were visited before the attacker found what he/she was looking for.

We see that the attacker sent some packets to this machine addressed to the sunrpc port. The two UDP packets that we recorded were also targeted to this machine. The method of break-in was a buffer overflow on the sunrpc port. The subsequent result of this was that the attacker gained root access to the machine which allowed him/her to basically take over the machine. The user creates a "backdoor" through port 60000 which allows him to gain automatic root access via this port.

After breaking into a local machine, the attacker then performs file transfers of various tools to setup for the attack. The key file that the user transfers is a set of his/her own unix tools. The source code for these tools are bundled in the file tb which he downloads from his home server.

The attacker performs two ftp file transfers back to his/her home server to download two key files: smurf.c which is the code used to instigate the denial of service attack (via broadcast pings) and newones which is a list of 560 IP hosts involved in the attack. These addresses are the destination addresses in the ICMP ping packets sent by 205.152.118.182.

NetDetector Security Camera for Your Network WAN/LAN Networks up to gigabit speeds Store up to 1 TB of Data Integrated IDS Application reassembly Telnet Email Instant Messenger Web VoIP

IDS and Anomaly Detection: customize alerts to identify malicious attacks, worms, spoofing, SNORT etc. Investigation of Security Alerts: identify real threats from false positives, fine tune security parameters Security Impact Analysis: conduct complete analysis of security breach - determine source, identify systems and information compromised Law-Enforcement / Auditing: record traffic for auditing and legal requirements Monitoring of Unauthorized Network Usage: reconstruction of web pages, emails, telnet, chat and other applications to determine source of violation

Network Security & Intelligence At Your Fingertips