INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad



Similar documents
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Certified Ethical Hacker (CEH)

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Network- vs. Host-based Intrusion Detection

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Ethical Hacking Course Layout

Firewalls and Intrusion Detection

Architecture Overview

An Introduction to Network Vulnerability Testing

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Certified Ethical Hacker Exam Version Comparison. Version Comparison

WHITE PAPER. An Introduction to Network- Vulnerability Testing

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

CS5008: Internet Computing


Network Attacks and Defenses

Introduction of Intrusion Detection Systems

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Intrusion Detection Systems

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

AN INFRASTRUCTURE TO DEFEND AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACK. Wan, Kwok Kin Kalman

Denial of Service (DoS)

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

CYBERTRON NETWORK SOLUTIONS

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

How To Protect Your Network From Attack From A Hacker On A University Server

Intruders & Intrusion Hackers Criminal groups Insiders. Detection and IDS Techniques Detection Principles Requirements Host-based Network-based

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

CS 356 Lecture 16 Denial of Service. Spring 2013

COSC 472 Network Security

IDS / IPS. James E. Thiel S.W.A.T.

How To Protect A Network From Attack From A Hacker (Hbss)

Missing the Obvious: Network Security Monitoring for ICS

Chapter 9 Firewalls and Intrusion Prevention Systems

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Penetration Testing Service. By Comsec Information Security Consulting

INTRUSION DETECTION SYSTEMS and Network Security

Taxonomy of Intrusion Detection System

Network Traffic Monitoring With Attacks and Intrusion Detection System

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Intrusion Detection Systems

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

IDS : Intrusion Detection System the Survey of Information Security

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

VOIP Attacks On The Rise

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

FISMA / NIST REVISION 3 COMPLIANCE

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

Course Content: Session 1. Ethics & Hacking

Security: Attack and Defense

Network Security Demonstration - Snort based IDS Integration -

Overview of computer and communications security

PROFESSIONAL SECURITY SYSTEMS

Protecting Critical Infrastructure

CRYPTUS DIPLOMA IN IT SECURITY

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

Name. Description. Rationale

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

Fuzzy Network Profiling for Intrusion Detection

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

PCI Security Scan Procedures. Version 1.0 December 2004

CMS Operational Policy for Firewall Administration

Guidelines for Web applications protection with dedicated Web Application Firewall

Client logo placeholder XXX REPORT. Page 1 of 37

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Intrusion Detection System (IDS)

Distributed Denial of Service (DDoS)

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Radware s Behavioral Server Cracking Protection

AASTMT Acceptable Use Policy

The principle of Network Security Monitoring[NSM]

Description: Objective: Attending students will learn:

A Decision Maker s Guide to Securing an IT Infrastructure

The Truth about False Positives

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Hackers: Detection and Prevention

Secure Software Programming and Vulnerability Analysis

Hypervisor Security - A Major Concern

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Transcription:

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion 2

OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion 3

Security incident landscape in Malaysia -High value that contributed to intrusion -Total intrusion reported that related to intrusion (excluding spam) is more than 300 cases Fig 1: Mycert quarterly report 4

Losses incurred from security incident Total losses have also declined, could be related to reduced in number of incidents reported Source: CSI, CSO, PWC, MIMOS Analysis, 5

Pre-attack Victim Attacker Target 6

Post-attack 7

Security incidents from intruder view an attack is unsuccessful from the perspective of intruder if none of their objective are fulfilled some components of an attack from the perspective an intruder are : - Objective? - Exploits scripts? - Vulnerabilities in target system? - Risk carrying out an intrusion? - Damage caused or consequences to victim? intruder 8

Security Incident from victim view A victim perspectives on intrusion is an attack is unsuccessful if there are no consequences that result from the attack Some components of an attack from the perspective of a victim are : -What happened? -Who is affected? -Who is the intruder? -How did the intrusion happen? victim 9

OUTLINE Security incident Attack scenario Introduction to IDS IDS technologies Issues and challenges Conclusion 10

Attack scenario There are 5 steps involved in the attack scenario : 1.Reconnaissance 2.Scanning 3.Exploit the system 4.Keeping access 5.Covering the track Basically analyst use this flow of attack scenario to detect an attack. Intruder may not use all the 5 steps, it depends on the modus operandi and skills of the intruder. 11

Step 1 : Reconnaissance Conduct open source investigation to extract information about a target such as domain name server (DNS), internet protocol (IP) and staff information Reconnaissance tool Whois DNS interrogation Web site searchers Google Sam Spade Web-based reconnaissance Description Acquire name servers Domain name and IP address Acquiring information about company from public databases Googling for vulnerable system and etc Capabilities such : ping, DNS lookup, whois, DNS zone transfer, trace route, finger, check time Numerous web site offer the capability to research or attack other sites 12

Step 2 : Scanning An attacker uses a variety of vulnerability scanning tools to survey a target to find vulnerabilities in the target defenses Scanning tool THC-scan War driving with NetStumbler Port Scanning with nmap Vulnerability scanning nessus Description Scan network looking for unprotected modems that autoanswer with no passwords Trying to connect to unprotected wireless networks to gain network or internet access To see which port are open. Basically run port scanner and try to connect to each port 13

Step 3 : Exploit to system An attacker tries to gain access, undermine an application or deny access to other users There are 3 ways in exploit the system : Gaining access Web application attack Denial of Service (DoS) 14

Gaining access -Unauthorized access by eavesdropping into communication channel -e.g : IP address spoofing, session hijacking, password cracking and worm Alice Bob Intruder 15

Step 3 : Exploit to system Web Application attack Alice Bob Intruder - The information not only intercepted, but modified by an unauthorized party while transit from the source to the destination -example : account harvesting, SQL injection and cross-site scripting 16

ATTACK SCENARIO Exploit to system Denial of Service (DoS) Source Destination - An asset of the system gets destroyed or becomes unavailable Launch Local Network-based 1.Stopping services 2.Exhausting resources -process killing, -process crashing, -system reconfig - malformed packet(bonk) -spawning to fill process table -filling up the whole file system - packet floods(syn flood) 17

ATTACK EXAMPLE SYN Flood Attack -A normal connection between a user (Alice) and a server. -The three-way handshake is correctly performed. 18

ATTACK EXAMPLE SYN Flood Attack -The attacker (Bob) sends several packets but does not send the "ACK" back to the server. -The connections are hence half-opened and eat the server resources. -Alice, a legitimate user, tries to connect but the server refuses to open a connection resulting in a denial of service. 19

Step 4 : Keeping access Attacker maintain access by manipulating the software installed on the system to achieve backdoor access Example : backdoor and trojan horses backdoor Alice Bob attacker 20

Step 5 : Covering the track Attacker maintain hard fought access by covering tracks. Hide from users and system admin using variety of techniques covering track in Unix, Windows and network is different Hide files to simply name like dot space 21

Attack scenarios Communication Information source Information destination 1. Interruption 2. Interception 3. Modification 4. Fabrication 22

OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion 23

Intrusion detection system (IDS) Intrusion: Sequence related actions performed by a malicious adversary that results in the compromise of a target computing or networking domain Intrusion detection : Processes to identify and respond to malicious activity targeted at target computing and networking domain Intrusion Detection System (IDS ): is a system that automates the intrusion detection process 24

Terminology in IDS Attack a failed attempt to enter the system False negative test result implying a condition does not exist when in fact it does. False positive test result implying a condition exists when in fact it does not. 25

Common Intrusion Detection Framework (CIDF), models an IDS aggregate as four component : R-box A-box A-box A-box D-box Basically in CIDF, IDS implementation have : - event box (E-box) - analysis box (A-box) - database box (D-box) - response box (R-box) E-box E-box Exchange raw audit data exchange events Monitored environment [Porras et al.,1998 ] 26

Intrusion Detection Characterization Intrusion detection characterization approach protected system structure data source behavior after an attack analysis timing anomaly detection HIDS NIDS Hybrids signature detection centralised system audit trail distributed system network packet system state analysis (kernel, Services, files) active passive response response Real time processing internal based IDS agent system Source : przemyslaw & piotr 27

IDS approach Signature vs Anomaly Audit Data Signature Base Match? 1.Signature based Audit data collected by the IDS is compared with the content of the signature, if a match IS found, alert generated Audit Data System Profile Statistically anomalous? 2.Anomaly based Audit data collected by the IDS is compared with the system profile (normal behaviour), if a match NOT found, alert generated 28

Protected system in IDS Network intrusion detection system (NIDS) NIDS - Detects attack by analyzing the network traffic exchanged on a network link. - defense at the network level 29

Host-based intrusion detection system(hids) -Detects attack against a specific host by analyzing audit data produced by the host operating system - defense at the application level HIDS 30

Hybrids - Detects attack against a specific host by analyzing audit data produced by the host operating system and network traffic 31

IDS structure Centralized system - IDS can operate standalone Centralized application - integrated applications that create a distributed system - multiple IDS Agent - a particular architecture with autonomous agents that are able to take pre-emptive and reactive measures and even to move over the network 32

IDS Data Source Audit trail event log processing Network packet a stream of network packet System state analysis -from kernel, services, files 33

IDS Behaviour after attack Active Response IDS responds to the suspicious activity by logging off a user or by reprogramming the firewall to block network traffic from the suspected malicious source. Passive Response IDS detects a potential security breach, logs the information and signals an alert 34

IDS Analysis Timing Real time processing Perform online verification of system events Require large amount RAM since no data storage is used Online monitoring, analyze events and user actions Interval based Related to audit trail (event log processing) Recording every event, consumption of system resources Vulnerable to DoS attack by over flowing the system's free space 35

IDS Technologies IDS product Non commercial IDS Snort, Emerald, Netstat, Bro and many others Commercial IDS SourceFire, NetProwler, NetRanger, Centrax, RealSecure and many others 36

IDS TECHNOLOGIES Immature and dynamic Research product eg. Emerald, Netstat, Bro etc Commercial products ( CMDS, NetProwler, NetRanger, Centrax, RealSecure etc 37

OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion 38

IDS issues and challenges Operational challenges with IDS Too many of IDS product IDS do not have the capability to look at every possible security event Difficulty with evaluating IDS technologies Identify and evaluate the processes,procedures and tools Lack of qualified technical staff To evaluate, select, install, operate and maintain IDS technologies Events from multiple sources Need to correlate the event 39

IDS issues and challenges IDS vs Intrusion prevention system (IPS) - IPS is a system to detect and also prevent the intrusion - The difference between IPS and IDS mainly it has the prevention process in line Will IPS replace IDS? Use both 40

Conclusion - IDS is a technology that can be use to detect an attack, but for future capabilities in IDS can be improved 41

References : Christopher Kruegel, Fredrik Valeur, Giovanni Vigna (2005). Intrusion Detection and Correlation, Challenges and Solution, Springer Science+Business Media Inc, USA. Ed Skoudis and SANS. Computer and network hacking exploits SANS 2006 http://www.sei.cmu.edu/publications/documents/99.reports/99tr028/99tr028chap0 1.html http://www.windowsecurity.com/articles/ids-part2-classification-methodstechniques.html 42

Thank you 43