Network Security: The Principles of Threats, Attacks and Intrusions (Part 2)



Similar documents
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Intrusion Detection Systems (IDS)

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

IDS / IPS. James E. Thiel S.W.A.T.

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

INTRUSION DETECTION SYSTEMS and Network Security

Network Forensics: Log Analysis

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

Chapter 9 Firewalls and Intrusion Prevention Systems

Intrusion Detection System (IDS)

CIT 380: Securing Computer Systems

Course Title: Penetration Testing: Security Analysis

Architecture Overview

Linux Network Security

How To Protect A Network From Attack From A Hacker (Hbss)

Network Defense Tools

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

Intrusion Detection Systems

How To Protect Your Network From Attack From Outside From Inside And Outside

HONEYPOT SECURITY. February The Government of the Hong Kong Special Administrative Region

Intrusion Detection Systems

Fuzzy Network Profiling for Intrusion Detection

CSE331: Introduction to Networks and Security. Lecture 18 Fall 2006

Fuzzy Network Profiling for Intrusion Detection

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Taxonomy of Intrusion Detection System

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware

Network Scanning. What is a Network scanner? Why are scanners needed? How do scanners do? Which scanner does the market provide?

Network Based Intrusion Detection Using Honey pot Deception

Security Intrusion & Detection. Intrusion Detection Systems (IDSs)

SURVEY OF INTRUSION DETECTION SYSTEM

NETWORK SECURITY WITH OPENSOURCE FIREWALL

Network- vs. Host-based Intrusion Detection

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Role of Anomaly IDS in Network

Network Attacks and Defenses

WHITE PAPER. An Introduction to Network- Vulnerability Testing

Security Event Management. February 7, 2007 (Revision 5)

CSCE 465 Computer & Network Security

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

IDS : Intrusion Detection System the Survey of Information Security

An Introduction to Network Vulnerability Testing

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Name. Description. Rationale

4. Getting started: Performing an audit

Introduction of Intrusion Detection Systems

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

How To Protect Your Network From Attack From A Hacker On A University Server

Countermeasure for Detection of Honeypot Deployment

FIREWALLS & CBAC. philip.heimer@hh.se

TS-301 Case Project Shaun DeRosa

Firewalls and Intrusion Detection

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments

AN OVERVIEW OF VULNERABILITY SCANNERS

Network and Host-based Vulnerability Assessment

Coimbatore-47, India. Keywords: intrusion detection,honeypots,networksecurity,monitoring

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

NETWORK SECURITY (W/LAB) Course Syllabus

Intrusion Detection Systems

Penetration Testing Report Client: Business Solutions June 15 th 2015

Chapter 6 Phase 2: Scanning

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

Development of a Network Intrusion Detection System

Security: Attack and Defense

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2. Intrusion Detection and Prevention Systems

SANS Top 20 Critical Controls for Effective Cyber Defense

Intrusion Detections Systems

CIS 4361: Applied Security Lab 4

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Second-generation (GenII) honeypots

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Transcription:

Network Security: The Principles of Threats, Attacks and Intrusions (Part 2) APRICOT 2004 Tutorial, 24 February 2004 Kuala Lumpur Ray Hunt, Associate Professor (Networks and Security), University of Canterbury, New Zealand 1

What is an Intrusion? Sequence of related actions by a malicious adversary that results in occurrence of security threats to target computer or network Indicators: Repetition of unusual behaviour Exploitation of known vulnerabilities Inconsistent packet sequences or routes Unexplained problems Suspicious traffic content 2

Major Reasons for Using Intrusion Detection Systems are.. To detect intruders, attacks, abuse... To detect probes To provide active network security To provide a means of deterrent To collect data on system behavior so as to recover after intrusion To indirectly provide useful information 3

History of IDS Developments/Products 4

IDS Goals Differentiate normal from damaging actions Scalable Variety of network systems and architectures Adapts in response to new attacks Reports attacks in real-time Co-operates with other security mechanisms 5

IDS Goals Increase monitoring at suspicious points Protect against being attacked itself Function in face of network failure Minimal performance impact X Generate audit information Reflect security policy of organisation 6

IDS Architecture 7

IDS Architecture Components Sensors - data gathering for the IDS Monitors - process the collected data Resolver - determines appropriate responses Controller - configuration of components in a distributed system Modern IDS apply these components in a cascading fashion, ie - allowing higher level system overviews to be gained as a user ascends through the tree 8

IDS Techniques Misuse Detection (M-IDS) - attempts to match observed v expected behaviour (eg signature analysis, Petri nets, state transition diagrams, genetic algorithms) Anomaly Detection (A-IDS) - models expected behaviour (eg statistical, expert systems, neural networks) 9

IDS Techniques Location of Sensors - network-based (no processing overheads and difficult to attack) or host-based (performance impact but good data collection) Monitor Processing Patterns - real-time (cf. batch) detection of significant benefit (performance issues) Distributed Correlation - simple interfaces (eg Shadow) or hierarchical (eg GrIDS) 10

Capabilities of IDS Second level of defense if primary security fails Clear view and summary (eg Tripwire) Extracts information useful in tracking intrusions Identifies nature of abuse - (eg systems modifications for later backdoor use) IDS logs as evidence in legal cases 11

Capabilities of IDS IDS can assist in detecting mis-configurations Combined with network security scanners, security holes can be revealed - eg finding particular firewall is vulnerable to certain attacks IDS can determine which resources are targeted New attacks every month - simplifies detection IDS works well with security policy 12

Limitations of IDS Reporting tool - cannot stop ongoing intrusions Cannot trace intrusion with poor authentication Can only trace intrusion to point of entry to system Must be aware of security policy Attackers may attack IDS systems Depends upon seeing all traffic Models event - systems react in different ways Widely spread attacks may be ignored New attacks continually being discovered Scaling problems 13

Current Development in IDS Distributed and scalable IDS Use of AI and pattern matching Embedded IDS in network devices Use in other areas - telephone / credit card systems Adaptation to new technologies Automatic recognition of new attacks (adaptive AI) IDS which responds to attacks in progress IDS standards/groups (eg CIDF, IDWG, IDSC.) 14

Intrusion Detection Systems and Products Manual Review Techniques Full-scale IDS may not always be appropriate: connect dummy service to ports (eg IMAP (143), SMB (139), HTTP (80) - trigger script when attacked use log files and audit info to build critical log use simple monitors such as NetMon and FileMon 15

Host-based (HIDS) Types of IDS searches for mis-configurations and dangerous settings, unusual privileges etc Network-based (NIDS) checks host security policies, dangerous or unnecessary services Hybrid Vary according to whether: fixed/wireless commercial/freeware operating system 16

Host-Based IDS GFi LANgaurd SELM Windows Commercial http://www.gfi.com/lanselm/index.html EMERALD expert-bsm Solaris Commercial http://www.sdl.sri.com/projects/emerald/releases/expert-bsm/ ISS BlackICE Windows Commercial http://blackice.iss.net Symantec Host IDS Windows/Solaris Commercial http://enterprisesecurity.symantec.com/products LIDS Linux GPL http://www.lids.org 17

Network-Based IDS AirDefense Guard (Wireless IDS) Hardware Commercial www.airdefense.net/products/airdefense_ids.shtm NetDetector Solution Hardware Commercial www.niksun.com/index.php?id=194 Network Flight Recorder Security Hardware Commercial RealSecure Network Sensor Windows/Linux/Solaris/Nokia Commercial Symantec ManHunt Solaris/Linux Commercial Shoki *nix GPL http://shoki.sourceforge.net Snort *nix GPL http://www.snort.org Sourcefire Intrusion MS Hardware Commercial 18

Hybrid IDS Prelude *nix GPL http://www.preludeids.org RealSecure Network Sensor Windows/*nix Commercial www.iss.net/products_services 19

Example NIDS: SNORT Lightweight IDS system capable of performing real-time traffic analysis and packet logging Can perform protocol analysis, content searching/matching. Can be used to detect a variety of attacks and probes, eg: buffer overflows stealth port scans CGI attacks SMB probes OS fingerprinting attempts 20

Example IDS: SNORT Snort has three primary uses. It can be used as: a packet sniffer like tcpdump a packet logger (useful for network traffic debugging, etc) a full network intrusion detection system Snort/IDS operates from a script rule file applied to each packet monitored Provides specialised access to IP packets, eg fragmentation bit checks Example rule: alert tcp any any -> 192.168.0.1/24 111 {content: 00 01 86 A5 ; msg: mountd access ; } 21

Example IDS: BlackIce Host-based IDS for Windows and carries out extensive port analysis Four levels: Paranoid, Nervous, Cautious, Trusting Provides back-trace of intruders via NetBios Uses signature files to detect known attacks Real time network usage graph Links to full protocol stack http://blackice.iss.net 22

Example IDS: ZoneAlarm ZoneAlarm (= Firewall + IDS) www.zonelabs.com Personal firewall with security settings of High, Medium, Low for both LAN and Internet connections, and a mail attachment check setting Alerts occur when access to an unauthorised port is attempted. ZoneAlarm advises what likely cause is and how indicative of an attack it is Access is allowed/denied for programs on the host PC to connect to the Internet ZoneAlarm Pro $US50 for single user and $US1800 for 50 users ZoneAlarm - free for home users 23

Tools Supporting Active Security Mapping Tools System Scanning Tools System Integrity Checkers Honeytraps 24

IDS Support Tools - Mapping Tools Network Mappers Commercial and free tools available - nmap and Cheops-NG Carry out - DNS zone transfers, address/port scanning, host requests, promiscuous monitoring nmap sends variety of packets with illegal flags, ICMP echos, fragmented packets etc to hosts and analysing responses eg recognise Linux with kernels older than 2.0.35 by using packet with SYN and illegal flags set 25

IDS Support Tools - Mapping Tools Cheops *nix GPL (no longer supported) www.marko.net/cheops/ Cheops-NG *nix GPL http://cheopsng.sourceforge.net/ nmap *nix/windows GPL http://www.insecure.org/nmap 26

IDS Support Tools - System Scanning Tools Tools used to detect and report on vulnerabilities in computer or network Uses database of known vulnerabilities and attempts matching to these records For an attacker these tools allow location of potential specific targets, eg open HTTP port with a known vulnerability 27

IDS Support Tools - System Scanning Tools Core Impact Windows Commercial GFi LANguard NSS Windows Commercial/Freeware ISS Internet Scanner Commercial Nessus *nix GPL www.nessus.org Rapid7 NeXpose Linux/Windows Commercial Retina Windows Commercial 28

IDS Support Tools - System Integrity Checkers Detect anomalies which may indicate that data on computer has been tampered with Cannot detect intruders until after intrusion and so are not real-time like IDSs Stores hashed snapshot of file systems and compares to current system state and reports discrepancies 29

IDS Support Tools - System Integrity Checkers Tripwire is best example Commonly support hashing algorithms, eg - MD4/5, SHA, ITU CRC-16 and -32 signatures Reference database based upon initial trusted system Only reports changes already present in system Last line of defence - system is already compromised! 30

Generate Newly generated database Compare Apply masks Current filesystem tw.config file Old database Tripwire report Files residing on system Structure of the Tripwire system 31

IDS Support Tools - System Integrity Checkers Aide *nix GPL Chkrootkit *nix Open Source Integrit *nix GPL Ionx Data Sentinel Windows Commercial GFi LANguard SIM Windows Commercial/Freeware Osiris *nix Open Source Samhain *nix GPL Tripwire *nix/windows Commercial and Open 32 Source

IDS Support Tools - Honeytraps Current IDS methodologies have shortcomings: problem recognising novel attacks occurrence of false positives reporting of attacks of no interest Honeytrap system simulated or real system that exists for sole purpose of being attacked! Looks and behaves like real system Must not be launching pad Must gather valuable information on attacker 33

IDS Support Tools - Honeytraps Bait and Switch *nix BSD KeyFocus Sensor Windows Commercial NetBait Enterprise i386-based Commercial Symantec Decoy Server Solaris Commercial Verizon NetFacade *nix Commercial 34

KFSensor Honeypot Output 35

IDS Standards Common Intrusion Detection Framework (CIDF) Common protocols and interface standards (1999) Intrusion Detection Working Group (IDWG) Produced 4 Internet Drafts (2002) Open Security Evaluation Criteria (OSEC) Evaluation of and tests on products (2003) Intrusion Detection Systems Consortium (IDSC) Vendor consortium promoting product adoption by defining common terminology, integrity, standards 36

Intrusion Detection Experiments Watchguard firewall used as testbed for Intrusion Detection Analysis simulates small office network single public server limited set of machines on firewall s trusted network unspecified number of machines on external network 37

External interface 177.209.49.31/20 Trusted interface 177.209.7.254/20 Attack Host (1) 177.209.49.32 Firebox II Trusted Network DMZ Optional interface 177.209.17.254/20 Attack Host (2) 177.209.17.201 IDS Server (1) 177.209.17.200 Web Server (1) 177.209.20.80 Attack Host (3) 177.209.7.201 IDS Server (2) 177.209.7.200 Web Server (2) 177.209.0.80 Firewall testbed 38

Intrusion Detection Case Study Sample Firewall policy might be. Incoming FTP traffic allowed (via proxy) only if destined for 204.137.98.164 - public server located in optional network Outgoing FTP traffic allowed without restriction Incoming HTTP traffic allowed (via proxy) only if destined for 204.137.98.165 Outgoing HTTP traffic allowed without restriction Incoming SMTP traffic was allowed only to 177.209.49.31 (external firewall interface) Outgoing SMTP traffic was allowed only from 177.209.0.25 (hypothetical SMTP server on trusted network) Configuration access to firewall allowed from internal networks IP Masquerading was disabled Port Autoblocking was disabled All other ports and services were blocked 39

Intrusion Detection Case Study 1. Scan Web server (2) and IDS server (2) from Attack host (3) (all machines on a common network segment) 2. Scan Web server (1) and IDS server (1) from Attack host (3) (attack on optional from trusted network) 3. Scan Web server (2) and IDS server (2) from Attack host (2) (attack on trusted from optional network) 4. Scan Web server (1) and IDS server (1) from Attack host (1) (external attack on optional network) 5. Scan Web server (2) and IDS-server (2) from Attack host (1) (external attack on trusted network) 40

Intrusion Detection Case Study Scan 1 gives baseline of what attacks IDS tools are capable of recognising, and corresponds to an internal attack on trusted network Scan 2 simulates internal attack against optional network Scan 3 simulates result if machine on optional network is compromised and then attacks internal machines Scan 4 -very common case - external attacker attempts to access machines on optional network Scan 5 is same situation for trusted network 41

Intrusion Detection Case Study Conclusions IDS can highlight problems with Firewall configurations Out-of-box configurations may be dangerous Firewalls protect inaccessible machines well Firewalls do not protect against application-level attacks Firewalls are themselves vulnerable to attack IDS tools can recognise many attacks IDS tools have different detection sets Network IDS recognise attacks from their area of coverage Network scanning tools are susceptible to false readings Firewalls offer minimal detection capabilities 42