Prof. Dr.- Ing. Firoz Kaderali Dipl.-Ing. Alex Essoh



Similar documents
Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

INTRUSION DETECTION SYSTEMS and Network Security

Network- vs. Host-based Intrusion Detection

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

How To Protect A Network From Attack From A Hacker (Hbss)

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Intrusion Detection System (IDS)

Intrusion Detection Systems

CSCE 465 Computer & Network Security

Performance Evaluation of Intrusion Detection Systems

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

A Review on Network Intrusion Detection System Using Open Source Snort

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES

Introduction of Intrusion Detection Systems

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Intrusion Detections Systems

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Intruders and viruses. 8: Network Security 8-1

Network Based Intrusion Detection Using Honey pot Deception

Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs

IDS : Intrusion Detection System the Survey of Information Security

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

IDS / IPS. James E. Thiel S.W.A.T.

Intrusion Detection for Mobile Ad Hoc Networks

Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques

Role of Anomaly IDS in Network

Intro to Firewalls. Summary

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

information security and its Describe what drives the need for information security.

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

SURVEY OF INTRUSION DETECTION SYSTEM

How To Protect Your Network From Attack From A Hacker On A University Server

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

Firewalls, Tunnels, and Network Intrusion Detection

Chapter 9 Firewalls and Intrusion Prevention Systems

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Intrusion Detection Systems

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

JAVA FRAMEWORK FOR SIGNATURE BASED NETWORK INTRUSION DETECTION SYSTEM

Second-generation (GenII) honeypots

Taxonomy of Intrusion Detection System

Science Park Research Journal

Intrusion Detection Systems with Correlation Capabilities

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Data Mining for Network Intrusion Detection

Sage Timberline Office

Comparison of Firewall and Intrusion Detection System

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

A Survey on Intrusion Detection System with Data Mining Techniques

An important observation in supply chain management, known as the bullwhip effect,

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Monitoring Frequency of Change By Li Qin

Name. Description. Rationale

Implementation of a Department Local Area Network Management System

Course Title: Penetration Testing: Security Analysis

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Intruders & Intrusion Hackers Criminal groups Insiders. Detection and IDS Techniques Detection Principles Requirements Host-based Network-based

Security Intrusion & Detection. Intrusion Detection Systems (IDSs)

Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila

SIGNATURE BASED INTRUSION DETECTION IN CLOUD BASED MULTI-TENANT SYSTEM USING MTM ALGORITHM

Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Payment Card Industry (PCI) Executive Report 08/04/2014

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

Chapter-3 Intruder Detection and Intruder Identification

From Network Security To Content Filtering

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Concurrent Program Synthesis Based on Supervisory Control

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Segurança Redes e Dados

SANS Top 20 Critical Controls for Effective Cyber Defense

Firewalls and Intrusion Detection

Certified Ethical Hacker (CEH)

Snort Installation - Ubuntu FEUP. SSI - ProDEI Paulo Neto and Rui Chilro. December 7, 2010

Web Application Security

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

NETWORK SECURITY (W/LAB) Course Syllabus

A Review on Intrusion Detection System to Protect Cloud Data

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

Transcription:

Intrusion Detection - Introduction and Outline Prof. Dr.- Ing. Firoz Kaderali Dil.-Ing. Alex Essoh

Talk Outline Motivation Intrusions Intrusion Prevention Intrusion Detection Major Intrusion Detection Aroaches 17.06.2004 Deartment of Communication Systems / FTK 2

What is an intrusion? A set of actions that attemts to comromise the integrity, confidentiality, or availability of comuter resources by causing a DoS, creating a backdoor (Trojan Horse), lanting viruses and exloiting software vulnerabilities [AND80]. An intrusion is a violation of the security olicy of a system [KUM95]. An intrusion is unauthorized access to, and/or activities in, an information system [NST97]. 17.06.2004 Deartment of Communication Systems / FTK 3

Motivation Dramatic increase in incidents Attacks are becoming more and more comlex and attackers focus on new vulnerabilities The resulting damages have been enormous 17.06.2004 Deartment of Communication Systems / FTK 4

Talk Outline Motivation Intrusion Categories Protocol related attacks Remote access attacks Malware Denial of Service (DoS) Intrusion Prevention Intrusion Detection Major Intrusion Detection Aroaches 17.06.2004 Deartment of Communication Systems / FTK 5

IP Soofing 17.06.2004 Deartment of Communication Systems / FTK 6

Talk Outline Motivation Intrusions Intrusion Prevention Intrusion Detection Major Intrusion Detection Aroaches 17.06.2004 Deartment of Communication Systems / FTK 7

Firewalls + Access Control Firewalls acket filters simle roxies generic roxies imlement different alications, but are not able to analyse or filter data streams. Firewalls are mainly used to filter external traffic, but according to several studies nearly 70-80% of all intruders are internal! Access Control Which subject is allowed to access which object. Many attacks are not detectable e.g. user imersonalisation. 17.06.2004 Deartment of Communication Systems / FTK 8

Talk Outline Motivation Intrusions Intrusion Prevention Intrusion Detection Definition Intrusion Detection Tyes Major Intrusion Detection Aroaches 17.06.2004 Deartment of Communication Systems / FTK 9

Intrusion Detection - Definition Intrusion detection is the rocess of identifying and resonding to malicious activity targeted at comuting and networking resources [AMO99]. The rocess of identifying that an intrusion has been attemted, is occurring, or has occurred [NST97]. 17.06.2004 Deartment of Communication Systems / FTK 10

Host-based Intrusion Detection Systems (HIDSs) How are intrusions detected on a host? System Integrity Verification (SIV) Snashot of the system (baseline) Crytograhic Check Sums Comarison current state and baseline Examle: Triwire (see htt://www.triwire.org) Automated log files analysis on each oerating system diverse log files are available Windows (Alication logs, System logs, Security logs) Solaris Basic Security Modul (BSM) Linux (Last log) Alication logs (Web Server) Examle: Logsurfer (see htt://www.cert.dfn.de/eng/logsurf/) 17.06.2004 Deartment of Communication Systems / FTK 11

Web Server logs access log 192.176.12.173 [06/Nov/2003:10:39:16 +0100] GET /middle.html HTTP/1.1 200 192.176.12.12 [06/Nov/2003:10:35:14 +0100] GET /alice.gif HTTP/1.1 304 192.176.12.11 [06/Nov/2003:10:36:14 +0100] GET /home/user/down.html HTTP/1.1 200 192.176.12.15 [06/Nov/2003:10:37:14 +0100] GET /rint.gif HTTP/1.1 200 192.176.12.9 [06/Nov/2003:10:38:14 +0100] GET /logo.jg HTTP/1.1 2000 62.104.86.112 [02/Feb/2004:10:41:19 +0100] GET /scrits/.\%252e/.\%252e\/winnt/system32/cmd.exe?/c+dir+c: HTTP/1.1\ 404 151.198.253.35 [02/Feb/2004:13:01:46 +0100] GET /scrits/.\%\%..\%255c\%255c../winnt/system32/cmd.exe?/c+dir" 404 211.81.24.3 [03/Feb/2004:07:20:34 +0100] CONNECT 1.3.3.7:1337 HTTP/1.0" 404 error log 217.238.141.213 [12/Feb/2004:09:04:13 +0100] GET /main.h HTTP/1.0 404 217.238.141.213 [12/Feb/2004:09:04:13 +0100] GET /hinfo.h HTTP/1.0 404 217.238.141.213 [12/Feb/2004:09:04:13 +0100] GET /test.h HTTP/1.0 404 217.238.141.213 [12/Feb/2004:09:04:14 +0100] GET /index.h3 HTTP/1.0 404 128.206.132.141 [12/Feb/2004:10:12:16 +0100] GET /scrits/..\%255c\%255c../winnt/system32/cmd.exe?/c+dir" 218.61.34.188 [14/Feb/2004:14:41:42 +0100] GET /d/winnt/system32/cmd.exe?/c+dir HTTP/1.0 404 last log (Linux) Se 16 11:55:40 server Failed assword for root from 192.176.12.129 ort 1137 ssh2 Se 16 11:55:46 server Failed assword for root from 192.176.12.129 ort 1137 ssh2 Se 16 11:55:55 server Failed assword for root from 192.176.12.129 ort 1137 ssh2 Se 16 11:55:59 server Acceted assword for root from 192.176.9.129 ort 1137 ssh2 17.06.2004 Deartment of Communication Systems / FTK 12

Network-based Intrusion Detection Systems (NIDSs) How are intrusions detected on a network? NIDS Deloyment 17.06.2004 Deartment of Communication Systems / FTK 13

Talk Outline Motivation Intrusions Intrusion Prevention Intrusion Detection Major Intrusion Detection Aroaches Anomaly Detection Misuse Detection 17.06.2004 Deartment of Communication Systems / FTK 14

Anomaly Detection Normal behaviour of a subject e.g. a user or a rogram is rofiled (long term behaviour). The rofile is then comared to the actual behaviour (short term behaviour). A new observation is then classified as an anomaly if it does not fit into a redefined tolerance bound. Anomaly Detection Models Statistical models Markov chains Multivariate analysis 17.06.2004 Deartment of Communication Systems / FTK 15

How are anomalies detected using Markov chains? The normal user behaviour is fully characterised by the transition robability matrix P P = M 11 21 31 n1 12 M 22 32 n 2 13 M 23 33 n 3 L L L M L 1n 2 n 3 n M nn P n k ij ij = P ij = 1 j and the initial robability distribution Q Q = ( q q L L q ) 0, 1, n q i = k N 17.06.2004 Deartment of Communication Systems / FTK 16

How are anomalies detected using Markov chains? Whenever a sequence of events S 1, S 2, L, S N takes lace a check is made to see whether this sequence is abnormal or not. The robability of the event sequence occurring is calculated using the Markov chain. The robability that a sequence of state S 1, S 2, L, S N occurs is [NON00]: P ( S S L S N ) = A low robability for the sequence transition is likely to be an anomaly. 1, 2,, 1 i 1 q S N i = 2 P S S i 17.06.2004 Deartment of Communication Systems / FTK 17

How are anomalies detected using multivariate analysis? Generally we have n revious observations (norm rofile) and the goal is to check whether a new observation x n + 1 resect to revious observations [DEN87]. x 1 K x n is abnormal with If the variable to be analysed is a multivariable, the n revious observations can be reresented as follows: X = x x M x n 11 21 1 x x x 12 22 M n 2 The goal is to check whether the new observation is abnormal or not. L L M L x x x 1 2 M n X = ( y, y 2, L, y 1 ) ( x ( n+ 1)1, x( n+ 1)2, x( n+ 1)3, Lx( n+ 1) ) Models (Hotelling s Test, Chi-Square Multivariate Test) [NON01][NQC01][NON02] 17.06.2004 Deartment of Communication Systems / FTK 18

Hotelling s Test for Anomaly Detection Introduced by Harald Hotelling and works as follows: At first the normal behaviour of the multivariable has to be determined by calculating 1. the mean of the multivariable X = ( y y, L ) 1, 2 y 2. and the variance co-variance matrix n 1 S = ( Xi X)( Xi X) n 1 i= 1 t X i is the ith observation of the multivariable Then secondly the Hotelling s test for a new observation t x x x x ) at discrete time interval (n+1) is calculated: ( ( n+ 1)1, ( n+ 1)2, ( n+ 1)3, L ( n+ 1) T 2 = + t 1 ( X ( n+ 1) X ) S ( X ( n 1) X ) 17.06.2004 Deartment of Communication Systems / FTK 19

Hotelling s Test for Anomaly Detection Thirdly the Hotelling s test has to be transformed into a F distribution n ( n ) with and (n-) degrees by multilying T² with. ( n + 1)( n 1) n ( n ) ( n + 1)( n 1) 2 Fourthly the obtained value T is then comared to the tabulated value for a given level of significance. α If the comuted value is greater than the tabulated value, the observation can be classed as abnormal. 17.06.2004 Deartment of Communication Systems / FTK 20

17.06.2004 Deartment of Communication Systems / FTK 21 Chi-Square Test for Anomaly Detection The Chi-Square test is used to see how much the result of the exeriment differs from the emirical result. The Chi-Square test is calculated as follows [NQC01]: Anomalies can be detected if X² is bigger than the exected tolerance bound. = = = = + = i i i i n i i i i y y x E E X X 2 1 1) ( 2 1 2 ) ( ) (

Methods Comarison A Markov chain erforms better than a Hotelling s - or a Chi- Square test [NON01]. Hotelling s test (95 % detection rate at 0 % false alarm) Chi-Square test (60% detection rate at 0% false alarm) But after 5% false alarm, Chi-Square erforms better. Conclusion: the difference between the Hotelling s - and the Chi-Square test is not very big. [NON02] 17.06.2004 Deartment of Communication Systems / FTK 22

Misuse Detection Diverse aroaches are used: State transition analysis [KOR95] Rule-based misuse detection IF, THEN rules are defined and alied to the data stream. Examle: SNORT (see htt://www.snort.org) 17.06.2004 Deartment of Communication Systems / FTK 23

SNORT Snort offers three oerational modes: Sniffer Packet logger Intrusion detection Each acket traversing the network is analysed in two stes: The Header of the snort rule is alied to the acket, if there is a match otions are alied to the rest of the ackets. 17.06.2004 Deartment of Communication Systems / FTK 24

SNORT Rules Examle 1 Land attack: attacker sends an IP acket where the sender IP address equals to the receiver IP address. SNORT rule to detect a land attack: <alert i any any any any (msg: DoS Land attack ;samei;)> Examle 2 Unauthorized directory traversal attack: attacker tries to execute malicious commands on a vulnerable Internet Information Server (IIS). SNORT rule to detect an unauthorized directory traversal attack: <alert tc $External_Network any $My_Webserver $Ports (msg:cmd32.exe access ; content cmd32.exe ; nocase; )> 17.06.2004 Deartment of Communication Systems / FTK 25

Comarison Anomaly vs. Misuse Anomaly Detection Misuse Detection Advantages Novel attacks can be detected Lower false ositive rate Disadvantages Higher false ositive rate Novel attacks can not be detected Products: RealSecure (see htt://www.iss.net) Database of attacks has to be regularly udated Next-Generation Intrusion Detection Exert System (NIDES) (see htt://www.sdl.sri.com/rojects/nides/) 17.06.2004 Deartment of Communication Systems / FTK 26

Oen Issues New Methods to significantly decrease the number of false alarms. Which variables are suitable for anomaly detection? New algorithms to reduce the amount of audit trails for efficient intrusion detection. Intrusion correlations. 17.06.2004 Deartment of Communication Systems / FTK 27

Literature [AMO99] Edward G. Amoroso, Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Tras, and Resonse, Intrusions.Net Books, 1999 [AND80] Anderson, J. P., Comuter Security Threat Monitoring and Surveillance, James P. Anderson Co., Fort Washington, 1980 [DEN87] Dorothy E. Denning, An Intrusion Detection Model, IEEE Transactions on Software Engineering, volume 13, number 2, ages 222-332, 1987 [ECK03] Claudia Eckert, IT Sicherheit-Konzete-Verfahren-Protokolle, 2. Auflage, Oldenbourg, 2003 [KOR95] Koral Ilgun and R. A. Kemmerer and Philli A. Porras, State Transition Analysis: A Rule-Based Intrusion Detection Aroach, IEEE Trans. Softw. Eng., volume = 21, number = 3,1995, ages = 181--199, [KUM95] S. Kumar, Classification and Detection of Comuter Intrusions, PhD thesis, Det. of Comuter Science, Purdue University, August 1995 17.06.2004 Deartment of Communication Systems / FTK 28

Literature [MAR01] David J. Marchette, Comuter Intrusion Detection and Network Monitoring: A Statistical Viewoint, Singer, 2001 [MUR90] Murray R. Siegel, Statistik, 2. überarbeitete Auflage, McGraw- Hill Book Comany Euroe, 1990 [NON00] Nong Ye, A Markov Chain Model of Temoral Behavior for Anomaly Detection, Proceedings of the 2000 IEEE, June 2000 [NON01] Nong Ye et al., Probabilistic Techniques for Intrusion Detection based on Comuter Audit Data, IEEE Transactions on Systems, MAN, and Cybernetics - Part A: Systems and Humans volume=31, number=4, ages=266--274, July 2001 [NON02] Nong Ye et all, Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection, IEEE Transactions on COMPUTERS, volume 51, number 7, ages = 810--820, July 2002 17.06.2004 Deartment of Communication Systems / FTK 29

Literature [NQC01] Nong Ye and Qiang Chen, An Anomaly Detection Technique based on a Chi-Square Statistic for detecting intrusions into information systems, Quality and Reliability Engineering International, volume=17, ages =105--112, [NST97] NSTAC Intrusion Detection Subgrou Reort, Dec. 1997 [RIC03] Robert Richardson, Eight AnnualCSI/FBI Comuter Crime and Security Survey, 2003 htt://www.visionael.com/roducts/security_audit/fbi_csi_2003.df [SAC93] Lothar Sachs, Statistiche Methoden, Planung und Auswertung, Sringer Verlag, 1993 [SPE03] Ralh Senneberg, Intrusion Detection für Linux-Server, Markt + Technik, 2003 [SYM03] Symantec Internet Security Threat Reort 2003 17.06.2004 Deartment of Communication Systems / FTK 30

End Thanks for your attention. Prof. Dr. Firoz Kaderali Det. Communication Systems FernUniversität Hagen email: firoz.kaderali@fernuni-hagen.de 17.06.2004 Deartment of Communication Systems / FTK 31