Intruders and viruses. 8: Network Security 8-1



Similar documents
Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Intrusion Detection System (IDS)

CS549: Cryptography and Network Security

Computer Security DD2395

Computer Networks & Computer Security

Intruders & Intrusion Hackers Criminal groups Insiders. Detection and IDS Techniques Detection Principles Requirements Host-based Network-based

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Taxonomy of Intrusion Detection System

INTRUSION DETECTION SYSTEMS and Network Security

Hackers: Detection and Prevention

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

Role of Anomaly IDS in Network

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls, Tunnels, and Network Intrusion Detection

Host-based Intrusion Prevention System (HIPS)

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

CS574 Computer Security. San Diego State University Spring 2008 Lecture #7

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

(Self-Study) Identify How to Protect Your Network Against Viruses

GFI White Paper PCI-DSS compliance and GFI Software products

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Chapter 14 Computer Threats

ANTIVIRUS BEST PRACTICES

Introduction of Intrusion Detection Systems

IDS : Intrusion Detection System the Survey of Information Security

Intrusion Detection Systems

Network Based Intrusion Detection Using Honey pot Deception

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Network Incident Report

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Chapter 9 Firewalls and Intrusion Prevention Systems

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Segurança Redes e Dados

Performance Evaluation of Intrusion Detection Systems

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

Intrusion Detection for Mobile Ad Hoc Networks

Data Management Policies. Sage ERP Online

OS Security. Malware (Part 2) & Intrusion Detection and Prevention. Radboud University Nijmegen, The Netherlands. Winter 2015/2016

MALICIOUS SOFTWARE CHAPTER Types Of Malicious Software. Backdoor Logic Bomb Trojan Horses Mobile Code Multiple-Threat Malware. 21.

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

LASTLINE WHITEPAPER. In-Depth Analysis of Malware

Computer Security Threats

Network- vs. Host-based Intrusion Detection

USM IT Security Council Guide for Security Event Logging. Version 1.1

Second-generation (GenII) honeypots

Intrusion Defense Firewall

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

Post-Class Quiz: Software Development Security Domain

Getting Ahead of Malware

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

74% 96 Action Items. Compliance

Section 12 MUST BE COMPLETED BY: 4/22

Malware. Björn Victor 1 Feb [Based on Stallings&Brown]

CS 356 Lecture 9 Malicious Code. Spring 2013

Detecting Anomaly IDS in Network using Bayesian Network

Intrusion Detections Systems

8. Intrusion detection and penetration tests

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Information Resource Management Directive USAP Software Management and Protection

SURVEY OF INTRUSION DETECTION SYSTEM

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

The Comprehensive Guide to PCI Security Standards Compliance

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

How To Protect A Network From Attack From A Hacker (Hbss)

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Firewalls and Intrusion Detection

CorreLog Alignment to PCI Security Standards Compliance

Name. Description. Rationale

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Firewalls & Intrusion Detection

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Banking Security using Honeypot

IDS / IPS. James E. Thiel S.W.A.T.

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Optimizing and Protecting Hard Drives Chapter # 9

FISMA / NIST REVISION 3 COMPLIANCE

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Flashback: Internet design goals. Security Part Two: Attacks and Countermeasures. Security Vulnerabilities. Why did they leave it out?

Transcription:

Intruders and viruses 8: Network Security 8-1

Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds on IIS Solution? Intrusion Detection Systems Monitor data and behavior Report when identify attacks 8: Network Security 8-2

Definition of Intrusion Detection System (IDS) The art of detecting inappropriate, incorrect, or anomalous activity. ID systems that operate on a host to detect malicious activity on that host are called hostbased ID systems, and ID systems that operate on network data flows are called network-based ID systems. 8: Network Security 8-3

Types of IDS Signaturebased Anomaly-based Rule - Based Host-based Network-based 8: Network Security 8-4

Signature-based IDS Characteristics Uses known pattern matching to signify attack Advantages? Widely available Fairly fast Easy to implement Easy to update Disadvantages? Cannot detect attacks for which it has no signature False positives Maintenance/tweaking Not very hard to evade 8: Network Security 8-5

Signature-based IDS Attack signatures describe action patterns that may pose a security threat. Typically, they are presented as a time-dependent relationship between series of activities that may be interlaced with neutral ones. Selected text strings signatures to match text strings which look for suspicious action (for example calling /etc/passwd). 8: Network Security 8-6

Signature-based IDS T A A S 10 20 6668 IRC:XDCC /5Bxdcc/5Dslt SEARCH STRING EVENT NAME PORT COMPARE BYTES DYNAMIC LOG BINARY OR STRING PROTECTED NETWORKS DIRECTION PROTOCOL http://www.snort.org/docs/ Snort has ~1900 signatures Dragon has ~1700 signatures 8: Network Security 8-7

Anomaly-based IDS Characteristics Uses statistical model or machine learning engine to characterize normal usage behaviors Recognizes departures from normal as potential intrusions Advantages? Can detect attempts to exploit new and unforeseen vulnerabilities Can recognize authorized usage that falls outside the normal pattern Disadvantages? Generally slower, more resource intensive compared to signature-based IDS Greater complexity, difficult to configure Higher percentages of false alerts 8: Network Security 8-8

Anomaly-based IDS Threshold detection: This approach involves defining the thresholds, independent of users, for the frequency of occurrence of various events. If the count surpasses what is considered a reasonable number that one might expect to occur, then intrusion is assumed. A lot of false positives due to a large difference in behavior of different users. Profile based: A profile of the activity of each user is developed and used to detect changes in the behavior of individual accounts. 8: Network Security 8-9

Audit Records used in IDS Audit records provide input to the profile based IDS. Each audit record (Dorothy Denning) contains the following fields: Subject: Initiators of actions, e.g, users, processes. Action: operation performed by the subject on or with an object, e.g., login, read, Object: receptors of actions, e.g. programs, messages,.. Exception-Condition: excpetion condition is raised on return Resource-Usage: amoutn of used resources. Time-stamp: unigque time-and date stamp identifying when the action took place. 8: Network Security 8-10

Metrics Used in Profile-based IDS Counter: A count of certain event types is kept over a particular period of time, e.g. number of logins by single user during an hour. Gauge: A measure of the current value of some entity, e.g., number of logical connections assigned to a user application. Interval timer: The length of time between two related events. Resource utilization: Quantity of resources consumed during a specified period, e.g., total time consumed by a program execution. 8: Network Security 8-11

Tests for IDS based on the metrics Mean and standard deviation: Statistical test is to measure the mean and standard deviation of a parameter over some historical period. This gives a reflection of the average behavior and its variability. Multivariate: Based on the correlations between two or more variables. Intruder behavior may be characterized with greather confidence. Frequency login and session elapse time Markov Process: Establish transtion probabilities among various states Transistion between various commands Time Series: Look for events that happens too rapidly or too quickly Operational: Based on a judgement of what is considered abnormal, rather than an automated analysis of past audit records. 8: Network Security 8-12

Tests for IDS based on the metrics 8: Network Security 8-13

Tests for IDS based on the metrics 8: Network Security 8-14

Tests for IDS based on the metrics 8: Network Security 8-15

Rule-based IDS Historical audit records are analyzed to identify usage patterns and to generate automatically rules that describe the patterns. Rules may represent past behavior patterns of users, programs, privileges, Current behavior is then observed, and each transaction is matched against the set of rules to determine if it conforms to any historically observed pattern of behavior. 8: Network Security 8-16

Network-based IDS Characteristics NIDS examine raw packets in the network passively and triggers alerts Advantages? Easy deployment Unobtrusive Difficult to evade if done at low level of network operation Disadvantages? Fail Open Different hosts process packets differently NIDS needs to create traffic seen at the end host Need to have the complete network topology and complete host behavior 8: Network Security 8-17

Host-based IDS Characteristics Runs on single host Can analyze audit-trails, logs, integrity of files and directories, etc. Advantages More accurate than NIDS Less volume of traffic so less overhead Disadvantages Deployment is expensive What happens when host get compromised? 8: Network Security 8-18

Viruses Virus is the common term to describe malicious programs. 8: Network Security 8-19

Taxonomy of Malicious Programs Malicious Program Need host program Independent Trap doors Logic bombs Trojan horses Viruses Bacterial Worms Replicate 8: Network Security 8-20

Trap Doors A secret entry point into a gprogam that allows someone that is aware of the trap door to gain access without going through the usual security access procedures. Used legitimately for many years by programmers to debug and test programs. Become threats when they are used by unscrupoulus programmers to gain unauthorized access. 8: Network Security 8-21

Logic Bomb Oldest types of program threats Coded embedded in some legitimate program that is set to explode when certain conditions are met. Particular day of the week Famous cases: employee ID number, library systems 8: Network Security 8-22

Trojan Horses Program or command procedure containing hidden code that when invoked, performas some unwanted or harmful functions. Gain access to files of another user on a shared system by changing permission when the unawared user run the Trojan horse program disguised as the normal program. ls, ps Data destruction 8: Network Security 8-23

Viruses A virus is a program that can infect other programs by modifying them; the modification includes a copy of the virus program, which can then go on to infect other programs. We will discuss shortly in details. 8: Network Security 8-24

Worms Network worm programs use network connections to spread from system to system. Electronic mail: A worm mails a copy of itself to other systems. Remote execution capability (rcp): A worm executes a copy of itself on another system. Remote login capability:a worm logs onto a remote system as a user and then uses command to copy itself from one system to the other. Worm can behave as a computer virus or bacteria or it could implant Trojan horse programs or perform any number of distruptive or destructive actions. 8: Network Security 8-25

Bacteria Bacteria are programs that do not explicitly damage any file. Typical bacterial program dupicate itself simultaneously, or create new files, each of which is a copy of the original source file of the bacterial program. The process continues and eventually takes up all the processor capacity, memory, or disk space, denying users access to those resources. 8: Network Security 8-26

Nature of Viruses Typical virus goes through the following four stages: Dormant phase: Virus is idle. Activated by some event, such as a date. Propagation phase: places an identical copy of itself onto other programs or into certain system areas on the disk. Triggering phase: The virus is activated to perform the function for which it was intended. Activated by a varity of system events. Execution phase: The function is performed. The function may be harmless, such as a message on the screen, or damaging, such as the destruction of program and data files. 8: Network Security 8-27

Structure of a simple virus A virus can be prepended or postpended to an executable program. When the infected program is invoked, it will first execute the virus code and then execute the original code of the program. 8: Network Security 8-28

Structure of a simple virus 8: Network Security 8-29

Detecting simple virus It is easy to detect the simple virus by simply comparing the size of the original and the infected program. 8: Network Security 8-30

Compression virus 1. For each uninfected file P2 that is found, the virus first compresses that file to produces P2, which is shorter than the original program by the size of the virus. 2. A copy of the virus is prepended to the compressed program. 3. The compressed version of the original infected program, P1, is uncompressed. 4. The uncompressed original program is executed. 8: Network Security 8-31

Structure of a compression virus 8: Network Security 8-32

Structure of a compression virus 8: Network Security 8-33

Types of Viruses Parasitic virus: Most common form of virus. A parasitic virus attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. Memory-resident virus: Lodges in main memory as part of a resident system program. From that point on, the virus infects every program that executes. Boot sector virus: Infects a master boot record or boot record and spreads when a system I booted from the disk containing the virus. Stealth virus: A form of virus explicitly designed to hide itself from detection by antivirus software. Polymorphic virus: A virus that muates with every infection, making detection by the signature of the virus impossible. 8: Network Security 8-34

Macro-viruses Platform independent, hence spread quickly. Macro virus infect documents, not executable portions of code. Very easy to spread, usually by electronic mail. 8: Network Security 8-35

Macro-viruses In Microsoft word: Autoexecute: if a macro named AutoExec is in the normal.dot template or in a global template stored in Word s start up directory, it is executed whenever Word is started. Automacro: An automacro executes when a defined event occurs, such as opening or closing a document. Command macro: If a macro in a global macrofile or a macro attached to a document has the name of an existing Word command, it is executed whenever the user invokes that command (e.g File Save). 8: Network Security 8-36

Antivirus Approaches: Detection Identification Removal First-generation: simple scanner: Identify signature of a virus Second-generation: Heuristic rules to search for probable virus infection. Looks for fragments of code that are often associated with virus. E.g. encryption loop in compression virus. Third-generation: Program are memory-resident which actively identifiy a virus by its actions rather than its structure in an infected program. Fourth-generation: contain a mix of first, second, and third generations. 8: Network Security 8-37