CSCI 454/554 Computer and Network Security. Topic 8.4 Firewalls and Intrusion Detection Systems (IDS)

Similar documents
CSCE 465 Computer & Network Security

CSCI 4250/6250 Fall 2015 Computer and Networks Security

INTRUSION DETECTION SYSTEMS and Network Security

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Introduction of Intrusion Detection Systems

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Firewalls. Chapter 3

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Lesson 5: Network perimeter security

INTRODUCTION TO FIREWALL SECURITY

Chapter 9 Firewalls and Intrusion Prevention Systems

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Outline (Network Security Challenge)

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Firewalls (IPTABLES)

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Cryptography and network security

Firewalls, IDS and IPS

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

Analysis of Network Packets. C DAC Bangalore Electronics City

Network Defense Tools

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

Solution of Exercise Sheet 5

Intrusion Detection Systems

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

SonicWALL PCI 1.1 Implementation Guide

FIREWALL AND NAT Lecture 7a

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

CSCE 465 Computer & Network Security

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Network Based Intrusion Detection Using Honey pot Deception

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Lab exercise: Working with Wireshark and Snort for Intrusion Detection

Intrusion Detection in AlienVault

Chapter 8 Network Security

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

Firewalls and Intrusion Detection

Proxy Server, Network Address Translator, Firewall. Proxy Server

Implementing Secure Converged Wide Area Networks (ISCW)

FIREWALLS & CBAC. philip.heimer@hh.se

Cyber Essentials. Test Specification

Network Security Management

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Lecture 23: Firewalls

Network- vs. Host-based Intrusion Detection

nmap, nessus, and snort Vulnerability Analysis & Intrusion Detection

Networking for Caribbean Development

Detecting Attacks. Signature-based Intrusion Detection. Signature-based Detection. Signature-based Detection. Problems

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Intruders and viruses. 8: Network Security 8-1

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Firewalls. CS 6v81 - Network Security. What is a firewall? Firewall capabilities. Firewall limitations. Firewall limitations, cont d

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

IDS / IPS. James E. Thiel S.W.A.T.

Types of Firewalls E. Eugene Schultz Payoff

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

Internet Security Firewalls

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Basic Network Configuration

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

12. Firewalls Content

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Chapter 8 Security Pt 2

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Passive Vulnerability Detection

Network Security. Internet Firewalls. Chapter 13. Network Security (WS 2002): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

Firewall Design Principles Firewall Characteristics Types of Firewalls

Firewalls CSCI 454/554

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Cisco Secure PIX Firewall with Two Routers Configuration Example

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

CSE331: Introduction to Networks and Security. Lecture 18 Fall 2006

Transcription:

CSCI 454/554 Computer and Network Security Topic 8.4 Firewalls and Intrusion Detection Systems (IDS)

Outline Firewalls Filtering firewalls Proxy firewalls Intrusion Detection System (IDS) Rule-based IDS Anomaly detection IDS Host-based vs. network-based IDS 2

Overview of Firewalls 3

Internet Security Mechanisms Prevent: Firewall, IPsec, SSL Detect: Intrusion Detection Survive/ Response: Recovery, Forensics Goal: prevent if possible; detect quickly otherwise; and confine the damage 4

Vulnerabilities Basic Terms Intrusions (attacks) and Intrusion Detection Systems (IDS) Alert or alarm: message generated by IDS 5

Example Attacks Disclosure, modification, and destruction of data Compromise host and then attack other systems Monitoring and capture of user passwords, then masquerade as authorized user Phishing attacks 6

Firewalls Provides secure connectivity between networks Implements and enforces a security policy for communication between networks 7

Firewalls (Cont d) Many organizations have distinct needs access by anyone to public data concerning the company access only by employees to internal data Solution: inner and outer (DMZ) networks Trusted Networks Firewall Untrusted Networks & Servers Untrusted Users Intranet Router Internet DMZ Public Accessible Servers & Networks Trusted Users 8

Firewall Capabilities Controlled access restrict incoming and outgoing traffic according to security policy Other functions log traffic, for later analysis network address translation encryption / decryption application (payload) transformations 9

Limitations of Firewalls Cannot protect against traffic that does not cross it i.e., there may be other ingress points to the network, such as modems or wireless access points, that bypass the firewall doesn t protect against inside attacks Configuration of firewalls to accomplish a desired high-level security policy is nontrivial 10

Filtering and Proxy Firewalls 11

Filtering Compare traffic to patterns, then process traffic according to rules if matched Two styles packet filtering session filtering 12

Packet Filtering Patterns specify values in the header of a single packet, e.g., source IP address and port number destination IP address and port number transport protocol type 13

Packet Filtering (cont d) Decisions made on a per-packet basis no state information (about previous packets) is maintained or used Assessment easy to implement but limited capabilities May be subject to tiny-fragment attack first fragment has only a few bytes rest of TCP header in a second fragment, not examined by firewall 14

Session Filtering Packet decisions are made in the context of a connection or flow of packets If packet is the start of a new connection check against rules for new connections If packet is part of an existing connection check against state-based rules for existing connections update state of this connection 15

Session Filtering (cont d) Assessment more powerful than packet filtering, can recognize more sophisticated threats or implement more complex policies also more expensive to implement Applications Presentations Sessions Transport Network DataLink Physical Presentations Sessions Transport Network DataLink Physical Applications Presentations Sessions Transport Network DataLink Physical Dynamic State Tables 16

Application: Telnet Telnet Server Telnet Client port=23 port=1234! Client opens channel to server; tells server its port number. The ACK bit is not set when initiating the connection but will be set on the remaining packets. " USE PORT 1234 ACK! " Server acknowleges. 17

Example: Firewall Access for Telnet Format: access-list <rule number> <permit deny> <protocol> <SOURCE host with IP address any IP address and mask> [<gt eq port number>] <DEST host with IP address any IP address and mask> [<gt eq port number>] Note: any packets not explicitly permitted in an access list assumed to be denied or dropped. The following allows user to telnet from an IP address (172.168.10.11) to any destination, but not vice-versa: access-list 100 permit tcp host 172.168.10.11 gt 1023 any eq 23! Allows packets out to remote Telnet servers access-list 101 permit tcp any eq 23 host 172.168.10.11 established! Allows returning packets to come back in. It verifies that the ACK bit is set interface Ethernet 0 access-list 100 out! Apply the first rule to outbound traffic access-list 101 in! Apply the second rule to inbound traffic 18

Application: FTP FTP Server port=20 Data! Client opens command channel to server; tells server second port number. " Server acknowledges. # " USE PORT 5151 OK DATA CHANNEL FTP Client port=21 Command port=5150 port=5151! # Server opens data channel to client s second port. $ Client acknowledges. TCP ACK $ 19

Example: Firewall Access for FTP Allow a user to FTP (not passive FTP) from any IP address to the FTP server (172.168.10.12) : access-list 100 permit tcp any gt 1023 host 172.168.10.12 eq 21 access-list 100 permit tcp any gt 1023 host 172.168.10.12 eq 20! Allows packets from any client to the FTP control and data ports access-list 101 permit tcp host 172.168.10.12 eq 21 any gt 1023 access-list 101 permit tcp host 172.168.10.12 eq 20 any gt 1023! Allows FTP server to send packets back to any IP address with TCP ports > 1023 interface Ethernet 0 access-list 100 in! Apply the first rule to inbound traffic access-list 101 out! Apply the second rule to outbound traffic 20

Proxy Firewalls Serve as relays for connections Two flavors 1. application level 2. circuit level 21

Application Proxies Understand specific application protocols, e.g., HTTP, SMTP, Telnet proxy impersonates both one side of connection to the other Can do arbitrary processing / inspection of application payloads ex.: check mail for viruses before forwarding Computationally expensive Must write a new proxy application to support new protocols 22

Application Proxies (Cont d) May require hosts inside the organization to be configured to use the proxy 23

Circuit-Level Proxies Sets up two connections, one to inside user, one to outside server i.e., proxy at the TCP level, rather than the application level client programs must be aware they are using a circuit-level proxy, by linking to modified libraries Users must authenticate to proxy before connection to outside will be established Example protocol: SOCKS 24

Overview of IDS 25

Attack Stages Cyber Kill Chain Intelligence gathering: attacker probes the system to determine vulnerabilities Planning: deciding what resource to attack and how Attack execution Hiding: covering traces of the attack Preparation for future attacks: install back doors for unhindered access 26

IDS Detect if attacks are being attempted, or if system has been compromised Desirable features Accuracy Fast Flexible, general Results easy to understand 27

Measuring Accuracy Events are actions occurring in the system (file accesses, login attempts, etc.) an intrusion (I) is an event that is part of an attack an alarm (A) is generated if an event is diagnosed as being an intrusion Alarm Generated Intrusion True positive Not an Intrusion False positive Alarm Not Generated False negative True negative 28

Measuring (Cont d) True positive rate (TPR): fraction of intrusions correctly diagnosed (detected) False negative rate: fraction of intrusions incorrectly diagnosed (not detected) FNR = 1 - TPR True negative rate (TNR): fraction of nonintrusions correctly diagnosed False positive rate: fraction of non-intrusions incorrectly diagnosed FPR = 1 - TNR 29

Which Ones Count It s trivial to have 100% TPR, and trivial to have 0% FPR how? Needed: both 30

Example 70,000 events, 300 intrusions, 2800 alarms (of which 298 are correct diagnoses, 2502 are incorrect) TPR: 298 / 300 = 99.3% FNR: 0.7% TNR: (70000-300 - 2502) / (70000-300) = 96.4% FPR: 3.6% 31

Base-Rate Fallacy Illustrated IDS often suffers from base-rate fallacy intrusions are rare events non-intrusions are common correctly detected intrusions are swamped by incorrectly detected nonintrusions! Previous example: only 298 out of 2800 alarms (10.6%) are correct in reality, often less than 1% of alarms are real intrusions 32

Components of IDS Assumes:system activities are observable by sensors Audit Records Audit Data Preprocessor Activity Data Detection Models Detection Engine Decision Table Notifier Alarms Action/Report 33

Signature-Based IDS 34

Basic IDS Techniques 1. Misuse detection use attack signatures (characteristics of real attacks, e.g., illegal sequences of system calls, invalid packets, etc.) can only detect already-known attacks false positive rate is low, but false negative rate is high 35

Detection (Cont d) 2. Anomaly detection uses a model of normal system behavior tries to detect deviations from this behavior, e.g., raises an alarm when a statistically rare event occurs can potentially detect new (not previously-encountered) attacks low false negative rate, high false positive rate Which is better? 36

Ex.: Misuse vs. Anomaly Detection Password file modified? Four failed login attempts? Failed connection attempts on 50 sequentially-numbered ports User who usually logs in around 10am from dorm logs in at 4:30am from an IP address in Lower Slobovia UDP packet to port 1434 (Slammer Worm)??? 37

Example Signatures A sequence of connection attempts to a large number of ports A privileged program spawning a shell A network packet that has lots of NOOP instruction bytes in it Program input containing a very long string (parameter value) A large number of TCP SYN packets sent, with no ACKs coming back 38

Signature Generation Research challenge: fast, automatic extraction of signatures for new attacks honeypots are useful for attracting attacks to generate signatures Attack signatures are usually very specific automated engines now generate unlimited variants of a single attack program obfuscation, self-decrypting code Possible response: find attack characteristics that are difficult to conceal / obfuscate 39

Anomaly-Based IDS 40

Anomaly Detection Collect a profile of normal behavior called training phase works best for small, well-defined, stable systems IDS compares operational system to this profile, and flags deviations 41

Examples of Metrics Count of the number of occurrences of an event per unit time if count exceeded, raise an alarm Time elapsed between events if time too small, raise an alarm Resource utilization if utilization too high, raise an alarm Statistical measures mean, standard deviation, etc. 42

Examples (Cont d) Markov process: use expected likelihood of transition from one system state to another, or from one output to another Short sequences of events ex. suppose the normal sequences of system calls during execution of two programs has been measured any serious deviation from such sequences will be flagged as possible signs of an attack 43

Building Profiles Profiles are updated regularly, and older data must be "aged" out ex.: m t = α * most recent measured value + (1-α)*m t-1 where m t is expected value for time period t, α is an experimentally-derived weighting factor between.5 and 1.0 Risk: attacker trains IDS to accept his activity as normal i.e., training data should be free of intrusions, or intrusions must be properly classified in the training data! 44

Examples of Data Mining Techniques Association rule learning (find interesting relations between variables) Principal components analysis (isolate and focus on the high variance variables) Cluster analysis (group data into categories based on similarities) 45

Conventional View Anomaly-based IDS by itself generates too many false positives Combination of anomaly-based and signature-based is best 46

Host-Based vs. Network-Based IDS 47

Where Is the IDS Deployed? Host-based intrusion detection system (HIDS) monitor activity on a single host Network-based intrusion detection (NIDS) monitor traffic, examine packet headers and payloads 48

Host-Based IDS Use OS auditing and monitoring mechanisms to find applications taken over by an attacker. Ex.: log all system events (e.g., file accesses) monitor shell commands and system calls executed Advantage: better visibility into behavior of individual applications running on the host Example application: detecting rootkits 49

Host-Based (Cont d) Drawbacks / limitations need an IDS for every machine if attacker takes over machine, can tamper with IDS binaries and modify audit logs only local view of the attack 50

Rootkit Rootkit is a set of Trojan system binaries Break into a host, download rootkit by FTP, unpack, compile and install Possibly turn off anti-virus / IDS Hides its own presence! installs hacked binaries for common system monitoring commands, e.g., netstat, ps, ls, du, login Sniff user passwords 51

File Integrity Checking Tripwire Records hashes of critical files and binaries System periodically checks that files have not been modified by re-computing and comparing hash Ways to bypass? 52

Network-Based IDS Inspects network traffic passive (unlike packet-filtering firewalls) often handled by a router or firewall Monitors user activities e.g., protocol violations, unusual connection patterns, attack strings in packet payloads Advantage: single NIDS can protect many hosts and look for widespread patterns of activity 53

Network-Based (cont d) Drawbacks / limitations may be easily defeated by encryption (data portions and some header information can be encrypted) not all attacks arrive from the network must monitor, record and process huge amount of traffic on high-speed links Attack: overload NIDS with huge data streams, then attempt the intrusion 54

Popular NIDS : Snort Popular open-source tool Large (> 4000) ruleset for vulnerabilities; Ex.: Date: 2005-04-05 Synopsis: the Sourcefire Vulnerability Research Team (VRT) has learned of serious vulnerabilities affecting various implementations of Telnet [ ] Programming errors in the telnet client code from various vendors may present an attacker with the opportunity to overflow a fixed length buffer [ ] Rules to detect attacks against this vulnerability are included in this rule pack 55

Some Snort Rule Categories Backdoors Multimedia POP Telnet Chat MySQL RPC TFTP DDoS NETBIOS Scan Virus Finger NNTP Shellcode Web FTP Oracle SMTP X11 ICMP P2P SNMP IMAP SQL 56

Snort Rule Syntax Each snort rule has two logical sections: rule header and rule options rule header contains action, protocol, source (IP address/port), direction, destination (IP address/port) rule option contains alert messages, info on which parts of packet to be inspected 57

Snort Rule Examples alert icmp $EXTERNAL_NET any <> $HOME_NET any (msg:"ddos Stacheldraht agent->handler (skillz)"; content:"skillz"; itype:0; icmp_id:6666; reference:url,staff.washington.edu/dittrich/misc/ stacheldraht.analysis; classtype:attempted-dos; sid:1855; rev:2;) alert any any -> 192.168.1.0/24 any (flags:a; ack:0; msg: NMAP TCP ping ;) # nmap send TCP ACK pkt with ack field set to 0 alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"web-iis cmd.exe access"; flow:to_server,established; content:"cmd.exe"; nocase; classtype:web-application-attack; sid:1002; rev:5;) 58

Detecting Attack Strings Scanning for a signature in each packet is not enough attacker can split attack string into several packets; will defeat stateless NIDS Recording just previous packet s text is not enough attacker can send packets out of order Attacker can use TCP tricks so that certain packets are seen by NIDS but dropped by the receiving application 59

Summary 1. Firewalls widely used, packet filters most common one valuable technique among many 2. IDS (both host-based and networkbased) widely used 3. Attacks are constantly evolving; the arms race 4. False alarm volume, and providing clear feedback to administrators, is a problem 60