Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12



Similar documents
Network Security: The Principles of Threats, Attacks and Intrusions (Part 2)

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

IDS / IPS. James E. Thiel S.W.A.T.

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Intrusion Detection Systems

CSCI 4250/6250 Fall 2015 Computer and Networks Security

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

INTRUSION DETECTION SYSTEMS and Network Security

Introduction of Intrusion Detection Systems

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

Second-generation (GenII) honeypots

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Architecture Overview

CSCE 465 Computer & Network Security

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

HONEYPOT SECURITY. February The Government of the Hong Kong Special Administrative Region

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Intrusion Detection Systems (IDS)

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Intrusion Detection System (IDS)

Science Park Research Journal

Firewalls, Tunnels, and Network Intrusion Detection

Course Title: Penetration Testing: Security Analysis

Intrusion Detection for Mobile Ad Hoc Networks

Name. Description. Rationale

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Intrusion Detection Systems

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Taxonomy of Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

PROFESSIONAL SECURITY SYSTEMS

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Network- vs. Host-based Intrusion Detection

Chapter 15. Firewalls, IDS and IPS

Intrusion Detection Systems with Correlation Capabilities

Coimbatore-47, India. Keywords: intrusion detection,honeypots,networksecurity,monitoring

Passive Vulnerability Detection

HoneyBOT User Guide A Windows based honeypot solution

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

Firewalls and Intrusion Detection

Deployment of Snort IDS in SIP based VoIP environments

Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

Role of Anomaly IDS in Network

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

A Layperson s Guide To DoS Attacks

Network Incident Report

Chapter 9 Firewalls and Intrusion Prevention Systems

A Review on Network Intrusion Detection System Using Open Source Snort

Security Event Management. February 7, 2007 (Revision 5)

Security: Attack and Defense

How To Protect Your Network From Attack From A Hacker On A University Server

Intrusion Detection in AlienVault

Linux Network Security

Fifty Critical Alerts for Monitoring Windows Servers Best practices

Network Based Intrusion Detection Using Honey pot Deception

Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila

Fuzzy Network Profiling for Intrusion Detection

Security Intrusion & Detection. Intrusion Detection Systems (IDSs)

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2. Intrusion Detection and Prevention Systems

Network Forensics: Log Analysis

IDS : Intrusion Detection System the Survey of Information Security

Lesson 5: Network perimeter security

cinderella: A Prototype For A Specification-Based NIDS

Intrusion Detection Systems

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cisco IPS Tuning Overview

Network Security Management

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Radware s Behavioral Server Cracking Protection

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Firewalls, IDS and IPS

Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs

SURVEY OF INTRUSION DETECTION SYSTEM

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

General Network Security

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

Framework for generating IDS benchmarking Data sets. Stian Skjølsvik

Network Intrusion Detection Signatures, Part One by Karen Kent Frederick last updated December 19, 2001

Transcription:

Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12

IDS CONCEPTS

Firewalls. Intrusion detection systems.

Anderson publishes paper outlining security problems 1972 DNS created 1984 Morris Worm 1988 Stalker released 1989 160 million Internet hosts 2002 ARPANET 1969 TCP created 1974 Denning publishes IDS paper 1987 100,000 Internet hosts 1989 NetRanger released 1995

Anderson publishes paper outlining security problems 1972 DNS created 1984 Morris Worm 1988 Stalker released 1989 160 million Internet hosts 2002 ARPANET 1969 TCP created 1974 Denning publishes IDS paper 1987 100,000 Internet hosts 1989 NetRanger released 1995

Anderson publishes paper outlining security problems 1972 DNS created 1984 Morris Worm 1988 Stalker released 1989 160 million Internet hosts 2002 ARPANET 1969 TCP created 1974 Denning publishes IDS paper 1987 100,000 Internet hosts 1989 NetRanger released 1995

Anderson publishes paper outlining security problems 1972 DNS created 1984 Morris Worm 1988 Stalker released 1989 160 million Internet hosts 2002 ARPANET 1969 TCP created 1974 Denning publishes IDS paper 1987 100,000 Internet hosts 1989 NetRanger released 1995

What is an Intrusion? Can happen at any layer of the stack. Attack. Sequence of related actions by a malicious adversary that results in occurrence of security threats to target computer or network. Misuse. Actions that are allowed by the system but violate organisational policies. Arrived at by monitoring sequences of system events at host or network level. 15

Common Intrusion Detection Framework (1999) Monitored environment D-Box R-Box 16

Common Intrusion Detection Framework (1999) Monitored environment Event box: sensors, provide data for other boxes. D-Box R-Box 17

Common Intrusion Detection Framework (1999) Monitored environment Database box: stores information for later analysis or acts as buffer in real-time system. D-Box R-Box 18

Common Intrusion Detection Framework (1999) Monitored environment Analysis box: analyses events, detects potential intrusions or misuse and generates alarm. D-Box R-Box 19

Common Intrusion Detection Framework (1999) Monitored environment Response box: response to intrusion or misuse. D-Box R-Box 20

Classification Accuracy False positive: classify benign events as intrusion. True positive: classify events correctly. False negative: classify intrusionrelated events as benign. 21

IDS TYPES

Common Intrusion Detection Framework (1999) Monitored environment Event box: sensors, provide data for other boxes. D-Box R-Box 23

Host Based IDS (HIDS) E-box is integrated into the host. Operating system or applicationlevel. Highly localised view of activity but allows operating system/ application specific attacks/ misuse to be detected. Major types: file-integrity and behavioural.

File-Integrity monitoring 25

Behaviour monitoring BlackIce Host-based IDS for Windows and carries out extensive port analysis Four levels: Paranoid, Nervous, Cautious, Trusting Detects known attacks. Real time network usage graph Links to full protocol stack www.networkice.com 26

Network Based IDS (NIDS) E-box monitors network traffic. Operating system agnostic. Sensor placement crucial to ability to detect attacks. Performance an issue if on backbone. Won t affect performance of hosts, doesn t require installation on hosts simplifying deployment.

Example: SNORT Lightweight IDS system capable of performing real-time traffic analysis and packet logging Snort has three primary uses. It can be used as: 1. a packet sniffer like tcpdump 2. a packet logger (useful for network traffic debugging, etc) 3. a full network intrusion detection system 28

DETECTION MODELS

Common Intrusion Detection Framework (1999) Monitored environment Analysis box: analyses events, detects potential intrusions or misuse and generates alarm. D-Box R-Box 30

Misuse or Signature-Detection Observe event (behaviour, contents of packets etc.) Match? Database of signatures or rule sets Raise Alert 31

Signature-Detection: Rules Unique signature byte sequence NIDS-style rules Protocol to examine (such as TCP, UDP, ICMP) IP port requested IP addresses to inspect (destination and source) Action to take (such as allow, deny alert, log, disconnect). Unique signature byte sequence HIDS-style rules Files to examine. Action to take (such as delete, quarantine, alert). 32

Signature-Detection: SNORT 33

Signature-Detection: Advantages/Disadvantages False negatives are low. Able to specify the nature of the attack. Polymorphic attacks/viruses are a problem. Performance degrades as signature database grows. Zero-day attacks are a problem. 34

Anomaly Detection Observe normal behaviour Observe current behaviour Build model Model of behaviour Compare with model Raise Alert 35

Anomaly-Detection: Events Unusual account activity. Excessive file and object accesses. High CPU utilization. Unusual pattern of commands issued at terminal. High number of sessions. Unusual traffic volumes or protocol types. Unusual process activity. 36

Anomaly-Detection: Advantages/Disadvantages Can deal with unknown attacks because focuses on effect of attack rather than characteristics of attack itself. Difficulty of defining what is normal behaviour leading to high false positives. Hackers who understand the model can deliberately change their behaviour to avoid detection. 37

Anomaly Detection: Self Non-Self Discrimination 38

INTRUSION PREVENTION SYSTEMS

Common Intrusion Detection Framework (1999) Monitored environment Response box: response to intrusion or misuse. D-Box R-Box 40

IPS Concept Internal network IDS Router Internet Feedback 41

Advantages/Disadvantages Can mitigate effect of an ongoing attack rather than deal with the aftermath. Efficiency, how long does it take to react? Can attackers turn the IPS to create a denial-of-service by tricking it into false positive? 42

Evading IDS Overwhelm IDS with false positives (denial-of-service). Create operator fatigue by generating false positives. Exploit understanding of structure of IDS to defeat attacks. Targeting IDS component vulerabilities (buffer overflow etc.). 43

SUPPORTING TECHNOLOGIES

Network Mappers Commercial and free tools available - Cheops and nmap Carry out - DNS zone transfers, address/port scanning, host requests, promiscuous monitoring nmap sends variety of packets with illegal flags, ICMP echos, fragmented packets etc to hosts and analysing responses Eg recognise Linux with kernels older than 2.0.35 by using packet with SYN and illegal flags set 45

Security Scanners Network mapping tools (nmap) allow verification of system Network Security Scanners test and report system security Sample tools: SATAN/SAINT/SANTA Metasploit Snort, ShieldsUP!, LeakTest (probe for vulnerabilities) Host-based - search for mis-configurations and dangerous settings, unusual privileges etc Network-based - checks host security policies, dangerous or unnecessary services 46

Honeypots Systems Current IDS methodologies have shortcomings: problem recognising novel attacks occurrence of false positives reporting of attacks of no interest Honeytrap system simulated or real system that exists for sole purpose of being attacked! Looks and behaves like real system Must not be launching pad Must gather valuable information on attacker 47