Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network Intrusion Detection System. Network Intrusion Detection Basics  Network intrusion detection systems are designed to sniff network traffic and.

Similar presentations


Presentation on theme: "Network Intrusion Detection System. Network Intrusion Detection Basics  Network intrusion detection systems are designed to sniff network traffic and."— Presentation transcript:

1 Network Intrusion Detection System

2 Network Intrusion Detection Basics  Network intrusion detection systems are designed to sniff network traffic and analyze it to identify threats in the forms of reconnaissance activities and attacks.  By detecting malicious activity, network intrusion detection enables you to identify and react to threats against your environment, as well as threats that your hosts might be directing at hosts on other networks.  There is also a related IDS technology known as host-based intrusion detection.  Host-based IDS software focuses on detecting attacks against a particular host, such as a workstation or server, and is run from the host itself.

3 Network Intrusion Detection Basics  There are several types of host-based IDS software products, including log analyzers and file integrity checkers.  Log analyzers monitor operating system and application logs, looking for entries that might be related to attacks or security violations.  File integrity checkers alert you if particular files are altered, which might indicate a successful attack.  Without intrusion detection, you may be unaware of many attacks that occur.

4 The Need for Intrusion Detection  Most ominously, you may never know about an attack that doesn't damage your host, but simply extracts information, such as a password file.  Many attacks involve multiple steps or phases. For example, an attacker might start by launching a scan that sends a DNS query containing a version.bind request to each IP address in a range.  Some DNS servers respond to such a query with their BIND version number.

5 The Need for Intrusion Detection  The goal of this scan is to identify which hosts are DNS servers and what versions of BIND they are using.  Based on the results of the first scan, the attacker then sends a specially crafted DNS query to some of the DNS servers to exploit a buffer overflow vulnerability in a particular version of BIND.  This second set of queries could occur hours or days after the first setor it could occur within seconds. It depends on the tools being used and the attacker's methodology.

6 The Need for Intrusion Detection  If any of the buffer overflow exploits are successful, the attacker might be able to perform unauthorized actions on one or more of the servers, potentially gaining administrator-level privileges.  If you are not using intrusion detection, how will you know when a successful attack has occurred? Some attacks are immediately visible, such as a website defacement; others are not.  A properly configured, robust IDS can play more than one role in identifying typical attacks. An IDS can detect reconnaissance activity that may indicate future targets of particular interest.

7 The Need for Intrusion Detection  It also generates alerts for the subsequent attempts to breach host security.  Alerts are usually generated through one of two methods. The first method, anomaly detection, relies on statistical analysis to identify traffic that falls outside the range normally seen in this environment, or it relies on protocol analysis to identify traffic that violates protocol standards or typical behavior.  The second method, signature detection, identifies known attack signatures observed in traffic.

8 Anomaly Detection IDS detect anomalies in network traffic by observing network activity over a period of time, then detecting significant deviations from the baseline. For example, a product could monitor a network for two weeks to identify which network services are provided by each host, which hosts use each service, and what volume of activity occurs during different times of the day and days of the week. A month later, if the IDS sensor sees a high volume of traffic involving a previously unused service on a host, this could indicate a distributed denial of service (DDoS) attack against the host or a compromised host providing a new service.

9 Anomaly Detection  This class of product is sometimes known as a DDoS attack mitigation system, because it not only detects the DDoS attacks, but also acts to stop them through intrusion prevention techniques.  Examples of DDoS attack mitigation systems include Captus IPS, Mazu Enforcer, and Top Layer Attack Mitigator.  One obvious drawback of this type of anomaly detection is that the baseline needs to be updated constantly to reflect authorized changes to the environment, such as the deployment of a new server or the addition of another service to an existing server

10 Anomaly Detection  Some products permit the baseline to be updated manually, at least in terms of identifying which hosts are authorized to provide and use certain services.  If the baseline can be kept current, or if the environment is quite static and the baseline changes rarely, anomaly detection can be extremely effective at identifying certain types of attacks and reconnaissance activities, such as port and host scans, network-based denial of service attacks, and malicious code (particularly worms).  Unfortunately, this type of anomaly detection cannot identify most other types of attacks, so it is best used to complement other IDS technologies.

11 Anomaly Detection  Many signature-based IDS products perform some type of protocol anomaly detection. This means that the IDS compares traffic to the expected characteristics for widely used protocols, such as HTTP, DNS, and SMTP.  When a serious discrepancy is discovered for example, a header field that contains hundreds of binary values instead of the expected small number of text characters the IDS generates an alert that an anomaly has been discovered.  This can be very effective at identifying certain previously unknown instances of attacks that a purely signature-based IDS could not identify.

12 Anomaly Detection  One significant limitation of anomaly-based IDS is that generally it cannot determine the intent of an attack just that something anomalous is occurring.  Analysts need to study the data captured by the IDS to determine what has happened, validate the alerts, and react appropriately. However, because network and protocol anomaly detection based methods can detect attacks that signature-based IDS cannot, a robust IDS solution for an enterprise should incorporate both anomaly-based and signature- based methods if resources permit.

13 Signature Detection  A network IDS signature is a pattern you are looking for in traffic.  When a signature for an attack matches observed traffic, an alert is generated, or the event is otherwise recorded.  Some older operating systems could not properly handle such packets, which violate standards, so attackers would send crafted packets with the same source and destination addresses.  Many signatures are protocol or application specific; for example, many signatures pertain only to DNS traffic

14 Signature Detection  Because DNS zone transfers traditionally use TCP port 53, a signature pertaining to a zone transfer vulnerability includes the TCP protocol and also needs to look for destination port 53.  Each signature specifies other characteristics that help to identify the vulnerability that the attacker is trying to exploit.  Some IDSs focus on long sequences of code from published exploits, whereas other IDSs actually perform full protocol analysis, examining and validating the header and payload values of each packet.  Although full analysis is more resource intensive, it tends to produce a much more robust signature solution.

15 Signature Detection  Most intrusion detection vendors release new sets of signatures regularly. If a major new vulnerability is discovered or an exploit is widely seen, intrusion detection vendors quickly research the exploit or vulnerability, create new signatures for it, and release the signatures to their users as soon as possible.  This process is similar to the process that antivirus software vendors follow when addressing threats from new viruses, worms, Trojans, and other types of malicious code.  When a major new threat emerges suddenly, such as the Slammer and Netsky worm, IDS vendors typically have a signature available for

16 How Signatures Work  Let's look at an example of a signature for the Nimda worm. Because the worm uses a common text-based protocol (HTTP) and uses a relatively simple exploitation technique.  When the Nimda worm tries to infect a web server, it sends a set of HTTP requests, including this one: GET /scripts/..%c0%af../winnt/system32/cmd.exe?/c+dir  The purpose of this particular request is to exploit a Unicode-related vulnerability in certain unpatched Microsoft IIS servers to gain unauthorized privileges.

17 How Signatures Work  %c0%af is the Unicode equivalent of a slash, so this command is actually trying to traverse the root directory to exploit the vulnerability.  You want your network intrusion detection sensors to notify you when they see this traffic. Many different possible signatures exist.  A simple text-matching signature would look for /scripts/..%c0%af../ in a URL (more precisely, in the payload of a TCP packet that a client sends to a server's port 80).  Because the Nimda worm issues several GET requests with slightly different values, you would need a separate signature for each one of them if you wanted to identify each attack attempt.

18 How Signatures Work  Some IDS sensors have a much more robust way of identifying these types of requests as attacks.  Rather than doing simple text matching, they actually decode the request, substituting a slash for the %c0%af sequence, and then analyze the validity of the decoded URL.  As a result of the analysis, the IDS sensor determines that the attacker is trying to go past the root directory, and it generates an alert.  Although this method is more resource intensive, it provides a much better detection capability than the simple text-matching method because it actually examines traffic for the attack technique, not for specific known instances of that technique being used.

19 False Positives and False Negatives  Signature development is always a balancing act. A specific signature might be extremely accurate in identifying a particular attack, yet it might take many resources to do so.  If an attacker slightly modifies the attack, the signature might not be able to identify it at all.  On the other hand, a general signature might be much faster and require far fewer resources, and it might be better at finding new attacks and variants on existing ones.

20 False Positives and False Negatives  The downside of a general signature is that it also might cause many false positives when a sensor classifies benign activity as an attack.  Another factor is the original release date of the signature; over time, false positives are identified by the IDS vendor and corrected, leading to the release of higher-quality signatures. Brand-new signatures often generate high numbers of false positives.  Every intrusion detection system generates false positives. When you first look at an IDS console and see dozens or hundreds of alerts, you might think that your systems are under massive attack. But those alerts are much more likely to be false positives.

21 False Positives and False Negatives  By selecting a solid IDS product and tuning your sensors, you can reduce false positives, but you can't completely eliminate them.  No matter how precisely a particular signature is written, there's still a chance that some benign traffic will accidentally match that signature.  False positives are a headache for an intrusion analyst because you have to spend time and resources determining that they are, in fact, false.

22 False Positives and False Negatives  A false negative occurs when a signature fails to generate an alert when its associated attack occurs.  People tend to focus on false positives much more than false negatives, but each false negative is a legitimate attack or incident that IDS failed to notice.  False negatives get less attention because you usually have no way of knowing that they have occurred.  It's important to understand what causes false positives and negatives so that you can choose an IDS that minimizes them.

23 Developing Signatures That Minimize False Positives and Negatives  To better understand false positives and negatives, let's look at a simple example.  Suppose that in your intrusion detection system, you write a signature that looks for cmd.exe anywhere in a URL. (cmd.exe is often used in root traversal exploits against IIS servers, such as the Nimda worm.)  This is a general signature that matches many different attack attempts.  Unfortunately, it also matches cmd.exe-analysis.html, a web page that contains an analysis of cmd.exe attacks.

24 Developing Signatures That Minimize False Positives and Negatives  Because of the false positives, you decide to rewrite your signature to use some contextual information as well. Now your signature is a URL that contains /winnt/system32/cmd.exe  Because this is a more specific signature, it triggers fewer false positives than the more general signature.  Unfortunately, reducing false positives often comes at the expense of increasing false negatives.

25 Developing Signatures That Minimize False Positives and Negatives  If an attacker uses a URL that includes /winnt/system32/../system32/cmd.exe, the more specific signature misses it, causing a false negative to occur.  However, the more general first signature would have sent an alert. And the more robust method described earlier, which decodes the entire URL and evaluates it for root traversals, would have sent an alert for both versions.  More complex signatures are usually better than simple text-matching signatures, which are unable to identify most variations on attacks. In fact, some attackers purposely craft their attacks to avoid detection by simple signatures; this is known as IDS evasion.

26 Detecting IDS Evasion Techniques  As if developing an IDS signature that minimizes false positives and false negatives isn't difficult enough, you must also consider the effects of IDS evasion techniques on signature development.  Attackers have many methods of altering their code to avoid IDS detection.  For example technique used in URLs is replacing a character with its hex or Unicode equivalent. Therefore, cmd.exe could become cmd.%65xe because %65 is the hex representation of e.

27 Detecting IDS Evasion Techniques  Only IDS products that perform hex decoding before performing signature comparisons would determine that this string matches cmd.exe.  Some evasion techniques actually relate to the IDS sensor's core architecture, not specific signatures.  One such technique is to fragment a packet so that it has a small initial fragment; the attacker hopes that the IDS examines only the first fragment, which looks benign, and ignores the remaining fragments, which contain malicious content.  An IDS that does full-packet reassembly is not fooled by this evasion method.

28 Avoiding Unwanted Alerts  Besides false positives, you might also have alerts that address legitimate problems that you simply don't care about.  Unwanted alerts seem to occur in just about every environment.  For example, if your environment is an ISP or a wireless company, you are providing network services to customers. You probably have a lot of traffic passing on your networks between your customers and other outside hosts.  If you are monitoring these networks with IDS sensors and you tune them to identify all possible scans and attacks, you are likely to be overwhelmed with a huge number of alerts that you honestly don't care about.

29 Alerting, Logging, and Reporting  When an intrusion detection system sees traffic that matches one of its signatures, it logs the pertinent aspects of the traffic or generates an alert, depending on the severity of the activity and the configuration of the IDS sensor.  Alerts can be delivered to intrusion analysts in a variety of ways, including messages on the analyst console, emails, and SNMP traps, depending on the product being used.

30 Alerting, Logging, and Reporting  Reporting is another key element of intrusion detection.  If you have only one sensor, reporting should be simple.  If you have dozens of sensors, you probably don't want separate reports from each of them. Instead, you want all data to be collected in one place because it's more convenient to view and easier to back up. It's also far easier to correlate events that all sensors see.  Reporting formats vary widely among IDS products; most also permit sensor alerts and logs to be exported to other databases for further queries and reporting.

31 Intrusion Detection Software  Many different network IDSs are available, each with its own distinct features. Some of the best-known and most popular products include Cisco Secure IDS, Enterasys Dragon Network Sensor, ISS RealSecure Network Sensor, NFR Sentivist IDS, Snort, and Sourcefire Intrusion Management System.  They all provide alerting, logging, and reporting capabilities. Signature sets are available through a variety of means, depending on the product.  Users of some products have written their own signatures and made them publicly available. Other products must be purchased to get signatures; some vendors hide the signature details, whereas others allow users to view and even modify their signatures.

32 Intrusion Detection Software  Network IDS sensors have other helpful features. For example, some systems can perform network monitoring and traffic analysis, collecting statistics on connections, protocols in use, and the like.  This capability can be invaluable in identifying policy violations, such as unauthorized services in use, and traffic oddities in general.  Some IDS products provide tiered solutions, which typically involve deploying multiple IDS sensors on various network segments. Each sensor transmits its IDS data to a centralized server that stores all the data. The individual sensors or the centralized box, which is able to correlate events from all the sensors' data, can make alert decisions.

33 Intrusion Detection Software  Many IDS solutions also have separate analyst consoles that connect to the centralized system or the individual sensors; these enable analysts to view recorded data and alerts, as well as reconfigure the sensors and update signatures.  Some software vendors, such as ArcSight, e-Security, GuardedNet, Intellitactics, and netForensics, offer console products that can process and correlate data from various brands of IDS sensors, firewalls, and other hosts.

34 Intrusion-Related Services  Besides intrusion detection products, some intrusion detection related services might be able to assist you with the analysis of your intrusion detection data.  Some organizations choose to outsource the analysis of their IDS sensor data to specialized commercial monitoring services.  Other organizations elect to do their own analysis, but also submit their data to free distributed IDS services for additional help. Following are main services: 1.Distributed IDS Services 2.Outsourced Intrusion Detection System Monitoring

35 Distributed IDS Services  As IDS products have become more popular, the use of free distributed IDS services has also grown significantly.  The basic concept is that administrators from organizations all over the world submit logs to a distributed IDS service from their own IDS sensors, firewalls, and other devices.  These services analyze the data from all the sites and perform correlations to identify likely attacks.  Two of the best-known distributed IDS services are Symantec's DeepSight Analyzer, located at http://analyzer.symantec.com,http://analyzer.symantec.com  DShield, located at http://www.dshield.org.http://www.dshield.org

36 Distributed IDS Services  Using a distributed IDS service has a few benefits. Because the service receives logs from many environments, it has a wealth of data to use for its intrusion analysis.  A distributed IDS service finds patterns among all the attacks that individual sites cannot see.  Another great feature of some distributed IDS services is that if they conclude that a host at a particular IP address attacked a substantial number of sites, they will email the technical contact for that domain so that the activity can be investigated.  Distributed IDS services can reduce some of the burden placed on intrusion analysts by analyzing logs, correlating events, and following up on highly suspicious activity essentially providing another tool that can help analysts.

37 Outsourced Intrusion Detection System Monitoring  Many companies, such as Counterpane, ISS, and Symantec, offer managed security services that include IDS monitoring capabilities.  This generally entails 24-hour remote monitoring of your IDS sensors, analysis of IDS data, and rapid notification of your staff in case of serious attack or IDS failure.  One advantage of using these services is staffing related; they can provide trained intrusion analysts to monitor your sensors at all times.  Another advantage is that because these services collect data from so many networks, they can correlate attacks among them.

38 Outsourced Intrusion Detection System Monitoring  The disadvantage is their lack of knowledge about your environment and their inability to correlate events unless they can access firewall and host log files in near real time.

39 Outsourced Intrusion Detection System Monitoring  At best, outsourced IDS monitoring can identify serious attacks and help your organization respond to them quickly and appropriately.  If your organization doesn't have the time or expertise to analyze its own IDS sensor data properly and promptly, outsourcing that work is important for maintaining a strong perimeter defense.  At worst, such services add little or nothing to the existing IDS solution, while requiring substantial financial commitments. Because outsourced IDS monitoring is very resource-intensive, it can easily cost millions of dollars a year for larger organizations.


Download ppt "Network Intrusion Detection System. Network Intrusion Detection Basics  Network intrusion detection systems are designed to sniff network traffic and."

Similar presentations


Ads by Google