Application Intrusion Detection

Slides:



Advertisements
Similar presentations
Lecture 1: Overview modified from slides of Lawrie Brown.
Advertisements

1. AGENDA History. WHAT’S AN IDS? Security and Roles Types of Violations. Types of Detection Types of IDS. IDS issues. Application.
Security Controls – What Works
Base Protection Lab (BPL) December 12, 2007 ONR Program Officer: William “Kip” Krebs, , Alternate POC: Annetta Burger.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 Intrusion Detection CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 4, 2004.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
seminar on Intrusion detection system
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Lecture 11 Intrusion Detection (cont)
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Intrusion Detection Systems: A Survey and Taxonomy A presentation by Emily Fetchko.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Distributed Network Intrusion Detection An Immunological Approach Steven Hofmeyr Stephanie Forrest Patrik D’haeseleer Dept. of Computer Science University.
CS490D: Introduction to Data Mining Prof. Chris Clifton April 14, 2004 Fraud and Misuse Detection.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
Intrusion Detection Adam Ashenfelter Nicholas J. Tyrrell.
IIT Indore © Neminah Hubballi
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
Computer System Intrusion Detection: A Survey Anita K. Jones & Robert S. Sielken Presented by Peixian Li (Rick) For CS551/651 Computer Security.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Operating system Security By Murtaza K. Madraswala.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Kittiphan Techakittiroj (25/10/58 12:06 น. 25/10/58 12:06 น. 25/10/58 12:06 น.) Intrusion Detection System Kittiphan Techakittiroj
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Intrusion Detection State of the Art/Practice Anita Jones University of Virginia.
Chapter -08 Process technology. PROCESS TECHNOLOGY In general process technologies are devices or machines that we use every day in operations. Two key.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Application Intrusion Detection Anita Jones University of Virginia.
Computer threats, Attacks and Assets upasana pandit T.E comp.
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors : Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser.
A Comparison Between Signature Based and Anomaly Based Intrusion Detection Systems By: Brandon Lokesak For: COSC 356 Date: 12/4/2008.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Jason Ewing. What is an Intrusion Why Detecting Signs of Intrusion is Important? Types of Intrusion Detection Systems (IDS) Approaches for Detection Anomaly.
Some Great Open Source Intrusion Detection Systems (IDSs)
Unit 1: Protecting the Facility (Virtual Machines)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Manajemen Jaringan, Sukiswo ST, MT 1 Network Control Sukiswo
SIEM Rotem Mesika System security engineering
CS457 Introduction to Information Security Systems
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Ch.22 INTRUSION DETECTION
(A CORPORATE NETWORK APPROACH)
Information System and Network Security
Intrusion Control.
Security Methods and Practice CET4884
Intrusion Detection Systems
Outline Introduction Characteristics of intrusion detection systems
Operating system Security
CNET334 - Network Security
Evaluating a Real-time Anomaly-based IDS
SECURITY INFORMATION AND EVENT MANAGEMENT
NET 412 Network Security protocols
A Real-time Intrusion Detection System for UNIX
Intrusion Detection Systems (IDS)
A survey of network anomaly detection techniques
Intrusion Prevention Systems
Intrusion Detection Systems
Lecture 8: Intrusion Detection
Intrusion Detection system
Intrusion Detection Systems
Cryptography and Network Security
Presentation transcript:

Application Intrusion Detection Robert S. Sielken In Fulfillment Of Master of Computer Science Degree School of Engineering and Applied Science University of Virginia May 4, 1999 Application Intrusion Detection

Application Intrusion Detection Outline Introduction State of Practice - OS IDS Case Studies Application Intrusion Detection Construction of an Application Intrusion Detection System (AppIDS) Conclusion May 4, 1999 Application Intrusion Detection

Application Intrusion Detection Introduction Intrusion Detection determining whether or not some entity, the intruder, has attempted to gain, or worse, has gained unauthorized access to the system Intruders Internal External Objectives Confidentiality Integrity Availability Accountability Current State done at the OS level, but diminishing returns opportunities and limits of utilizing application semantics? May 4, 1999 Application Intrusion Detection

State of Practice - OS IDS Audit records operating system generated collections of the events that have happened in the system over a period of time Events results of actions taken by users, processes, or devices that may be related to a potential intrusion Threat Categories Denial of Service Disclosure Manipulation Masqueraders Replay Repudiation Physical Impossibilities Device Malfunctions May 4, 1999 Application Intrusion Detection

Application Intrusion Detection OS IDS - Approaches Anomaly Detection Static Tripwire, Self-Nonself Dynamic NIDES, Pattern Matching (UNM) Misuse Detection NIDES, MIDAS, STAT Extensions - Networks Centralized DIDS, NADIR, NSTAT Decentralized GrIDS, EMERALD May 4, 1999 Application Intrusion Detection

OS IDS - Generic Characteristics Relation - expression of how two or more values are associated Statistical Rule-Based Observable Entities - any object (user, system device, etc.) that has or produces a value in the monitored system that can be used in defining a relation Thresholds - determine how the result of the relation will be interpreted May 4, 1999 Application Intrusion Detection

OS IDS - Generic Characteristics Effectiveness fine-tuning of thresholds frequency of relation evaluation number of correlated values hierarchy May 4, 1999 Application Intrusion Detection

Application Intrusion Detection AppIDS Guiding Questions Opportunity – what types of intrusions can be detected by an AppIDS? Effectiveness – how well can those intrusions be detected by an AppIDS? Cooperation – how can an AppIDS cooperate with the OS IDS to be more effective than either alone? May 4, 1999 Application Intrusion Detection

Application Intrusion Detection Case Studies Electronic Toll Collection numerous devices distributed complementary device values hierarchical gathers data about monitored external behavior accounting component Health Record Management non-hierarchical no devices beyond controlling computer no financial component limited access contains physical realities data collection and scheduling components May 4, 1999 Application Intrusion Detection

Electronic Toll Collection (ETC) Devices Toll Lane Tag Sensor Automated Coin Basket Toll Booth Attendant Loop Sensor Axle Reader Weigh-In-Motion Scale Traffic Signal Video Camera Vehicle Tag (Active/Passive) May 4, 1999 Application Intrusion Detection

Application Intrusion Detection ETC - Hierarchy May 4, 1999 Application Intrusion Detection

ETC - Application Specific Intrusions Threat Categories Specific Intrusions Methods Relations Annoyance (3 methods) Steal Electronic Money (10 methods) Steal Vehicle (4 methods) Device Failure (1 method) Surveillance (2 methods) May 4, 1999 Application Intrusion Detection

Application Intrusion Detection ETC - Steal Service May 4, 1999 Application Intrusion Detection

Application Intrusion Detection Similarities detect intrusions by evaluating relations to differentiate between anomalous and normal behavior centralized or decentralized (hierarchical) same threat categories Differences anomaly detection using statistical and rule-based relations internal intruders event causing entity resolution tightness of thresholds event records periodic code triggers May 4, 1999 Application Intrusion Detection

Application Intrusion Detection AppID (cont’d) Dependencies OS IDS on AppIDS None AppIDS on OS IDS basic security services prevention of bypassing application to access application components Cooperation audit/event record correlation communication bi-directional request-response bundles complications terms of communication resource usage - lowest common denominator May 4, 1999 Application Intrusion Detection

Construction of an AppIDS Event Record Manager Relation Evaluator Anomaly Alarm Handler TOOLS Relation Specifier Relations Event Record Specifier Event Record Structure Timings Relation – Code Connector Observable Entity Locations in the Application GENERIC COMPONENTS May 4, 1999 Application Intrusion Detection

Application Intrusion Detection Conclusion Opportunity internal intruders (abusers) anomaly with statistical and rule-based relations same threat categories Effectiveness resolution tightness of thresholds Cooperation detection Construction tools generic components May 4, 1999 Application Intrusion Detection

Health Record Management (HRM) Components Patient Records Orders – lists of all requests for drugs, tests, or procedures Schedule – schedule for rooms for patient occupancy, laboratory tests, or surgical procedures (does not include personnel) Users doctors, laboratory technicians, and nurses May 4, 1999 Application Intrusion Detection

HRM - Application Specific Intrusions Threat Categories Specific Intrusions Methods Relations Annoyance (4 methods) Steal Drugs (1 method) Patient Harm (6 methods) Surveillance (2 methods) May 4, 1999 Application Intrusion Detection

Application Intrusion Detection HRM - Patient Harm May 4, 1999 Application Intrusion Detection

Application Intrusion Detection ETC - Steal Service May 4, 1999 Application Intrusion Detection

Steal Service (cont’d) May 4, 1999 Application Intrusion Detection

Application Intrusion Detection HRM - Patient Harm May 4, 1999 Application Intrusion Detection