Intrusion Detection/Prevention Systems

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Anomaly Detection Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
IDS/IPS Definition and Classification
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Intrusion Detection/Prevention Systems. Objectives and Deliverable Understand the concept of IDS/IPS and the two major categorizations: by features/models,
IT Security Doug Brown Jeff Bollinger. What is security? P.H.P. People Have Problems Security is the mitigation and remediation of human error in information.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
What Learned Last Week Homework qn –What machine does the URL go to?
Intrusion Detection/Prevention Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality,
seminar on Intrusion detection system
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection - Arun Hodigere. Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
Intrusion Detection/Prevention Systems. Objectives and Deliverable Understand the concept of IDS/IPS and the two major categorizations: by features/models,
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
Introduction to firewalls and IDS/IPS
Penetration Testing Security Analysis and Advanced Tools: Snort.
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
COEN 252 Computer Forensics
IIT Indore © Neminah Hubballi
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
COEN 252 Computer Forensics Collecting Network-based Evidence.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Chapter 5: Implementing Intrusion Prevention
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Intrusion Detection/Prevention Systems. Objectives and Deliverable Understand the concept of IDS/IPS and the two major categorizations: by features/models,
Intrusion Detection System
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
CS5261 Information Security CS 526 Topic 15 Malware Defense & Intrusion Detection Topic 15: Malware Defense.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Some Great Open Source Intrusion Detection Systems (IDSs)
CompTIA Security+ Study Guide (SY0-401)
Internet Quarantine: Requirements for Containing Self-Propagating Code
Wireless Network Security
Outline Introduction Characteristics of intrusion detection systems
Network-based Intrusion Detection, Prevention and Forensics System
Principles of Computer Security
CompTIA Security+ Study Guide (SY0-401)
NET 412 Network Security protocols
A Real-time Intrusion Detection System for UNIX
CORE Security Technologies
Intrusion Prevention Systems
Understanding Intrusion Detection Systems
Lecture 8: Intrusion Detection
Intrusion Detection system
Introduction to Internet Worm
Intrusion Detection Systems
Lecture 7: Intrusion Detection
Intrusion Detection Systems
Presentation transcript:

Intrusion Detection/Prevention Systems

Objectives and Deliverable Understand the concept of IDS/IPS and the two major categorizations: by features/models, and by location. Understand the pros and cons of each approach Be able to write a snort rule when given the signature and other configuration info Understand the difference between exploits and vulnerabilities

Definitions Intrusion Intrusion detection Intrusion prevention A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability, of a computing and networking resource Intrusion detection The process of identifying and responding to intrusion activities Intrusion prevention Extension of ID with exercises of access control to protect computers from exploitation Online IDS + Access control

Elements of Intrusion Detection Primary assumptions: System activities are observable Normal and intrusive activities have distinct evidence Components of intrusion detection systems: From an algorithmic perspective: Features - capture intrusion evidences Models - piece evidences together From a system architecture perspective: Various components: audit data processor, knowledge base, decision engine, alarm generation and responses

Components of Intrusion Detection System Audit Data Preprocessor Audit Records Activity Data system activities are observable Detection Models Detection Engine Alarms normal and intrusive activities have distinct evidence Decision Table Decision Engine Action/Report

Intrusion Detection Approaches Modeling Features: evidences extracted from audit data Analysis approach: piecing the evidences together Misuse detection (a.k.a. signature-based) Anomaly detection (a.k.a. statistical-based) Deployment: Network-based or Host-based Network based: monitor network traffic Host based: monitor computer processes Need “both” on all these.

Misuse Detection pattern matching Intrusion Patterns: intrusion Sequences of system calls, patterns of network traffic, etc. activities pattern matching intrusion Example: if (traffic contains “x90+de[^\r\n]{30}”) then “attack detected” Advantage: Mostly accurate. But problems? Can’t detect new attacks

Vulnerability vs. Exploit Blaster Worm (WINRPC) Example: BIND: rpc_vers==5 && rpc_vers_minor==1 && packed_drep==\x10\x00\x00\x00 && context[0].abstract_syntax.uuid=UUID_RemoteActivation BIND-ACK: rpc_vers==5 && rpc_vers_minor==1 CALL: rpc_vers==5 && rpc_vers_minors==1 && packed_drep==\x10\x00\x00\x00 && opnum==0x00 && stub.RemoteActivationBody.actual_length>=40 && matchRE(stub.buffer, /^\x5c\x00\x5c\x00/) Good state Bad Vulnerability Signature Vulnerability: design flaws enable the bad inputs lead the program to a bad state Bad input (exploit) Pros Describe semantic context Very expressive, can express the vulnerability condition exactly Accurate Cons Slow! Existing approaches all use sequential matching Require protocol parsing

Anomaly Detection probable intrusion activity measures Define a profile describing “normal” behavior, then detects deviations. Thus can detect potential new attacks. Any problem ? The two axis not shown are IO and page fault. Relatively high false positive rates Anomalies can just be new normal activities. Anomalies caused by other element faults E.g., router failure or misconfiguration, P2P misconfig Which method will detect DDoS SYN flooding ?

Host-Based IDSs Use OS auditing and monitoring/analysis mechanisms to find malware Can execute full static and dynamic analysis of a program Monitor shell commands and system calls executed by user applications and system programs Has the most comprehensive program info for detection, thus accurate Problems: User dependent: install/update IDS on all user machines! If attacker takes over machine, can tamper with IDS binaries and modify audit logs Only local view of the attack

The Spread of Sapphire/Slammer Worms In the first 30 minutes of Sapphire’s spread, we recorded nearly 75,000 unique infections. As we will detail later, most of these infections actually occurred within 10 minutes. This graphic is more for effect rather than technical detail: We couldn’t determine a detailed location for all infections, and the diameter of each circle is proportional to the lg() of the number of infections, underrepresenting larger infections. Nevertheless, it gives a good feel for where Sapphire spread. We monitored the spread using several “Network Telescopes”, address ranges where we had sampled or complete packet traces at single sources. We also used the D-shield distributed intrusion detection system to determine IPs of infected machines, but we couldn’t use this data for calculating the scanning rate.

Network Based IDSs Our network Internet Gateway routers Our network Host based detection At the early stage of the worm, only limited worm samples. Host based sensors can only cover limited IP space, which has scalability issues. Thus they might not be able to detect the worm in its early stage.

Network IDSs Deploying sensors at strategic locations For example, Packet sniffing via tcpdump at routers Inspecting network traffic Watch for violations of protocols and unusual connection patterns Look into the packet payload for malicious code Limitations Cannot execute the payload or do any code analysis ! Even DPI gives limited application-level semantic information Record and process huge amount of traffic May be easily defeated by encryption, but can be mitigated with encryption only at the gateway/proxy Problems: mainly accuracy

Host-based vs. Network-based IDS Give an attack that can only be detected by host-based IDS but not network-based IDS Can you give an example only be detected by network-based IDS but not host-based IDS ? For the first: a unknown malware For the second: botnet scanning or worm propagation

Key Metrics of IDS/IPS Algorithm Architecture Alarm: A; Intrusion: I Detection (true alarm) rate: P(A|I) False negative rate P(¬A|I) False alarm (aka, false positive) rate: P(A|¬I) True negative rate P(¬A|¬I) Architecture Throughput of NIDS, targeting 10s of Gbps E.g., 32 nsec for 40 byte TCP SYN packet Resilient to attacks

Architecture of Network IDS Signature matching (& protocol parsing when needed) Protocol identification TCP reassembly Packet capture libpcap Packet stream

Firewall/Net IPS VS Net IDS Firewall/IPS Active filtering Fail-close Network IDS Passive monitoring Fail-open Protection is not free/cheap. For example, an intrusion detection system (IDS) needs to analyze each packet. This requires a lot of computing power, usually a dedicated high-end workstation. If the IDS is real-time then its response time must be short. When there is insufficient resources, some protection mechanisms will simply not let data in (fail-close). For example, a firewall, which filters each packet, will simply drop packets when it is overloaded. The dropped packet will not be able to reach beyond the firewall into the internal network. The user experience may not be a happy one because of data loss. However, other protection mechanisms will check/analyze as much as they can but will effectively let all data (fail-open) when there is insufficient resources. For example, an IDS, which simply copies a packet and analyzes it (while the packet continues to reach its target), may only be able to check a packet after a lengthy delay when it is overloaded, letting the packet to complete its potentially malicious actions. When assessing the protection mechanisms, we will develop models and evaluate under what conditions they will fail-close or fail-open. IDS FW

Comparison between Packet Filter and IPS Input Header only (layer 3 & 4) Header and payload First match? Yes No (match all) Signature/anomaly based detection? Signature only Signature and anomaly based detection

Gartner Magic Quadrant for IPS Ability to Execute Product/Service Overall Viability (Business Unit, Financial, Strategy, Organization) Sales Execution/Pricing Market Responsiveness and Track Record Marketing Execution Customer Experience Operations Completeness of Vision Market Understanding Marketing Strategy Sales Strategy Offering (Product) Strategy Business Model Vertical/Industry Strategy Innovation Geographic Strategy http://www.gartner.com/technology/reprints.do?id=1-1B9PW2W&ct=120706&st=sb

Gartner Magic Quadrant for IPS Two and Half Years Ago http://www.gartner.com/technology/reprints.do?id=1-1B9PW2W&ct=120706&st=sb

Case Study: Snort IDS (not required for hw/exam except its signatures)

Conclusions Understand the concept of IDS/IPS and the two major categorizations: by features/models, and by location. Understand the pros and cons of each approach Be able to write a snort rule when given the signature and other configuration info Understand the difference between exploits and vulnerabilities

Backup Slides

Problems with Current IDSs Inaccuracy for exploit based signatures Cannot recognize unknown anomalies/intrusions Cannot provide quality info for forensics or situational-aware analysis Hard to differentiate malicious events with unintentional anomalies Anomalies can be caused by network element faults, e.g., router misconfiguration, link failures, etc., or application (such as P2P) misconfiguration Cannot tell the situational-aware info: attack scope/target/strategy, attacker (botnet) size, etc.

Limitations of Exploit Based Signature 1010101 10111101 11111100 00010111 Traffic Filtering Internet X Our network X Polymorphism! Polymorphic worm might not have exact exploit based signature 25

Vulnerability Signature Vulnerability signature traffic filtering Internet X X Our network X X Vulnerability Work for polymorphic worms Work for all the worms which target the same vulnerability 26

Example of Vulnerability Signatures At least 75% vulnerabilities are due to buffer overflow Sample vulnerability signature Field length corresponding to vulnerable buffer > certain threshold Intrinsic to buffer overflow vulnerability and hard to evade Overflow! Protocol message Vulnerable buffer

Next Generation IDSs Vulnerability-based Adaptive - Automatically detect & generate signatures for zero-day attacks Scenario-based for forensics and being situational-aware Correlate (multiple sources of) audit data and attack information

Related Tools for Network IDS (I) While not an element of Snort, wireshark (used to called Ethereal) is the best open source GUI-based packet viewer www.wireshark.org offers: Support for various OS: windows, Mac OS. Included in standard packages of many different versions of Linux and UNIX For both wired and wireless networks

Related Tools for Network IDS (II) Also not an element of Snort, tcpdump is a well-established CLI packet capture tool www.tcpdump.org offers UNIX source http://www.winpcap.org/windump/ offers windump, a Windows port of tcpdump