15 December 1998DARPA Information Survivability Program Intrusion Detection PI Meeting 1 DERBI: Diagnosis, Explanation and Recovery from Break-Ins Mabry.

Slides:



Advertisements
Similar presentations
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Advertisements

© 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Installation & management of SUSE.
Fill in missing numbers or operations
AP STUDY SESSION 2.
1
Worksheets.
& dding ubtracting ractions.
1 Copyright © 2002 Pearson Education, Inc.. 2 Chapter 2 Getting Started.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Multiplication X 1 1 x 1 = 1 2 x 1 = 2 3 x 1 = 3 4 x 1 = 4 5 x 1 = 5 6 x 1 = 6 7 x 1 = 7 8 x 1 = 8 9 x 1 = 9 10 x 1 = x 1 = x 1 = 12 X 2 1.
Division ÷ 1 1 ÷ 1 = 1 2 ÷ 1 = 2 3 ÷ 1 = 3 4 ÷ 1 = 4 5 ÷ 1 = 5 6 ÷ 1 = 6 7 ÷ 1 = 7 8 ÷ 1 = 8 9 ÷ 1 = 9 10 ÷ 1 = ÷ 1 = ÷ 1 = 12 ÷ 2 2 ÷ 2 =
1 Hyades Command Routing Message flow and data translation.
David Burdett May 11, 2004 Package Binding for WS CDL.
We need a common denominator to add these fractions.
Prepared by: Workforce Enterprise Services For: The Illinois Department of Commerce and Economic Opportunity Bureau of Workforce Development ENTRY OF EMPLOYER.
CALENDAR.
1 1  1 =.
1  1 =.
Chapter 6 File Systems 6.1 Files 6.2 Directories
1 Chapter 12 File Management Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Around the World AdditionSubtraction MultiplicationDivision AdditionSubtraction MultiplicationDivision.
1 Advanced Tools for Account Searches and Portfolios Dawn Gamache Cindy Bylander.
The 5S numbers game..
© Tally Solutions Pvt. Ltd. All Rights Reserved Shoper 9 License Management December 09.
Break Time Remaining 10:00.
The basics for simulations
Table 12.1: Cash Flows to a Cash and Carry Trading Strategy.
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
PP Test Review Sections 6-1 to 6-6
1 IMDS Tutorial Integrated Microarray Database System.
Look at This PowerPoint for help on you times tables
PEPS Weekly Data Extracts User Guide September 2006.
MySQL Access Privilege System
Vanderbilt Business Objects Users Group 1 Reporting Techniques & Formatting Beginning & Advanced.
EIS Bridge Tool and Staging Tables September 1, 2009 Instructor: Way Poteat Slide: 1.
Figure 3–1 Standard logic symbols for the inverter (ANSI/IEEE Std
Outline Minimum Spanning Tree Maximal Flow Algorithm LP formulation 1.
INTRODUCTION Lesson 1 – Microsoft Word Word Basics
Chapter 11: The X Window System Guide To UNIX Using Linux Third Edition.
Dynamic Access Control the file server, reimagined Presented by Mark on twitter 1 contents copyright 2013 Mark Minasi.
Chapter 6 File Systems 6.1 Files 6.2 Directories
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
Progressive Aerobic Cardiovascular Endurance Run
Adding Up In Chunks.
RH030 Linux Computing Essentials
MaK_Full ahead loaded 1 Alarm Page Directory (F11)
When you see… Find the zeros You think….
GEtServices Services Training For Suppliers Requests/Proposals.
Before Between After.
Macromedia Dreamweaver MX 2004 – Design Professional Dreamweaver GETTING STARTED WITH.
: 3 00.
5 minutes.
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Types of selection structures
Static Equilibrium; Elasticity and Fracture
12 January 2009SDS batch generation, distribution and web interface 1 ExESS IT tool for SDS batch generation, distribution and web interface ExESS IT tool.
Converting a Fraction to %
Resistência dos Materiais, 5ª ed.
Clock will move after 1 minute
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
& dding ubtracting ractions.
SESSION ID: Continuous Monitoring with the 20 Critical Security Controls SPO1-W02 Wolfgang Kandek CTO.
The DDS Benchmarking Environment James Edmondson Vanderbilt University Nashville, TN.
Select a time to count down from the clock above
Import Tracking and Landed Cost Processing An Enhancement For AS/400 DMAS from  Copyright I/O International, 2001, 2005, 2008, 2012 Skip Intro Version.
A Data Warehouse Mining Tool Stephen Turner Chris Frala
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
New Opportunities for Load Balancing in Network-Wide Intrusion Detection Systems Victor Heorhiadi, Michael K. Reiter, Vyas Sekar UNC Chapel Hill UNC Chapel.
DERBI 13 December Intrusion Detection Evaluation Joint DARPA ID/SIA PI Meeting 1 DERBI: Diagnosis, Explanation and Recovery from Break-Ins Mabry.
Presentation transcript:

15 December 1998DARPA Information Survivability Program Intrusion Detection PI Meeting 1 DERBI: Diagnosis, Explanation and Recovery from Break-Ins Mabry Tyson Douglas Moran Pauline Berry David Blei Artificial Intelligence Center SRI International 333 Ravenswood Avenue Menlo Park CA

15 December 1998DARPA Information Survivability Program Intrusion Detection PI Meeting 2 Introduction PART 1: Presentation of Evaluation Results –Design assumption: an out-of-the-box system after-the-fact analysis no network monitoring or audit trail data –Data source: end-of-day filesystem dumps for Pascal not available: contents of /tmp, /proc, OS tables,... PART 2: Status of DERBI System PART 3: Future

15 December 1998DARPA Information Survivability Program Intrusion Detection PI Meeting 3 Evaluation Procedure Scoring based on *.list files. DERBI not designed to use those data sources = no automatic mapping Manual mapping, no additional information used Attacks detected but scored as undetected because we could not identify corresponding session (3) Some false positives similarly unscored (approx. 5) Full DERBI system not used –to better fit into scoring protocol –to provide linearized textual output

15 December 1998DARPA Information Survivability Program Intrusion Detection PI Meeting 4 Detection of Buffer Overflow Attacks Detected, but session not identified X major + contributing DetectedUndetected False x + x x x Inconsistent uudemon.cleanup FileSys Changes x 115 EJECT: 7 of 7; 1 falseFORMAT: 6 of 7; 1 false FFB: 2 of x x x 77 x /etc/passwd 11 x Normal Access uudecode 22 x x + 35 x Suspicious login 54 x + 75 x x x + 60 Attack ID Exploit Script: Created Accessed 6* x x x x x PS: 3 of 4 + failed attack* 5%50% Probability (blank if 100%)

15 December 1998DARPA Information Survivability Program Intrusion Detection PI Meeting 5 Visibility of Evidence exploit detected failed exploit detectedfalse positive normal usage MTuThWFMTuThWF uud.clean eject format ffb uudecode read create ps 687 exploit evidence overwritten

15 December 1998DARPA Information Survivability Program Intrusion Detection PI Meeting 6 Attack Evidence Rules Used in the Evaluation Test Set = 18%

15 December 1998DARPA Information Survivability Program Intrusion Detection PI Meeting 7 Example Evidence Rule: EJECT buffer overflow EVIDENCE-TYPE (exploit (setuid root) buffer-overflow) UNIQUE-NAME eject-1 EVALUATION-NAME eject PATHS (follow-links '("/usr/bin/eject")) EVIDENCE ( ((not (and (command-version-vulnerable-p DIR FILE) ;; not vulnerable command or (window-of-opportunity (TimeAccessed PATH)))) ;; not used in interval of interest 0 0) ;;; assign 0% probability to command being used and 0% believe that it was ((greater-than (TimeAccessed PATH) ;;; use is later than (max (TimeModified "/cdrom") (TimeModified "/floppy"))) ;;; expected effects )) ;;; 40% probability of exploit, no change in believe about whether it was exploited POSIT ((posit ((TIME (TimeAccessed PATH))) (compromised-shell "root" TIME *unknown-time*))) EXPLANATION (next slide)

15 December 1998DARPA Information Survivability Program Intrusion Detection PI Meeting 8 Evidence Rule: EJECT buffer overflow (cont) UNIQUE-NAME eject-1 PATHS (follow-links '("/usr/bin/eject")) EXPLANATION (explain-evidence ( PATH ;;; variable declarations (TIME (print-unix-time (TimeAccessed PATH))) (TIME2 (print-unix-time (TimeModified "/cdrom"))) (TIME3 (print-unix-time (TimeModified "/floppy"))) ) (TimeAccessed PATH) ;;; as-of time "The command ~S is version vulnerable to a buffer overflow attack and appears to have been used at time ~A which is more recent than two associated files: /cdrom (~A) and /floppy (~A)." PATH TIME TIME2 TIME3)

15 December 1998DARPA Information Survivability Program Intrusion Detection PI Meeting 9 Example Output for an Attack +04:53:25 later ==================================== Time: 23-Jul :32:39 EDT ( ) Exploit: Suspicious-login (Suspicious-login) Login for user "darleent from host :00:12 later ==================================== Time: 23-Jul :32:51 EDT ( ) Exploit: DOWNLOADING-EXPLOIT (UUDECODE-1) "/usr/bin/uudecode" is often used by crackers and rarely by users, and appears to have been used at time 23-Jul :32:51 EDT :00:23 later ==================================== Time: 23-Jul :33:14 EDT ( ) Exploit: EJECT (EJECT-1) The command "/usr/bin/eject" is version vulnerable to a buffer overflow attack and appears to have been used at time 23-Jul :33:14 EDT which is more recent than two associated files: /cdrom (12-Feb :42:46 EST) and /floppy (20-Jul :32:15 EDT). Asserting belief/plausibility = (40 100) :10:32 later

15 December 1998DARPA Information Survivability Program Intrusion Detection PI Meeting 10 mscan (#80): spotted probing of telnet saint (#53): detected rlogin to root via ++ warez (#66-1): detected creation of hidden directory xsnoop (#71): detected root remote logins (and FTP) paired to immediately preceding SU to root by user alie HTTP tunnel: not matched to session (scored undetected) –detected installation of bogus uudemon.cleanup –detected use (via CRON: uucp and later bramy) More Indirect Detection

15 December 1998DARPA Information Survivability Program Intrusion Detection PI Meeting 11 Interesting False Detections Rlogin from local host to privileged account (root) that has + + in.rhosts root SetUID command installed (top) login record inconsistencies –root: lastlog date later than last entry in wtmpx –start of root login missing (wtmpx truncation?) –~root/.cshrc access does not match root login and far from SU, but 30 seconds after suspicious remote login –some related to test setup/shutdown (ignored, based on timing).

15 December 1998DARPA Information Survivability Program Intrusion Detection PI Meeting 12 DERBI Architecture Three major components: –Head: analysis, reasoning, and explanation –Body: interface between complex queries of Head and simple data from Feet –Feet: simple data collection - may run on remote system file system information log files Support heterogeneous clusters & low-end systems

15 December 1998DARPA Information Survivability Program Intrusion Detection PI Meeting 13 Log File Information Relationships utmp utmpx wtmp wtmpx lastlog syslog messages authlog sulog File system Shell Init Files cronlogcrontabs Partial redundancy of info Redundancy a common result of the evolution & growth of systems Use to check for tampering Also exposes changes to system clock

15 December 1998DARPA Information Survivability Program Intrusion Detection PI Meeting 14 Checking a Suspect System DERBI

15 December 1998DARPA Information Survivability Program Intrusion Detection PI Meeting 15 Rule Graph The presented slide is not included here -- it could not be adequately converted into a graphic that could be included in a MS PowerPoint file. This slide showed a graph with a large number of nodes representing rules, and was intended to show that although the rules formed a predominantly hierarchical structure, there was substantial crossing-over of the boundaries. A PostScript version of this graph can be found at

15 December 1998DARPA Information Survivability Program Intrusion Detection PI Meeting 16 Future Analysis for interrelated systems –overlapping file systems, servers, users, other privileges (not just simple client-server) Support of multiple OSs and OS families Expansion and standardization of attack data –vulnerabilities, exploits, tools, camouflage, packages Test and distribution: operational clusters; false positive rates Explanation More sophisticated analysis Identification of higher-level goals