Report on Common Intrusion Detection Framework By Ganesh Godavari.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

2 Introduction A central issue in supporting interoperability is achieving type compatibility. Type compatibility allows (a) entities developed by various.
Web Service Ahmed Gamal Ahmed Nile University Bioinformatics Group
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
OASIS Reference Model for Service Oriented Architecture 1.0
Managing Data Resources
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Collaborative Intrusion Detection and Response. Limitations of Monolithic ID Single point of failure Limited access to data sources Only one perspective.
2008/7/3 NanoMon: An Adaptable Sensor Network Monitoring Software Misun Yu, Haeyong Kim, and Pyeongsoo Mah Embedded S/W Research Division Electronics and.
A survey of commercial tools for intrusion detection 1. Introduction 2. Systems analyzed 3. Methodology 4. Results 5. Conclusions Cao er Kai. INSA lab.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 7 Internet Protocol Version4.
Systems Architecture, Fourth Edition1 Internet and Distributed Application Services Chapter 13.
Common Intrusion Detection Framework By Ganesh Godavari.
Report on Common Intrusion Detection Framework By Ganesh Godavari.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
Course Instructor: Aisha Azeem
Host Intrusion Prevention Systems & Beyond
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Lecture 11 Intrusion Detection (cont)
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
Mrs. Maninder Kaur 1Maninder Kaur
Defeating Large Scale Attacks: Technology and Strategies for Global Network Monitoring The NetViewer Experiment PAVG in collaboration with Networking Systems.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Chapter 6 – Architectural Design Lecture 2 1Chapter 6 Architectural design.
Mapping Internet Addresses to Physical Addresses (ARP)
Rainbow Facilitating Restorative Functionality Within Distributed Autonomic Systems Philip Miseldine, Prof. Taleb-Bendiab Liverpool John Moores University.
Penetration Testing Security Analysis and Advanced Tools: Snort.
S E C U R E C O M P U T I N G Intrusion Tolerant Server Infrastructure Dick O’Brien, Tammy Kappel, Clint Bitzer OASIS PI Meeting March 14, 2002.
16-1 The World Wide Web The Web An infrastructure of distributed information combined with software that uses networks as a vehicle to exchange that information.
Step-by-Step Intrusion Detection using TCPdump SHADOW.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Decision Support Systems Chapter 10.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
SNORT Feed the Pig Vicki Insixiengmay Jon Krieger.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
DoS Suite and Raw Socket Programming Group 16 Thomas Losier Paul Obame Group 16 Thomas Losier Paul Obame.
Experiment Management System CSE 423 Aaron Kloc Jordan Harstad Robert Sorensen Robert Trevino Nicolas Tjioe Status Report Presentation Industry Mentor:
S E C U R E C O M P U T I N G Not For Public Release 1 Intrusion Tolerant Server Infrastructure Dick O’Brien OASIS PI Meeting July 25, 2001.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Dynamic Host Configuration Protocol (DHCP)
A Data Stream Publish/Subscribe Architecture with Self-adapting Queries Alasdair J G Gray and Werner Nutt School of Mathematical and Computer Sciences,
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
DoS/DDoS attack and defense
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Design-Directed Programming Martin Rinard Daniel Jackson MIT Laboratory for Computer Science.
Java Programming: Advanced Topics 1 Enterprise JavaBeans Chapter 14.
CS223: Software Engineering
Chapter – 8 Software Tools.
Design and implementation Chapter 7 – Lecture 1. Design and implementation Software design and implementation is the stage in the software engineering.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Introduction to Visual Basic 2008 Programming
DATA MODELS.
Internet Protocol Version4
Packet Switching To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered.
Object-Oriented Analysis
Internet Protocol Version4
Software Architecture
Chapter 7 –Implementation Issues
Intrusion Detection Systems
Presentation transcript:

Report on Common Intrusion Detection Framework By Ganesh Godavari

Outline of the talk CIDF GIDO GIDO Filters

Goal Goal of IDIAN –Develop a negotiation protocol that is dynamic –Allow distributed collection of heterogeneous ID components –Provide inter-operate ability to reach agreement on ID information processing capability

Motivation Understand –Common Intrusion Detection Framework – Common Intrusion Specification Language (CISL)

Scenario 1: a new capability new host machine with detection component is added to LAN. Network under connection laundering attack Solution ?

solution Analysis component detects the number of inbound and outbound connections for the service provided by the host.

Scenario 2: flooding IDS Stolen company laptop with detection component is used to launch an attack. Hacker generate lot of spurious audit data to deflect suspicion. Second host is also compromised. Generate more audit data and crash the central IDS

Common Intrusion Detection Framework (CIDF) CIDF architecture –Divides IDS into Components –Component consists of software code with configuration information –Components can be added/removed –Components interact in real time and exchange data using GIDO

CIDF components Components –Event generators ("E-boxes") Produce GIDOs –Event analyzers ("A-boxes") Consume GIDOs Conclusions are turned out as GIDOs –Event databases ("D-boxes") store events for later retrieval –Response units ("R-boxes") Consume GIDOs Take action like kill process, reset connections

Generalized Intrusion Detection Objects (GIDO) GIDO consists of two components – Fixed Format header CIDF version, timestamp, and length of body –Variable Length Body data

GIDO body (ByMeansOf (Attack (Observer (ProcessName `StackGuard') ) (Target (HostName `somehost.someplace.net') ) (AttackSpecifics (Certainty `100') (Severity `100') (AttackID `1' `0x4f') ) (Outcome (CIDFReturnCode `2') ) (When (BeginTime `14:57:36 24 Feb 1999') (EndTime `14:57:36 24 Feb 1999') ) ) (ByMeansOf (Execute (Process (ProcessName `fingerd') ) (When (BeginTime `14:57:36 24 Feb 1999') (EndTime `14:57:36 24 Feb 1999') ) ) ) ) data Semantic Identifier (SID) Where the attack occurred Which process detected Where the attack is targeted at? StackGuard is a compiler that emits programs hardened against "stack smashing" attacks.

SID is associated with each piece of data in the body SID associated with data are called Atom SID Atom SID cannot completely describe an event. Verbs describe events –e.g. Attack SID Verb SID has set of Role SIDs which provide additional information about the event. –e.g. Observer Role provides information about the observer of an event.

Example V is a verb SID R1 and R2 are role SIDs A1 through A3 are Atom SIDs S-expression (V (R1 (A1 data1) (A2 data2) ) (R2 (A3 data3) ) Tree Representation

IDIAN Components IDIAN architecture components –Detection Sensors like audit mechanisms and packet sniffers Record activity –Analysis Detect attacks –Response Accept commands to take specific action to stop attacks

IDIAN component Interaction Analysis component uses recorded activity to detect attacks Detection Analysis Response Recorded Activity Specific Action Commands

GIDO Filters GIDO Filter –Method of describing a set of GIDOs –Use same basic structure as GIDOS –Interesting fields identified in the filter can easily be extracted from GIDO => filtering unneeded information Major difference between a GIDO and Filter is in the body

GIDO filter Requirements –Expressive Ability to specify all sets of useful GIDOs –Ability to specify sets of hosts, users –Precise Ability to determine which GIDOs satisfy a filter or not –Allow the extraction of particular data values from matching GIDOS –Filter language must allow for efficient implementation of encoding, decoding and matching GIDOs to filters –Easy to construct filters from existing subsets of existing filters –Easy to determine if a filter is equivalent to a null filter (no matching GIDO)

Sample filter (Filter (Fragment (Attack (observer (ProcessName ‘observer:exp1’)) (Target (HostName ‘target:exp2) ) ) ) (Permit ‘ByMeansOf’) (variables ‘observer’ ‘target’) ) GIDO in Figure 1 matches the fragment in Figure 2, with the variables observer and target instantiating to `StackGuard' and `somehost.someplace.net‘ resp. Specifies piece of GIDO

References Intrusion Detection Inter-component Adaptive NegotiationIntrusion Detection Inter-component Adaptive Negotiation – Richard Feiertag et al 2000 IEEE Computer Networks special issue on intrusion detection A Common Intrusion Specification Language, CIDF working group document. Communication in the Common Intrusion Detection Framework, CIDF working group document.

Negotiation Protocol IDIAN negotiation protocol allows components to –Discover the services of other components. –Negotiate for the use of those services. –Intelligently manage the use of IDS resources by components. –Dynamically adjust the use of services, perhaps in order to respond to changes in the environment.

Agreement –relationship between a producer and a consumer. –species a set of services which the producer must provide to the consumer. –example, an event generator may agree to provide a particular set of audit data to an analyzer. At a minimum, an agreement must specify the producer, consumer, and the set of services to be provided. Contract – set of agreements, each of which involve the same producer and consumer (the partners to the contract). –exactly one agreement in a contract is in effect. Contract Database –set of contracts. –Every component has a contract database containing all the contracts to which it is a partner. Capability Database –associates services (e.g., provide IP audit data, filter packets, etc.) with the components which can provide those services. –Each component has a database containing its own capabilities and, possibly, those of other components.