Forensics and Auditing. Computer Forensics Computer forensics is the science of attempting to recover evidence on a computer system. Complex area: Legal.

Slides:



Advertisements
Similar presentations
Configuration management
Advertisements

Computer Security: Principles and Practice
Lesson 17: Configuring Security Policies
Automating Bespoke Attack Ruei-Jiun Chapter 13. Outline Uses of bespoke automation ◦ Enumerating identifiers ◦ Harvesting data ◦ Web application fuzzing.
Access Control Chapter 3 Part 5 Pages 248 to 252.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
Chapter 19: Network Management Business Data Communications, 4e.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Human Resources Security Part 1 of 3
Intrusion Detection Systems and Practices
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Lecture 11 Intrusion Detection (cont)
Computer Security: Principles and Practice
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Maintaining Windows Server 2008 File Services
Security Guidelines and Management
Maintaining Host Security Logs.  Security logs are invaluable for verifying whether the host's defenses are operating properly.  Another reason to maintain.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Linux Operations and Administration
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
9 Chapter Nine Compiled Web Server Programs. 9 Chapter Objectives Learn about Common Gateway Interface (CGI) Create CGI programs that generate dynamic.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Guide to Linux Installation and Administration, 2e1 Chapter 10 Managing System Resources.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
© Janice Regan, CMPT 300, May CMPT 300 Introduction to Operating Systems Memory: Relocation.
Ch11: Syslog and Logfiles Presented by: Apichana Thiantanawat 06/11/02.
DATABASE MANAGEMENT SYSTEMS CMAM301. Introduction to database management systems  What is Database?  What is Database Systems?  Types of Database.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Cryptography and Network Security Sixth Edition by William Stallings.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Understand Audit Policies LESSON Security Fundamentals.
Audit COM380 University of Sunderland Harry R. Erwin, PhD.
Linux Operations and Administration
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
Tool Support for Testing Classify different types of test tools according to their purpose Explain the benefits of using test tools.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
PART1 Data collection methodology and NM paradigms 1.
Security Methods and Practice CET4884
SQL Database Management
Chapter 19: Network Management
Secure storage and TPM Auditing and logging
Maintaining Windows Server 2008 File Services
Information Security Professionals
Chapter 2: System Structures
Software Configuration Management
Chapter 2: System Structures
Training Module Introduction to the TB9100/P25 CG/P25 TAG Customer Service Software (CSS) Describes Release 3.95 for Trunked TB9100 and P25 TAG Release.
Operating System Security
(Authentication / Authorization)
Principles and Practice
Principles and Practice
Presentation transcript:

Forensics and Auditing

Computer Forensics Computer forensics is the science of attempting to recover evidence on a computer system. Complex area: Legal issues heavily weigh in here. Technical tools are likewise complex, since a chain of evidence must be preserved. However, much of this boils down to an area called auditing. As a result, we must discuss what audit tools are included (and appropriate) on various systems.

Table 18.1 Security Audit Terminology RFC 2828

Anatomy of an audit system Logger: a mechanism to record information. Generally built into the system, but can be tailored by administrator. Logger: a mechanism to record information. Generally built into the system, but can be tailored by administrator. Analyzer: Takes a log as input. Result of the analysis may lead either to changes in the data being recorded or to detection of problem/event. Analyzer: Takes a log as input. Result of the analysis may lead either to changes in the data being recorded or to detection of problem/event. Notifier: Takes output of analyzer and takes appropriate action, such as notifying user or admin. Notifier: Takes output of analyzer and takes appropriate action, such as notifying user or admin.

Security Auditing Functions

Event Definition must define the set of events that are subject to audit common criteria suggests: introduction of objects deletion of objects distribution or revocation of access rights or capabilities changes to subject or object security attributes policy checks performed by the security software use of access rights to bypass a policy check use of identification and authentication functions security-related actions taken by an operator/user import/export of data from/to removable media

Implementation Guidelines agree on requirements with management scope of checks agreed and controlled checks limited to read- only access to software and data other access only for isolated copies of system files, then erased or given appropriate protection resources for performing the checks should be explicitly identified and made available requirements for special or additional processing should be defined all access should be monitored and logged document procedures, requirements, responsibilities person(s) doing audit independent of activities

What to Collect events related to the use of the auditing software events related to the use of the auditing software events related to the security mechanisms on the system events related to the security mechanisms on the system events that are collected for use by the various security detection and prevention mechanisms events that are collected for use by the various security detection and prevention mechanisms events related to system management and operation events related to system management and operation operating system access operating system access application access for selected applications application access for selected applications remote access remote access

Table 18.2 Auditable Items Suggested in X.816

Monitoring Areas Suggested in ISO 27002

Figure Examples of Audit Trails figure 18.4a is an example of a system-level audit trail on a UNIX system figure 18.4b is an example of an application-level audit trail for a mail delivery system figure 18.4c is an example of a user- level audit trail on a UNIX system

Physical Access Audit Trails generated by equipment that controls physical access card-key systems, alarm systems sent to central host for analysis and storage data of interest: date/time/location/user of access attempt both valid and invalid access attempts attempts to add/modify/delete physical access privileges may send violation messages to personnel

Protecting Audit Trail Data read/write file on host easy, least resource intensive, instant access vulnerable to attack by intruder write-once/read- many device more secure but less convenient need steady supply of recordable media access may be delayed and not available immediately write-only device provides paper trail impractical for capturing detailed audit data on large or networked systems useful when a permanent, immediately available log is required must protect both integrity and confidentiality encryption, digital signatures, access controls

Implementing Logging foundation of security auditing facility is the initial capture of the audit data software must include hooks (capture points) that trigger data collection and storage as preselected events occur dependent on the nature of the software varies depending on operating system and applications involved

Windows Event Log event is an entity that describes some interesting occurrence contains: a numeric identification code a set of attributes optional user-supplied data three types of event logs: system: system related apps and drivers application: user-level apps security: Windows LSA

Windows Event Schema Elements

Windows System Log Example

Windows Event Categories account logon events account management directory service access logon eventsobject access policy changes privilege use

UNIX Syslog elements: syslog() API referenced by several standard system utilities and available to application programs logger command used to add single-line entries to the system log /etc/syslog.conf configuration file used to control the logging and routing of system log events syslogd daemon to receive/route log events UNIX's general-purpose logging mechanism UNIX's general-purpose logging mechanism found on all UNIX / Linux variants found on all UNIX / Linux variants

Syslog Service basic service provides: a means of capturing relevant events a storage facility a protocol for transmitting syslog messages from other machines to a central machine that acts as a syslog server extra add-on features may include: robust filtering log analysis event response alternative message formats log file encryption database storage rate limiting

Syslog Protocol a transport allowing hosts to send IP event notification messages to syslog servers provides a very general message format allowing processes and applications to use suitable conventions for their logged events common version of the syslog protocol was originally developed on the University of California Berkeley Software Distribution (BSD) UNIX/TCP/IP system implementations messages in the BSD syslog format consist of: PRI - facilities / severity code header – timestamp and hostname/IP address Msg - program name and content

Syslog Examples

Syslog Facilities and Severity Levels (b) Syslog Severity Levels (a) Syslog Facilities

Logging at Application Level privileged applications present security issues may not be captured by system/user-level audit data constitute a large percentage of reported vulnerabilities vulnerabilities exploited: lack of dynamic checks on input data errors in application logic may be necessary to capture behavior of application beyond its access to system services and file systems two approaches to collecting audit data: interposable libraries dynamic binary rewriting

Interposable Libraries allows the generation of audit data without needing to recompile either the system libraries or the application allows the generation of audit data without needing to recompile either the system libraries or the application audit data can be generated without changing the system’s shared libraries or needing access to the source code for the executable audit data can be generated without changing the system’s shared libraries or needing access to the source code for the executable exploits the use of dynamic libraries in UNIX exploits the use of dynamic libraries in UNIX statically linked libraries a separate copy of the linked library function is loaded into the program’s virtual memory statically linked shared libraries referenced shared object is incorporated into the target executable at link time by the link loader each object is assigned a fixed virtual address link loader connects external referenced objects by assigning their virtual addresses when the executable is created dynamically linked shared libraries the linking to shared library routines is deferred until load time if changes are made to the library prior to load time any program that references the library is unaffected

Use of an Interposable Library

Example of Function in the Interposed Library

Dynamic Binary Rewriting can be used with both statically and dynamically linked programs can be used with both statically and dynamically linked programs postcompilation technique that directly changes the binary code of executables postcompilation technique that directly changes the binary code of executables change is made at load time and modifies only the memory image of a program change is made at load time and modifies only the memory image of a program does not require recompilation of the application binary does not require recompilation of the application binary implemented on Linux using two modules: implemented on Linux using two modules: loadable kernel module loadable kernel module monitoring daemon monitoring daemon loadable modules loadable modules can be automatically loaded and unloaded on demand can be automatically loaded and unloaded on demand

Audit Trail Analysis analysis programs and procedures vary widely analysis programs and procedures vary widely must understand context of log entries must understand context of log entries relevant information may reside in other entries in the same logs, other logs, and nonlog sources relevant information may reside in other entries in the same logs, other logs, and nonlog sources audit file formats contain mix of plain text and codes audit file formats contain mix of plain text and codes must decipher manually / automatically must decipher manually / automatically ideally regularly review entries to gain understanding of baseline ideally regularly review entries to gain understanding of baseline

Types of Audit Trail Analysis audit trails can be used in multiple ways audit trails can be used in multiple ways this depends in part on when done this depends in part on when done possibilities include: possibilities include: audit trail review after an event audit trail review after an event triggered by event to diagnose cause and remediate triggered by event to diagnose cause and remediate focuses on the audit trail entries that are relevant to the specific event focuses on the audit trail entries that are relevant to the specific event periodic review of audit trail data periodic review of audit trail data review bulk data to identify problems and behavior review bulk data to identify problems and behavior real-time audit analysis real-time audit analysis part of an intrusion detection function part of an intrusion detection function

Audit Review audit review capability provides administrator with information from selected audit records audit review capability provides administrator with information from selected audit records actions of one or more users actions of one or more users actions on a specific object or resource actions on a specific object or resource all or a specified set of audited exceptions all or a specified set of audited exceptions actions on a specific system / security attribute actions on a specific system / security attribute may be filtered by time / source / frequency may be filtered by time / source / frequency used to provide system activity baseline used to provide system activity baseline level of security related activity level of security related activity

Approaches to Data Analysis indicate interesting type of event has occurred basic alerting define normal versus unusual events / patterns compare with new data to detect changes thresholding is the identification of data that exceed a particular baseline value baselining detection of events within a given set of parameters windowing seeks relationships among events correlation

Integrated Approaches volume of audit data means manual analysis and baselining is impractical volume of audit data means manual analysis and baselining is impractical need a Security Information and Event Management (SIEM) system need a Security Information and Event Management (SIEM) system a centralized logging and analysis package a centralized logging and analysis package agentless or agent-based agentless or agent-based normalizes a variety of log formats normalizes a variety of log formats analyzes combined data analyzes combined data correlates events among the log entries correlates events among the log entries identifies and prioritizes significant events identifies and prioritizes significant events can initiate responses can initiate responses

Example: Cisco MARS example of SIEM product example of SIEM product support a wide variety of systems support a wide variety of systems agentless with central dedicated server agentless with central dedicated server wide array of analysis packages wide array of analysis packages an effective GUI an effective GUI server collects, parses, normalizes, correlates and assesses events to then check for false positives, vulnerabilities, and profiling server collects, parses, normalizes, correlates and assesses events to then check for false positives, vulnerabilities, and profiling

Table 18.6 Suggested List of Events to Be Audited