Guide to Network Defense and Countermeasures Second Edition

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Third Edition
Advertisements

Guide to Network Defense and Countermeasures Second Edition
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Intrusion Detection Systems and Practices
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Security Awareness: Applying Practical Security in Your World
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion Detection MIS ALTER 0A234 Lecture 3.
seminar on Intrusion detection system
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Host Intrusion Prevention Systems & Beyond
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEM
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Intrusion Detection Chapter 12.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Module 14: Configuring Server Security Compliance
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Guide to Network Defense and Countermeasures
Chapter 5: Implementing Intrusion Prevention
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
DIVYA K 1RN09IS016 RNSIT1. Cloud computing provides a framework for supporting end users easily through internet. One of the security issues is how to.
Security Methods and Practice CET4884
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
Intrusion Detection Lecture hours and locations: M W 11:30 AM - 12:45 PM HANGR00124 Instructor: Shushan Zhao Office: Swarts Hall 160 Office Phone:
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
CompTIA Security+ Study Guide (SY0-401)
IDS Intrusion Detection Systems
Security Methods and Practice CET4884
Click to edit Master subtitle style
Firewalls.
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-501)
Intrusion Detection system
Presentation transcript:

Guide to Network Defense and Countermeasures Second Edition Chapter 7 Intrusion Detection System Concepts

Objectives Identify the components of an intrusion detection system Explain the steps of intrusion detection Describe options for implementing intrusion detection systems Evaluate different types of IDS products Guide to Network Defense and Countermeasures, Second Edition

Examining Intrusion Detection System Components Network intrusion Attempt to gain unauthorized access to network resources Intrusion Detection System (IDS) Consists of more than one application or hardware device Incorporates more than just detection Intrusion Detection Involves prevention, detection, and response Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Examining Intrusion Detection System Components (continued) Network sensors Alert systems Command console Response system Database of attack signatures or behaviors Guide to Network Defense and Countermeasures, Second Edition

Network Sensors Sensor IDS types Electronic “eyes” of an IDS Hardware or software that monitors traffic in your network and triggers alarms Attacks detected by an IDS sensor Single-session attacks Multiple-session attacks IDS types Host-based IDS Network-based IDS Guide to Network Defense and Countermeasures, Second Edition

Network Sensors (continued) Sensors should be placed at common-entry points Internet gateways Connections between one LAN and another Remote access server that receives dial-up connections from remote users Virtual private network (VPN) devices Management program controls sensors Sensors could be positioned at either side of the firewall Behind the firewall is a more secure location Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Alert Systems Trigger Types of triggers Circumstances that cause an alert message to be sent Types of triggers Detection of an anomaly Detection of misuse Guide to Network Defense and Countermeasures, Second Edition

Alert Systems (continued) Anomaly detection Requires you to make use of profiles For each authorized user or group of users Describe services and resources normally accessed by users Some IDSs can create user profiles During “training period” Accuracy problems False negatives False positives Guide to Network Defense and Countermeasures, Second Edition

Alert Systems (continued) Misuse detection Triggers alarms based on characteristic signatures of known attacks IDS comes equipped with a set of signatures Can start protecting the network immediately Need to maintain state information Other detection mechanisms Traffic rate monitoring Protocol state tracking IP packet reassembly Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Command Console Provides a graphical front-end interface to an IDS Enables administrators to receive and analyze alert messages and manage log files IDS can collect information from security devices throughout a network Command console should run on a computer dedicated solely to the IDS To maximize the speed of response Guide to Network Defense and Countermeasures, Second Edition

Response System IDS can be setup to take some countermeasures Response systems do not substitute network administrators Administrators can use their judgment to distinguish a false positive Administrators can determine whether a response should be escalated Increased to a higher level Guide to Network Defense and Countermeasures, Second Edition

Database of Attack Signatures or Behaviors IDSs don’t have the capability to use judgment Can make use of a source of information for comparing the traffic they monitor Misuse detection References a database of known attack signatures If traffic matches a signature, it sends an alert Keep database updated Passive detection mode Anomaly-based IDS Store information about users in a database Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Examining Intrusion Detection Step by Step Steps Installing the IDS database Gathering data Sending alert messages The IDS responds The administrator assesses damage Following escalation procedures Logging and reviewing the event Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Step 1: Installing the IDS Database IDS uses the database to compare traffic detected by sensors Anomaly-based systems Require a training period (over a week) IDS observes traffic and compile a network baseline Misuse-based IDS Can use database immediately You can provide it with your own database Guide to Network Defense and Countermeasures, Second Edition

Step 2: Gathering Data Network sensors gather data by reading packets Sensors need to be positioned where they can capture all packets Sensors on individual hosts capture information that enters and leaves the host Sensors on network segments read packets as they pass throughout the segment Sensors on network segments cannot capture all packets If traffic levels become too heavy Guide to Network Defense and Countermeasures, Second Edition

Step 3: Sending Alert Messages Sensors capture packets IDS software compares captured packets with information in its database IDS sends alert messages If captured packets match an attack signature or Deviates from normal network behavior Guide to Network Defense and Countermeasures, Second Edition

Step 4: The IDS Responds Command console receives alert messages Notifies the administrator IDS can be configured to take actions when a suspicious packet is received Send an alarm message Drop the packet Stop and restart network traffic Guide to Network Defense and Countermeasures, Second Edition

Step 5: The Administrator Assesses Damage Administrator monitors alerts And determines whether countermeasures are needed Administrator need to fine-tune the database The goal is avoiding false negatives Line between acceptable and unacceptable network use is not always clear Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Step 6: Following Escalation Procedures Set of actions to be followed if the IDS detects a true positive Should be spelled out in company’s security policy Incident levels Level One Might be managed quickly Level Two Represents a more serious threat Level Three Represents the highest degree of threat Guide to Network Defense and Countermeasures, Second Edition

Step 7: Logging and Reviewing the Event IDS events are stored in log files Or databases Administrator should review logs To determine patterns of misuse Administrator can spot a gradual attack IDS should also provide accountability Capability to track an attempted attack or intrusion back to the responsible party Some systems have built-in tracing features Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Options for Implementing Intrusion Detection Systems Network-based IDS Host-base IDS Hybrid implementations Guide to Network Defense and Countermeasures, Second Edition

Network-Based Intrusion Detection Systems Locating an NIDS on the Network Network-based IDS (NIDS) Monitors network traffic Common locations for NIDS sensors Behind the firewall and before the LAN Between the firewall and the DMZ Any network segment Management and analysis software must be installed on a dedicate computer Positioning sensors at network perimeter Enables IDS to sniff traffic Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Network-Based Intrusion Detection Systems (continued) Advantages and disadvantages of NIDS NIDS handles a high volume of traffic Requires dedicated hardware appliance Guide to Network Defense and Countermeasures, Second Edition

Host-Based Intrusion Detection Systems Host-based IDS (HIDS) Deployed on a host in the LAN Protected by the firewall Evaluates traffic generated by the host Gathers system variables such as System processes CPU use File accesses Does not sniff packets as they enter the LAN Guide to Network Defense and Countermeasures, Second Edition

Host-Based Intrusion Detection Systems (continued) Configuring an HIDS Centralized configuration HIDS sends all data to a central location Host’s level of performance is unaffected by the IDS Alert messages that are generated do not occur in real time Distributed configuration Processing of events is distributed between host and console Host generates and analyzes it in real time Performance reduction in host Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Host-Based Intrusion Detection Systems (continued) Choosing the host computer Centralized configuration RAM, hard disk memory, and processor speed requirements are minimal Distributed configuration Host should be equipped with maximum memory and processor speed Guide to Network Defense and Countermeasures, Second Edition

Host-Based Intrusion Detection Systems (continued) Advantages and disadvantages of HIDSs Advantages Detect events on host systems Can process encrypted traffic Not affected by use of switched network protocols Can compare records stored in audit logs Guide to Network Defense and Countermeasures, Second Edition

Host-Based Intrusion Detection Systems (continued) Disadvantages More management issues Vulnerable to direct attacks and attacks against host Susceptible to some denial-of-service attacks Can use large amounts of disk space Could cause increased performance overhead on host Guide to Network Defense and Countermeasures, Second Edition

Hybrid IDS Implementations Combines the features of HIDSs and NIDSs Gains flexibility and increases security Combining IDS sensor locations Put sensors on network segments and network hosts Can report attacks aimed at particular segments or the entire network Guide to Network Defense and Countermeasures, Second Edition

Hybrid IDS Implementations (continued) Combining IDS detection methods IDS combines anomaly and misuse detection Database enables IDS to run immediately Anomaly-based systems keep the alert system flexible Can respond to the latest, previously unreported attacks Both external and internal attacks Administrators have more configuration and coordination work to do Guide to Network Defense and Countermeasures, Second Edition

Hybrid IDS Implementations (continued) Shim IDS Acts like a type of NIDS Involves sensors being distributed around a network Data collected by sensors is sent to a central location Sensors are installed in selected hosts and network segments Those that require special protection Guide to Network Defense and Countermeasures, Second Edition

Hybrid IDS Implementations (continued) Distributed IDS Multiple IDS devices are deployed on a network Reduces response time Two popular DIDSs myNetWatchman DShield Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Hybrid IDS Implementations (continued) Advantages Combine aspects of NIDS and HIDS configurations Can monitor network as a whole Can monitor attacks that reach individual hosts Disadvantages Need to get disparate systems to work in coordinate fashion Data gathered by multiple systems can be difficult to absorb and analyze Guide to Network Defense and Countermeasures, Second Edition

Evaluating Intrusion Detection Systems Survey various options and match them to your needs Review topology of your network identifying Number of entry points Use of firewalls Number of network segments Evaluating IDSs can be time consuming Guide to Network Defense and Countermeasures, Second Edition

Freeware NIDS: Snort Ideal for monitoring traffic on a small network or individual host Does not consume extensive system resources Intended for installation on a computer at network perimeter Comes with a collection of rule files Separate rules exist for Port scans Back door attacks Web attacks Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Commercial HIDS: Norton Internet Security Firewall designed to protect a home-based standalone computer Or a computer on a small network Contains a limited number of intrusion detection features Block port scans Block attack attempts on ports used by known Trojan programs Can be trained to identify normal network use Alert messages appear as pop-up windows Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

IDS Hardware Appliances Can handle more network traffic Have better scalability than software IDSs Plug-and-play capabilities One of its major advantages Do not need to be configured to work with a particular OS Examples iForce Intrusion SecureNet StealthWatch G1 Guide to Network Defense and Countermeasures, Second Edition

IDS Hardware Appliances (continued) You should create a custom configuration To reduce the number of false positives and false negatives Upgrade appliances periodically Can be complicated and expensive Guide to Network Defense and Countermeasures, Second Edition

Summary Intrusion Detection System (IDS) IDS components Supplementary line of defense behind firewalls and antivirus software IDS components Network sensors Alert messages Command console Response system Database of signatures Guide to Network Defense and Countermeasures, Second Edition

Summary (continued) IDS steps False positives are highly likely Install set of attack signatures Sensors monitor packets IDS responds False positives are highly likely Require administrators to fine-tune the system If attack is legitimate, escalation procedures should be followed IDS logs alarmed events They can be reviewed later Guide to Network Defense and Countermeasures, Second Edition

Summary (continued) IDS implementation Types of IDS products Network-based IDS (NIDS) Host-based IDS (HIDS) Hybrid IDS Shim IDS Distributed IDS (DIDS) Types of IDS products Open-source IDSs such as Snort Commercial firewalls such as Norton Internet Security IDS hardware appliances Guide to Network Defense and Countermeasures, Second Edition