Stephen S. Yau CSE 465-591, Fall 2006 1 Intrusion Detection.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Intrusion Detection CS461/ECE422 Spring Reading Material Chapter 8 of the text.
Anomaly Detection Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
Guide to Network Defense and Countermeasures Second Edition
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
1 Intrusion Detection CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 4, 2004.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
Intrusion Detection/Prevention Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality,
seminar on Intrusion detection system
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Intrusion Detection - Arun Hodigere. Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEM
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
COEN 252 Computer Forensics
IIT Indore © Neminah Hubballi
Network Intrusion Detection Systems Ali Shayan October 2008.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
COEN 252 Computer Forensics Collecting Network-based Evidence.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Guide to Network Defense and Countermeasures
Operating system Security By Murtaza K. Madraswala.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Kittiphan Techakittiroj (25/10/58 12:06 น. 25/10/58 12:06 น. 25/10/58 12:06 น.) Intrusion Detection System Kittiphan Techakittiroj
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
Intrusion Detection Cyber Security Spring Reading material Chapter 25 from Computer Security, Matt Bishop Snort –
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection System
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
Some Great Open Source Intrusion Detection Systems (IDSs)
IDS Intrusion Detection Systems
Access control techniques
NET 412 Network Security protocols
NET 412 Network Security protocols
A Real-time Intrusion Detection System for UNIX
Intrusion Detection Systems (IDS)
Lecture 8: Intrusion Detection
Lecture 7: Intrusion Detection
Presentation transcript:

Stephen S. Yau CSE , Fall Intrusion Detection

Stephen S. Yau CSE , Fall Intruders Gain hostile or unwanted access to the system. Either local or via network Varying levels of competence May seem benign May use compromised system to launch other attacks Aim to increase their own privileges on system

Stephen S. Yau CSE , Fall Types of Intruders Masquerader: usually an outsider, not authorized to use the system, but penetrates the system through legitimate user account Misfeasor: usually an inside legitimate user who accesses assets not authorized, or is authorized but misuses privileges Clandestine user: an insider or outsider user who has supervisory access to the system

Stephen S. Yau CSE , Fall Intrusion Techniques Basic attack methodology –Take possession of target machine and gather unauthorized information –Obtain initial access –Escalate privileges –Remove traces of intrusion Main goal is to acquire passwords

Stephen S. Yau CSE , Fall Why Need Intrusion Detection? Security failures are inevitable Need to detect intrusions –Blocked if detected quickly –Act as deterrent –Collect information to improve security Data within organization is often more important than the network itself –Commerce, Government, Business, and Academia

Stephen S. Yau CSE , Fall Intrusion Detection System Types of IDS –Host-based IDS –Network-based IDS T1: ch22 T2: ch25

Stephen S. Yau CSE , Fall Host-based IDS Use OS auditing mechanisms e.g., logs all direct or indirect events generated by a usere.g., logs all direct or indirect events generated by a user Monitor user activities e.g., Analyze shell commandse.g., Analyze shell commands Monitor executions of system programs e.g., Analyze system calls made by sendmaile.g., Analyze system calls made by sendmail Involve monitoring of –communications in and out of a machine –integrity of system files –processes running

Stephen S. Yau CSE , Fall Examples of Host-based IDS Black Ice ( –Windows Operation System Zone Alarm ( –Windows Operation System Internet Security Systems (ISS) RealSecure ( –Windows and Unix Operating System Linux Intrusion Detection Systems (LIDS) ( –Linux Operating System

Stephen S. Yau CSE , Fall Strengths and Drawbacks of Host-based IDS Strengths: –Easy attack identification –Can monitor key components –Near real-time detection and response. –No additional hardware needed Drawbacks: –Type of information needed to be logged in is a matter of experience. –Unselective logging of messages may greatly increase audit and analysis burdens. –Selective logging has risk that attack manifestations be missed.

Stephen S. Yau CSE , Fall Network-based IDS Deploy special sensors at strategic locations e.g., Packet sniffing via tcpdump at routerse.g., Packet sniffing via tcpdump at routers Inspect network traffic Watch for violations of protocols and unusual connection patternsWatch for violations of protocols and unusual connection patterns Monitor user activities Look into data portions of packets for malicious command sequencesLook into data portions of packets for malicious command sequences Monitor packets for some sort of signature as they pass a sensor

Stephen S. Yau CSE , Fall Common Network Signs of Intrusion Detection String –Look for a text string that indicates a possible attack. Port –Watch for connection attempts to well-known frequently attacked ports. Header –Look for suspiciously dangerous or illogical combinations of packets and headers. –Example: Winnuke, where a packet is destined for NetBIOS port, and Urgent pointer or Out Of Band pointer is set, resulting in "blue screen of death" for Windows systems.

Stephen S. Yau CSE , Fall Some Examples of Network-based IDS Internet Security Systems (ISS) RealSecure ( –Windows and Unix Operating System Snort ( –Open Source –Windows and Unix Operating System Cisco NetRanger ( –Unix Based Appliance Intrusion Detection System

Stephen S. Yau CSE , Fall Strengths and Drawbacks of Network-based IDS Strengths: –Cost of ownership reduced –Packet analysis feasible –Real time detection and response –Malicious intent detection before real intrusion happens –Operating system independence Drawbacks: – –Packets can be lost on flooded networks; Reassemble packets could be incorrect and trigger false alarm – –Not handle encrypted data –Depending on network architecture –High false-positive –Configuration needs expertise –Privacy compromised

Stephen S. Yau CSE , Fall NIDS Hybrid of Network-based and Host-based IDS HIDS Internet

Stephen S. Yau CSE , Fall Intrusion Detection Techniques Profile-basedSignature-based –Rule-based –State Transition Analysis –Pattern Matching

Stephen S. Yau CSE , Fall ID Techniques – Profile-based Profile: identification of subjects and their normal behavior Subject: a user account, a service, a group, or a network domain, etc. Approaches: –Intrusion Detection Expert System (IDES) –Wisdom and Sense (W & S) –Specification-based Advantages: easy to implement; capable of detecting new intrusion scenarios Disadvantage: high false alarms

Stephen S. Yau CSE , Fall ID Techniques – Signature-based Find specific event sequences (signatures) by scanning system activities Event: a generic system activity, such as deleting a file, sending an Types: –Rule-based –State-transition analysis –Pattern matching Can detect known intrusion patterns efficiently, but not unknown intrusion patterns and variants of intrusion signatures.

Stephen S. Yau CSE , Fall Rule-based Intrusion Detection Based on expert system Most basic signature-based IDS “If condition, then action” –Condition specifies constraints on audit record –Action specifies action to be taken if condition is satisfied.

Stephen S. Yau CSE , Fall Rule-based Intrusion Detection (cont.) Observe events happening on system Apply rules to decide if activity is suspicious Rule-based Anomaly Detection: –Generating rules involves analysis of audit data and identification of usage patterns –Observe current data and match data against rules to see if it conforms to abnormal behavior Example: If a server finds that 40 % of the packets received are Internet Control Message Protocol (ICMP) echo requests from diverse sources, it may be regarded as a DoS attack. Rule: Percentage of echo request in ICMP >= 40%  DoS attack happens

Stephen S. Yau CSE , Fall Strengths and Drawbacks of Rule-based Intrusion Detection Strengths: –The inference engine is simple –The system is powerful to detected intrusion specified in those rules –Easy to implement Limitations –Direct dependence on audit records. –Rules are created using audit records of known penetrations. Slight variations in attacks could make penetration undetected. –If someone changes audit trail, penetration may not be detected. –Difficult for distributed processing

Stephen S. Yau CSE , Fall State Transition Analysis State is a snapshot of the system with all the volatile and permanent memory locations. –State represents some attribute of system – not whole system state –State is generic, e.g. “user is root now” Transition is an action that will make state changed. Penetration is viewed as a sequence of actions performed by an attacker that leads from an initial state to a compromised (insecure) state. –Penetration sequence represented by finite state machine node is a state arc is an action (or transition) Signature actions are a sequence of identified actions which will trigger transition from one state to another.

Stephen S. Yau CSE , Fall State Transition Analysis (cont.) Information retrieved from audit data are represented graphically in State Transition Diagram As actions of an intrusion are completed one by one, the target machine changes its state from one state to another when certain actions are performed. When the machine changes from some normal state to a compromised state, an intrusion is detected and reported

Stephen S. Yau CSE , Fall Strengths and Drawbacks of State Transition Analysis Strengths: –State Transition Analysis identifies a number of signature actions and represents them visually. –State Transition Diagram identifies precisely the requirements and penetrations –Lists of actions that must occur for completion of certain penetration. –Provide efficient reasoning support. Drawbacks: –It cannot represent complex intrusion scenarios.

Stephen S. Yau CSE , Fall Pattern Matching Approach Each intrusion signature is represented as a Petri net –A Petri net is a graphical and mathematical modeling tool. It consists of places, transitions, and arcs that connect them. Input arcs connect places with transitions, while output arcs start at a transition and end at a place. –Has strong expressive power (Reference: James L. Peterson, “Petri Net theory and modeling of systems (Reference: James L. Peterson, “Petri Net theory and modeling of systems”)

Stephen S. Yau CSE , Fall Pattern Matching Approach (cont.) Characteristics of patterns used to model attacks –Linearity: Specifies a sequence of events comprising the signature pattern which is a sequence of events without conjunction and disjunction. –Unification: Instantiates variables to earlier events and matches these events to later occurring events. –Occurrence: Specifies the relative placement in time of an event with respect to the previous events. –Beginning: Specifies the absolute time of match of the beginning of a pattern. –Duration: Specifies constraints on the time duration for which the event must be active. Reference: S. Kumar, E. H. Spafford, “An Application of Pattern Matching in Intrusion Detection”

Stephen S. Yau CSE , Fall Pattern Matching Approach (c ont.) Use Petri nets to capture –Each signature corresponds to a particular Petri net automaton –Nodes represents tokens; edges represents transitions –Final state of signature is a compromised state Generate an intrusion pattern 1.Identify existence of files or other entities created by an attacker 2.Identify a sequence of events 3.Identify two or more sequences of events under temporal relation 4.Identify duration of events 5.Identify interval of events

Stephen S. Yau CSE , Fall Strengths: –Rule based sequential patterns detect anomalous activities that are difficult using traditional methods. –Systems built using this model are highly adaptive to changes by users; if a new pattern found, it is easier to define it by Petri net. –Anomalous activities detected and reported within seconds of receiving audit events. Drawbacks: –Requires experience to generate rules –Difficult to verify the completeness set of rules Strengths and Drawbacks of Pattern Matching Approach

Stephen S. Yau CSE , Fall References Matt Bishop,, Addison- Wesley, 2004, ISBN: (textbook1) Matt Bishop, Introduction to Computer Security, Addison- Wesley, 2004, ISBN: (textbook1) Matt Bishop, Computer Security: Art and Science, Addison- Wesley, 2002, ISBN: (textbook2) M. Merkow, J. Breithaupt, Information Security: Principles and Practices, Prentice Hall, August 2005, 448 pages, ISBN James L. Peterson, “Petri Net theory and modeling of systems James L. Peterson, “Petri Net theory and modeling of systems” S. Kumar, E. H. Spafford, “An Application of Pattern Matching in Intrusion Detection”. Available at: rn.pdf