K. Salah1 Intrusion Detection Systems. K. Salah2 Firewalls are not enough Don’t solve the real problems Don’t solve the real problems  Buggy software.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection Aaron Beach Spring 2004.
F3 Collecting Network Based Evidence (NBE)
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Guide to Network Defense and Countermeasures Second Edition
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Host Intrusion Prevention Systems & Beyond
Intrusion Detection - Arun Hodigere. Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
IDS Mike O’Connor Eric Tallman Matt Yasiejko. Overview IDS defined IDS defined What it does What it does Sample logs Sample logs Why we need it Why we.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Intrusion Detection Chapter 12.
COEN 252 Computer Forensics
Intrusion Detection Chapter 12.
Network Intrusion Detection Systems Ali Shayan October 2008.
Intrusion Detection Systems. A properly implemented IDS is watched by someone besides your system administrators, such as security personnel.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Intrusion Detection and Prevention. Objectives ● Purpose of IDS's ● Function of IDS's in a secure network design ● Install and use an IDS ● Customize.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
FORESEC Academy FORESEC Academy Security Essentials (III)
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Chapter 5: Implementing Intrusion Prevention
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
1 Quick Overview Overview Network –IPTables –Snort Intrusion Detection –Tripwire –AIDE –Samhain Monitoring & Configuration –Beltaine –Lemon –Prelude Conclusions.
7.5 Intrusion Detection Systems Network Security / G.Steffen1.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
K. Salah1 Intrusion Detection Systems. K. Salah2 Firewalls are not enough Don’t solve the real problems Don’t solve the real problems  Buggy software.
1 Figure 10-4: Intrusion Detection Systems (IDSs) IDSs  Event logging in log files  Analysis of log file data  Alarms Too many false positives (false.
1 HoneyNets, Intrusion Detection Systems, and Network Forensics.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
1 Figure 10-4: Intrusion Detection Systems (IDSs) Actions  Alarms  Interactive analysis Manual event inspection of raw log file Pattern retrieval 
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Security Methods and Practice CET4884
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
IDS Intrusion Detection Systems
NETWORKS Fall 2010.
Principles of Computer Security
Intrusion Detection Systems (IDS)
Intrusion Prevention Systems
Intrusion Detection system
Presentation transcript:

K. Salah1 Intrusion Detection Systems

K. Salah2 Firewalls are not enough Don’t solve the real problems Don’t solve the real problems  Buggy software (think buffer overflow exploits)  Bad protocol design (think WEP in b) Generally don’t prevent denial of service Generally don’t prevent denial of service Passive Devices  Firewalls does not have intelligence  Limited actions (block, permit)  Limited state/history Don’t prevent insider attacks Don’t prevent insider attacks Don’t prevent MITM attacks Don’t prevent MITM attacks Increasing complexity and potential for misconfiguration Increasing complexity and potential for misconfiguration

K. Salah3 IDS More than “Hidden Cameras” IDS sensors sniff and analyze traffic searching for various “electronic scent” or “signatures” to identify threats or attempts to exploit vulnerability, and to perform the proper action Some types of attacks cannot be detected by examining only host- based data, for instance:  Doorknob rattling  Masquerading/Spoofing  Diversionary attacks  Multipronged attacks  Chaining  Loopback IDS analysis  Anomaly-based: statistical analysis to identify what abnormal traffic or protocol behavior Examples: sudden load increase, flurries of strange IP addresses  Signature-bases: looking for a pattern in the traffic Examples: scanning, Land attack (source and dest IP are the same).. Etc

K. Salah4 Basic Elements of IDS

K. Salah5 Distributed IDS Two modes of transfer: Two modes of transfer:  Batched (every few minutes)  Real time (as events occurs or periodically)

K. Salah6 Operations  Full protocol analysis  Full payload content IDSs  Event logging in log files  Analysis of log file data  Alarms false positives (false alarms) Annoyance factor An alarm for a valid but new IP address false negatives (overlooked incidents) More dangerous No alarm for a spoofed IP addresses or stealth port scanning

K. Salah7 Philosophy/Decisions When to “sound an alarm” When to “sound an alarm” Keep in mind that these are a *continuum* Keep in mind that these are a *continuum* Minimize False Positives Minimize False Negatives

K. Salah8 Decision Results We anticipate both false positives and false negatives: We anticipate both false positives and false negatives:  False positive: some acceptable usage will be diagnosed as misuse  False negative: some unacceptable usage will be diagnosed as okay Looks Abnormal, Is Normal Gray Area Looks Normal, Is Normal Looks Normal, Is Misuse Looks Abnormal, Is Misuse

K. Salah9 Balancing Issues There is an important balance to be reached between these two failures: There is an important balance to be reached between these two failures:  False positives lead to extra investigatory time, annoyance of users, and perhaps denial of service.  False negatives can lead to system damage, undetected misuse.

K. Salah10 Managing IDS Tuning for precision  Too many false positives can overwhelm administrators and dull interest  False negatives allow attacks to proceed unseen  Tuning for false positives turns off unnecessary rules, reduces alarm levels of unlikely rules  IDS might make tuning difficult Updates Updates  Program and attack signatures must be updated periodically Performance Performance  If processing speed cannot keep up with network traffic, some packets will not be examined This can make IDSs useless during DoS attacks  If memory requirements are too large, system might crash Making logs smaller by saving them more frequently hurts longer-duration event correlation

K. Salah11 After Detection – “ReAction” Passive Passive  Log  Alert Reactive Reactive  Log  Alert  Deal with the attack Instruct router to block incoming traffic from a source IP address

K. Salah12 Network IDS (NIDS) Capture and analyze packets in promiscuous mode Capture and analyze packets in promiscuous mode  Sensors or Taps on wires  Host or Switch or Firewall Sensors Switches and routers have port spanning or port mirroring All traffic incoming and outgoing traffic is sent to manager IDS Stand-alone NDIS, single router or switch, does not give global analysis of the network Stand-alone NDIS, single router or switch, does not give global analysis of the network Gather and collect data from all sensors and send them to a manager for analysis Gather and collect data from all sensors and send them to a manager for analysis  Real-time analysis  After-the-fact analysis Train statistical modeling algorithm on data set – learning normal to identify abnormal Bayesian Nets Hidden Markov Models Datamining models Others… Records a lot of traffic Records a lot of traffic  Very difficult to be discriminating Usually end up recording everything  Requires a fair amount of disk space and I/O bandwidth  May also require CPU time if there is a lot of traffic and analysis is done in real time NDIS cannot filter encrypted payload NDIS cannot filter encrypted payload

K. Salah13 Host-based IDS (HIDS) Need an IDS for every host Need an IDS for every host Collect and analyze packets at host only Collect and analyze packets at host only No need to operate in promiscuous mode No need to operate in promiscuous mode Can examine encrypted payload Can examine encrypted payload  Look for polymorphic worms OS Monitoring OS Monitoring  events, failed logins, executable changes, system config files (eg., registry, init.conf) Application Monitoring Application Monitoring  Spyware  adware  Backdoors  BO filtering Mcafee, Symantec, Norton are popular host-based IDS Mcafee, Symantec, Norton are popular host-based IDS

K. Salah14

K. Salah15 Popular IDS products Commercial  Shadow, Cisco, secure, EntraSys, Dragon, ISS Real Secure, and NFR, Symantec, Mcafee, etc Open Source  Snort, Tripwire IDS is a complex system.  Outsourcing it is an attractive option

K. Salah16 Snort  NIDS Several books written on it Very popular Uses tcpdump to get network packet info Checks each packet against a rule-set logs packet information into MySQL backend Nice web interface to a BASE engine  Analysis Console for Intrusion Database (ACID)

K. Salah17 Tripwire  HIDS Records MD5 checksums of critical files and binaries Also checks file attributes, I.e. size, dates, permissions, etc… Periodically verifies that the files have not been modified Good for detecting Rootkit  Rootkit After breaking in, attacker wishes to hide her presence Root kit is a set of Trojan binaries (ls, ps, netstat, etc…) Hides files, processes belonging to attacker May also include sniffers to gather username/passwords

K. Salah18 IDS Placement Deploy multiple network IDS sensors  Classification: per segment, per traffic, per application Between main firewall and external network  (+) to capture attacks plans  (-) exposed IDS to the attack, performance issues, lot of log to view Between main firewall and internal network  (+) to capture all attacks get thru the FW (FW policy problem)  (+) IDS less vulnerable to attacks  (-) limited view of the attacks (not the planned ones) For high traffic network, the outside IDS identifies the critical server attacks and the inside IDS does protocol and payload detail analysis At internal network  To detect successful attacks  To detect worms and Trojans  to detect internal malicious insiders With encryption devices  Place it on the 1st segment that receives the decrypted traffic (could be in the host), or  IDS works on the header if not encrypted– limited In switches: make sure it runs on each port

K. Salah19 Good IDS sits on a separate network!