Network Intrusion Detection: Capabilities & Limitations Vern Paxson International Computer Science Institute Lawrence Berkeley National Laboratory

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Bro: A System for Detecting Network Intruders in Real-Time Vern Paxson Lawrence Berkeley National Laboratory,Berkeley, CA A stand-alone system for detecting.
Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection Aaron Beach Spring 2004.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
FIREWALLS Chapter 11.
Analyzing Network Traffic in the Presence of Adversaries Vern Paxson International Computer Science Institute / Lawrence Berkeley National Laboratory
Anomaly Detection Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Firewalls and Intrusion Detection Systems
Common IS Threat Mitigation Strategies An overview of common detection and protection technologies Max Caceres CORE Security Technologies
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Security Awareness: Applying Practical Security in Your World
Examining IP Header Fields
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Bro: A System for Detecting Network Intruders in Real-Time Presented by Zachary Schneirov CS Professor Yan Chen.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection - Arun Hodigere. Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from.
Lecture 11 Intrusion Detection (cont)
Intrusion Detection System Marmagna Desai [ 520 Presentation]
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Detecting attacks Based on material by Prof. Vern Paxson, UC Berkeley.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
Presentation on Osi & TCP/IP MODEL
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Intrusion Detection and Prevention. Objectives ● Purpose of IDS's ● Function of IDS's in a secure network design ● Install and use an IDS ● Customize.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
FORESEC Academy FORESEC Academy Security Essentials (III)
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Security at NCAR David Mitchell February 20th, 2007.
Breno de MedeirosFlorida State University Fall 2005 Network Intrusion Detection Systems Beyond packet filtering.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Network & WebSecurity Dina Katabi nms.csail.mit.edu/~dina.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Department of Computer Science and Engineering Applied Research Laboratory Architecture for a Hardware Based, TCP/IP Content Scanning System David V. Schuehler.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
1 Flexible, High-Speed Intrusion Detection Using Bro Vern Paxson Computational Research Division Lawrence Berkeley National Laboratory and ICSI Center.
Intrusion Detection System
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
Network Intrusion Detection System (NIDS)
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
Network Devices and Firewalls Lesson 14. It applies to our class…
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
Managing Secure Network Systems
Click to edit Master subtitle style
Principles of Computer Security
Presentation transcript:

Network Intrusion Detection: Capabilities & Limitations Vern Paxson International Computer Science Institute Lawrence Berkeley National Laboratory November 16, 2005

2 Outline What problem are we trying to solve? Why network intrusion detection? Why not? Styles of approaches. Architecture of a network intrusion detection system (NIDS). The fundamental problem of evasion. Detecting activity: scanners, stepping stones.

3 What Problem Are We Trying To Solve? A crucial basic question is What is your threat model?  What are you trying to protect?  Using what sort of resources?  Against what sort of adversary who has what sort of goals & capabilities? It’s all about shades of grey, policy decisions, limited expenditure, risk management

4 Types of Threats In general, two types of threats: insider and outsider.

5 Types of Threats In general, two types of threats: insider and outsider. Insider threat:  Hard to detect  hard to quantify  Can be really damaging  In many contexts, apparent prevalence: rare

6 Types of Threats In general, two types of threats: insider and outsider. Insider threat:  Hard to detect  hard to quantify  Can be really damaging  In many contexts, apparent prevalence: rare Outsider threat:  Attacks from over the Internet: ubiquitous.  Internet sites are incessantly probed: Background radiation: on average, Internet hosts are probed every 90 sec  Medium-size site: 10,000’s of remote scanners each day. What do they scan for? A wide and changing set of services/vulnerabilities, attacked via “auto-rooters” or worms.  Increasingly, not just “over the Internet”: Laptops, home machines erode notion of “perimeter”

7 What Are They After? Short answer: Not Us.  Most attacks are not targeted. They seek bragging rights:  E.g., via IRC or Web page defacement They seek zombies for:  DDOS slaves  Spamming  Bots-for-sale  Finding more targets They seek more of themselves (worms). Most don’t cause damage beyond cleanup costs. But: this is changing with the commercialization of malware

8 What can you learn watching a network link? Far and away, most traffic travels across the Internet unencrypted. Communication is layered with higher layers corresponding to greater semantic content. The entire communication between two hosts can be reassembled: individual packets (e.g., TCP/IP headers), application connections (TCP byte streams), user sessions (Web surfing). You can do this in real-time.

9 Tapping links, con’t: Appealing because it’s cheap and gives broad coverage. You can have multiple boxes watching the same traffic. Generally (not always) undetectable. Can also provide insight into a site’s general network use.

10 Problems with passive monitoring Reactive, not proactive  However, this is changing w/ intrusion prevention systems Assumes network-oriented (often “external”) threat model. For high-speed links, monitor may not keep up.  Accordingly, monitors often rely on filtering.  Very high speed: beyond state-of-the-art. Depending on “vantage point”, sometimes you see only one side of a conversation (especially inside backbone). Against a skilled opponent, there is a fundamental problem of evasion: confusing / manipulating the monitor.

11 Styles of intrusion detection — Signature-based Core idea: look for specific, known attacks. Example: alert tcp $EXTERNAL_NET any -> $HOME_NET 139 flow:to_server,established content:"|eb2f 5feb 4a5e 89fb 893e 89f2|" msg:"EXPLOIT x86 linux samba overflow" reference:bugtraq,1816 reference:cve,CVE classtype:attempted-admin

12 Signature-based, con’t: Can be at different semantic layers, e.g.: IP/TCP header fields; packet payload; URLs. Pro: good attack libraries, easy to understand results. Con: unable to detect new attacks, or even just variants.

13 Styles of intrusion detection — Anomaly-detection Core idea: attacks are peculiar. Approach: build/infer a profile of “normal” use, flag deviations. Example: “user joe only logs in from host A, usually at night.” Note: works best for narrowly-defined entities  Though sometimes there’s a sweet spot, e.g., content sifting or scan detection Pro: potentially detects wide range of attacks, including novel. Con: potentially misses wide range of attacks, including known. Con: can potentially be “trained” to accept attacks as normal.

14 Styles of intrusion detection — Specification-based Core idea: codify a specification of what a site’s policy permits; look for patterns of activity that deviate. Example: “user joe is only allowed to log in from host A.” Pro: potentially detects wide range of attacks, including novel. Pro: framework can accommodate signatures, anomalies. Pro: directly supports implementing a site’s policy. Con: policies/specifications require significant development & maintenance. Con: hard to construct attack libraries.

15 Some general considerations about the problem space Security is about policy. The goal is risk management, not bulletproof protection. All intrusion detection systems suffer from the twin problems of false positives and false negatives. These are not minor, but an Achilles heel. Scaling works against us: as the volume of monitored traffic grows, so does its diversity. Much of the state of the art is at the level of car alarms  Sure, for many attackers, particularly unskilled ones, they go off …  … but they also go off inadvertently a whole lot too

16 General NIDS Structure Taps link passively, sends up a copy of all network traffic. Network

17 General NIDS Structure Reduces high-volume stream via static filter to subset of main interest Network Pre-Filter Packet Stream Filtered Packet Stream

18 General NIDS Structure Distills filtered stream into high-level, policy-neutral elements reflecting underlying network activity  E.g., connection attempt, Web request, user logged in Network Pre-Filter Decoder Packet Stream Filtered Packet Stream Event Stream

19 General NIDS Structure Detection logic processes event stream, incorporates:  Context from past analysis  Site’s particular policies Network Pre-Filter Event Engine Detection Packet Stream Filtered Packet Stream Event Stream Real-time Notification Record To Disk Decoder

20 General NIDS Structure Detection logic processes event stream, incorporates:  Context from past analysis  Site’s particular policies Network Pre-Filter Event Engine Packet Stream Filtered Packet Stream Event Stream Real-time Notification Record To Disk … and takes action: Records forensic information to disk Generates alarms Executes response Decoder Detection

21 A Stitch in Time: Prevention instead of Detection Big win to not just detect an attack, but block it However: Big lose to block legitimate traffic Mechanisms:  NIDS spoofs connection tear-down/denial messages  NIDS contacts firewall/router, requests block (race condition)  NIDS is in-line and itself drops offending traffic (no race, but performance and robustness issues) Increasing trend in industry … … but requires highly accurate algorithms

22 The Problem of Evasion Consider the following attack URL: Easy enough to scan for (say, “cmd.exe”), right?

23 The Problem of Evasion Consider the following attack URL: Easy enough to scan for (say, “cmd.exe”), right? But what about

24 The Problem of Evasion Consider the following attack URL: Easy enough to scan for (say, “cmd.exe”), right? But what about  Okay, we need to handle % escapes.

25 The Problem of Evasion Consider the following attack URL: Easy enough to scan for (say, “cmd.exe”), right? But what about  Okay, we need to handle % escapes. But what about  Oops. Will recipient double-expand escapes … or not?

26 The Problem of Evasion, con’t More generally, consider passive measurement: scanning traffic for a particular string (“USER root”)

27 The Problem of Evasion, con’t More generally, consider passive measurement: scanning traffic for a particular string (“USER root”) Easiest: scan for the text in each packet  No good: text might be split across multiple packets

28 The Problem of Evasion, con’t More generally, consider passive measurement: scanning traffic for a particular string (“USER root”) Easiest: scan for the text in each packet  No good: text might be split across multiple packets Okay, remember text from previous packet  No good: out-of-order delivery

29 The Problem of Evasion, con’t More generally, consider passive measurement: scanning traffic for a particular string (“USER root”) Easiest: scan for the text in each packet  No good: text might be split across multiple packets Okay, remember text from previous packet  No good: out-of-order delivery Okay, fully reassemble byte stream  Costs state ….

30 The Problem of Evasion, con’t More generally, consider passive measurement: scanning traffic for a particular string (“USER root”) Easiest: scan for the text in each packet  No good: text might be split across multiple packets Okay, remember text from previous packet  No good: out-of-order delivery Okay, fully reassemble byte stream  Costs state ….  …. and still evadable

31 Evading Detection Via Ambiguous TCP Retransmission

32 The Problem of Evasion Fundamental problem passively measuring traffic on a link: Network traffic is inherently ambiguous Attackers can craft traffic to confuse/fool monitor Okay, can’t you then generate an alarm when you see ambiguous traffic?

33 The Problem of Crud Real network traffic, especially in high volume environments, inevitably has a steady stream of strange/broken traffic:  Storms of useless packets, due to implementation/protocol bugs.  Unroutable addresses leaking out.  Data split into overlapping pieces  Direct violations of protocol standards  Senders that acknowledge data that was never sent  Senders that retransmit different data than sent the first time E.g., LBL’s Bro NIDS logged 76,610 “weird” events yesterday  Out of 13,261,129 connections analyzed Plenty of background noise in which an attacker can hide :-(

34 Countering Evasion-by-Ambiguity Involve end-host: have it tell you what it saw, or do the analysis itself Probe end-host in advance to resolve vantage-point ambiguities  E.g., how many hops to it?  E.g., how does it resolve double %-escapes? Change the rules - perturb  Introduce a network element that “normalizes” the traffic passing through it to eliminate ambiguities  Approach works for some ambiguities, but not all Change the rules - become the recipient  Run proxies for allowed services

35 Detecting activity — scanners How do you detect if someone is probing your site? How quickly can you do this? Classic approach: look for a source attempting to contact N different hosts in T seconds  Easy to evade if attacker knows (or can measure) N and T  Hard to set N and T to rapidly detect scanners but not misdetect hosts whose traffic fans out

36 Detecting activity — scanners, con’t Idea: leverage the fundamental fact that the scanner doesn’t know what’s there Ergo: scanner’s attempts are more likely to fail Posit two hypotheses:  H0: source is benign. Connection attempts fail with probability P0.  H1: source is a scanner. Attempts fail with probability P1 > P0. For each new connection attempt, use sequential hypothesis testing to see if either H0 or H1 is strongly more consistent with observations. Very effective at finding scanners after 4-5 attempts. Framework gives bounds on false positives & negatives.

37 Detecting activity — stepping stones Interactive attacks invariably do not come from the attacker’s own personal machine, but from a stepping-stone: an intermediary previously compromised. Furthermore, usually it is a chain of stepping stones. Manually tracing attacker back across the chain is virtually impossible. So: want to detect that a connection going into a site is closely related to one going out of the site.

38 Detecting stepping stones Approach:  Leverage unique on/off pattern of user login sessions.  Look for connections that end idle periods at the same time.  Two idle periods correlated if ending time differ by <=  sec. If enough idle periods coincide  stepping stone pair.  For A  B  C stepping stone, just 2 correlations suffices.  For A  B ...  C  D, 4 suffices.

39 Detecting stepping stones Works very well, even for encrypted traffic. But: easy to evade, if attacker cognizant of algorithm. And: also turns out there are frequent legit stepping stones.  This is a broad theme of detecting high-level activity. Often if you manage to do it, you find it indeed occurs, but for benign reasons.

40 Some Summary Points Security is not about bullet-proof; it's about policies and tradeoffs. You can detect a whole lot by piecing together judiciously filtered network traffic into events reflecting activity … … but this raises difficult issues with managing state … … and there are significant problems with evasion, potentially leading to an arms race. Traffic contains much more diversity/junk than you'd think, including incessant scanning for vulnerabilities. The endpoint host is a great location to look for attacks, if you can “manage” it. There is increasing pressure to bolster network intrusion detection with in-line forwarding elements that constrain/alter the traffic on behalf of the NIDS.