Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.

Slides:



Advertisements
Similar presentations
Chapter 18: Computer and Network Security Threats
Advertisements

2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 6 – Intrusion Detection.
Network Security Essentials Chapter 9 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 13 Intrusion Detection modified from slides of Lawrie Brown.
Cryptography and Network Security Chapter 20 Intruders
Information Networking Security and Assurance Lab National Chung Cheng University Network Security (I) 授課老師 : 鄭伯炤 Office: Dept. of Communication Rm #112.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 8 “Intrusion Detection”.
Security+ Guide to Network Security Fundamentals
Network Security Testing Techniques Presented By:- Sachin Vador.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Lecture 11 Reliability and Security in IT infrastructure.
Web server security Dr Jim Briggs WEBP security1.
Lecture 14 Intrusion Detection
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Lecture 11 Intrusion Detection (cont)
CS 432 – Computer and Network Security Sabancı University
Intrusion Detection. Intruders Classes (from [ANDE80]: Classes (from [ANDE80]: two most publicized threats to security are malware and intruders two most.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Cryptography and Network Security Chapter 20 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Cryptography and Network Security Chapter 20 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 20. Chapter 20– Intruders They agreed that Graham should set the test for Charles Mabledene. It was neither.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
Chapter 18 Intruders.
BUSINESS B1 Information Security.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
C8- Securing Information Systems
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Data Security and Encryption (CSE348) 1. Lecture # 26 2.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
INTRUDERS BY VISHAKHA RAUT TE COMP OUTLINE INTRODUCTION TYPES OF INTRUDERS INTRUDER BEHAVIOR PATTERNS INTRUSION TECHNIQUES QUESTIONS ON INTRUDERS.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Name:Neha Madgaonkar Roll no:  What are intruders?  Types  Behavior  Techniques.
Topic 5: Basic Security.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Intruders & Intrusion Detection Systems Intruders Three classes of intruders:Three classes of intruders: An individual who is not authorized to.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Chapter 9 Intruders.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Computer Security Intrusion Detection. Intruders  A significant security problem for networked systems is hostile/unwanted, trespass by users or software.
Privilege Escalation Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago, Chile.
Computer Security: Principles and Practice Chapter 6 – Intrusion Detection.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Chapter 9 Intruders.
Add video notes to lecture
Network Security Essentials
NETW4005 COMPUTER SECURITY A
Secure Software Confidentiality Integrity Data Security Authentication
NET 412 Network Security protocols
NET 412 Network Security protocols
Chapter 9 Intruders.
Lecture 8: Intrusion Detection
Intrusion Detection system
Cryptography and Network Security Chapter 20 Intruders
Chapter # 3 COMPUTER AND INTERNET CRIME
Intrusion.
Designing IIS Security (IIS – Internet Information Service)
Test 3 review FTP & Cybersecurity
Lecture 7: Intrusion Detection
Presentation transcript:

Lecture 10 Intrusion Detection modified from slides of Lawrie Brown

Intruders classes: two most publicized threats to security are malware and intruders two most publicized threats to security are malware and intruders generally referred to as a hacker or cracker generally referred to as a hacker or cracker masquerader likely to be an insider an unauthorized individual who penetrates a system to exploit a legitimate user account misfeasor generally an insider legitimate user who misuses privileges clandestine user can be either insider or outsider individual who seizes supervisory control to evade auditing and access controls or to suppress audit collection

Examples of Intrusion remote root compromise web server defacement guessing / cracking passwords copying databases containing credit card numbers viewing sensitive data without authorization running a packet sniffer distributing pirated software using an unsecured modem to access internal network impersonating an executive to get information using an unattended workstation

Hackers motivated by thrill of access and/or status – hacking community is a strong meritocracy – status is determined by level of competence benign intruders consume resources and slow performance for legitimate users intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) to counter hacker threats – can restrict remote logons to specific IP addresses – can use virtual private network technology (VPN) intruder problem led to establishment of computer emergency response teams (CERTs)

Hacker Patterns of Behavior 1 1 select the target using IP lookup tools such as NSLookup, Dig, and others 2 2 map network for accessible services using tools such as NMAP 3 3 identify potentially vulnerable services (in this case, pcAnywhere) 4 4 brute force (guess) pcAnywhere password 5 5 install remote administration tool called DameWare 6 6 wait for administrator to log on and capture his password 7 7 use that password to access remainder of network

Criminals organized groups of hackers now a threat – corporation / government / loosely affiliated gangs – typically young – meet in underground forums – common target is credit card files on e-commerce servers criminal hackers usually have specific targets – once penetrated act quickly and get out IDS / IPS can be used but less effective sensitive data should be encrypted

Criminal Enterprise Patterns of Behavior act quickly and precisely to make their activities harder to detect exploit perimeter via vulnerable ports use Trojan horses (hidden software) to leave back doors for re-entry use sniffers to capture passwords do not stick around until noticed

Insider Attacks among most difficult to detect and prevent employees have access and systems knowledge may be motivated by revenge/entitlement – employment was terminated – taking customer data when moving to a competitor IDS / IPS can be useful but also need – enforcement of least privilege, monitor logs, strong authentication, termination process

Internal Threat Patterns of Behavior create network accounts for themselves and their friends access accounts and applications they wouldn't normally use for their daily jobs former and prospective employers conduct furtive instant-messaging chats visit web sites that cater to disgruntled employees perform large downloads and file copying access the network during off hours

Security Intrusion: A security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system (or system resource) without having authorization to do so. Intrusion Detection : A security service that monitors and analyzes system events for the purpose of finding, and providing real-time or near real-time warning of, attempts to access system resources in an unauthorized manner. RFC 2828: Internet Security Glossary