Intrusion Detection Presentation : 2 OF n by Manish Mehta 02/07/03.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Intrusion Detection System(IDS) Overview Manglers Gopal Paliwal Gopal Paliwal Roshni Zawar Roshni Zawar SenthilRaja Velu SenthilRaja Velu Sreevathsa Sathyanarayana.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
IUT– Network Security Course 1 Network Security Firewalls.
Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Introduction to Network Analysis and Sniffer Pro
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Intrusion Detection Systems and Practices
Survey of Information Assurance Intrusion Detection systems.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
A survey of commercial tools for intrusion detection 1. Introduction 2. Systems analyzed 3. Methodology 4. Results 5. Conclusions Cao er Kai. INSA lab.
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
Host Intrusion Prevention Systems & Beyond
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEM
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
APA of Isfahan University of Technology In the name of God.
Intranet, Extranet, Firewall. Intranet and Extranet.
TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
COEN 252 Computer Forensics
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Network Intrusion Detection Systems Ali Shayan October 2008.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
COEN 252 Computer Forensics Collecting Network-based Evidence.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
What is a “Network Intrusion Detection System (NIDS)"?
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
FORESEC Academy FORESEC Academy Security Essentials (III)
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Chapter 5: Implementing Intrusion Prevention
Intrusion Detection Presentation : 3 OF n by Manish Mehta 02/21/03.
CHAPTER 9 Sniffing.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security fundamentals Topic 13 Detecting and responding to incidents.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
DoS/DDoS attack and defense
Intrusion Detection System
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Network Devices and Firewalls Lesson 14. It applies to our class…
Unit 2 Personal Cyber Security and Social Engineering Part 2.
An Introduction To Gateway Intrusion Detection Systems Hogwash GIDS Jed Haile Nitro Data Systems.
Some Great Open Source Intrusion Detection Systems (IDSs)
Security Methods and Practice CET4884
CompTIA Security+ Study Guide (SY0-401)
Snort – IDS / IPS.
NETWORKS Fall 2010.
Domain 4 – Communication and Network Security
CompTIA Security+ Study Guide (SY0-401)
Presentation transcript:

Intrusion Detection Presentation : 2 OF n by Manish Mehta 02/07/03

What will we discuss? Network-Based Detection Network-based Architecture -Traditional Sensor-based -Distributed Network-node Network Intrusion Detection Engine -Signatures Operational Concepts for network-based detection Benefits of network-based ID Challenges for network-based Technologies

Introduction Why you call it ‘network-based’? - used to analyze network packets. - packets are ‘sniffed’ off the network. TCP/IP is the most common protocol targeted by commercial IDS. Different technologies can resolve different levels of protocols through the application layer.

Network-based Detection Most network-based attacks are directed at OS vulnerabilities. These can be exploited mainly towards following means –Unauthorized Access –Data/Resource Theft –Denial of Service

Unauthorized Access Unauthorized Login - Key is to detect before/while logging in. - TFTP is well-known for lack of security. - SunOS 4.1.x had security problems with file sharing protocol. Jump-off Point - They are ‘bad’ and not ‘stupid’. - A compromised computer can open up several other computers in the same organization. - Why is my mail server contacting DoD?

Data/Resource Theft Information theft - Password file download gives attacker the ability to compromise other systems. (look for ‘/etc/passwd’) - Secret Data file download Credit card numbers, Employee HR data Bandwidth Theft - Firms with lot of bandwidth not used at all times. - If the business of the attacker grows, he will be caught.

Denial of Service Malformed Packets - Not all error conditions are taken care of while coding the protocol stack. - Code is not prepared to handle impossible situations in argument fields. Packet Flooding - Not a very sophisticated attack. - If source address is spoofed, it can be hard to deal with. Distributed DoS -Special case of Flooding (several machines attack at once) - ID is not a very good tool against this attack, but it can be helpful

NID Architecture Two types of NID Traditional Sensor-based (Promiscuous mode) - obtain packets, search for patterns, report alarms to the central command console. Network-node (Distributed) - Agent on each computer (for individual target)

Traditional Sensor-based Architecture Ethernet Chip in Promiscuous mode “sniffed” packets are fed to the detection engine (typically on the same machine) Taps are distributed to all mission-critical segments (generally one per segment) Central command console correlates alarms from multiple sensors.

Life cycle of a Packet Packet is born. “sniffed” off the wire in real-time by the sensor. (a stand-alone machine or a network device in promiscuous mode) Detection engine matches the predefined patterns. If matched, Alert is generated and forwarded to central console. Security officer is notified.

Life cycle of a Packet (Contd.) Response is generated. - Reconfiguring of routers/firewall rules - Terminate session Alert is stored for later review and correlation. Reports are generated. Data forensics for long-term trends.

Distributed Network-node Architecture Sensor on every computer. Every sensor is concerned about the target it resides on. Now confused between host and network based?? - the difference between host and network based ID is the source of data Network-node agents communicate with each other on the network to correlate alarms at the console.

Life cycle of a Packet Packet is born. The packet is read in real-time through a sensor resident on the destination machine. A Detection Engine is used to match signatures of misuse. If a pattern is found, an alarm is generated and forwarded to central console or other sensors on the network.

Life cycle of a Packet (Contd.) Security officer is notified. Response is generated. - Reconfiguring of routers/firewall rules - Terminate session Alert is stored for later review and correlation. Reports are generated. Data forensics for long-term trends.

Misconception  Real-Time ID “I need Intrusion Detection” “Are you interested in network-based or host based?” “Oh, I need real-time Intrusion Detection” “Great, on the host or the network” “What???”

Network Intrusion Detection Engine This is where the real magic is !! A stream of time sequential TCP/IP packets is processed to detect predetermined sequences and patterns (signatures). Speed – An Issue.

Network Signatures Packet Content Signatures -based on contents of packets (smart ??) Traffic Analysis Signatures -based on Header information and flow of traffic More on detection mechanisms in future talks.

Packet Content Signatures Simple Example -Copy password file over FTP. - Look for pattern “passwd” in the packet. (Output of Snoop) Source.com  dest.com ETHER Type=0800(IP), size = 67 bytes IP D= S= LEN=53, ID=34704 TCP D=21 S=2095 Ack= Seq= Len=13 Win=4096 FTP C port=2095 RETR \etc\passwd\r\n

Traffic Analysis Signature Simple Examples - A lot of packets destined to one machine in relatively short period of time. (An attempt of DoS attack) - A packet coming from outside the network with Source IP address as that of the inside network.

Operational Concept A NIDS only performs as well as it is operated. (configured) The value of the system depends on the skills of the operator. Network based ID may be used in a manner that requires very few resources.

How do I use NIDSs? The specific use of a NIDS is dependent on the environment-specific requirement. Sensor placement plays an important role. Example: Sensor placed outside the firewall will identify source addresses attempting to attack you. Sensors placed inside the firewall will detect attacks that successfully circumvent your firewall. (IF you don’t have a Firewall, YOU SHOULDN’T BE HERE ! GO INSTALL IT FIRST !!)

Operational Modes Operational mode describes the manner in which you will operate your NIDS and partially describe the end goals of monitoring. Two primary operational modes: -Tip-Off -Surveillance

Tip-Off and Surveillance The defining characteristic for tip-off The system is detecting something previously unsuspected. Unlike tip-off, Surveillance takes place when misuse is already indicated or suspected. It is an increased effort to observe the behavior of a small set of objects.

Benefits of NID Outside Deterrence - A notification to the hacker can enhance the deterrent value of an IDS. Threat Detection - Can be used deterministically or in a Decision Support Context. Automated Response and Notification. - Pager, SNMP trap, On Screen, Audible, .

Challenges for Network-based Technologies (promiscuous-mode) Packet Reassembly (IP fragmentation) - can only search for patterns after reassembly. High-speed networks (Gig E?) Sniffer Detection Programs (Antisniff) Switched Networks (IP over ATM?) Encryption (IPSec, VPN)

Questions ?

Until then..