Intrusion Control. CSCE 522 - Farkas2 Readings Lecture Notes Pfleeger: Chapter 7.5.

Slides:



Advertisements
Similar presentations
Enhancing Security Using Mobile Based Anomaly Detection in Cellular Mobile Networks Bo Sun, Fei Yu, KuiWu, Yang Xiao, and Victor C. M. Leung. Presented.
Advertisements

Access Control Methodologies
1. AGENDA History. WHAT’S AN IDS? Security and Roles Types of Violations. Types of Detection Types of IDS. IDS issues. Application.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
1 Intrusion Detection CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 4, 2004.
1 Steve Chenoweth Tuesday, 10/18/11 Week 7, Day 2 Right – One view of the layers of ingredients to an enterprise security program. From
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
Lecture 11 Reliability and Security in IT infrastructure.
seminar on Intrusion detection system
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Intrusion Detection Systems: A Survey and Taxonomy A presentation by Emily Fetchko.
Building Survivable Systems based on Intrusion Detection and Damage Containment Paper by: T. Bowen Presented by: Tiyseer Al Homaiyd 1.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
CSCE 727 Cyber Attacks and Risk Management. CSCE Farkas2 Attack Sophistication vs. Intruder’s Technical Knowledge From:
Intrusion Detection Adam Ashenfelter Nicholas J. Tyrrell.
IIT Indore © Neminah Hubballi
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
Intrusion Detection Sytems
Chapter 18 Intruders.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Signature Based and Anomaly Based Network Intrusion Detection
CSCE 727 Cyber Attacks and Risk Management. CSCE Farkas2 Attack Sophistication vs. Intruder’s Technical Knowledge High Low
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Guide to Network Defense and Countermeasures
Operating system Security By Murtaza K. Madraswala.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
CSCE 522 Secure Software Development Best Practices.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
Intrusion Detection State of the Art/Practice Anita Jones University of Virginia.
1 A Network Security Monitor Paper By: Heberlein et. al. Presentation By: Eric Hawkins.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
1 Intrusion Detection “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking resources.”
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Intrusion Detection System
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
CSCE 201 Identification and Authentication Fall 2015.
Detecting Undesirable Insider Behavior Joseph A. Calandrino* Princeton University Steven J. McKinney* North Carolina State University Frederick T. Sheldon.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Intrusion Control.
Basics of Intrusion Detection
Outline Introduction Characteristics of intrusion detection systems
Operating system Security
Intrusion Detection & Prevention
NET 412 Network Security protocols
Intrusion Detection Systems
Lecture 8: Intrusion Detection
Intrusion Detection system
Lecture 7: Intrusion Detection
Presentation transcript:

Intrusion Control

CSCE Farkas2 Readings Lecture Notes Pfleeger: Chapter 7.5

CSCE Farkas3 Historical Research - Prevention It is better to prevent something than to plan for loss.

CSCE Farkas4 Misuse Prevention Prevention techniques: first line of defense Secure local and network resources Techniques: cryptography, identification, authentication, authorization, access control, security filters, etc. Problem: Losses occur!

CSCE Farkas5 Contributing Factors for Misuse Many security flaws in systems Secure systems are expensive Secure systems are not user-friendly “Secure systems” still have flaws Insider Threat Hackers’ skills and tools improve

CSCE Farkas6 Need: Intrusion Prevention: protect system resources Intrusion Detection: (second line of defense) discriminate intrusion attempts from normal system usage Intrusion Recovery: cost effective recovery models

CSCE Farkas7 Why Intrusion Detection? Second line of defense Deter intruders Catch intruders Prevent threats to occur (real-time IDS) Improve prevention/detection techniques

CSCE Farkas8 Intrusion Detection - Milestones 1980: Deviation from historical system usage (Anderson) 1987: framework for general-purpose intrusion detection system (Denning) 1988: intrusion detection research splits Attack signatures based detection (MIDAS) Anomaly detection based detection (IDES)

CSCE Farkas9 Intrusion Detection - Milestones Early 1990s: Commercial installations IDES, NIDES (SRI) Haystack, Stalker (Haystack Laboratory Inc.) Distributed Intrusion Detection System (Air Force) Late 1990s - today: Integration of audit sources Network based intrusion detection Hybrid models Immune system based IDS

CSCE Farkas10 Terminology Audit: activity of looking at user/system behavior, its effects, or the collected data Profiling: looking at users or systems to determine what they usually do Anomaly: abnormal behavior Misuse: activity that violates the security policy Outsider: someone without access right to the system Insider: someone with access right to the system Intrusion: misuse by outsiders and insiders

CSCE Farkas11 Phases of Intrusion Intelligence gathering: attacker observes the system to determine vulnerabilities Planning: attacker decide what resource to attack (usually least defended component) Attack: attacker carries out the plan Hiding: attacker covers tracks of attack Future attacks: attacker installs backdoors for future entry points

CSCE Farkas12 Times of Intrusion Detection Real-time intrusion detection Advantages: May detect intrusions in early stages May limit damage Disadvantages: May slow down system performance Trade off between speed of processing and accuracy Hard to detect partial attacks

CSCE Farkas13 Times of Intrusion Detection Off-the-line intrusion detection Advantages: Able to analyze large amount of data Higher accuracy than real-time ID Disadvantages: Mostly detect intrusions after they occurred

CSCE Farkas14 Audit Data Format, granularity and completeness depend on the collecting tool Examples System tools collect data (login, mail) Additional collection of low system level “Sniffers” as network probes Application auditing Needed for Establishing guilt of attackers Detecting subversive user activity

CSCE Farkas15 Audit-Based Intrusion Detection Intrusion Detection System Audit Data Profiles, Rules, etc. Decision Need: Audit data Ability to characterize behavior

CSCE Farkas16 Anomaly versus Misuse Non-intrusive useIntrusive use Looks like NORMAL behavior Does NOT look Like NORMAL behavior False negative Non-anomalous but Intrusive activities False positive Non-intrusive but Anomalous activities

CSCE Farkas17 False Positive v.s. False Negative False positive: non-intrusive but anomalous activity Security policy is not violated Cause unnecessary interruption May cause users to become unsatisfied False negative: non-anomalous but intrusive activity Security policy is violated Undetected intrusion

CSCE Farkas18 Intrusion Detection Techniques 1. Anomaly Detection 2. Misuse Detection 3. Hybrid Misuse/Anomaly Detection 4. Immune System Based IDS

CSCE Farkas19 Rules and Profiles Statistical techniques: Collect usage data to statistically analyze data Good for both anomaly-based and misuse-based detection: Anomaly-based: standards for normal behavior. Warning when deviation is detected Misuse-based: standards for misuse. Warning when phases of an identified attack are detected Threshold detection E.g., number of failed logins, number of accesses to resources, size of downloaded files, etc.

CSCE Farkas20 Rules and Profiles Rule-based techniques: Define rules to describe normal behavior or known attacks Good for both anomaly-based and misuse-based detection: Anomaly-based: looks for deviations from previous usage Misuse-based: define rules to represent known attacks

CSCE Farkas21 Anomaly Detection Techniques Assume that all intrusive activities are necessarily anomalous  flag all system states that very from a “normal activity profile”

CSCE Farkas22 Anomaly Detection Techniques Need: Selection of features to monitor Good threshold levels to prevent false-positives and false-negatives Efficient method for keeping track and updating system profile metrics Audit Data System Profile Attack State Update Profile Generate New Profile Deviation

CSCE Farkas23 Misuse Detection Techniques Represent attacks in the form of pattern or a signature (variations of same attack can be detected) Problem! Cannot represent new attacks

CSCE Farkas24 Misuse Detection Techniques Expert Systems Model Bases Reasoning State Transition Analysis Neutral Networks Audit DataSystem Profile Attack State Timing Information Modify Rules Add New Rules Rule Match

CSCE Farkas25 Hybrid Misuse / Anomaly Detection Anomaly and misuse detection approaches together Example: 1. Browsing using “nuclear” is not misuse but might be anomalous 2. Administrator accessing sensitive files is not anomalous but might be misuse

CSCE Farkas26 Immune System Based ID Detect intrusions by identifying suspicious changes in system-wide activities. System health factors: Performance Use of system resources Need: identify system-wide measurements

CSCE Farkas27 Immune System Based ID Principal features of human immune system that are relevant to construct robust computer systems: 1. Multi-layered protection 2. Distributed detection 3. Diversity of detection 4. Inexact matching ability 5. Detection of unseen attacks

CSCE Farkas28 Intrusion Types Doorknob rattling Masquerade attacks Diversionary Attack Coordinated attacks Chaining Loop-back

CSCE Farkas29 Doorknob Rattling Attack on activity that can be audited by the system (e.g., password guessing) Number of attempts is lower than threshold Attacks continue until All targets are covered or Access is gained

CSCE Farkas30 Masquerading Login as X Change identity: I’m Y Login as Y Target 1 Target 2 Attacker Y Legitimate user

CSCE Farkas31 Diversionary Attack TARGET Real attack Create diversion to draw attention away from real target Fake attacks

CSCE Farkas32 Coordinated attacks Attacker Target Multiple attack sources, maybe over extended period of time Compromise system to attack target

CSCE Farkas33 Chaining Move from place to place To hide origin and make tracing more difficult Attacker Target

CSCE Farkas34 Intrusion Recovery Actions to avoid further loss from intrusion. Terminate intrusion and protect against reoccurrence. Reconstructive methods based on: Time period of intrusion Changes made by legitimate users during the effected period Regular backups, audit trail based detection of effected components, semantic based recovery, minimal roll-back for recovery.

Next Class Economic and legal aspects CSCE Farkas35