Breno de MedeirosFlorida State University Fall 2005 Network Intrusion Detection Systems Beyond packet filtering.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection Aaron Beach Spring 2004.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
CCNA – Network Fundamentals
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Introduction1-1 message segment datagram frame source application transport network link physical HtHt HnHn HlHl M HtHt HnHn M HtHt M M destination application.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
1 TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
1 CS 4396 Computer Networks Lab Transmission Control Protocol (TCP) Part I.
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
IP Basics. Physical Link Network IP ARP ICMP RoutingTables.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
Examining IP Header Fields
Internet Networking Spring 2003
IP Basics. IP encapsulates TCP IP packets travel through many different routers (hops) before reaching it’s destination MTU variation at the physical.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Transport Layer TCP and UDP IS250 Spring 2010
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
Gursharan Singh Tatla Transport Layer 16-May
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
1 Chapter 1 OSI Architecture The OSI 7-layer Model OSI – Open Systems Interconnection.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
University of the Western Cape Chapter 12: The Transport Layer.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Intrusion Detection Issues Presented by Deepa Srinivasan CSE581, Winter 2002, OGI.
Dr. John P. Abraham Professor UTPA
Chapter 5: Implementing Intrusion Prevention
CSE 461 Section. Let’s learn things first! Joke Later!
Chapter 13 The Internet.
Networking Basics CCNA 1 Chapter 11.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
DoS/DDoS attack and defense
Breno de MedeirosFlorida State University Fall 2005 The IP, TCP, UDP protocols A quick refresher.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
1 Version 3.1 Module 10 Intermediate TCP/IP (Layer 4)
© 2002, Cisco Systems, Inc. All rights reserved..
Chapter 3 TCP and IP 1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Internet.
IP packet filtering Breno de Medeiros. Florida State University Fall 2005 Packet filtering Packet filtering is a network security mechanism that works.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
CompTIA Security+ Study Guide (SY0-401)
Chapter 9: Transport Layer
Instructor Materials Chapter 9: Transport Layer
TCP/IP Internetworking
TCP.
TCP/IP Internetworking
Introduction to Networking
CompTIA Security+ Study Guide (SY0-401)
TCP - Part I Karim El Defrawy
Transport Layer Unit 5.
The IP, TCP, UDP protocols
Dr. John P. Abraham Professor UTPA
Dr. John P. Abraham Professor UTPA
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
ITIS 6167/8167: Network and Information Security
NET 323D: Networks Protocols
Transport Layer 9/22/2019.
Presentation transcript:

Breno de MedeirosFlorida State University Fall 2005 Network Intrusion Detection Systems Beyond packet filtering

Goal of NIDS  Detect attacks as they happen:  Real-time monitoring of networks  Provide information about attacks that have succeeded:  Forensic analysis  Passive systems: monitoring and reporting  Active systems: corrective measures adopted  Good place to establish a NIDS: The perimeter network, or DMZ.

Strategies  Often NIDS are described as being composed of several parts  Event generator boxes  Analysis boxes  Storage boxes  Counter-measure boxes  Analysis is the most complex element, and can use protocol analysis as well as anomaly detection, graph analysis, etc.

Elements of a NIDS  A general NIDS system can be seen to consist of 4 modules (boxes)  Event (E)  Analysis (A)  Conter-measure (C)  Storage (S)  E may activate A, C, or S.  A may activate C or S

Host based vs. Network based  Host based: Operating system log analyses  Semantically rich: Contain information about the state of the system  Network based: Direct analysis of network traffic  Complete: Sees all the network events, not only those conveyed up to the higher levels of the operating system.  Unobtrusive: Does not degrade network or host performance

Common analysis techniques  Attempts pattern-matching against certain known attack types.  For instance, substring matching.  Passive protocol analysis.  Emulate the sequence of protocol events to detect attacks.

Difficulties inherent in NIDS  What defines an attack is not a packet, but its induced behavior on the receiving host.  NIDS must determine this behavior  NIDS runs in a different machine, even a different part of the network.  Proper function of the NIDS may require of each host being protected:  Knowledge of its place in the network topology  Knowledge of its TCP/UDP implementation  OS-based behavior variance.

Influence of Network Topology  If several internal routers exist between the network component where the NIDS resides, and where the receiver host resides:  TTL may result in some packets reaching the NIDS but not the receiver.  Some packets being dropped by filtering routers.

Influence of implementation  UDP packets with incorrect checksum -- will be dropped or accepted? will be filtered?  Packets with incorrect header fields.  Fragmentation, overlap, and re-ordering issues.

Insertion attacks  Means: Lead the NIDS into thinking a particular packet will be accepted by the receiving host, when it in fact will not.  Goal: To prevent the NIDS from recognizing patterns (either for protocol analysis or signature recognition) by reconstructing an incorrect series of events

Example of insertion attack  NIDS performs signature analysis based on substring match: fragment the string into parts and add intermediate packets that are rejected by the destination host, but not by NIDS.

Evasion attacks  Means: Lead the NIDS into believing that a particular packet will be rejected by the host, when it will not.  Goal: To prevent the NIDS from detecting an attack (via protocol analysis or signature analysis) by preventing the NIDS from reconstructing the correct sequence of packets processed by the receiving host.

Evasion example

Confusing the NIDS  Some implementations of NIDS may allow evasion/ insertion attacks simply because the NIDS does not correctly implement all the steps of protocol verification.  An attacker specifically targets this.  In what follows, we consider difficulties which are inherent with the design of NIDS systems, namely intrinsic ambiguity on what types of decisions the NIDS should take.

Ambiguity  Network topology information lacking  IP TTL not be enough to reach destination  NIDS may erroneously keep packet  Do-not-fragment flag ignored by NIDS  packet discarded at router before destination  Destination configuration info. lacking  NIDS keeps source-routed packets discarded by destination  Destination OS knowledge lacking  Time-out values for holding to packet fragments of incompletely received packets differs in destination from NIDS  Re-assembly strategy for overlapping packet fragments differs  TCP header options may lead to packets being dropped differently  Destination may or not silently drop packets with old timestamps  Destination may interpret differently conflicting TCP segments  Destination may/may not discard RST packets w/ wrong sequence numbers

Some evasion/insertion attacks  Bad IP headers  Differences in NIDS’ network and host network with respect to TTL and don’t fragment (DF) bit.  Bad IP options  Source-based packets filtered and variations in timestamp decisions  Direct frame addressing:  Attacker in the same physical network as NIDS directs packet to NIDS (or to non-existing MAC address) but IP address of host.

IP packet fragmentation  Large IP packets (larger than the size of the data-frames in the link layer) must be broken up into smaller packets.  The IDS must be able to handle IP packet re- assembly correctly.  out-of-order fragments must be re-ordered.  fragments must be stored until all fragments for the packet are known.  DoS attack: Send partial IP packets

Packet fragmentation  After some time, packet fragments must be discarded based on their arrival times, or the system will run out of memory.  If NIDS drops them faster than end system, there is opportunity for successful evasion attacks.  If NIDS keeps them longer than end system, there is opportunity for successful insertion attacks.  Coordinated attacks using many source/ destination pairs can disable NIDS.

Overlapping fragments  Two TCP fragments may contain overlapping data.  Forward overlap:  fragment of data at a later section of the packet arrives early  Later, a fragment partially overlaps with the data in the early packet  Some OSes override the old data; others keep it  Reverse overlap  A packet contains both new data and data received at earlier packets  (All?) OSes keep old data, discarding new, overlapped data

TCP layer problems  For forensic reasons it is important to keep/ analyze higher level protocol information.  One such approach is called TCP connection monitoring  TCP packets can be assigned to connections, or at least requests to open connections.  A TCP session can be in a set of “states” »Established, Closed, …  The NIDS and the end system should be state- synchronized for monitoring to succeed.

TCB = TCP Control Block  A TCP monitoring NIDS must keep a TCB for every existing connection, with state, packet numbers, window, etc.  TCBs must be created for new connections and should be discarded for closed connections.  TCB creation  TCB re-assembly  TCB teardown

TCB creation and re-assembly  Missed handshake sequences  TCP has a 3-way handshake. When to consider the connection has been established?  Existing connections at boot time:  Insertion attacks  replay an old packet sequence number on an existing connection  send a packet on a closed connection  send a packet on a non-existing connection

TCP stream synchronization  TCB re-assembly:  TCP data overlap  TCP time-window and acknowledgment strategies  NIDS does not validate TCP packets in accordance with end system  TCP header, options, checksum  Wrapped sequence numbers

TCB teardown  TCP connections are closed by sending FIN or RST packets.  TCP connections do not “time-out”  DoS attack by never closing connections  What to do with RST packets with wrong sequence numbers.  TCP control information re-use after connection is closed.