1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Report on Common Intrusion Detection Framework By Ganesh Godavari.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Chapter 19: Network Management Business Data Communications, 4e.
IDS/IPS Definition and Classification
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Distributed Intrusion Detection Systems (dIDS) 2/10 CIS 610.
Security Considerations in Adaptive Middleware Security and Mobile Agents Ajanta – Mobile Agent’s research project papers (
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
STATE OF THE PRACTICE OF INTRUSION DETECTION TECHNOLOGIES Presented by Hap Huynh Based on content by SEI.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
A survey of commercial tools for intrusion detection 1. Introduction 2. Systems analyzed 3. Methodology 4. Results 5. Conclusions Cao er Kai. INSA lab.
seminar on Intrusion detection system
Report on Common Intrusion Detection Framework By Ganesh Godavari.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Intrusion Detection - Arun Hodigere. Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEM
1 Action Automated Security Breach Reporting and Corrections.
SMS Mobile Botnet Detection Using A Multi-Agent System Abdullah Alzahrani, Natalia Stakhanova, and Ali A. Ghorbani Faculty of Computer Science, University.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Security Guidelines and Management
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
S E C U R E C O M P U T I N G Intrusion Tolerant Server Infrastructure Dick O’Brien, Tammy Kappel, Clint Bitzer OASIS PI Meeting March 14, 2002.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
IIT Indore © Neminah Hubballi
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Monitoring for network security and management Cyber Solutions Inc.
Overview of MSS System Human Actors Non-Human Actors In-house developed components Third party products.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
1 Figure 10-4: Intrusion Detection Systems (IDSs) IDSs  Event logging in log files  Analysis of log file data  Alarms Too many false positives (false.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
1 Intrusion Detection “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking resources.”
Intrusion Detection System
WebWatcher A Lightweight Tool for Analyzing Web Server Logs Hervé DEBAR IBM Zurich Research Laboratory Global Security Analysis Laboratory
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
Some Great Open Source Intrusion Detection Systems (IDSs)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
SIEM Rotem Mesika System security engineering
IDS Intrusion Detection Systems
Access control techniques
NETWORKS Fall 2010.
Security Methods and Practice CET4884
Intrusion Detection system
Presentation transcript:

1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking resources.”

2 The Seven Fundamentals 1.What are the methods used 2.How are IDS Organized 3.What is an intrusion 4.How do we trace and how do they hide 5.How do we correlate information 6.How can we trap intruders 7.Incident response

3 The Major components of IDS Target System Feed Processing Knowledge base Storage Alarms Operator interface Communications infrastructure Multiple IDS Network management

4 Text book: figure 3-1

5 Major components of IDS (cont.) Target System –Important networks and systems! Feed –Information collected from the target systems and sent back for processing –Q: should feeds carry raw traffic back to the processing system? Should they carry alarms? What are the considerations?

6 Major components of IDS (cont.) Processing –The execution of the detection algorithms Knowledge Base –Used to store information about attacks, user profiles,..etc. –Ability to update is an important issue Storage –Short term vs. long term storage –Performance and capacity issues

7 Major components of IDS (cont.) Alarms and Directives –Various types of configurable alarms and notification methods are typically supported –Increasing trend towards using them for automatic reconfiguration of other network components (See CIDF for messaging model) Communications infrastructure –Used for communications between IDS components –Security needs?

8 Major components of IDS (cont.) Multiple IDS –Common in many environments –The need for secure integration Network management –Integration and interaction issues

9 IDS processing Processing components in IDS include: –Engines Filters Set of autonomous agents each performing a specified task –Management –Correlation Combine results! Interface with other components

10 IDS algorithms Baseline processing while (true) { target_system_feed(info); intrusion_processing(info, results); If (result == intrusion) initiate_response(result); }

11 IDS algorithms (cont.) Dynamic association while (true){ target_system_feed(info); if (suspicious(info) && new(info)) create new association if(suspicious(info)&& not new(info)) add to existing association }

12 IDS algorithms (cont.) Audit trail data reduction –Loop over log records Consider combinations of records Check if they are relevant to current incident –Append to report Other types of data reduction?

13 IDS algorithms (cont.) Out-of-band correlation processing while (true){ target_system_feed(info); if (OOB_data) get_OOB(operator_input); if(relevant(info, operator_input) combine(info, operator_input); }

14 IDS algorithms (cont.) Attack filter pattern matching while (true){ target_system_feed(info); For (i=0; i< NumFilters; i++) if (match(filter[i], info)) AttackFound(i) }

15 IDS Knowledge Base Profiles of normal and abnormal behavior Attack signatures Suspicious traffic patterns / strings Information used to initiate responses and actions

16 IDS Feed Processing System Management Storage Alarms/ Directives GUI/ Operator Interface Target System Knowledge Bases attack signatures other static info response actions user profiles system profiles

17 IDS Storage Archives IDS logs Dynamic buffer The case of Oklahoma bank Camera The case of the Cuckoo's Egg

18 IDS Feed Processing System Management Knowledge Base Alams/ Directives GUI/ Operator Interface Target System Intrusion Detection Storage audit log bufferarchive

19 CIDF Architectural conventions Message specifications (GIDO: generalized ID objects) Transmission standards for sending GIDOs between components Communications protocol for CIDF components API for CIDF

20 CIDF Event generator (E-Box) Analysis Engine (A-box) Storage (D-Box) Response component (R-Box)