Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.

Slides:



Advertisements
Similar presentations
Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
Advertisements

1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Guide to Network Defense and Countermeasures Second Edition
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 Intrusion Detection CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 4, 2004.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
Intrusion Detection MIS ALTER 0A234 Lecture 3.
seminar on Intrusion detection system
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Building Survivable Systems based on Intrusion Detection and Damage Containment Paper by: T. Bowen Presented by: Tiyseer Al Homaiyd 1.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
IIT Indore © Neminah Hubballi
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
What is FORENSICS? Why do we need Network Forensics?
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
Guide to Network Defense and Countermeasures
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Chapter 5: Implementing Intrusion Prevention
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
7.5 Intrusion Detection Systems Network Security / G.Steffen1.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
1 Intrusion Detection “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking resources.”
Intrusion Detection System
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
Some Great Open Source Intrusion Detection Systems (IDSs)
Security Methods and Practice CET4884
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
IDS Intrusion Detection Systems
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Access control techniques
Security Methods and Practice CET4884
Outline Introduction Characteristics of intrusion detection systems
Intrusion Detection Systems
Intrusion Detection system
Intrusion Detection Systems
Presentation transcript:

Intrusion Detection System (IDS)

What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted to computing and network resources Analogy: security cameras and burglar alarms in a house; Intrusion detection in Information systems Categories: Attack detection and Intrusion detection The goal of intrusion detection is to positively identify all true attacks and negatively identify all non-attacks

Characteristics of ID ID monitors a whole System or just a part of it Intrusion Detection occurs either during an intrusion or after it ID can be stealth or openly advertised If suspicious activity occurs it produces an alarm and keeps logs that can be used for reports on long term development Human (Administrator) needed for alarm processing ID systems can produce an alarm and/or produce an automated response

Motivation of ID The motivation for intrusion detection varies for different sites: Some use IDS for tracking, tracing, and prosecution of intruders Some use IDS as a mechanism for protecting computing resources Some use IDS for identifying and correcting vulnerabilities

Why Intrusion Detection Detecting and reacting to an attack: Possible to stop the attack before anything serious happens and do damage control Knowledge of the attack and managing the damage Information gathering of the attack and trying to stop it from happening again Information gathering of attacks against the ID system; useful data for the security administration Timely and correct response is imperative in IDS

Definition of Intrusion Attack and intrusion can be viewed from a number of perspectives; the intruder and the victim Each perspective brings with it a criterion for judging the success of the attack An intrusion has taken place if the attack is considered successful from the victims’ point of view (the victim has experienced some loss or consequences) Vulnerability in the victims system that is exploited by the intruder with an objective enables a successful attack The intrusion process ends when some or all objectives of the intruder are realized or the intruder gives up Because multiple perspectives are involved in a single attack, defining what constitutes an attack is difficult

Different Kinds of Intrusion The vulnerabilities exploited in this process range from flaws in the software, for example buffer overflow that can be exploited to elevated privileges, exploitation of known weaknesses of a system with exploit-scripts, to flaws in organizational structure that allows a social engineering attack to obtain sensitive information or passwords to accounts. Attacks can involve one or more attackers and more than just one victim

Terminology of Intrusion Detection (cont.) There are 2 categories of analysis approach: Attack signature detection identifies patterns corresponding to known attacks Anomaly detection identifies any unacceptable deviation from expected behaviour

IDS System Hierarchy Every IDS has a sensor, analyser, and user interface. The type of data that is generated by a particular IDS varies significantly. ID systems can be classified into one of the following categories based on the types of data they examine.

IDS System Hierarchy (cont.) Application An application-based IDS examines the behaviour of an application program, generally in the form of log files. Host A host-based IDS examines data such as log files, process accounting information, user behaviour, or outputs from application-based ID systems operating on a host

IDS System Hierarchy (cont.) Network A network-based IDS examines network traffic. It may have access to outputs from host-based and application-based ID systems operating within the monitored network environment.

Comparison of ID analysis methods Different kinds of analysis methods are used when detecting known and unknown attacks Attack signature based detection: A signature-based system requires generally significantly less configuration effort than a anomaly detection system, since the latter requires a lots of data collection, analysis, and updating. Signature-based systems ID systems produce conclusions based on pattern matching. It can trigger an alarm message because of a certain signature, or it can provide supporting data that is relevant to the signatures occurrence.

Comparison of ID analysis methods (cont.) Anomaly detection Anomaly-based systems are in generally more difficult to configure because a comprehensive definition of known and expected behaviour for a system is required. The users must understand, represent, and maintain the expected behaviour of their system. Automated support is available, but it takes time, and the data must be unambiguous. The output of anomaly-based ID systems generally produce conclusions based on statistical correlations between actual and expected behaviours.

Comparison of ID analysis methods (cont.) An advantage of the anomaly-based ID system is the ability to detect novel attacks that manage to bypass the signature-based system. Anomaly-based systems produce more data. The best results are obtained by combining the signature- and anomaly-based methods; the combination of both methods provides the capability to detect a larger variety of attacks and keep the signature-based system up to date

Methodology of Intrusion Detection Passive: (after the fact or on-line solution) o Audit trail analysis o Network traffic analysis o Anomaly detection o Misuse detection o Combination of these methods Positive: (before the fact) o Honeypot

Traffic Analysis & Network Monitoring (cont) Main problems To actually recognize an attack, you usually need more information Can not monitor user activities on the consol Since traffic analysis collect all traffic on the network, a vast amount of stoage is necessary and there is the processing overhead of hardware such as CPU and NIC (network interface card)

Anomaly Detection General ideas : Record users’ activities on the systems and creates statistical profiles of the activities based on these records Regards activities that markedly differ from normal use as intrusions If events are outside of a probability window of “normal” generate an alert

Anomaly Detection (cont) Typical anomaly detection approaches Statistical approaches Behavior profiles are generated first Adaptively learn the behavior of users so more sensitive than human experts Can be trained by intruders and intrusive events are considered normal Predictive pattern generation Tries to predict future events based on the events that have already occurred based so called “rulebase” Example : E1 - E2 --> (E3 = 80%, E4 = 15%, E5 = 5%) Neural networks Train the neural network to predict a user's next action or command, given the window of n previous actions or commands

Anomaly Detection (cont) Anomaly Detection: Advantages If it works it could conceivably catch any possible attack If it works it could conceivably catch attacks that we haven’t seen before Will not require constantly keeping up on hacking technique Anomaly Detection: Disadvantages Too many false positives/negatives Requires expertise to figure out what triggered the alert

Misuse Detection General ideas: Refers to intrusions that follow well-defined intrusion patterns These patterns can be written into the system in advance So-called ”expert system”

Misuse Detection (cont) Typical misuse detection approaches: Expert systems profiles are updated at periodic intervals component --- intrusion scenarios and attack patterns Need a security professional Keystroke monitoring a very simple technique that monitors keystrokes for attack patterns Model Based Intrusion Detection State Transition Analysis “Network grep” - look for strings in network connections which might indicate an attack in progress Pattern matching - encode series of states that are passed through during the course of an attack e.g.: “change ownership of /etc/passwd” -> “open/etc/passwd for write” -> alert

Misuse Detection (cont) Misuse Detection: Advantages Easy to implement Easy to deploy Easy to update Easy to understand Low false positives Fast Misuse Detection: Disadvantages Cannot detect something previously unknown Constantly needs to be updated with new rules Easier to fool

What is NIDS? Definition Network Intrusion Detection Systems (NIDS) is a system which monitors packets on the network wire and attempts to discover if a hacker/cracker is attempting to break into a system (or cause a denial of service attack).

Implementation of NIDS NIDS can be installed on the host it monitors. NIDS can be divided into sensors and a central analysis point. In this presentation, we discuss about the second implementation in detail.

Two-Part Architecture Several sensors + one central analysis point If there is only one sensor installed, it’s recommended to put it at the firewall so that all the traffic going out of and into the network can be monitored.