Intrusion Detection State of the Art/Practice Anita Jones University of Virginia.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Intrusion Detection CS461/ECE422 Spring Reading Material Chapter 8 of the text.
Guide to Network Defense and Countermeasures Second Edition
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Intrusion Detection Systems and Practices
1 Intrusion Detection CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 4, 2004.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
Intrusion Detection Systems By Ali Hushyar. What is an intrusion? Intrusion: “any action or set of actions that attempt to compromise the integrity, confidentiality.
seminar on Intrusion detection system
Foundations of Network and Computer Security J J ohn Black Lecture #26 Dec 2 nd 2004 CSCI 6268/TLEN 5831, Fall 2004.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Intrusion Detection - Arun Hodigere. Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEM
Building Survivable Systems based on Intrusion Detection and Damage Containment Paper by: T. Bowen Presented by: Tiyseer Al Homaiyd 1.
WAC/ISSCI Automated Anomaly Detection Using Time-Variant Normal Profiling Jung-Yeop Kim, Utica College Rex E. Gantenbein, University of Wyoming.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Data Mining for Intrusion Detection: A Critical Review Klaus Julisch From: Applications of data Mining in Computer Security (Eds. D. Barabara and S. Jajodia)
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
Intrusion Detection Adam Ashenfelter Nicholas J. Tyrrell.
IIT Indore © Neminah Hubballi
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
Clay Brockman ITK 478 Fall Why intrusion detection? Comparing two types: Monitoring Database Application Behavior Using Time Signatures.
Grant Pannell. Intrusion Detection Systems  Attempt to detect unauthorized activity  CIA – Confidentiality, Integrity, Availability  Commonly network-based.
Computer System Intrusion Detection: A Survey Anita K. Jones & Robert S. Sielken Presented by Peixian Li (Rick) For CS551/651 Computer Security.
Operating system Security By Murtaza K. Madraswala.
Intrusion Control. CSCE Farkas2 Readings Lecture Notes Pfleeger: Chapter 7.5.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Kittiphan Techakittiroj (25/10/58 12:06 น. 25/10/58 12:06 น. 25/10/58 12:06 น.) Intrusion Detection System Kittiphan Techakittiroj
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
Systems II San Pham CS /20/03. Topics Operating Systems Resource Management – Process Management – CPU Scheduling – Deadlock Protection/Security.
7.5 Intrusion Detection Systems Network Security / G.Steffen1.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
DTRAB Combating Against Attacks on Encrypted Protocols through Traffic- Feature Analysis.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Application Intrusion Detection Anita Jones University of Virginia.
Intrusion Detection System
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Some Great Open Source Intrusion Detection Systems (IDSs)
Application Intrusion Detection
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Ch.22 INTRUSION DETECTION
Access control techniques
Intrusion Control.
Intrusion Detection Systems
Operating system Security
Principles of Computer Security
Evaluating a Real-time Anomaly-based IDS
OPERATING SYSTEM OVERVIEW
NET 412 Network Security protocols
NET 412 Network Security protocols
A Real-time Intrusion Detection System for UNIX
IDS Survey Based on Two Surveys
Unit 1: Introduction to Operating System
Intrusion Detection Systems
Chapter 9 The Art of Intrusion Detection
Lecture 8: Intrusion Detection
Intrusion Detection Systems
Lecture 7: Intrusion Detection
Presentation transcript:

Intrusion Detection State of the Art/Practice Anita Jones University of Virginia

10/062 Introduction Intrusion Detection –determining whether or not some entity, the intruder, has attempted to gain, or has gained unauthorized access to the system Intruder Types –External –Internal

10/063 State of Practice Assume the Operating System as the basis Use what an OS knows about -- OS semantics –users, processes, devices –controls on access and resource usage –network traffic management Record events in the life of the OS Use OS audit records OS Intrusion Detection Systems -- OS IDS

10/064 OS IDS - the two Approaches Anomaly Detection –assume that behavior can be characterized statically -- by known, fixed data encoding dynamically -- by patterns of event sequences or by threshold limits on event occurrences (e.g. system calls) –detect errant behavior that deviates from expected, normal behavior Misuse Detection –look for known patterns (signatures) of intrusion, typically as the intrusion unfolds

10/065 OS IDS - the two Approaches Anomaly Detection –Static: e.g. Tripwire, Self-Nonself –Dynamic: e.g. Rule-based (thresholds) –see GrIDS Misuse Detection –e.g. USTAT Networks are handled as “extensions” –I.e. Use same two approaches listed above –Centralized: e.g. DIDS, NADIR, NSTAT –Decentralized: e.g. GrIDS, EMERALD

10/066 Audit Records Most IDS depend on audit records What do OS audit records record? Can the OS assure integrity of the audit records? What techniques would an intruder use to cover his tracks that might be found in an audit trail? “Clandestine intruders” Forensics

10/067 User Profiles What can you use to characterize user activity? Measures (absolute amounts; fluctuation; duration: –use of memory –use of processors –network traffic Absolute measures Statistical measures -- thresholds

CPU usagecount elapsed CPU execution -- seconds I/O usage# of devices; duration of use of each; # commands Location of Use# connection from each location Mailer Usage# invocations Editor Usage# invocations Compiler Usage# invocations Shell Usage# invocations Directory Usage# directories accessed; # accesses per directory Commands Used# command; # repetitions per command Directories Created# created Directories Read# accessed; # at end of path Directories Modified# directories changed; # mods/dir.; size increase decrease File Usage# accesses; # mods; magnitude of mods Temp files created# average size; standard deviation of size User Ids accessed# time ID is changed System errors# System Errors by Type# per type Audit Record Activitycategories of records; # of each category; # per hour Hourly activitypatterns of CPU, files, memory used per hour Time of day usepattern of average on-line use per day Remote network activity# packets sent; packets per hour Network activity by Hostshosts contacted Local Network activitytraffic within local network Local network activity by hosttraffic by host inside local network

10/069 Signatures Signature is some data or pattern of data that captures distinctive behavior Many IDS systems depend upon the development of a signature Large variety Formats of signatures may differ What is “summarized”?

10/0610 OS IDS -- a Particular Problem OS IDS has problems when –anomalous & normal behavior can’t be distinctly characterized –OS IDS has no pattern for a newly invented intrusion (misuse) But, the greatest problem is –to distinguish abusive internal (legit user) activity

An OS IDS is inherently limited by the semantics of the OS You can’t talk about something for which you have no words!

10/0612 Alarms Who do you call? How do they respond? Quality of the IDS: –False positives –False negatives