network security intrusion detection
play

Network Security: Intrusion Detection Seungwon Shin, KAIST most - PowerPoint PPT Presentation

Network Security: Intrusion Detection Seungwon Shin, KAIST most slides from Dr. Guofei Gu Some Definition Intrusion A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability, of a computing and


  1. Network Security: Intrusion Detection Seungwon Shin, KAIST most slides from Dr. Guofei Gu

  2. Some Definition Intrusion A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability, of a computing and networking resource Intrusion detection The process of identifying and responding to intrusion activities

  3. Why Is Intrusion Detection Necessary? Protect your systems from intrusion React/ Prevent Detect Survive Security principles: layered mechanisms

  4. Elements of IDS Primary assumptions: System activities are observable Normal and intrusive activities have distinct evidence Components of intrusion detection systems: From an algorithmic perspective: Features - capture intrusion evidences Models - piece evidences together From a system architecture perspective: Audit data processor, knowledge base, decision engine, alarm generation and responses

  5. Components of IDS Audit Records system activities are system activities are observable observable Audit Data Preprocessor Activity Data normal and intrusive normal and intrusive Detection activities have distinct activities have distinct Detection Engine Models evidence evidence Alarms Action/Report Decision Engine Decision Table

  6. IDS Approachs Modeling Features: evidences extracted from audit data Analysis approach: piecing the evidences together Misuse detection (signature-based, e.g., Snort, Bro) Anomaly detection (e.g., statistical-based) Deployment Network-based Host-based Development and maintenance Hand-coding of “expert knowledge” Learning based on audit data

  7. Misuse Detection pattern matching Intrusion intrusion Patterns activities Example: if (src_ip == dst_ip) then “land attack” Cannot detect unknown attacks

  8. Anomaly Detection 90 probable 80 intrusion 70 60 activity 50 measures normal profile 40 abnormal 30 20 10 0 CPU Process Size Relatively high false positive rate - anomalies can just be new normal activities.

  9. Monitoring Network and Hosts Network Packets tcpdump BSM Operating System Events

  10. Performance Metric Algorithm Alarm: A; Intrusion: I Detection (true positive) rate: P(A|I) False negative rate P(¬A|I) Alarm (detection result) False positive rate: P(A|¬I) ) T F True negative rate P(¬A|¬I) Intrusion (Reality) Bayesian detection rate: P(I|A) True False T Positive Negative Architecture False True F Scalable Positive Negative Resilient to attacks

  11. ROC Curve IDS1 % Detect IDS2 IDS2 % False Alarm Ideal system should have 100% detection rate with 0% false alarm

  12. HIDS Using OS auditing mechanisms E.G., BSM on Solaris: logs all direct or indirect events generated by a user strace for system calls made by a program Monitoring user activities E.G., Analyze shell commands Monitoring executions of system programs E.G., Analyze system calls made by sendmail

  13. HIDS - Example A Sense of Self - Immunology Approach Prof. Forrest at University of New Mexico Anomaly detection Simple and short sequences of events to distinguish “self” from not Currently looking at system calls (strace) Apply to detection of lpr and sendmail

  14. Some More Anomaly detection for Unix processes “Short sequences” of system calls as normal profile (Forrest et al. UNM) …, open,read,mmap,mmap,open,getrlimit,mmap,close, … Sliding window of length k Y normal … open,read,mmap,mmap read,mmap,mmap,open % matched > ε mmap,mmap,open,getrlimit mmap,open,getrlimit,mmap N … abnormal

  15. NIDS Deploying sensors at strategic locations E.G., Packet sniffing via tcpdump at routers Inspecting network traffic Watch for violations of protocols and unusual connection patterns Monitoring user activities Look into the data portions of the packets for malicious command sequences Maybe easily defeated by encryption Data portions and some header information can be encrypted Other problems...

  16. Firewall vs. NIDS Firewall Active filtering Fail-close Network IDS Passive monitoring Fail-open IDS FW

  17. NIDS Requirements High-speed, large volume monitoring No packet filter drops Real-time notification Mechanism separate from policy Extensible Broad detection coverage Economy in resource usage Resilience to stress Resilience to attacks upon the IDS itself!

  18. Two Well-known NIDS Bro Alternative?

  19. Bro Vern Paxson at ICSI Real-time notification Policy script Record to disk Policy Script Interpreter remember TRW? Event control Event stream Event Engine Bro: A System for Detecting Network Intruders in Real-Time Filtered packet stream Tcpdump filter - USENIX Security 1998 libpcap Packet stream Network

  20. Bro: How it works • Taps GigEther fiber link passively, sends up a Network copy of all network traffic. Bro

  21. Bro: How it works Tcpdump Filtered Packet Filter Stream • Kernel filters down high-volume stream via libpcap standard libpcap packet capture library. Packet Stream Network

  22. Bro: How it works Event Event • “Event engine” distills filtered stream Control Stream into high-level, policy-neutral events reflecting underlying network activity Event Engine – E.g. Connection-level: • connection attempt Tcpdump Filtered Packet • connection finished Filter Stream – E.g. Application-level: libpcap • ftp request • http_reply Packet Stream – E.g. Activity-level: • login success Network Bro

  23. Bro: How it works Policy Real-time Notification Script Record To Disk • “Policy script” processes event stream, incorporates: Policy Script Interpreter – Context from past events – Site’s particular policies Event Event Control Stream Event Engine Tcpdump Filtered Packet Filter Stream libpcap Packet Stream Network Bro

  24. Snort open source SourceFire leads this project now commercial??

  25. Snort: Rule action proto. src. IP src. port dst. IP dst. port alert tcp 192.168.2.0/24 23 -> any any \ (content: "confidential"; msg: "Detected confidential";) contents

  26. Eluding NIDS What the IDS sees may not be what the end system gets. Insertion and evasion attacks. IDS needs to perform full reassembly of packets. But there are still ambiguities in protocols and operating systems: E.G. TTL, fragments. Need to “normalize” the packets.

  27. Insertion Attack IDS sees: IDS sees: End- End -System sees: System sees: C C K K A A A A T T T T X K K A A C C T T A A T T Attacker’s data stream Attacker’s data stream Examples: bad Examples: bad checksum, checksum, A A K K T T X C C A A T T TTL. TTL.

  28. Evasion Attack IDS sees: IDS sees: End End- -System sees: System sees: A A T T C C K K K K T T A A A A C C T T T T Attacker’s data stream Attacker’s data stream Example: Example: K K fragmentation fragmentation T T A A T T A A C C overlap overlap

  29. Summing up Network intrusion A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability, of a computing and networking resource Detecting network intrusion Method misuse vs. anomaly Placement Host level AV-tools Network level Snort, Bro

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend