surfnet ids os3 uva project extension of the surfnet
play

SURFnet IDS / OS3 UvA Project Extension of the SURFnet Intrusion - PowerPoint PPT Presentation

SURFnet IDS / OS3 UvA Project Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Michael Rave Coen Steenbeek 7 February 2007 Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP


  1. SURFnet IDS / OS3 UvA Project Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Michael Rave Coen Steenbeek 7 February 2007

  2. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Overview • Intrusion Detection Systems • SURFnet IDS • Problem Definition • Research • Solutions • Conclusion • Future Work • Questions 2/18

  3. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Intrusion Detection Systems • What is IDS? – detects unwanted manipulations – Hackers, script kiddies, worms, e.c. – Detection, no prevention • Different sorts of IDS’s – Network IDS – Host-based IDS – Hybrid IDS 3/18

  4. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP SURFnet IDS • Distributed IDS – Client - Server model • Distributed sensors – Modified Knoppix distribution – Layer-2 VPN tunnel in bridging mode • Honeypot – Nepenthes • Logging Server – PostgreSQL Database – Apache webserver 4/18

  5. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP SURFnet IDS 5/18

  6. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Problem Definition “How to give a desktop computer the same functionality of the current SURFnet IDS sensors without affecting the current functionality of the desktop computer?” 6/18

  7. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Sub-questions • How to obtain unused ports on Windows XP • How to forward certain ports on Windows XP • How to forward incoming traffic on certain ports to the honeypot without changing the source IP-address of the incoming packets 7/18

  8. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Research • Unused Ports – Netstatp – Nmap – Winpcap – … • Port forwarding – Trivial Port Forward – Netsh – Wintunnel – … 8/18

  9. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Solutions • “How to forward incoming traffic on certain ports to the honeypot without changing the source IP-address of the incoming packets” • Indirect Solution • Direct Solution 9/18

  10. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Solution Indirect 10/18

  11. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Implementation Indirect • Challenges Indirect – Source IP-address of attacker • Solution – IP-tunneling/IPSec/IPv6? – Not tested 11/18

  12. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Advantages/Disadvantages Indirect • Advantages – Sensor Server already present in current setup – Only one VPN connection – Better structure • Disadvantages – IP-tunneling/IPSec/IPv6 introduces difficulties – No working concept so not tested 12/18

  13. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Solution Direct 13/18

  14. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Implementation Direct • Challenges Direct – Source IP-address of attacker – Routing through same tunnel • Solutions – Netsh, pre-routed NAT – Source based routing 14/18

  15. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Advantages/Disadvantages Direct • Advantages – Secure VPN tunnel – No changes to current sensor – Already tested succesfully • Disadvantages – Every sensors needs its own VPN tunnel – Many rules in source based routing tables 15/18

  16. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Future Work • IP-tunneling/IPv6/IPSec for indirect solutions • Further tests • Efficient port checking – No opening of ports – Opening when attacked 16/18

  17. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Conclusion • Summary – Two Solutions – First tested successfully – Second needs more research and testing • We recommend – Direct solution • Secure VPN tunnel • Successfully tested • No modifications to old-style sensor • Only small modifications to honeypot server • Both sensors (old and new) in conjunction 17/18

  18. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Questions? 18/18

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend