23
May 4, 1999 Application Intrusion Detection 1 Application Intrusion Detection Robert S. Sielken In Fulfillment Of Master of Computer Science Degree School of Engineering and Applied Science University of Virginia

Application Intrusion Detection

Embed Size (px)

DESCRIPTION

Application Intrusion Detection. Robert S. Sielken In Fulfillment Of Master of Computer Science Degree School of Engineering and Applied Science University of Virginia. Outline. Introduction State of Practice - OS IDS Case Studies Application Intrusion Detection - PowerPoint PPT Presentation

Citation preview

Page 1: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 1

Application Intrusion Detection

Robert S. Sielken

In Fulfillment Of

Master of Computer Science Degree

School of Engineering and Applied Science

University of Virginia

Page 2: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 2

Outline

• Introduction

• State of Practice - OS IDS

• Case Studies

• Application Intrusion Detection

• Construction of an Application Intrusion Detection System (AppIDS)

• Conclusion

Page 3: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 3

Introduction• Intrusion Detection

– determining whether or not some entity, the intruder, has attempted to gain, or worse, has gained unauthorized access to the system

• Intruders– Internal

– External

• Objectives– Confidentiality– Integrity– Availability– Accountability

• Current State– done at the OS level,

but diminishing returns– opportunities and limits

of utilizing application semantics?

Page 4: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 4

State of Practice - OS IDS• Audit records

– operating system generated collections of the events that have happened in the system over a period of time

• Events– results of actions taken

by users, processes, or devices that may be related to a potential intrusion

• Threat Categories– Denial of Service

– Disclosure

– Manipulation

– Masqueraders

– Replay

– Repudiation

– Physical Impossibilities

– Device Malfunctions

Page 5: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 5

OS IDS - Approaches• Anomaly Detection

– Static• Tripwire, Self-Nonself

– Dynamic• NIDES, Pattern

Matching (UNM)

• Misuse Detection• NIDES, MIDAS, STAT

• Extensions - Networks– Centralized

• DIDS, NADIR, NSTAT

– Decentralized• GrIDS, EMERALD

Page 6: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 6

OS IDS - Generic Characteristics

• Relation - expression of how two or more values are associated– Statistical

– Rule-Based

• Observable Entities - any object (user, system device, etc.) that has or produces a value in the monitored system that can be used in defining a relation

• Thresholds - determine how the result of the relation will be interpreted

Page 7: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 7

OS IDS - Generic Characteristics

• Effectiveness– fine-tuning of thresholds– frequency of relation evaluation– number of correlated values– hierarchy

Page 8: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 8

AppIDS

• Guiding Questions– Opportunity – what types of intrusions can be

detected by an AppIDS?– Effectiveness – how well can those intrusions

be detected by an AppIDS?– Cooperation – how can an AppIDS cooperate

with the OS IDS to be more effective than either alone?

Page 9: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 9

Case Studies• Electronic Toll

Collection– numerous devices

distributed

– complementary device values

– hierarchical

– gathers data about monitored external behavior

– accounting component

• Health Record Management– non-hierarchical

– no devices beyond controlling computer

– no financial component

– limited access

– contains physical realities

– data collection and scheduling components

Page 10: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 10

Electronic Toll Collection (ETC)• Devices

– Toll Lane• Tag Sensor

• Automated Coin Basket

• Toll Booth Attendant

• Loop Sensor

• Axle Reader

• Weigh-In-Motion Scale

• Traffic Signal

• Video Camera

– Vehicle• Tag (Active/Passive)

Page 11: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 11

ETC - Hierarchy

T o ll L a ne T o ll L a ne

T o ll P la za T o ll P la za

T o ll L a ne T o ll L a ne T o ll L a ne

T o ll P la za O th e r D e v ices

T o ll M a n ag e m en t C e n te r

Page 12: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 12

ETC - Application Specific Intrusions

• Annoyance (3 methods)

• Steal Electronic Money (10 methods)

• Steal Vehicle (4 methods)

• Device Failure (1 method)

• Surveillance (2 methods)

Threat Categories

Specific Intrusions

Methods Relations

Page 13: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 13

ETC - Steal Service

Rel#

RelationRelation

DescriptionExecutionLocation

Steal Service

No tagand

coverplate

Copytag

Packet filterthat discards

all a tag'spackets

1 Tag vs. Historical (Time) (stat) TBP/TMC X4 Tag vs. Historical (Sites) (stat) TMC X5 Tag vs. Time (rule) TMC X9 Tag vs. Axles (rule) TBL X X X25 Unreadable Tags (stat) TBP/TMC X

Page 14: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 14

Application Intrusion Detection• Similarities

– detect intrusions by evaluating relations to differentiate between anomalous and normal behavior

– centralized or decentralized (hierarchical)

– same threat categories

• Differences– anomaly detection

using statistical and rule-based relations

– internal intruders

– event causing entity

– resolution

– tightness of thresholds

– event records• periodic

• code triggers

Page 15: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 15

AppID (cont’d)• Dependencies

– OS IDS on AppIDS• None

– AppIDS on OS IDS• basic security services

• prevention of bypassing application to access application components

• Cooperation– audit/event record

correlation

– communication• bi-directional

• request-response bundles

– complications• terms of communication

• resource usage - lowest common denominator

Page 16: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 16

Construction of an AppIDS

Event Record Manage

r

Relation Evaluato

r

Anomaly Alarm Handler

TOOLS

Relation Specifier

Relations

Event Record

Specifier

Event Record Structure

Timings

Relation – Code

Connector

Observable Entity Locations in the

Application

GENERIC COMPONENTS

Page 17: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 17

Conclusion• Opportunity

– internal intruders (abusers)

– anomaly with statistical and rule-based relations

– same threat categories

• Effectiveness– resolution

– tightness of thresholds

• Cooperation– detection

• Construction– tools

– generic components

Page 18: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 18

Health Record Management (HRM)

• Components– Patient Records– Orders – lists of all requests for drugs, tests, or

procedures– Schedule – schedule for rooms for patient

occupancy, laboratory tests, or surgical procedures (does not include personnel)

• Users– doctors, laboratory technicians, and nurses

Page 19: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 19

HRM - Application Specific Intrusions

• Annoyance (4 methods)

• Steal Drugs (1 method)

• Patient Harm (6 methods)

• Surveillance (2 methods)

Threat Categories

Specific Intrusions

Methods Relations

Page 20: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 20

HRM - Patient Harm

Rel#

RelationRelation

DescriptionPatient Harm

Adm

in.

Wro

ngD

rug

Adm

in.

Too

Muc

hof

Dru

g

Adm

in.

an A

llerg

icD

rug

Adm

in.

Impr

oper

Die

t

Ord

er N

eed

less

Dru

gs

Per

form

Nee

dles

sP

roce

dure

2 Drug vs. Allergy (rule) X X

5 Drug vs. Diet (rule) X X

8 Drug vs. Historical (dosage) (stat) X X

24 Patient Test Results vs. TestResults (Historical)

(stat) X X X X

Page 21: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 21

ETC - Steal ServiceRel#

Relation Relation DescriptionExecutionLocation

Steal Service

No tagand

coverplate

Copytag

Packet filterthat discards

all a tag'spackets

1 Tag vs.Historical (Time)

Tag (Time of Day) should match Historical Time (ofDay) (stat)

TBP/TMC X

2 Tag vs.Historical (Day)

Tag (Day of Week) should match Historical Time(Day of Week) (stat)

TBP/TMC X

3Tag vs.

Historical(Frequency)

Tag (Frequency (per day)) should match HistoricalFrequency (per day) (stat)

TBP/TMC X

4 Tag vs.Historical (Sites)

Tag (Sites) should match Historical sites (stat) TMC X

5 Tag vs. TimeTag should not be reread within x minutes any othertoll both (rule)

TMC X

6 Tag vs. ParkingTag (Identity) should not be listed as being in aparking facility (Parking) (rule)

TMC X

7 Tag vs. Reportof Stolen Tag

Tag should not match that of a reported lost/stolenvehicle (rule)

TMC X

9 Tag vs. Axles Tag (Axles) should match Axles (rule) TBL X X X10 Tag vs. Scale Tag (Weight) should match Scale (rule) TBL X X X

11Tag + Toll +Coin Toll vs.Traffic Signal

# of tolls paid (tag/toll/coin-toll) equals number ofsignals given (green) (rule)

TBL X

12Tag + Toll +Coin Toll vs.

Video

# of tolls paid (tag/toll/coin-toll) equals number ofvehicles seen by camera (rule)

TBL X X

13Tag + Toll +Coin Toll vs.

Loops

# of tolls paid (tag/toll/coin-toll) equals number ofvehicles seen by loops (rule)

TMC X X

Page 22: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 22

Steal Service (cont’d)Rel#

Relation Relation DescriptionExecutionLocation

Steal Service

No tagand

coverplate

Copytag

Packet filterthat discards

all a tag'spackets

15 Axles vs. Scale # of Axles should match Scale reading (rule) TBL X16 Axles vs. Toll Axles (cost) should match Toll collected (rule) TBL X X X

17 Axles vs. Coin-Toll

Axles (cost) should match Toll (coin) paid (rule) TBL X X X

18 Toll vs. Scale Toll collected should match Scale based fare (rule) TBL X X X

19 Toll vs. VideoToll collected should match Video vehicledetermination (rule)

TBL X X X

20 Coin-Toll vs.Scale

Toll (coin) paid should match Scale based fare (rule) TBL X X X

21 Coin-Toll vs.Video

Toll (coin) paid should match Video vehicledetermination (rule)

TBL X X X

22 Traffic Signal vs.Video

# of signals (green) equals # of vehicles seen byvideo camera (rule)

TBL X

23 Traffic Signal vs.Loops

# of signals (green) equals # of vehicles seen byloops (rule)

TMC X

24 Video vs. Loops# of vehicles seen by video camera equals # ofvehicles seen by loops (rule)

TMC X

25 UnreadableTags

# of unreadable tags should be fairly evenlydistributed between lanes and toll booths (stat)

TBP/TMC X

Page 23: Application Intrusion Detection

May 4, 1999 Application Intrusion Detection 23

HRM - Patient HarmRel#

Relation Relation Description Patient Harm

Adm

in.

Wro

ngD

rug

Adm

in.

Too

Muc

hof

Dru

g

Adm

in.

an A

llerg

icD

rug

Adm

in.

Impr

oper

Die

t

Ord

er N

eed

less

Dru

gs

Per

form

Nee

dles

sP

roce

dure

1 Drug vs. DrugCertain drugs cannot be taken in conjunction with otherdrugs (rule)

X

2 Drug vs. AllergyCertain drugs cannot be taken when a person has certainallergies (rule)

X X

3 Drug vs. SexCertain drugs cannot be taken by one sex or the other(rule)

X

4 Drug vs. WeightCertain drugs prescriptions are based on the patient'sweight (rule)

X X

5 Drug vs. DietCertain drugs cannot be taken while consuming certainfoods (rule)

X X

6 Drug vs. Lethal Dosage Drug dosage should not exceed the lethal dosage (rule) X X

7 Drug vs. TimeDrugs have a minimum time between doses (such as 4hours) (rule)

X X

8 Drug vs. Historical(dosage)

Drug dosage should be fairly similar to other prescriptionsof the drug in either dosage amount or frequency (stat)

X X

12 Procedure vs. DietSome procedures may have a special dietary preparationrequirement (rule)

X

18 Language vs.Language

Anything outside of the restricted language is not allowed(rule)

X

24Patient Test Results

vs. Test Results(Historical)

Test results should be related to previous test results forthat patient (stat)

X X X X

25 Test Results vs. TestResults (Historical)

Test results should be related to previous test resultsacross all patients (stat)

X X X X