40
Intrusion Detection Systems Francis Chang <[email protected]> Systems Software Lab OGI

Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Embed Size (px)

Citation preview

Page 1: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Intrusion Detection Systems

Francis Chang <[email protected]>

Systems Software Lab

OGI

Page 2: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

The Papers

[1] M. Crosbie, B. Kuperman, "A Building Block Approach to Intrusion Detection"

[2] M. Wetz, Andrew Hutchison, "Interfacing Trusted Applications with Intrusion Detection Systems"

[3] Y. Zhang, W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks"

[4] G. Mansfield, K. Ohta, Y. Takei, N. Kato, Y. Nemoto, "Towards Trapping Wily Intruders in the Large"

Page 3: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

A building Block Approachto Intrusion Detection

Let’s first look at the first paper…

[1] M. Crosbie, B. Kuperman, "A Building Block Approach to Intrusion Detection"

Page 4: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

A new spin on how to build an IDS –

“..motors the system looking for misuse actions that are indicative of attack. These misuses actions are called building blocks.”

Need for a better data source for IDS (IDDS – Intrusion Detection Data Source)

A building Block Approachto Intrusion Detection

Page 5: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Examples of building blocks:

A building Block Approachto Intrusion Detection

Modification of a system file

Unexpected change user privileges of a running process

Modify log files

Change a global symbolic link

Creating setuid programs

Page 6: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

So what did they do?

Build an in-kernel IDDS.

A building Block Approachto Intrusion Detection

Page 7: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Crosbie/Kuperman argue that traditional IDS data sources are insufficient – let’s take a look at their argument.

A building Block Approachto Intrusion Detection

Page 8: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

syslogd:

A building Block Approachto Intrusion Detection

Often a popular IDS data source

Often syslogd is used when a daemon “starts up, change configuration, encounter an error, or some other unusual behaviour occurs”

Page 9: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

syslogd: (continued)

A building Block Approachto Intrusion Detection

Crosbie/Kuperman argues that the quality of the log messages is completely dependent on the programmers who wrote the system daemons.

Early versions of syslogd could be attacked – buffer overflows, abnormal exits

Page 10: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Network Packet Traces:

A building Block Approachto Intrusion Detection

If only using network packet traces, you often lose context, and thus, cannot detect certain types of attacks.

Page 11: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Why is an in-kernel approach good?

A building Block Approachto Intrusion Detection

Time inside the kernel is “frozen”

In-kernel design is more resilient to attack

Page 12: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Interfacing Trusted Apps

The next paper - [2] M. Wetz, Andrew Hutchison, "Interfacing Trusted Applications with Intrusion Detection Systems"

Page 13: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

This is funny:

Interfacing Trusted Apps

Page 14: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

The basic suggestion: Rewrite existing applications to take advantage of a syslogd/IDS system.

Interfacing Trusted Apps

Page 15: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Interfacing Trusted Apps

Page 16: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Intrusion Detection in Wireless Ad-hoc Networks

Open Medium – attacks can come from anywhere, an go anywhere

No clear topology – network is continually changing – no central points

The problem:

Page 17: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Intrusion Detection in Wireless Ad-hoc NetworksThe solution: An IDS at every node

Let’s take a closer look at the IDS…

Page 18: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Intrusion Detection in Wireless Ad-hoc Networks

Page 19: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Intrusion Detection in Wireless Ad-hoc Networks

Detecting Abnormal Routing Updates –

Give each IDS a built-in GPS, and watch for unexpected # of route changes. (Statistical analysis)

Page 20: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Intrusion Detection in Wireless Ad-hoc Networks

Detecting abnormal activities in other layers:

Various independent monitors to detect anomolies in other protocol layers, and combine results into a confidence rating.

Page 21: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Intrusion Detection in Wireless Ad-hoc Networks

Respond to intrusion detection by reconstructing the routing tables, and routing around the compromised node.

Page 22: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the Large

G. Mansfield, K. Ohta, Y. Takei, N. Kato, Y. Nemoto, "Towards Trapping Wily Intruders in the Large"

The Basics: Monitor the network, and collect statistics. When the statistics deviate from “normal” behaviour, flag it.Extend SNMP to allow various networks to collaborate to track down the intruder

Page 23: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the Large

When a network is under attack, there is often a lot of suspicious network traffic – There are usually more:

TCP-RESET packets

ICMP echo & response

ICMP Destination unreachable messages

Page 24: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the Large

ICMP Echo:Often occur in high volume when a network is under attack:

Mapping out a network

DDOS attacks

SMURF Attacks – let’s take a look

Page 25: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the Large

1.1.1.1

1.1.1.2 1.1.1.3

2.2.2.2 3.3.3.3

SMURF Attack

Ping 1.1.1.255 from 3.3.3.3

Page 26: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the Large

1.1.1.1

1.1.1.2 1.1.1.3

2.2.2.2 3.3.3.3

SMURF Attack

Ping 1.1.1.255 from 3.3.3.3

Page 27: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the Large

1.1.1.1

1.1.1.2 1.1.1.3

2.2.2.2 3.3.3.3

SMURF Attack

Echo Reply Echo Reply

Page 28: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the Large

1.1.1.1

1.1.1.2 1.1.1.3

2.2.2.2 3.3.3.3

SMURF Attack

Many Echo Responses

Page 29: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the Large

TCP Resets:They do not occur too frequently in normal network traffic – but very often when a network is being attacked.Eg.

Port Scanning

Inverse Mapping – let’s take a look at this.

Page 30: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the Large

1.1.1.1

1.1.1.2 1.1.1.3

2.2.2.2 2.2.2.3ACK from1.1.1.2

Inverse Mapping (Successful routing)

Page 31: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the Large

1.1.1.1

1.1.1.2 1.1.1.3

2.2.2.2 2.2.2.3

TCP Reset

Inverse Mapping (Successful routing)

Page 32: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the Large

1.1.1.1

1.1.1.2 1.1.1.3

2.2.2.2 2.2.2.3

TCP Reset

Inverse Mapping (Successful routing)

Page 33: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the Large

1.1.1.1

1.1.1.2 1.1.1.3

2.2.2.2 2.2.2.3

No Response

Inverse Mapping (Successful routing)

Page 34: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the Large

1.1.1.1

1.1.1.2 1.1.1.3

2.2.2.2 2.2.2.3ACK from1.1.1.4

Inverse Mapping (Unsuccessful routing)

Page 35: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the Large

1.1.1.1

1.1.1.2 1.1.1.3

2.2.2.2 2.2.2.3

TCP Reset

Inverse Mapping (Unsuccessful routing)

Page 36: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the Large

1.1.1.1

1.1.1.2 1.1.1.3

2.2.2.2 2.2.2.3

Inverse Mapping (Unsuccessful routing)

ICMP No Route to Host

Page 37: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the Large

So, now that we know what we’re looking for, how do we find it?

Let’s just use some simple math – isolate patterns with least-squares curve fitting, and find corelations between network traffic.

Page 38: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the Large

Page 39: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the LargeTracing an attack

Page 40: Intrusion Detection Systems Francis Chang Systems Software Lab OGI

Towards Trapping Wily Intruders in the Large

This system does not rely on specific types of attack/patterns/signatures, and does not attempt to reconstruct a detailed transaction log, relying only on statistics.

Can traceback the flow of the attack