80
IDS/IPS Computer Security and Intrusion Detection • Communication •Any communication requires 4 entities •Source •Destination •Medium •Protocol – Rule

Computer Security and Intrusion Detection(IDS/IPS)

Embed Size (px)

Citation preview

Page 1: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSComputer Security and Intrusion Detection

• Communication

•Any communication requires 4 entities

•Source

•Destination

•Medium

•Protocol – Rule

Page 2: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSComputer Security and Intrusion Detection

• Communication – Flow of Information

Page 3: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSComputer Security and Intrusion Detection

• Various types of attacks

•Interruption

•Interception

•Modification

•Fabrication

Page 4: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSComputer Security and Intrusion Detection

• Interruption - state where the asset of a system gets

destroyed or becomes un-available

• targets the source or the communication channel

• prevents the information from reaching the destination

Page 5: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSComputer Security and Intrusion Detection

• Interruption - Examples

• Cutting the physical cable medium

• Overload the carrying medium

• Types of Denial of Service (DoS) Attacks

Page 6: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSComputer Security and Intrusion Detection

• Interception – un-authorized party gets illegal access to

the information traversing through the communication

channel.

• Examples

•Wiretapping

Page 7: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSComputer Security and Intrusion Detection

• Modification – information is intercepted and modified .

• Examples

•MITM Attacks

Page 8: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSComputer Security and Intrusion Detection

• Fabrication – attacker inserts forged objects into the

system without the senders knowledge and involvement .

Page 9: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSComputer Security and Intrusion Detection

• Fabrication – 2 types

• Replaying

• previously intercepted entity is inserted

• Example – Replaying an authentication message.

• Masquerading

• attacker pretends to be the legitimate source

• inserts his / her desired information

• Example – Adding new records to a file or database

Page 10: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSComputer Security and Intrusion Detection

• Security Property

•Desired feature of a system with regard to certaintype of attacks.

•The four attacks discussed in the previous sectionviolates the various security properties of aninformation system

•Core qualities of any information system

Page 11: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSComputer Security and Intrusion Detection

• Security Property

•Confidentiality

•Integrity

•Availability

•Authentication

•Non Repudiation

Page 12: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSComputer Security and Intrusion Detection

• Traffic Analysis - Process of intercepting andexamining messages in order to deduce informationfrom patterns in communication. Information collectedinclude:

•Source

•Destination

•Timing of the data

•Frequency of a particular message

•Type of data / communication

Page 13: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSComputer Security and Intrusion Detection

• Non-repudiationConcept of ensuring that a contract cannot later bedenied by one of the parties involved.

• Describes the mechanism that prevents either senderor receiver from denying a transmitted message.

•Non-repudiation of origin – proves data has been sent

•Non-repudiation of delivery – proves data has beenreceived

Page 14: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSComputer Security and Intrusion Detection

•Security MechanismsThe various actions and countermeasuresemployed to safeguard the security properties of aninformation system.

•Security Mechanisms – 3 Types

•Attack Prevention

•Attack Avoidance

•Attack Detection

Page 15: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSComputer Security and Intrusion Detection

• Attack PreventionSeries of security mechanisms implemented toprevent or defend against various kinds of attacksbefore they can actually reach and affect the targetsystem.

•Examples

•Access Control

•Firewall

Page 16: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSComputer Security and Intrusion Detection

• Attack AvoidanceTechniques in which the information is modified in away that makes it unusable for the attacker.

•Assumption – Attacker may / has access to thesubject information.

•Examples

• Cryptography

Page 17: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSComputer Security and Intrusion Detection

• Attack DetectionProcess / Technique of reporting that something isable to bypass the security measures (if available),and identifying the type of attack.

• Counter measures are initiated to recover from theimpact of the attack.

•Examples

• IDS / IPS

Page 18: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSComputer Security and Intrusion Detection

• Intrusion Detection System

Intrusion detection encompasses a range ofsecurity techniques designed to detect (and reporton) malicious system and network activity or torecord evidence of intrusion.

Page 19: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

• Types of Events – 2

• Attributable

Event can be traced to an authenticated user

•Non-attributable

Event cannot be traced to an authenticated user.

Ex: Any event that occur before authentication in

the login process – bad password attempts.

Page 20: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Vulnerability

•Existence of a weakness, design, or implementationerror that can lead to an unexpected, undesirableevent compromising the security of the system,network, application, or protocol involved

•Pen Testers Point of View - From a penetrationtester’s point of view, vulnerability is defined as asecurity weakness in a Target of Evaluation.

Page 21: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Threat

• Any possible event, action, process or phenomenonthat can potentially inflict damage on system resources

Page 22: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Relation between Vulnerability and Threat

Page 23: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Real Life Case Study – European Space Agency

•Ariane 5 Rocket – 10 years and $ 7 million

•Capable of placing a pair of three-ton satellites intothe orbit.

•Launched on 04 Jun 1996

Page 24: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Immediately after launch, Ariane 5exploded

Case of the explosiona very small computer programtrying to stuff a 64-bit number into a16-bit space

See it: http://s.freissinet.free.fr/videos/ariane5.wmv

Page 25: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Vulnerability Classification

Vulnerabilities can be classified as follows:

• Design Vulnerabilities

• Implementation Vulnerabilities

• Configuration or Operational Vulnerabilities

Page 26: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Design Vulnerability

• When the vulnerability is said to be inherent to theproject or design

• Very difficult to detect and eliminate as it isinherent to the project

• Proper implementation of the product will not getrid of the flaw

• Example - TCP/IP protocol stack vulnerability

Page 27: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Implementation Vulnerability

• When an error is introduced into the componentsof a system, during the implementation stage of aproject or algorithm, they are termed asImplementation Vulnerabilities.

• Error could be hardware based or software based.

• Example – Buffer Overflows

Page 28: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Configuration Vulnerability

• Also known as Operational Vulnerability.

• Introduced into the system when the administratorresponsible does not perform the properconfiguration or sometimes leaving the defaultconfiguration on.

•Example - Not disabling unwanted services,allowing weak passwords

Page 29: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Attacks

• an assault on system security that derives from anintelligent threat.

• an intelligent act that is a deliberate attempt toevade security services and violate the securitypolicy of a system

•Example - denial of service attacks, penetrationand sabotage

Page 30: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Difference between Attack and Security Event

• Attack - the intruder aims at achieving a particularresult which could be against the implied securitypolicy

• Event – No rules are violated or broken

Page 31: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Attack Components

• Attack realization tool – Example - PortScanner• Vulnerability – Exploit a known vulnerability• Security Event – actions on target system• Result of the Attack - When an attacker isable to exploit vulnerability and has generated asecurity event

The results of an attack may vary depending uponthe security event and vulnerability chosen.

Page 32: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

ATTACKER

TARGET

PERFORMS ATTACK

General Attack Model

Page 33: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

The attacker and target represent the same entity

ATTACKER AND TARGET

ARE ON THE SAME

ENTITY

Page 34: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Attack Model Categories

• Traditional Attack Model

• One-to-one Attack Model

• One-to-many Attack Model

• Distribution Attack Model

• Many-to-one Attack Model

• Many-to-many Attack Model

Page 35: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Traditional Attack Model

• Attack always originate from a single point.

• Single – tier architecture

• There is only a single layer between the attackerand the target.

Page 36: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

One-to-one (traditional attack model)

• The attacker and target is having a one-to-onerelationship.•Attack originates from a single machine.

Page 37: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

One-to-many (traditional attack model)

• The attacker and target is having a one-to-manyrelationship.

•Attack originates from a single machine, but morethan one target is there

Page 38: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

One-to-many (traditional attack model)

Page 39: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Distributed Attack Model

• Based on many-to-one and many-to-manyrelationship.

• Source of the attack is more than one entity.

• The attack packets originate from intermediatesystems compromised by the attacker.

Page 40: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Many-to-one (Distributed attack model)

• The attacker and target is having a Many-to-onerelationship.

•Attack originates from more than one machine.

•There is only one target

Page 41: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Many-to-one (Distributed attack model)

Page 42: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Many-to-many (Distributed attack model)

• The attacker and target is having a Many-to-manyrelationship.

•Attack originates from more than one machine.

•There are more than one target

Page 43: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Many-to-many (Distributed attack model)

Page 44: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Distributed attack

• Reconnaissance – searching for suitable host.

• Compromise the system – installing backdoors

• Attack Initiation – start the attack using thecompromised system.

Page 45: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Distributed attack - Agents

• Two types of special agents•Masters / Servers•Daemons / Clients

•Zombie – compromised systems where agents areinstalled.

•Distributed attacks implement a three tierarchitecture

Page 46: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Distributed attack - Advantages

• Attack Effect – devastating effect as attackoriginates from multiple locations.

• Anonymity – provides high level of anonymity tothe attacker.

• Hard-to-stop attacks – Very difficult to stop theattack without bringing down or disconnecting thetarget system

Page 47: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Intruder

• Also known as attacker – first element in theattack model.

•person who attempts to gain unauthorized accessto a system, to damage that system, or to disturbdata on that system

•attempts to violate Security by interfering withsystem Availability, data Integrity or dataConfidentialit

Page 48: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Intruder Types

•Black Hat Hacker

•Hacker spies support by Govt

•Cyber Terrorist

•Corporate Spies

•Professional Criminals

•Vandals

Page 49: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Incidents

•violation or imminent threat of violation that

could or results in

•a loss of data confidentiality,

•disruption of data or system integrity, or

disruption or denial of availability

•An incident must clearly be a breach of network

security.

Page 50: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSAttack Framework

Examples of Incidents

• DoS

• Malicious Code

• Unauthorized Access

• Inappropriate Usage

Page 51: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

Intrusion - any unauthorized system or network

activity on one (or more of) computer(s) or

network(s)

Intrusion detection systems (IDSs) are software

or/and hardware based systems that detect

intrusions to your network / host based on a number

of telltale signs.

Page 52: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

Two types of IDS:

•Active IDS –

•attempt to block attacks

•respond with countermeasures

•alert administrators

•Passive IDS –

•merely log the intrusion

•create audit trails

Page 53: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

IDS can provide the following information onattempted or actual security events

•Data destruction

•Denial-of-service

•Hostile Code

•Network or system eavesdropping

•System or network mapping and intrusion

•Unauthorized access

Page 54: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

Types of IDS

•Host - based Intrusion detection system (HIDS)

•Network-based intrusion detection system

(NIDS)

•Hybrid Intrusion Detection Systems

Page 55: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

HIDS

•Resides on the host

•They scan log files – OS log files, application

log files etc

•If the log files are corrupt, HIDS is not effective.

•The scan output is logged into secure database

and compared to detect any intrusion.

Page 56: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

Types of HIDS

• Operating System Level – Works on OS log

files.

•Application Level – Works on application level

log files.

• Network Level – works on packets addressed

to or sent from a host.

Page 57: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

Advantages of HIDS

• Cost Effective

• Additional Layer of Protection.

• Direct control over system entities – works on

packets addressed to or sent from a host.

Page 58: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

NIDS

• IDS responsible for detecting in-appropriate,

anomalous, or any other kind of data which may

be considered unauthorized or inappropriate for

a subject network

• Pattern based

HIDS – Combination of HIDS and NIDS

Page 59: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

IPS

• Sophisticated class of network security

implementation that not only has the ability to detect

the presence of intruders and their actions, but also

to prevent them from successfully launching any

attack.

• Incorporate the security features of firewall

technology and that of intrusion detection systems

Page 60: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

IPS Categories

• Host IPS (HIPS)

•Loaded on each PC and server

• Network IPS (NIPS)

•Component that effectively integrates into your

overall network security framework.

Page 61: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

Benefits of HIPS

• Attack Prevention

• Patch Relief

• Internal Attack propagation prevention

• Policy enforcement

• Regulatory requirements

Page 62: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

NIPS - Places sensors as L2 forwarding devices.

Page 63: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

Main difference between IDS and IPS – packet

dropping.

Dropping of packets – Categories

•Dropping a single packet

•Dropping all packets for a connection

•Dropping all traffic from a source IP.

Page 64: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

Page 65: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

Defense in Depth.

• Also known as Elastic defense.

• Military strategy that seeks to delay rather than

prevent the advance of an attacker.

• Represents the use of multiple computer security

techniques to help mitigate the risk of one

component of the defense being compromised or

circumvented.

Page 66: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

Defense in Depth

•Attacker has to penetrate a series of layered

defenses

• Each layer is equipped with the suitable defense

• The delay provides the security staff with the time

to respond to the attack.

Page 67: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

Defense in Depth

Page 68: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

IDS & IPS Analysis Scheme

•A baseline is first set.

•Baseline - known value or quantity with which an

unknown is compared when measured or assessed

•A group of network activities / characteristics are

categorized as baseline for an IDS system

•Anything outside baseline - malicious

Page 69: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

Network Activity Baseline

Variance from

the Baseline

activities

Page 70: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

IDS Analysis

• Process of organizing the various elements of

data related to IDS and their inter-relationships to

identify any irregular activity of interest.

Page 71: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

IDS Analysis

Divided into 4 phases:

• Preprocessing

• Analysis

• Response

• Refinement

Page 72: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

Detection Methodologies

• Rule based Detection

• Also known as Misuse Detection or Signature

detection or pattern matching.

• First scheme used in earlier IDS

• process of attempting to identify instances of

network attacks by comparing current activity

against the expected actions of an intruder

Page 73: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

• Anomaly Detection

• Also known as profile-based detection

•A profile is created for each user group on the

system.

•The profile created is then used as a baseline

to define user activity.

•If network activity deviates from baseline, alarm

is generated.

Page 74: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

• Behavior Anomaly Detection

• Looks for anomalies in user behavior.

• Characteristics dependent rather than

statistical.

Page 75: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

• Network Behavior Anomaly Detection (NMAD)

• Also known as traffic anomaly systems

• Process of continuously monitoring a

proprietary network for unusual events or trends

• Basically statistical rather than characteristics.

Page 76: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

• Protocol Anomaly Systems

• Look for deviations from the set protocol

standards.

• Primarily characteristics based.

• Not very reliable and generates false positives.

Page 77: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

• Target Monitoring Systems

• Look for modification of specified files or

objects.

• More of a corrective control.

•Creates crypto checksum for each file.

•This checksum is compared at regular intervals

to detect any changes.

Page 78: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

Heuristics

• Still in its initial stages

• Refers to the use of AI in detecting Intrusions.

• AI scripting language is used to apply the

analysis to the incoming data.

Page 79: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

Hybrid Approach

• Any system that uses a combination of the

above mentioned analysis

Page 80: Computer Security and Intrusion Detection(IDS/IPS)

IDS/IPSIntroduction to IDS and IPS

Some Myths

•IDS and IPS are two separate solutions

•IDSs and IPSs will catch or stop all network

intrusions

•IDS give too many false positives

•IDS will eventually replace firewalls.

•Few Security Admins are required if you deploy

an IDS