Intrusion Detection Methods and Resolutions James Logan jlogan

advertisement
Intrusion Detection Methods and Resolutions
James Logan
jlogan@uccs.edu
Abstract—This document provides
The network setup rests on the
information in regards to network
shoulders of the network administrators.
intrusion detection techniques and
It is their responsibility to ensure that the
resolutions. It is recommended that
network is secure. Normally, the
the reader have a familiarity with
following actions are taken when
basic network technology and
installing and maintaining a network:
architectures.
- Install the system
I. INTRODUCTION
The responsibility of the a
- Configure the system
- Constantly check the configuration
network system’s architecture, hardware,
- Set correct permissions
software, security and the integrity of
- Bring the system online and monitor
those components falls in the hands of
any user or process that may be running
the system’s administrator or network
- Protect the system from unauthorized
operator. In terms of security it
and malicious users
necessary to protect these systems from
- Check data integrity
intrusions. An intrusion is defined as
- Repair the system if broken
actions that attempt to compromise the
integrity, confidentiality, or availability
The system administrator should also
of a particular resource [1]. In the
consider using the Least Privilege
following sections of this paper, the
Principle. This idea dictates that a user
focus will be on the techniques and
or program should only operate using the
resolutions for network intrusion
minimum set of privileges needed to
detection.
perform their/its job. In addition, it is
necessary for the administrators to be
II. THE SYSTEM ADMINISTRATOR
informed about security bugs and issues
and hope they can be discovered and
Cons:
resolved quickly.
- Compromise between security and
III. THE FIREWALL
The fire wall is seen as the first
usability due to too much control or
blocking
line of defense when it comes to
- Is unable to prevent insider attacks
intrusion detection. It controls
- Could be a source of a bug or exploit if
connections and traffic leaving and
installed on a server
coming in to a network. However it
- If a port is not under the control of the
does have a downside. The first issue is
firewall, it can be used to hack the
that it can cause a substantial increase to
system.
the load of the system which can cause a
decrease in performance and efficiency.
IV. INTRUSION DETECTION
However, this would not be a problem if
SYSTEM
the network device was only a firewall.
The implementation of an
The second reason is that no program is
intrusion detection system (IDS) can be
perfect. Eventually an attacker can find
considered a defense in depth approach
some kind flaw in the program and
to securing a network when a firewall
exploit it. Overall the firewall does have
has been already established. The
its pros and cons which are:
addition of an IDS adds security to a
network where the firewall cannot. This
Pros:
includes protection from internal attacks
and network channels that are not
- Can filter connections before they are
established
monitored by the firewall.
An IDS implementation has a
- Can log, filter, redirect, discard, and
simple technique basis that it uses when
reject packets based on rule set.
it comes to controlling a system’s
- Can be modified in real time to adapt
security and reliability when working
to different situations even if it has to be
with a firewall:
done manually.
- Prevent Intrusions – System policies
should not be too restrictive nor should
they cause an overload to the system. If
will block the traffic, thereby effectively
the firewall is bypassed or a flaw allows
rendering the alarm a false one [2].
an attacker to exploit and penetrate the
Internal Deployments are
firewall the IDS will act as the back up
designed such that all links are
to the firewall.
monitored within the network which in
- Detect the Intruder – An IDS needs to
return adds additional security. The
be to trace the movements, actions, and
IDSs are placed at switching nodes in
the source IP of the intruder.
the local network and near the access
- Response to Intrusions – An IDS
routers at the network boundaries. The
needs to be able to respond to intrusions
advantage of this setup is that it will
by either blocking rogue traffic or
reduce the false alarms posed by Early
automatically or notifying an
Warning Mode setup since it does not
administrator to handle the issue [1].
have to monitor the traffic blocked by
With these three basic concepts comes
the firewalls. However the major
three basic network architectures when
drawback is that multiple instances of a
configuring and IDS system which are
IDS will require a greater effort in
Early Warning Mode, Internal
regards to maintenance. The Internal
Deployments, and Every Host.
Deployments of IDSs are popular in
Early Warning Mode applies an
ecommerce back end networks that
IDS to the outside perimeter of the
consist of web, mail, storage, and
network firewall. The major benefit of
database servers because it adds
this approach is that the IDS is able to
increased security to the local network.
see all network traffic on the high speed
In addition, it has the ability to keep an
links. In addition, management,
infected server to infect other servers on
signature updates, and configuration are
the network [2].
much easier for the network
The final basic IDS configuration
administrator. However, the major
is the Every Host configuration. This
drawback to this setup is that it cannot
setup basically states that every host on
detect internal attacks within the
the network will have IDS software
firewall. It is also possible that the IDS
and/or hardware running on the machine.
will raise an alarm while the firewall
However, there more drawbacks than
there are benefits. The only key benefit
matching or pattern matching with
is that that IDS is not integrated into the
regular expressions to determine the
operating system and that it can be
payloads content. The algorithm for the
remotely managed from a central
IP packet header parsing is based on the
location. In contrast, the first drawback
concept of Deterministic Finite
is that management of the IDS systems
Automaton (DFA) or Ternary Content
especially on a large network can be
Addressable Memories (TCAM) [2]
complex. It is also possible that the host
where as the payload parsing requires
itself will be unaware of network traffic
more over head due to the fact that the
going through other links which could
every byte in the payload must be
lead to Distributed Denial if Service
examined and compared to a string or
attacks. Another disadvantage is the
regex matching rule.
extensive use of access gateways that
One of the earliest algorithms for
dynamically assign IPs to local hosts.
IDS is the Aho-Corasick algorithm. It is
The limited scope of the IP addresses,
designed to be an efficient algorithm that
sometimes can make it difficult for the
can perform multiple string matches in a
host based IDS to effectively trace the
time linear to the size of the input. The
route of the packet which affects its
algorithm has two basic
detection mechanism and capability [2].
implementations. The first type is the
Deterministic Finite Automaton (DFA)
V. SIGNATURE BASED IDS
Packets inbound or circulating
which is straight forward. A set of
comparison strings is used to create a
around a network are normally scanned
state machine by which a character by
against a database of known malicious
character evaluation is performed against
signatures contained by the IDS. The
a packet’s content. The Non-
signatures contain information that is
Deterministic Finite Automaton (NFA)
compared to a packet header and its
implementation of the algorithm has a
content. For the packet’s header, the
similar premise but has a little more
IDS inspects the source and destination
flexibility since it allows character
IPs as well as the ports. With the
comparisons to be done in multiple
packet’s content, an IDS will do string
stages. The idea is that on a failure to
transition to the next state a link is added
minimal impact to resources on the
to the current node to a failure point on
network. The hardware devices used
another path based on the longest prefix
would have two major characteristics:
of the node. This adds an additional
- limited amounts of on chip storage
amount of freedom in how the string is
require that an NFA be used to keep the
processed.
number of transition status used to a
The second type of Signature
minimum.
Bases IDS is the regular expression.
- the hardware would exploit a high
Regular expressions seem to be the
degree of parallelism by encoding
preferred method when it comes to
automata in the parallel logic resources
examining a packet’s content. This is
[2].
because regular expressions are more
efficient and offer more flexibility than
other exact string matching algorithms.
VI. ANOMALY BASED IDS
As a contrast to signature based
The increase in flexibility comes from a
IDS methods, Anomaly Based IDS
high degree of expressiveness achieved
methods focus on pattern recognition,
by using character classes, union,
deviations in network traffic analysis,
operational elements, and closures [2].
and machine learning. With this notion,
The efficiency increase comes from the
comes three basic concepts:
effective schemes to perform string
- Statistically Based Detection
matching [2]. However there is a
- Machine Learning
performance issue when using the
- Data Mining Algorithms.
regular expressions on a network IDS.
Statistically anomaly based
The regular expressions use tremendous
detection focuses on deviations in
amounts memory and can drastically
network traffic based in terms of volume
slow down network with all of string
of number of bytes, packets, IP
matching operations be executed
addresses, and ports. This type of
simultaneously. Therefore individuals
mechanism is useful to detect significant
have proposed specialized hardware to
network traffic changes. One of the key
implement automata algorithms to
features of the statistically based
enable high parse rates while keeping a
detection is that it can be easily
augmented to a signature based detection
everyday operational uses. The
system. However, its major drawback is
characteristics are forms of benefits,
that it can produce many false positives.
limitations, and exploitations.
Machine learning is based on an
IDS benefits consist of being
application automatically learning
able to measure and analyze abnormal
through input and feedback from the
traffic patterns such as high volume
network. One of the key factors is that
flows, load imbalances, and changes in
the algorithms used are focused on
demands of certain ports being used.
improving the reductions in false
Other benefits include detection of
positives and increasing performance in
known worms, viruses, and security
network traffic analysis. One of the
holes. In addition advanced IDSs can
most used methods in the Bayesian
use pattern recognition as a means to
network model. It is a graphical model
detect security threats or false positives
that assigns a probabilistic relationship
before they occur. Overall, one of the
between variable of interests.
most important benefit of IDSs is their
The third basic anomaly based
IDS is Data Mining. The Data Mining
algorithms take input which is either real
ability to enforce security policies in a
network.
However, IDSs do have
time or archived and performs analysis
limitations. It has been argued that IDSs
on the data set. The analysis usually
are just mere workarounds for security
consists of patter matching and deviation
flaws and weak or missing security
detect of network traffic. One of the
mechanisms [2]. IDSs tend to also
benefits of this approach is that it can
create false positives depending on
construct profiles of normal and
which kind of basic network architecture
anomaly based traffic patterns.
is being implemented. There are also
performance issues in regards to regex
VII. KNOWN BENEFITS,
LIMITATIONS, AND COMPUTER
VULNERABILITIES
IDS systems overall have their
own characteristics when it comes to
mechanisms that examine a packet’s
content. They can create bottlenecks in
the system and decrease throughput.
Another limitation that IDSs have is with
packets whose content is encrypted. The
IDSs’ signatures more or less become
these issues if properly implemented.
useless and the system does not know
However, there is a drawback. An IDS
how to handle the packet. In addition,
would have to be aware of what types
there is evidence that attackers can
programs are running on computers all
manipulate attacks in such way by
the time. This would create a bottle
varying the frequency that packets are
neck in the system which decrease
sent so that the IDS can not match
throughput of network traffic.
against a probability or statistical model.
Finally, IDSs do have the ability
to apply preventative maintenance to
VIII. SNORT
SNORT is an open source IDS
systems on a network that have
that was developed by Martin Roesch
vulnerabilities . One of them is buffer
1998. Over there years through
overflow. Another is the Input
community involvement, SNORT has
Validation Error. This is where the
evolved into an enterprise like IDS. It
Computer does not check the packets
has the ability to perform real time
content for correctness or integrity
traffic analysis and packet logging on IP
which can lead to an unauthorized access
networks. In addition, it can perform
to system. There is also the Boundary
protocol analysis, content
Condition Error which is similar to a
matching/searching, and can be used to
Input Validation Error whereby the
detect attacks and probes such as stealth
system crosses over a security boundary
port scans and CGI attacks [4].
which results in a system crash. Some
SNORT uses a high performance
examples are divisions by zero and
multi-rule inspection engine for
malformed SQL statements. The other
detecting rule matches during packet
major concern is the Access Control
processing. The inspection of the
Vulnerability. The access control
packets in performed in three stages:
implemented by the computer may be
- Rule optimization to produce rule sets
faulty which could lead to unauthorized
for inspection
access by users and access to remote
- Set based inspection algorithms that
machines in other domains. A well
perform high speed multi-pattern content
equipped IDS has the ability to deal with
searches
- Parameterized inspection techniques
Overall an IDS can improve the
which allow for complicated parameter
security of a network. However the
inspections [3]
network administrator must realize that
The preferred pattern matching
there is a potential cost for having an
algorithm that SNORT uses is the Wu-
IDS. The greatest potential cost is
Manber. The algorithm uses less
performance vs security. The tradeoff
memory than the Aho-Corasick but lacks
will dictate how secure or fast the
a little bit in performance by
network is (improved security for lower
comparison. It uses a hashing to create
performance and vice versa). In
sub-groups of rules, and set based Bad
addition, the network administrator must
Word Shifts to accelerate the search by
take into account the type of network
providing a byte skipping feature [3]. In
architecture to be used in order to obtain
addition the Bad Word Shift feature can
the capability of an IDS. On that note,
improve the algorithms performance
an IDS is not perfect. They are complex
when rule sets have a larger minimum
systems that use sophisticated algorithms
pattern size [3]. In general, when
to determine security risks to a network.
choosing the pattern matching algorithm
They can create false positives and be
the developers took into account the
totally useless when it comes to
following issues:
encrypted traffic depending on the
- Intrinsic Algorithmic Performance
algorithm used. However, IDSs can
Characteristics (Performance is rule
always be updated with new profiles and
driven or data driven)
performance features that give an extra
- CPU Architecture Performance
edge when dealing with a network’s
(Memory access costs, cache miss costs,
security.
relative shift/add/compare/jump
operation costs)
- Compiler and Optimizations Used
- Application Memory Requirements and
Platform Limits [3].
IX. CONCLUSION
REFERENCES
[1]
Stefano Marinelli, Analysis of
Intrusion Detection Tools and
Tecjniques, December 12, 2002,
Available:
http://dragas.dyndns.org/~draga/articles/
IDS/index.php
[2]
Sailesh Kumar, Survey of
Current Network Intrusion Detection
Techniques, Available:
http://www.cs.wustl.edu/~jain/cse57107/ftp/ids.pdf
[3]
Marc Norton and Daniel Roelker,
SNORT 2.0 Hi-performance Multi-rule
Inspection Engine, April 2004,
Available:http://www.cs.ucdavis.edu/~w
u/ecs236/sf_snort20_HPMRIE.pdf
[4]
About SNORT,
Available:http://www.snort.org/about_sn
ort/
Download