The Pseudo-Internal Intruder: A New Access Oriented Intruder Category A Thesis Presented to The Faculty of the School of Engineering and Applied Science University of Virginia In Partial Fulfillment of the Requirements for the Degree Master of Science (Computer Science) By Brownell Kerr Combs May 1999 The Pseudo-Internal Intruder ii Approval Sheet This thesis is submitted in partial fulfillment of the requirements for the degree of Master of Science (Computer Science) ______________________________________________________ Author’s Name This thesis has been read and approved by the Examining Committee: ______________________________________________________ Thesis Advisor ______________________________________________________ Committee Chairman ______________________________________________________ Accepted for the School of Engineering and Applied Science: ______________________________________________________ Dean, School of Engineering and Applied Science May, 1999 The Pseudo-Internal Intruder iii Abstract Intruders attack both commercial and federal distributed systems frequently, and often successfully. The problem of intruders has become critical. The most effective defense today is the use of intrusion detection systems, because it is widely considered to be impossible to build complicated distributed systems that completely prevent unauthorized intrusions. Since 1980 the intrusion detection community has divided intruders into two categories based on the intruder’s access to a system. Internal intruders have legitimate access through user accounts; external intruders break into a system without benefit of a user account. The proliferation of distributed systems with complex networks has necessitated a reexamination of intruder definitions. When the notion of internal and external intruders was defined, systems were largely stand-alone computers – typically contained in a single area sometimes with remote peripherals. Today computers are part of networked, distributed systems that may span multiple buildings sometimes located thousands of miles apart. The network of such a system is a pathway for communication between the computers in the distributed system. The network is also a pathway for intrusion. We define a new category, the pseudo-internal intruder. This new category encompasses intruders without user accounts who circumvent the perimeter defenses of a modern distributed system and attack the system via its network. In contrast, external intruders attack a system from the outside through a system’s perimeter defenses. Having a pseudo-internal category is useful because it gives the intrusion detection community a framework in which to clearly describe the capabilities of the pseudo-internal intruder, defend against the pseudo-internal intruder, and develop techniques for detecting the pseudo-internal intruder. The Pseudo-Internal Intruder iv Acknowledgments I would like to thank my advisor, Dr. Anita Jones, not only for her guidance and support during the thesis process, but her help and advice with my career. I would also like to thank Bob Sielken for thought provoking discussions on the topic of intruders, Andy Lowe for help with the case study network and technical proofreading, Chris Milner for advice on numerous tasks around the department, and Peggy Reed for always being willing to lend a hand. I also appreciate the flexibility of my employers at SAIC, Robert Schlansker, Dave Carothers, and William Baugh, in allowing me to split time between work and school. Thanks and love to Melissa Meehan and Craig Hille for their support and making my time in Charlottesville much more enjoyable. Lastly, I send my love and appreciation to my mother, father, and stepfather for all of their support and unconditional love since I departed for boarding school some 9 years ago. I could never have achieved this without you. The Pseudo-Internal Intruder v Table of Contents APPROVAL SHEET ...................................................................................................................................II ABSTRACT ................................................................................................................................................ III ACKNOWLEDGMENTS.......................................................................................................................... IV TABLE OF CONTENTS ............................................................................................................................. V FIGURES .................................................................................................................................................... VI TABLES ..................................................................................................................................................... VII CHAPTER 1: THE PSEUDO-INTERNAL INTRUDER ..........................................................................1 1.1 1.2 1.3 1.4 1.5 1.6 INTRODUCTION.................................................................................................................................1 LITERATURE SURVEY .......................................................................................................................2 APPROACHES TO CATEGORIZING INTRUDERS ...................................................................................6 DEFINITIONS .................................................................................................................................. 10 A NEW ACCESS ORIENTED INTRUDER CATEGORY ......................................................................... 18 THE PSEUDO-INTERNAL INTRUDER: A DISTINCT CATEGORY? ....................................................... 21 CHAPTER 2: CAPABILITIES OF THE PSEUDO-INTERNAL INTRUDER .................................... 24 2.1 2.2 TOOLS AND TECHNIQUES USED BY THE PSEUDO-INTERNAL INTRUDER ......................................... 24 DANGERS OF THE PSEUDO-INTERNAL INTRUDER ........................................................................... 31 CHAPTER 3: SECURITY RECOMMENDATIONS .............................................................................. 39 3.1 3.2 3.3 3.4 DEFENDING SYSTEMS AGAINST THE PSEUDO-INTERNAL INTRUDER .............................................. 39 DEFENDING THE DISTRIBUTED SYSTEM: PREVENTING INTRUDER ACCESS .................................... 43 DEFENDING THE DISTRIBUTED SYSTEM: MITIGATING INTRUDER ACCESS ..................................... 46 DEFENDING THE DISTRIBUTED SYSTEM: DETECTING INTRUDER ACCESS ...................................... 49 CHAPTER 4: CASE STUDY ..................................................................................................................... 52 4.1 4.2 4.3 4.4 4.5 4.6 4.7 4.8 INTRODUCTION............................................................................................................................... 52 THE TARGET SYSTEM..................................................................................................................... 53 THE PSEUDO-INTERNAL INTRUDER ATTACKS ................................................................................ 57 EXPECTED RESULTS ....................................................................................................................... 59 RESULTS OF ATTACKS ON TARGET SYSTEM – PHASE 1 .................................................................. 60 SECURITY CHANGES MADE TO TESTBED SYSTEM FOR PHASE 2 ..................................................... 65 RESULTS OF ATTACKS ON TARGET SYSTEM – PHASE 2 .................................................................. 68 SUMMARY ...................................................................................................................................... 72 CHAPTER 5: CONCLUSIONS AND FUTURE WORK ........................................................................ 75 5.1 5.3 CONCLUSIONS ................................................................................................................................ 75 FUTURE WORK ............................................................................................................................... 76 REFERENCES ............................................................................................................................................ 77 The Pseudo-Internal Intruder vi Figures FIGURE 1-1: PHYSICAL CONFIGURATION OF EXAMPLE NETWORK ..................................... 12 FIGURE 1-2: NETWORK CONFIGURATION OF SAME NETWORK FROM FIGURE 1-1 ......... 17 FIGURE 1-3: BOX DIAGRAM OF INTRUDER CATEGORIES ......................................................... 19 FIGURE 2-1: IPV4 PACKET HEADER .................................................................................................. 25 FIGURE 4-1: NETWORK CONFIGURATION OF PHASE 1 TESTBED SYSTEM.......................... 55 FIGURE 4-2: NETWORK CONFIGURATION OF PHASE 2 TESTBED SYSTEM.......................... 67 The Pseudo-Internal Intruder vii Tables TABLE 4-1: NODES IN TESTBED DISTRIBUTED SYSTEM............................................................. 53 The Pseudo-Internal Intruder Chapter 1: The Pseudo-Internal Intruder 1.1 Introduction Each day intruders attack numerous distributed systems. A 1996 report estimated that Department of Defense systems alone are attacked on average over 680 times per day [GAO96]. The report further estimated that as many as 65 percent of those attacks were successful in gaining access to sensitive information. More than 99 percent of all respondents reported at least one security incident in one recent survey [Pow99], while 78 percent of organizations responding to a 1996 survey reported financial loss from security breaches [DV97]. The Computer Emergency Response Team (CERT) annual reports show a 67 percent increase in security incidents handled annually by CERT from 1994 to 1998 [CER94, CER98]. The problem of successful intrusions is not expected to end any time soon. Most experts believe that it is not practically possible to build a complex distributed system that is completely secure. Even if some new development allowed such a system to be created, the vast installed base of vulnerable systems would guarantee a lengthy transition period during which intrusions would still occur [Sun96]. For these reasons security experts advocate the use of intrusion detection systems. Developers of intrusion detection systems, and those responsible for network security of distributed systems, face the difficult task of defending against an ever changing set of potential intrusions. Each day new attack tools and techniques are developed and it is increasingly difficult for system administrators and intrusion detection system developers to stay ahead of malicious computer users (witness the recent success The Pseudo-Internal Intruder 2 of the Melissa e-mail virus [CNN99]). Any framework that helps such administrators and developers to understand and classify potential intruders is useful in the struggle to protect distributed systems. Chapter 1 of the thesis introduces the topic of intruder categories, describes the evolution of intruder categories, and defines important terms and explains aspects of network security that are required to discuss the pseudo-internal intruder. Chapter 1 concludes with a definition and explanation of the pseudo-internal intruder as a new and distinct access oriented intruder category. Chapter 2 lists the tools and techniques available to pseudo-internal intruders and the threat represented by such intruders. Two example intrusion scenarios illustrate the threat of the pseudo-internal intruder. Chapter 3 describes an overall strategy that can be used to defend distributed systems against pseudo-internal intruders. Chapter 4 contains the results of a case study illustrating the effectiveness of the defensive strategy outlined in chapter 3. Chapter 5 contains the conclusions of the thesis and speculates on interesting future work. 1.2 Literature Survey In 1980 J.P. Anderson introduced the concept of intrusion detection [And80]. Anderson proposed a “security surveillance system” involving formal examination of a system’s audit logs. In examining the system threats, Anderson also introduced the notion of categorizing intruders based upon their access to a system. He noted that in “considering the threat problem, the principle breakdown of threats is on the basis of whether or not an attacker is normally authorized to use the computer system.” Internal intruders were defined as those with permissions to access the system and external The Pseudo-Internal Intruder 3 intruders were those without any permissions. Therefore the external intruder category included not only outsiders from other organizations, but anyone with physical proximity to the computer system, but without user access to the computer system. It is important to note that when Anderson wrote his report there were very few distributed systems. In fact, the report that introduced the concepts of intrusion detection and access oriented intruder categories was an actual study of a customer’s single computer system, “the purpose of which was to improve… computer security…” Therefore, it is easy to see why Anderson chose not to differentiate between outsiders and those with physical access, but without authorized user access to the computer system. Whether through tapping wire communication (outsider) or physical access to a terminal (employee without permissions) the best that either could achieve was a login prompt. Both groups of intruders had to deal with the same technical barrier: the system’s access control security measures. By the mid 1980s the landscape was, however, changing. Distributed systems were becoming predominant over single computer systems. That change started a debate in the network security field as to what changes should be made to existing security principles to adapt them to distributed systems. In 1985 Anderson claimed that “network security issues can be handled with the same concepts that apply to single computer systems” [And85]. Anderson’s opinion appeared to be in the minority. Nessett argued that “a strong case [could] be made that distributed systems admit important security issues that either are not applicable to stand-alone systems or are assumed to be rarely relevant… [Such] issues add extra dimensions to the distributed system security problem and invalidate The Pseudo-Internal Intruder 4 attempts to simply extend existing concepts into the area of distributed system security” [Nes87]. Others pointed out that any protection mechanism residing in a single computer becomes insufficient when a computer is connected to a network because those mechanisms cannot protect the security of communication across the network [LS90]. Such distributed systems require a security enforcement mechanism for the network in addition to any mechanisms residing on single machines [LS90]. There was, however, no dispute that both stand alone and distributed systems needed real time intrusion detection. In her paper introducing a new intrusion detection model, Denning argued that “developing systems that are absolutely secure is extremely difficult, if not generally impossible. [Additionally], even the most secure systems are vulnerable to abuse by insiders who misuse their privileges” [Den87]. Denning’s model of intrusion detection was an adaptation of Anderson’s original idea of utilizing audit logs for intrusion detection. Since “exploitation of a system’s vulnerabilities involves abnormal use of the system,” intrusions can be detected by monitoring audit logs and other indicators for abnormal patterns of system usage [Den87]. Denning’s model of intrusion detection is considered to be the beginning of the second generation of intrusion detection which was more statistically sophisticated, addressed distributed systems, and provided some real time alerts [JS99]. This second generation of intrusion detection systems is divided into two approaches: anomaly detection and misuse detection. Intrusion detection systems based on anomaly detection characterize the correct behavior of a system and then detect wrongful changes to that correct behavior. Misuse detection systems characterize known ways to penetrate a system and then monitor for those misuse characterizations to appear. This progression The Pseudo-Internal Intruder 5 of intrusion detection can be more closely followed in a number of recent surveys of intrusion detection techniques and products [CH96, Lun93, Sun96, JS99]. A majority of intrusion detection experts currently believe that the best intrusion detection system will contain both anomaly detection and misuse detection mechanisms. One such intrusion detection system that includes both anomaly detection and misuse detection mechanisms is the Next-generation Intrusion Detection Expert System (NIDES) [AFV95]. NIDES contains a statistically dynamic anomaly detector to catch internal intruders masquerading as legitimate users. A profile consisting of more than 30 different criteria (such as CPU usage and typical amounts of input and output) is maintained for each user. User actions are matched against that individual’s profile and “when the observed activity departs from established patterns of use for an individual” alarms are raised by the intrusion detection system [SRI97]. The mechanism is statistically dynamic (as opposed to static) since NIDES adapts each user’s profile over time. If a user’s habits change slowly over time, the profile will be adapted to the new behavior without raising alarms. Profiles can also be created for workstations, remote hosts, groups of users, or particular application programs [JS99]. NIDES also contains an expert system misuse detection to “detect attempts to exploit known security vulnerabilities of the monitored systems and intruders who exhibit specific patterns of behavior that are known to be suspicious or in violation of site security policy” [SRI97]. NIDES observes the system and compares its observations to a rule database of known intrusion scenarios and attack patterns. The security experts that created NIDES initially constructed the rule database, but the system administrator of the system NIDES is protecting can customize the database. The Pseudo-Internal Intruder 6 Even though it is accepted that distributed systems require different security mechanisms than stand-alone systems, the intruder categories defined for stand-alone systems are still in use. Many modern intrusion detection system research papers still describe the threat of intruders as non-authorized (external) and authorized (internal) users [IKP95]. Recall that in Anderson’s seminal paper he only evaluated the threat of an intruder with respect to whether the intruder had authorized user access to the computer. As discussed, this made perfect sense when considering a stand alone computer. But with the proliferation of the distributed system, this way of categorizing intruders should be reexamined for distributed systems in a manner similar to the reexamination of security concepts. 1.3 Approaches to Categorizing Intruders There are two main approaches to classifying intruders. The first is to simply separate intruders into categories based on their access to a system. An example of this approach is the previously discussed traditional pair of categories: external and internal intruders [And80]. The external intruder is an outsider who has no authorized access to the system and must gain access by compromising the system’s security. The internal intruder is one who already has limited access to the system through an authorized user account. An internal intruder can either be a legitimate user or an outsider who is successfully masquerading as a legitimate user. The second approach categorizes intruders not by access to a system, but by the method of attack used by the intruder. One example of such an approach divides all attacks into three modes: outside, within, and below [Neu98]. Attacks from the outside The Pseudo-Internal Intruder 7 come from above or laterally at the same abstraction level. These types of attacks can be unprivileged intrusions where a security flaw was exploited to allow access with no authorization required. Attacks from within are obtained with the privileges of the given level. That is, the attack originates from a privileged user or an outsider successfully masquerading as a privileged user (through password cracking, etc). Attacks from below are at a lower layer of abstraction. These attacks are either hardware or operating system based and can require some unusual physical access to the system. One example of this type of attack would be connecting a hardware sniffer to the network to gather information. Both approaches have their disadvantages with respect to their use in describing intruders. The traditional access oriented approach of splitting all intruders into external and internal categories is too simplistic since it was originally designed for solitary machines where everyone either did (internal) or did not (external) have a user account on that machine. When one replaces the solitary machine with a distributed system, the issue of defining an intruder’s access becomes much more complicated. Distributed systems can have multiple levels of users on multiple machines, complex trust relationships between machines, the network infrastructure connecting the machines, and quite often connections to other uncontrolled networks (even including the Internet). Compare the complexity illustrated above to a solitary machine with a single operating system where each individual is either a user or a non-user without an account, and the increased vulnerabilities become obvious. The nature of the more complicated distributed system introduces many new vulnerabilities and ways in which an intruder might access the system. It is often stated The Pseudo-Internal Intruder 8 by experts that system security for distributed systems is fundamentally more complex than it is for stand-alone systems [Nes87]. Therefore extending security concepts developed for stand-alone systems to distributed systems is often not practical [Nes87]. Yet many continue to use only the traditional internal and external access oriented categories, even though it is clear that the transition to networked systems has increased the kinds of access to a distributed system as well as the possible range and complexity of attacks that intruders might attempt. When considering access to a distributed system, defining an intruder as either external or internal has become an ambiguous definition. Since neither has a user account, a janitor damaging network equipment or an Internet hacker attempting to break through a firewall are each considered external intruders. The problem is that in a distributed system the external and internal categories include so many kinds of access to the system that referring to an intruder as either of the categories is no longer distinctive enough. Attack oriented categorization can also present an ambiguity problem, but one of a different type. The problem is that a single intruder can often attempt attacks from more than one category (outside, within, and below). An example of such ambiguity would be an authorized user on a UNIX machine (internal intruder) running a software sniffer (attack from below), exploiting a FTP bug (attack from within), or using that machine’s privileges to gain access to other machines (security/logic flaw, attack from outside). If the system administrator only knows that just one of these attacks occurred it may be difficult to determine the source of the attack. Depending on a machine’s configuration, it is sometimes possible that both authorized users of the machine and nonusers connected to the machine can exploit certain FTP bugs to gain root access. If no The Pseudo-Internal Intruder 9 effort is made to identify the type of access, but only the type of attack, the system administrator of the above machine will not know whether the machine was hacked from the outside or if the intruder is internal, i.e. an authorized user. So while the attack oriented approach may be useful for some purposes, it is not the best choice to unambiguously define intruders. The most effective approach to categorizing intruders is to modify the existing access oriented approach to account for the complications of distributed systems and all that has been learned through examinations of attack methods such as the attack oriented categorization approach. In order to discuss intruders in unambiguous terms this modification of the traditional access oriented categorization must seek to create more numerous, but distinct, access oriented categories. The access oriented approach will become less ambiguous as categories are added, while the addition of categories to the attack oriented approach will not change the fact that a given intruder can launch attacks from more than one category. To this end we define and analyze a new distinct category of intruder. The pseudo-internal intruder is the intruder who has the system access to launch many of the attacks that did not exist prior to distributed systems and which are difficult for external or internal intruders to utilize. The end result of defining the pseudo-internal intruder will be a framework in which the scientific intrusion detection community can clearly describe the capabilities of the pseudo-internal intruder, develop techniques for detecting the pseudo-internal intruder, and consider defenses against the pseudo-internal intruder. The Pseudo-Internal Intruder 10 1.4 Definitions Without clear definitions it would be impossible to adequately convey the different types of access to and within a system. Since this thesis defines intruders based on their access, it is important to have these precise definitions for most aspects of a typical distributed system environment. A distributed system is an interconnection of two or more computers over a network. Modern distributed systems often contain many more than two computers as well as other hardware devices that facilitate digital communication, network maintenance, and security. The network is the backbone used by elements of a distributed system to communicate. Since most distributed systems interface with other distributed systems or the Internet, a particular distributed system’s network will sometimes be referred to as an internal network to distinguish it from other networks. It is important to note that our definition of a distributed system is different than the classic definition of a distributed system. For the purpose of this thesis, we are including systems that some would consider networked systems into our definition of a distributed system. We are also assuming that any distributed system is reasonably setup with respect to functionality and security. There is little point in discussing distributed systems with no network traffic at all (no functionality) or no defenses to protect it from intruders (no security measures). Each distributed system has an owner that is the single administrational and operational authority. The owner has the ultimate responsibility of maintaining the distributed system. Owners of large distributed systems often designate operational authority over all or parts of the system to system administrators who adhere to both a The Pseudo-Internal Intruder 11 functionality policy and a security policy. The owner of the system creates both policies. A functionality policy dictates what purpose a distributed system is supposed to serve. A security policy states what security measures are to be used in a distributed system. When combined, these two policies control the balance between functionality and security (i.e. additional security is usually at the cost of functionality). Each network contains network devices that facilitate communication between machines by managing and directing the flow of packets of information bound from one machine to another. For our purposes we will divide network devices into two types: routers and hubs. Routers are network devices that selectively forward packets based upon the intended destination of the packet. For example, if a router has three choices of directions to forward a packet, it will only forward the packet in directions of intended recipients (instead of all three directions). Hubs are network devices that forward packets without selectivity. A hub forwards each packet to every device connected to the hub. Every distributed system has a physical configuration that includes all of the hardware used in the distributed system as well as the location of each hardware item. This not only includes computers, but peripherals like printers and scanners, network devices such as routers and hubs, as well as all networking cable. In short, anything that is connected to the internal network of a distributed system, including the hardware that constitutes the interconnections, is part of its physical configuration. The physical configuration can be geographically represented on a three dimensional map based upon the physical location of all the hardware. The physical perimeter of a distributed system is a three dimensional geographic boundary such that no hardware item of the physical configuration is outside the The Pseudo-Internal Intruder 12 boundary. With the exception of hardware items used to create a connection with a system outside the physical perimeter, all of the physical elements of the entire distributed system are inside the physical perimeter. Such hardware items used to make connections with other systems can reside on the physical perimeter, but never outside it. Physical perimeter defenses protect the hardware items of the physical configuration from unauthorized access. These defenses are designed to prevent unauthorized persons from ever crossing the physical perimeter. Examples of physical perimeter defenses include guards, fences, locked doors, and even lead shielding around cables. Figure 1-1: Physical Configuration of Example Network Figure 1-1 shows the physical configuration of an example distributed system that is connected to the Internet and one other external distributed system. All of this distributed system’s hardware is surrounded by the physical perimeter. The internal network consists of several network devices (a router and two hubs), four machines, and The Pseudo-Internal Intruder 13 a printer. One of the machines is connected to a modem, but the modem is not yet connected to a phone line. It is useful to define distributed systems to have a network configuration that is a representation of how all elements of the physical configuration are connected and interact with each other. When drawn graphically, it shows the digital pathways connecting each piece of hardware (a node) in the physical configuration, but does not show physical size, distance, or geographic location. Since the network configuration also specifies the ways in which the elements of the configuration use the pathways to communicate with each other, network protocol stacks and segmentations of a network are aspects of the network configuration. A network protocol is a definition of how two or more nodes on the network will communicate [Tan96]. A network protocol stack is a collection of network protocols chosen by the system administrator to be used in a particular distributed system [Tan96]. A segment of a network is a collection of elements that only receive network traffic intended for one of the nodes in the segment. The network perimeter is the separation between a distributed system’s internal network and the outside world. The outside world to any given distributed system is anything outside either its physical or network perimeter. Similar to the physical perimeter, the network perimeter encompasses all nodes and digital pathways of the internal network. The network perimeter does, however, not exist in physical space like the physical perimeter. The network perimeter is merely a conceptual boundary separating the internal network from all other networks (anything in the outside world). The physical perimeter encompasses the actual physical location of each hardware component in the physical configuration. The Pseudo-Internal Intruder 14 A network perimeter defense is anything at the outside connects that serves to detect and prevent unauthorized access to the distributed system. An outside connect is a point on the network perimeter that allows two-way communication between the distributed system and the outside world. There are three different types of network perimeter defenses: firewalls, audit tools, and authentication packages. Firewalls are software packages or pieces of hardware that limit the network traffic passing through the network perimeter into the internal network of a distributed system. The restrictions on network traffic can range from letting nothing at all through to letting virtually all traffic into the internal network. The restrictions are set based upon the requirements of a distributed system’s functionality and security policies. For example, if the owner of a distributed system decides to host web pages than can be seen by users of the Internet then at least certain traffic related to that web service must be let through the firewall. Audit tools record all or part of the network traffic activity observed by the tool. The amount and kinds of traffic recorded are dictated by the functionality and security policies of the distributed system in question. An audit tool might be programmed to record all communication originating from outside the network perimeter, but not communications originating from inside the network perimeter. System administrators of large distributed systems must often limit the information recorded by audit tools because the sheer volume of all traffic would require large amounts of disk storage that are not practical. Authentication packages control access to a distributed system’s internal network from outside the network perimeter through user accounts and passwords. Owners of a distributed system can allow authorized users that are located outside of the network The Pseudo-Internal Intruder 15 perimeter a higher level of access. Authenticating the identity of the person attempting to connect to the internal network securely allows this higher level of access for particular users. The process is very similar to logging into a network from inside the network perimeter. There is also a unique case of an outside connect that needs to be defined. The rogue outside connect is an outside connect which exists unbeknownst to the owner of the distributed system that it connects to the outside world. Rogue outside connects are elements of the network configuration, but are not in the owner’s perception of the current network configuration of a distributed system. This means that they cannot be assumed to have any of the network perimeter defense mechanisms usually associated with outside connects. The most likely way for a rogue outside connect to occur is when unauthorized hardware becomes part of the physical configuration without the knowledge or permission of the system administrators. One example would be if an employee brought a modem to work and connected it to their desktop computer. If that desktop computer is connected to the network then it is a part of the system’s physical configuration and a node of the network configuration. Attaching a new piece of hardware to the computer, like the modem, is adding a new piece of hardware to the physical configuration. Connecting a phone line to that hardware item (the modem) already connected to the network creates an outside connect. The modem would allow someone from outside the network perimeter of the system to dial into the modem and gain access to the network through the computer the modem is attached to. Since system administrators are unaware The Pseudo-Internal Intruder 16 of this outside connect, the desktop computer does not have the appropriate network perimeter defenses. Another example of a potential rogue outside connect can be created by an unauthorized or misconfigured remote network management device. An administrator must manage network devices like hubs and routers by reconfiguring them as changes are made to a system’s network configuration. This management of network devices is normally done from a remote location like a central network operations center. Remote network management devices allow communication between a network device and a remote system administrator. The most common example of a remote network management device is a modem connected to a particular network device like a router. Since communication between the management device and the remote manager is not done through the normal pathways of digital communication in the distributed system, remote network management devices require an entirely different set of security features as opposed to normal network perimeter defenses. If a remote network management device has been installed without the knowledge of the system administrators, then these special network perimeter defenses have not been set up. Therefore, the remote network management device would be a rogue outside connect. The Pseudo-Internal Intruder 17 Figure 1-2: Network Configuration of Same Network from Figure 1-1 Figure 1-2 shows a network configuration of the same sample distributed system from figure 1-1. Notice how different the physical and network configurations can appear since one is based on the physical location of hardware and the other is not. The internal network is surrounded by a network perimeter separating the internal network from the outside world. The Internet and the other distributed system are connected to the internal network by an outside connect that is guarded by a firewall. Also notice that the modem has now been connected to an outside telephone line. Assuming that the system administrators do not know about the modem, that connection forms a rogue outside connect. The Pseudo-Internal Intruder 18 1.5 A New Access Oriented Intruder Category As has been discussed, the problem with having only two categories is that intruders with varying degrees of access to a system are combined into the same category. When the concept of internal and external intruders was defined in 1980 systems were largely stand-alone computers. Therefore, those concerned with intrusions were mainly focused on the damage rogue users could do (internal intruders). Not only was it difficult for an external intruder to gain access to a single guarded room, but there was little such an intruder could do without a user account. In fact, there was such focus over internal intruders that the internal intruder category was further broken up into three subcategories (masquerading, clandestine, and legitimate) while the external category was basically defined as ‘anything not internal’ [And80]. Today most systems are large distributed systems running over complex networks. Such a change from stand-alone systems to networked, distributed systems necessitates a reexamination of categorizing intruders. The scientific intrusion detection community must consider the differences between a traditional external intruder attacking a system from outside the network perimeter and one attacking the system from inside the network perimeter. This thesis will examine these traditionally external intruders who have access inside the network perimeter of a distributed system, but do not have any of the privileges granted to authorized users. These intruders are called pseudo-internal intruders. The Pseudo-Internal Intruder 19 Figure 1-3: Box Diagram of Intruder Categories The pseudo-internal intruder is an intruder who has circumvented network perimeter defenses and gained access to the network of a distributed system without utilizing any user accounts. The primary difference between the pseudo-internal intruder and the external intruder is that the pseudo-internal intruder has completely bypassed, not broken through, any network perimeter defenses. Therefore system administrators relying solely upon network perimeter defenses to notify them of intrusions will have no knowledge of the existence of a pseudo-internal intruder. A pseudo-internal intruder must gain access to a distributed system’s network without using an outside connect since all outside connects are monitored by network perimeter defenses (i.e. the intruder must get inside the network perimeter without encountering network perimeter defenses). There are two ways to gain this unique type of access: either by violating the physical perimeter to get physical access to the hardware of the distributed system or by accessing the network configuration through a rogue outside connect. Recall that because the existence of a rogue outside connect is not known by a system’s owners, it is not monitored by any of the network perimeter defenses normally used to guard outside connects. Therefore, as far as system security is The Pseudo-Internal Intruder 20 concerned, an intruder accessing the system through a rouge outside connect is, in effect, inside the network perimeter. Using a rogue outside connect does not require the intruder to violate the physical perimeter since the rogue outside connect could be the result of system administrator misconfiguration or users of the system not following security policy. In such cases the pseudo-internal intruder could gain knowledge and use of the rogue outside connect without ever violating physical security to create that rogue outside connect. Based on these two means of access pseudo-internal intruders can be divided into two sub-groups: intruders with physical access to some part of a distributed system’s physical configuration, and intruders with access to a rogue outside connect. The first sub-group is made up of both insiders and outsiders. Insiders are those who by virtue of an association with the owner of a distributed system can personally cross the physical perimeter. Insiders could have access to a wiring closet or perhaps just have a networked computer on their desk. Examples of insiders are system administrators, users of the system, support and cleaning staff, physical security personnel, or even contractors working inside the physical perimeter. Outsiders are intruders who gain their access to the distributed system’s physical configuration by violating the physical perimeter through either subterfuge or force. An example of subterfuge might be an outsider illicitly crossing the physical perimeter by posing as a legitimate insider. Or the outsider may choose to use force and break through the physical perimeter by simply breaking into a building. The second sub-group, those that use rogue outside connects, can avoid having to contend with any physical perimeter defenses. Note that a rogue outside connect would The Pseudo-Internal Intruder 21 not include normal dialup or Internet access that passes through any authentication system. Remember that the key aspect of rogue outside connects is that they do not pass through any network perimeter defense mechanisms that might log identity (no user logins) or prevent access. Although an intruder may be dialing in to an unauthorized modem from a location outside the physical perimeter, the access gained is the equivalent of being inside the network perimeter of the system. 1.6 The Pseudo-Internal Intruder: A Distinct Category? Any newly proposed access oriented intruder category must be examined to determine if it is truly distinct from the traditional internal and external categories, or merely a sub-group of an existing category. At first, it intuitively seems that a pseudointernal intruder might be a sub-group of the internal intruder category. Since such an intruder is inside the network perimeter of the system is certainly seems that they are more ‘internal’ than ‘external’. One must remember, however, that the fundamental definition for an internal intruder has always been an intruder who has at least limited user privileges in the system. Next, consider whether it makes more sense to define pseudo-internal intruders as a sub-group of external intruders. Problems arise with this approach. The first is that the access of pseudo-internal intruders allows them to launch attacks that are unavailable to any intruder faced with network perimeter defenses such as an Internet hacker (the most infamous type of external intruder). While other differences between pseudo-internal intruders and those intruders outside of the network perimeter will be explained later in the thesis, it is sufficient to note one such difference here to illustrate why the attacks are The Pseudo-Internal Intruder 22 so dissimilar. It is very difficult to attack a state-of-the-art distributed system from outside the perimeter and not be detected irregardless of the success of the attack. An unsuccessful attack on a distributed system will leave evidence in the audit logs since audit tools would record the network traffic involved in the attack. Since an unsuccessful intruder never gains access, the intruder has no chance to influence the audit tool to prevent it from reporting the attack. Even if an external intruder is successful in gaining access to a distributed system it is likely that audit tools will record the successful attack. Several recent audit tools are constructed to observe and record the contents of incoming traffic without interacting with the rest of the internal network [ODS98]. Even an intruder that is successful in breaking through network perimeter defenses may be recorded by an audit tool that the intruder has no way of interacting with to delete any evidence of an intrusion. Even older audit tools are designed so that it is difficult to remove particular information from audit logs without deleting the entire log (i.e. absence of any audit log will serve as evidence of an intrusion). This problem of being detected regardless of whether the intruder gains control of a machine or not is not something that affects the pseudo-internal intruder. Considering the differences in access to a distributed system, making pseudointernal intruders a sub-group of external intruders would make calling an intruder ‘external’ an ambiguous statement. For example, such a combination would make an ‘external intruder’ be both an Internet-based hacker and an employee passively harvesting information from inside the perimeter. Not only does this make the phrase ‘external intruder’ potentially ambiguous, it doesn’t make sense. As has been discussed above, the access of the pseudo-internal intruder is not external to the system at all. The Pseudo-Internal Intruder 23 While the unique access of the pseudo-internal intruder is not equivalent to that of either a traditional internal or external intruder, it is definitely closer to being internal. Hence, the name pseudo-internal and not pseudo-external. Due to the pseudo-internal intruder’s lack of user privileges and dissimilarities with other traditional external intruders, it is a distinct access oriented category and not a sub-group of one of the two existing categories. Our real motivation for carefully defining this new category is because it can be the basis for better understanding of, defense against, and detection of the pseudo-internal intruder. The following section will describe the unique tools and techniques and the behaviors of the pseudo-internal intruder. Example scenarios of theoretical pseudointernal intruders will help to illustrate the dangers to a distributed system represented by such intruders. Later sections will describe ways of detecting and defending against the pseudo-internal intruder. The Pseudo-Internal Intruder 24 Chapter 2: Capabilities of the Pseudo-Internal Intruder 2.1 Tools and Techniques Used by the Pseudo-Internal Intruder The unique aspect of the pseudo-internal intruder category is access to the internal network from inside the network perimeter. It has been pointed out that accessing the network of a distributed system from inside the network perimeter allows pseudo-internal intruders to avoid the auditing and security measures of network perimeter defenses. But what does this mean with respect to a distributed system’s security? What can a pseudointernal intruder do that makes him or her such a unique threat? It is helpful to first review the tools and techniques that pseudo-internal intruders can utilize prior to explaining the threat and behavior of such intruders. Familiarity with these tools will lead to a better understanding of such threats since many of the unique abilities of pseudo-internal intruders derive from the ability to use such tools in ways that no other kind of intruder can. There are four kinds of tools and techniques that pseudo-internal intruders can use: network assessment tools, packet sniffers, exploits (that do not require user accounts), and denial of service attacks. 1. Network assessment tools gather information about the network configuration and report on potential vulnerabilities of a distributed system. In passive mode, these tools gather network configuration information by examining the packets passing the assessment tool’s location on the network. Each packet has a header that contains certain information about the packet depending on the protocol stack in use in a distributed system. For example, the header for an IPv4 packet (figure 2-1) contains the source and destination of the packet, the relative age of the packet, and the type of service the packet desires from the network. IPv4 packets may also contain the security level of the packet, The Pseudo-Internal Intruder 25 the path that the source wanted the packet to follow, the path that the packet actually followed, and a timestamp from each router the packet traversed. Figure 2-1: Ipv4 Packet Header [Tan96] Network assessment tools correlate the information gathered from observing packet headers and can build a picture of a distributed system’s network configuration. This picture can include not only the routes between nodes in the network configuration, but details like which nodes send and receive the most traffic, and what services the traffic is being directed to (FTP, HTTP, Telnet, etc.). In active mode, network assessment tools not only examine passing packets, but send out queries over the network. These queries attempt to identify the presence and type of any device on the network. Most network assessment tools contain databases of vulnerabilities per operating system and network service. Once the tool finds evidence that indicates some device it is scanning may have one of the vulnerabilities in its database, the tool reports this fact to the pseudo-internal intruder. Some tools also explain how the vulnerability could be exploited. For example, the network assessment tool may send a request to use the FTP service on a targeted machine. The version The Pseudo-Internal Intruder 26 number of the FTP service available on the targeted device is then checked against the tool’s internal list of FTP versions that contain known vulnerabilities. Perhaps the targeted device is running one of the FTP versions that are susceptible to an attack where anonymous users can crash the service and retrieve the shadow password file from the core dump created by the crash. The shadow password file could then be cracked to recover user account names and associated passwords on the target machine. In addition to any information gained from packet headers, all of the FTP vulnerability information would be reported to the pseudo-internal intruder using the network assessment tool. 2. Packet sniffers record each packet that passes by the sniffer’s location on the network. In contrast to network assessment tools that scan packet headers, packet sniffers are used to read and record the contents of the packet. Dumb packet sniffers simply collect the packets and store them in memory for a human to later examine the raw data. There are, however, intelligent packet sniffers that are programmed to look for particular pieces of information such as network account names and passwords. Often these intelligent sniffers simply discard packets that do not appear to contain the particular information for which the sniffer is searching. For this reason, intelligent packet sniffers can run longer before human intervention is required because they store information more selectively, recording less than the total amount of information passing the sniffer. Dumb packet sniffers must be periodically checked or swapped out or else the memory will become full and new packets will either be discarded or written over already stored packets. The frequency with which the dumb sniffer must be checked depends on the memory available to the sniffer and the volume of network traffic on the target system. The Pseudo-Internal Intruder 27 Packet sniffers can either be programs run on a normal computer attached to the network (software sniffers) or autonomous devices built only to analyze network traffic (hardware sniffers). Hardware sniffers are much more expensive, but have the advantage of being completely passive. Because it is custom designed, the hardware sniffer can analyze passing traffic without producing any output at all. This lack of output is unlike a computer running a software sniffer because the computer will often have to register itself with the network or have its own unique network identifier even to receive packets (having an IP address is an example of this in a IP based network). A highly skilled pseudo-internal intruder can create a software sniffer that is totally passive (like a hardware sniffer), but this requires a customizable operating system, like Linux, and a high degree of knowledge about operating systems as well as pseudo-internal intrusion techniques. 3. An exploit consists of the steps required to take advantage of a given vulnerability in a network device (router, hub, etc.) or a machine. An intruder must perform certain actions to successfully attack a target machine or device. These actions are usually sequential and can be thought of as a series of steps. By executing the correct steps in the correct order, a vulnerability can be exploited. The Ping of Death attack is one example of an exploit. It was found that sending an abnormal sized (very large) ping packet to machines running the operating system Windows95 would crash the machine. The following steps are required to execute the Ping of Death exploit: Intruder discovers the IP address of the machine to be attacked. Intruder sends an oversized ping packet to the target IP address. Targeted machine crashes upon receipt of the oversized ping packet. The Pseudo-Internal Intruder 28 While a rather simple exploit, the Ping of Death is very effective against machines that have not been updated with the Microsoft security patch that eliminates the Ping of Death problem. 4. Denial of service attacks are those that degrade the functionality of one or more machines by preventing the machines from communicating over the internal network. These are not direct attacks against target machines, but indirect attacks against the machines’ ability to communicate. For example, the Ping of Death is not a denial of service attack since it directly targets a vulnerability in a machine’s operating system. Denial of service attacks are popular because they require less skill than exploiting vulnerabilities and are extremely difficult to defend against. The attacker does not have to determine the vulnerabilities of a target machine’s software and what steps are require to exploit those vulnerabilities. From a functional viewpoint, denying the target machine the ability to provide service to other machines is the equivalent of taking the machine down by gaining control of it. Recall that any distributed system has a functionality policy that dictates the purpose of the system. If a denial of service attack prevents the distributed system from fulfilling its purpose, then the pseudo-internal intruder has succeeded. There are two types of denial of service attacks: network saturation, and traffic misdirection. Network saturation is the process of flooding the network with useless traffic so that legitimate requests for service can not reach the target machine. This is the easiest type of denial of service attack, as it only requires access to the network configuration, of which the target machine is a node. While there are different methods The Pseudo-Internal Intruder 29 of network saturation, the most common is to direct a machine on the same internal network as the target machine to continuously output packets. Traffic misdirection is the interception or diverting of network traffic intended for the target machine. One example of traffic misdirection is IP spoofing. IP spoofing is a process by which an intruder convinces other computers on the network that his or her machine is in fact the target machine. In this way no request for service is ever received by the target machine. IP spoofing does, however, require more technical expertise than network saturation. Certain exploits and denial of service attacks have been automated in hacker programs. Hacker programs are computer programs that attack target machines by attempting preprogrammed exploits or denial of service attacks. The advantage of such a program to a pseudo-internal intruder is that very little knowledge of the exploit steps or vulnerabilities is required of the user. The user simply directs the program to attack certain machines and it takes action accordingly. The disadvantage is that hacker programs are usually only preprogrammed with one or two exploits or denial of service attacks. Hacker programs will not be effective if the targeted machine does not have any of the exact vulnerabilities for which the hacker program has exploits or denial of service attacks. An example of a hacker program is WinNuke for Windows. WinNuke attempts the Ping of Death exploit against any number of machines as directed by the user. All the user has to do is install the program and direct it to attack a machine. No knowledge of the Ping of Death packet size or what commands are used to send a Ping of Death packet is required. The Pseudo-Internal Intruder 30 It is also important to note why pseudo-internal intruders can use these four tools and techniques more effectively than external intruders can. In each case, security provided by the network perimeter defenses prevents external intruders from effectively using these tools and techniques. Network assessment tools and packet sniffers are not effective from outside the network perimeter of a target system because the bulk of packets transmitted over a network are not intended for destinations outside of the network perimeter and are not transmitted outside the network perimeter. Network perimeter defenses, like firewalls, only permit packets intended for destinations in the outside world to cross the network perimeter. With only the traffic intended for the outside world to sample from, network assessment tools and packet sniffers would only be marginally useful. Network perimeter defenses are also often configured to reject the queries of active network assessment tools. This prevents active network assessment tools from gathering any information about the internal network. These same network perimeter defenses would prohibit denial of service attacks or exploits against any device inside the network perimeter. Any time a firewall detects a critical volume of traffic targeted for the internal network, it simply refuses to pass on that traffic. Such an attack would prevent other machines in the outside world form communicating with the distributed system, but machines inside the network perimeter would not be prevented from communicating with the target machine or any other machine inside the network perimeter. While there are other tools and techniques used by intruders, these four categories are the only ones that apply to pseudo-internal intruders [Bou98]. A pseudo-internal intruder has two choices upon gaining access to a distributed system: listen to the system The Pseudo-Internal Intruder 31 (read) or try to effect some change upon the system (write). If the pseudo-internal intruder chooses to listen to the system then he or she can either read the headers of packets (assessment tools) or the body of packets (sniffers). If the pseudo-internal intruder decides to attack the system then he or she can either attack the machines on the network (exploits) or the network itself (denial of service attacks). New pseudo-internal intruder tools and techniques will surely be developed in the future, but they will fall into one of the above four categories characterized by reading or writing. 2.2 Dangers of the Pseudo-Internal Intruder Pseudo-internal intruders have two main courses of action: proactive and passive. Proactive actions create normal or excessive network traffic. The nature of these actions is to actively seek out information or effect some change on the network. Passive actions are those that contribute little or no network traffic to a distributed system’s internal network. By nature these actions attempt to contribute no traffic at all, but in some cases passive actions add small amounts of network protocol oriented traffic to the distributed system. For example, some protocols may require a machine to register its presence in order to communicate on the network. When the Dynamic Host Configuration Protocol (DHCP) is in use on a network, each computer must request an IP address from the DHCP server. The DHCP server grants a ‘lease’ to the requesting computer for a specific IP address. This exchange creates a small amount of network protocol oriented traffic. While it is possible for a highly skilled pseudo-internal intruder to avoid such protocol traffic, many potential intruders with pseudo-internal access will not be able to avoid The Pseudo-Internal Intruder 32 these small amounts of protocol traffic. Such traffic is, however, so minimal that it should not be considered proactive. A passive pseudo-internal intruder is limited to harvesting information passing through that segment of the network configuration on which the intruder is located. In order to gather this information, passive pseudo-internal intruders can only utilize tools that generate little or no network traffic such as packet sniffers and passive network assessment tools. Such information may be the actual data traveling over the network or it may contain clues about the details of the network configuration itself. Although there are not many different passive actions, the act of harvesting information can compromise the security of a distributed system. The data itself may be private or the information gained about the network configuration can lead to the discovery of vulnerabilities in the system. Passive actions are not available to the traditional external intruder since network perimeter defenses would prevent the escape of any information not intended for recipients outside the network perimeter. While it is possible for an internal intruder to utilize user account privileges to harvest information it is not really a passive action since the utilization of a user account creates normal network traffic. There is a greater chance that an internal intruder, rather than a passive pseudo-internal intruder, would be detected harvesting information because many intrusion detection systems that monitor user activity would detect the effects of a user running network assessment tools. The following example scenario of an intrusion will illustrate the danger represented by a pseudo-internal intruder using only passive actions. The main character in this example is an industrial espionage agent paid to covertly steal proprietary business information from a competitor. The agent believes that such information can be found in The Pseudo-Internal Intruder 33 the competitor’s distributed system. For information to be of value to the agent’s employer, the competitor can not know that such proprietary information has been stolen. Otherwise the competitor may pursue legal action or purposely invalidate the stolen information. The phrase target system will be used as a reference to any distributed system that is the attack target of any particular intruder being discussed. The agent therefore decides to forgo the risk of testing the network perimeter defenses of the target system and attempts to gain direct access to the network configuration. The agent is able to get a job as a custodian for a janitorial service that cleans the office building that houses the target system. While the agent’s new employee status does not grant access to restricted areas like server rooms, it does provide access to several closets that contain hubs and wiring for the target system’s network. These ‘wiring closets’ provide the agent with direct access to the physical configuration, and therefore the network configuration, of the target system without having to cross the network perimeter and contend with any network perimeter defenses. Because the agent’s goal is to gather proprietary information without being detected, he or she connects a hardware packet sniffer to the hub in one of the wiring closets. Depending on the style of the packet sniffer, it can be connected to an open port on the hub or coupled around a cable leading to the hub. The agent is able to cleverly hide the sniffer and leaves it there for several days. During this time the hardware sniffer records any packet that is transmitted on the segment which that particular hub is connected to. Since the hardware sniffer has a finite amount of memory in which to store the packets, the agent periodically replaces the hardware sniffer with another. The agent can then take each hardware sniffer to another location to examine the captured packets at The Pseudo-Internal Intruder 34 will. While the agent could leave a hardware sniffer in place indefinitely (simply switching them every few days), the choice is made to remove all hardware sniffers after a particularly critical high level communication is intercepted. The termination of the agent’s operation further decreases the chance that the owners of the target system will ever realize that proprietary information has been compromised. Soon after the removal of the hardware sniffer, the agent quits the janitorial service citing unhappiness with the job. The above industrial agent is an example of an outsider passive pseudo-internal intruder. This agent has accomplished the mission of compromising the target system while avoiding any perimeter defense (unlike an external intruder) and not using any user permissions at all (unlike an internal intruder). The entire attack consisted of passive actions that would likely go unnoticed by system administrators. Expensive hardware sniffers, like the one used by the espionage agent, can easily be designed to create no additional network traffic, while recording all passing network traffic. Recall that most software sniffers running on computers (cheaper than custom built hardware sniffers) create a small amount of network traffic that could be detected by system administrators. Other pseudo-internal intruders are willing to accept the risk of proactive actions. This allows the proactive pseudo-internal intruder a wider range of options including denial of service attacks, exploiting the vulnerabilities of machines on the network, use of hacker programs, and proactive network assessments. The character in the next scenario is a disgruntled data entry specialist, an unhappy employee working for the owners of the target system. This employee is angry about a lack of compensation. The situation has led the employee to attempt to disrupt the target system in contrast to the previously The Pseudo-Internal Intruder 35 mentioned example of an attempt to gather confidential information from a target system. The disgruntled employee will serve as an example of a proactive pseudo-internal intruder. The employee has decided to attack the computer responsible for payroll on the day that payroll checks are to be created. Although this employee does not have physical access to any areas like server rooms or wiring closets, he or she still has access to several network jacks where computers in the office are connected to the network. That office connection provides the employee with direct access to the internal network of the target system while circumventing any network perimeter defenses. Each office not only contains personal desktop computers for most employees, but several computers that are shared among all employees in each office. The shared machines require no user account since they are intended for word processing and Internet research, but not for users to log in to the network. In order to access shared network printers and the Internet, the shared machines are connected to the network and running the correct protocol stack for the network. Therefore, the machines can communicate on the network regardless of whether a user is logged in or not. In case any of his or her actions are detected, the employee decides to use one of the shared machines in the office. Since many different employees have access to the shared machine, it would be difficult for system administrators to connect any suspicious traffic coming from the shared machine to any single employee. The disgruntled employee begins the intrusion by running a network assessment tool on the shared machine, in order to gather information about the target system’s network configuration. The anonymity provided by using a shared machine encourages The Pseudo-Internal Intruder 36 the employee to direct the network assessment tool to conduct a proactive assessment. Preliminary information from the network assessment provides the IP address and name of the payroll server by intercepting traffic from the server. Such information allows the employee to direct the assessment tool to proactively gather information on that single machine. Focusing on a single machine decreases the amount of network traffic and hence, the likelihood that network assessment traffic will be detected by system administrators. The result from the network assessment tool is a detailed picture of the payroll server, including what services (FTP, Telnet, etc.) and versions of software and services the machine is running, and to what network nodes the machine communicates with and how often. Furthermore, assume that the assessment tool intercepted several user accounts and passwords transmitted over the network when users remotely logged into the payroll machine. One of those captured accounts was that of a user with administrative rights on the payroll machine. Such a user is a type of a local system administrator for that single machine. It is clear that, so far, the disgruntled employee can not be considered an external or internal intruder. The employee has not used any user privileges thus far, nor did the employee have to contend with any perimeter defenses. At this point it is possible that the employee will become an internal intruder by masquerading as the payroll server administrator mentioned above. The employee will likely be able to use the permissions of that account to delete everything on the payroll server. Such a move would likely destroy the data required to create payroll checks for that week. If the system administrator account had not been captured, the employee could continue to be a proactive pseudo-internal intruder and attempt to gain control of the machine by The Pseudo-Internal Intruder 37 exploiting some of the vulnerabilities that the assessment tool found. Yet another possibility would be to launch denial of service attacks against the machine to prevent it from communicating with other machines in the manner necessary to gather payroll data. The disgruntled employee scenario involves a single intruder having access to a distributed system that places the intruder in more than one access oriented intruder category. In this example, a pseudo-internal intruder harvested system administrator account information that would have allowed the intruder to log in as the system administrator. The disgruntled employee would still have the access of a pseudo-internal intruder, even after logging in as a system administrator and gaining access reserved to internal intruders. It is possible for a given intruder to start with or obtain more than one type of access to a target system, thus placing the intruder in more than one access oriented intruder category. Any intruder with more than one type of access (external, internal, pseudo-internal) to a distributed system is a multi-category intruder. The multi-category intruder is not a new concept brought about by the introduction of a third category to the traditional internal and external pair of intruder categories. For example, if an Internet hacker (external intruder) discovered a user account name and its password, then the hacker could log in to the target system as that user. Once logged in, the external Internet hacker would be taking advantage of user privileges, thus granting the hacker the access of an internal intruder. This use of user privileges would not eliminate the fact that the Internet hacker was still also outside the network perimeter of the system with the access of an external intruder. Since this example does not involve a pseudo-internal intruder, it appears that multi-category intruders exist whether one chooses to distinguish intruders by two or three categories. The Pseudo-Internal Intruder 38 This issue of multi-category intruders does, however, not affect the definition, detection, or defense against pseudo-internal intruders. Any intrusion against a target system can be connected to a primary form of access, which is the access actually used to complete the intrusion. Several of our examples illustrate such primary forms of access. Although the disgruntled employee captured the system administrator password using pseudo-internal access to the target system, if the employee attacked the payroll machine using the privileges of the administrator account then the employee is acting as an internal intruder. The attack on the payroll machine would be defined as an internal intrusion, and defending against the attack would require protection mechanisms designed to counter internal intruders. Likewise, assume for a moment that the disgruntled employee did not use the administrator account, and instead launched a denial of service attack against the payroll machine. That denial of service attack could not be defined as an internal intrusion since no user account was used. The attack would be a proactive pseudo-internal intrusion and would require defenses designed to thwart pseudo-internal intruders. The next section will describe the detection and defenses against such pseudo-internal intruders. The Pseudo-Internal Intruder 39 Chapter 3: Security Recommendations 3.1 Defending Systems Against the Pseudo-Internal Intruder One of our purposes in defining the category of pseudo-internal intruders is to provide a carefully defined framework in which to discuss defending systems against a pseudo-internal intruder. Most of the data gathered on network intrusion incidents indicates that internal intruders are responsible for the majority of network security incidents [Pow99]. In a recent survey of financial institutions the most expensive incident reported was the result of an internal intruder. One bank spent over 2 million dollars tracking down what they assumed to be an ‘Internet hacker’ that had stolen intellectual property only to find out it was a disgruntled employee [Mei99]. In actuality, many times that internal intruders are referred to, the statement applies to pseudo-internal intruders as well. For example, a recent network security incident at a Chinese bank was widely reported as an ‘internal’ or ‘insider’ job, when the intruders actually used pseudointernal tools and techniques [Reu98a, Reu98b]. The defense of systems against pseudointernal (and internal) intruders is clearly of growing importance. As network perimeter defenses get stronger, and they will, more intruders will be forced to attempt to circumvent the network perimeter defenses and utilize pseudo-internal tools and techniques. It is also important to explicitly examine defenses against pseudo-internal intruders since such defenses are so different from the average defenses used to combat internal or external intruders. Common intrusion detection systems designed to defend against internal intruders examine usage patterns of user accounts. These packages seek to discover unauthorized activity by existing user accounts since internal intruders The Pseudo-Internal Intruder 40 utilizing user accounts to attack a target system. Clearly, such packages designed to defend against internal intruders will have no effect against intruders that do not utilize user accounts (pseudo-internal intruders). Likewise, common external intruder intrusion detection systems do not affect the pseudo-internal intruder since the focus is on preventing the external intruder from penetrating the network perimeter. Since the pseudo-internal intruder is already inside the network perimeter, such network perimeter defenses do not detect or defend against pseudo-internal intruders. There are three steps to consider when attempting to protect a system against potential intruders: denying an intruder access to the distributed system, mitigating the consequences if an intruder does gain access to the distributed system, and detecting, monitoring, and recording any intrusions. Recall that, by definition, a pseudo-internal intruder has to have access to the digital pathways of communication that are part of the network configuration. Because the pseudo-internal intruder is our primary concern, this section will first address the issue of denying intruders access to the network configuration of a distributed system. Denial of access to the network configuration would entirely eliminate the possibility of pseudo-internal intruders from the system. We know, however, that experts caution against assuming that any defensive actions will totally preclude intruders from gaining access to a system. Therefore, we will secondly address the issue of minimizing the effect of pseudo-internal intruders who do gain access to the network configuration. Lastly, the issue of detecting, monitoring, and recording pseudo-internal intrusions will be addressed. The combination of these three steps provides an effective overall security strategy to defeat the pseudo-internal intruder. The Pseudo-Internal Intruder 41 Prevention of access to the network configuration has two aspects: perimeter defenses and physical configuration control. The objective of perimeter defenses is to stop as many intruders as possible at the perimeter in order to deny them access to any part of the distributed system. We will only be concerned with physical perimeter defenses since pseudo-internal intruders entirely circumvent network perimeter defenses. While network perimeter defenses play a vital role in distributed system security, they do not protect against threats already inside the network perimeter and have no bearing on a discussion about pseudo-internal intruders. Since there is a distinct possibility that perimeter defenses will fail in stopping all intruders, it is necessary to protect each component of the network configuration from unauthorized access. Physical configuration control is any process by which the owners of a distributed system ensure that no unauthorized hardware can be introduced to the physical configuration and that authorized hardware is not used for unauthorized actions. In effect, physical configuration control places some type of barrier around each component of the physical configuration to prevent intruders from accessing such components or adding their own pieces of hardware to the configuration. Such a barrier to unauthorized use can include security measures like frequent inspections as well as traditional physical and digital barriers. The second step in the overall system defense against pseudo-internal intruders is limiting the abilities of pseudo-internal intruders that do gain access to the network configuration by adequately controlling the network configuration. Network configuration control is the manner in which the network configuration is managed to ensure the highest degree of security, while complying with functionality requirements. The Pseudo-Internal Intruder 42 Remember that the network configuration not only includes all of the hardware of the physical configuration and the avenues of digital communication, but the protocols used for communication, and the way that communication is segmented. The network configuration not only dictates the path communication follows, but how nodes in the distributed system are allowed to communicate. By correctly managing such protocols, network attributes, and segmentation, system administrators can make it more difficult for pseudo-internal intruders to utilize and gather information from the network configuration. The ways in which network configuration control can be practiced will be further explained in the next section. There is always the possibility that all attempts to deny pseudo-internal intruders access to the network configuration will fail. Successful pseudo-internal intrusions should be identified and located as soon as possible. The process of network configuration monitoring, the last piece of overall system security, continuously observes all aspects of the network configuration searching for evidence of intruders. Successful monitoring of the network configuration will alert system administrators to take immediate action to prevent further damage to the distributed system. The following sections will further explain each of the three steps of defending a distributed system against a pseudo-internal intruder. Additionally, examples of each method of defense will be offered to illustrate ways in which the method can be implemented. The Pseudo-Internal Intruder 43 3.2 Defending the Distributed System: Preventing Intruder Access Since chain link fences and armed guards do not contain any programs or data communication ports, physical perimeter defenses are theoretically one of the easiest and straightforward forms of computer security. In practice, physical perimeter defenses are, however, one of the hardest forms of security to implement effectively. Typically, the more restrictive physical perimeter defenses are, the less efficient any workforce hampered by such physical perimeter security policies becomes. For example, only allowing system administrators access to areas with machines (the most secure physical perimeter defense) would not allow other employees to utilize the system (totally ineffective workforce). Few physical configurations of large, practical distributed systems reside within a physical perimeter that does not also contain the offices of many employees and users of the system. The other practical drawback to physical perimeter defense is that many of the possible pseudo-internal intruders have legitimate reasons to cross the physical perimeter. Both example scenarios involved such insider pseudointernal intruders. When the industrial espionage agent took a job as a legitimate custodian, he or she was entitled to access within the physical perimeter of the target system. While the agent’s duplicity may have eventually been discovered, the gambit of being hired as a custodian provided sufficient time to compromise the target system. Likewise, the disgruntled employee certainly was entitled to access within the physical perimeter of the target system. It would be unrealistic to expect a physical perimeter defense to not only prevent access by unauthorized persons, but also to also prevent access by authorized persons planning on committing unauthorized actions, while still allowing harmless authorized persons access. The Pseudo-Internal Intruder 44 Physical configuration control is the second aspect of preventing pseudo-internal intruders from gaining access to any part of a distributed system’s network configuration. Recall that any practical physical perimeter defense will still allow legitimate employees, and those successfully masquerading as legitimate employees, access to the facilities housing the target system. To prevent intruders who are able to cross the perimeter from accessing the network configuration, physical configuration control measures protect each component of the physical configuration to further decrease the chance of unauthorized access. With respect to physical configuration control, components of the physical configuration can generally be broken down into three groups: avenues of communication (network cabling), communication facilitators (network devices), and end points (workstations and servers). Each of these types of components has a unique manner in which it can be individually protected. Running network cabling through some type of conduit is one way to protect it. Lead conduit is normally used because lead is an excellent inhibitor of signals. Lead conduit makes it more difficult for pseudointernal intruders to use devices to monitor the traffic on encased network cabling. Additionally, conduit that had been breached would be more easily observable to those inspecting the physical configuration for signs of tampering or unauthorized devices. For fiber optic network cables there are more advanced solutions like motion detectors and devices that monitor any disturbances of the fiber optic cable [Gri95]. Network devices can be protected by locking the device in metal casing if located in a relatively insecure area like a wiring closet. Like encasing network cable in lead conduit, securing the network device would make it more difficult for pseudo-internal The Pseudo-Internal Intruder 45 intruders to monitor signals going in or out of the network devices, or to connect unauthorized devices to the network configuration. Lastly, the workstations and servers must also be encased against monitoring and unauthorized use. Since it is unrealistic to have all machines encased in metal, it is possible to require that all desktop computers have power-on passwords and screen saver passwords to prevent anyone but the designated user of that machine from using it to gain access to the network configuration. Power-on passwords require the user of a machine to enter a password before the machine will perform any function, including booting the operating system or accessing the floppy disk drive. Computers can be configured so that a screen saver activates any time that the computer is not in use for a certain period of time (usually 5-15 minutes). A screen saver password requires the user to enter a password before the screen saver will deactivate and allow the machine to be used again. Measures can also be taken to ensure that all hardware complies with the Transient Electromagnetic Pulse Emanation Standard (TEMPEST). Without taking special precautions, intruders can gather information by monitoring the electromagnetic emanations coming from hardware. TEMPEST technology can be used to prevent intruders from being able to remotely gather information from network hardware. There may, however, be legal implications depending on the country in which the network is setup. A good explanation of TEMPEST, including both offensive and defensive aspects and legal issues, can be found in [Eck85] and [Sel90]. Physical configuration control not only utilizes barriers to protect each component of the physical configuration, but also is the process by which that protection is inspected and monitored for violations. In this way, physical configuration control ensures that no The Pseudo-Internal Intruder 46 barrier to unauthorized access has been violated and no unauthorized devices added to the physical configuration. Verification of physical configuration integrity is usually achieved by educating the users of the system not to introduce unauthorized hardware and continuously inspecting the physical configuration for unauthorized hardware. If any unauthorized device is found it is either removed or receives the appropriate security measures. This kind of inspection of the physical configuration aids in the discovery and removal of unauthorized devices like packet sniffers that may have been placed in the physical configuration by pseudo-internal intruders. Such inspections also address the problem of rogue outside connects. Recall that rogue outside connects are created when unauthorized hardware is added to the physical configuration. Such unauthorized hardware can create an outside connect unbeknownst to the system administrators. These unauthorized outside connects do not have network perimeter defenses and are rogue outside connects. Physical configuration control inspections identify unauthorized hardware. In this way, any rogue outside connect discovered is either removed or becomes a normal outside connect protected by network perimeter defenses. 3.3 Defending the Distributed System: Mitigating Intruder Access Network configuration control measures are designed to make it more difficult for a pseudo-internal intruder with access to the system to execute a successful attack. If network configuration control measures prevent a pseudo-internal intruder from listening to information (reading) from the target system or affecting change (writing) on the target system, then there is little the pseudo-internal intruder can do. The Pseudo-Internal Intruder 47 Therefore, the first aspect of network configuration control is designing the configuration so that information is available to as few as possible unintended recipients (prevent unauthorized listening). This can be done either by encapsulating information so that unintended recipients cannot read it, or by preventing the information from reaching unintended recipients. One way of encapsulating information, is to design an encryption scheme for all information traveling over the network of the distributed system. One possibility is to have hardware link encryptors that automatically encrypt and decrypt packets as they travel through a certain length of network cabling. This might be useful for areas where there was a higher possibility of intruders gaining access to network cabling. Another option would be to have all information encrypted between end-points (workstations or servers). This method of encryption would allow messages to be sent that only the intended recipients can decrypt. Of course, this introduces the question of key management which is outside the scope of this paper. The main disadvantages to encryption are the cost, network latency, and implementation difficulties. A good treatment of the problems, costs, and intricacies of encryption and public key management can be found in [Den99] and [Sch96]. [And93] and [AN96] specifically address common reasons why the implementation of cryptosystems fail. A less expensive method of eliminating the availability of information to unintended recipients of any given packet, is to configure the network into smaller network segments. Recall that using routers, a system administrator can have packets passed on to only a small group of nodes that contains the machines of the actual recipients. In many network protocols, each packet has a header with information about that packet’s destination. Unlike hubs that simply pass on packets to everything The Pseudo-Internal Intruder 48 connected to the hub, routers can examine the destination information of a packet and only pass that packet on in the direction(s) for which it is intended. While this does mean that every node on the same segment as the intended destination will receive a copy of the packet, this is more desirable than every node in the entire network configuration receiving a copy of the packet. This means that pseudo-internal intruders that are sniffing the network for packets will only receive packets intended for a node on the segment to which the intruder is connected. The other aspect of network configuration control is preventing unauthorized communication over the network. Most network protocols have some method of uniquely identifying potential recipients of network traffic. Any device that communicates with other network devices must have one of these unique identifiers. Therefore, the identifiers themselves can be managed in order to control which devices can communicate on the network. For example, in an IP based network, all machines must have an IP address in order to receive network traffic. There are methods of managing these IP addresses from a central location in a manner that system administrators control whether a machine gets an IP address at all, and if so, what IP address. This makes it more difficult for pseudo-internal intruders to connect unauthorized devices to the network configuration and then run proactive scanning utilities. Without a valid IP address, the unauthorized device would not be able to receive the responses required for a proactive scan. In fact, even running a passive scan without a valid IP address requires either a much more expensive and rare hardware packet sniffer or a specially designed and configured operating system running a software sniffer, as opposed to the common software packet sniffer running on a personal computer. The Pseudo-Internal Intruder 49 While a pseudo-internal intruder might correctly guess a usable IP address, system administrators have a list of all authorized IP address if an IP address management scheme is in use on that distributed system. The next section will explain how system administrators can use such a list to monitoring the network for potential pseudo-internal intruders. 3.4 Defending the Distributed System: Detecting Intruder Access We know that none of these security measures will entirely eliminate the possibility of a pseudo-internal intruder gaining access to a target system. It is therefore critical that the system administrator have timely knowledge of any pseudo-internal intrusions. Knowledge of the existence of an intruder would allow system administrators to perhaps apprehend the intruder, feed the intruder misinformation, or in the very least, eliminate the intruder’s access to the target system. Network configuration monitoring can provide system administrators with the needed warnings of pseudo-internal intruder activities. Network configuration monitoring includes checking for unauthorized or incorrectly used unique identifiers (required to communicate on the network), querying the network for unauthorized devices (the digital equivalent to visually inspecting the physical configuration), and observing the status and presence of network devices that should be present in the network configuration. There are a variety of technical ways to actually monitor the network configuration depending on its architecture. In a TCP/IP based network the unique identifiers are the IP addresses. The sender and recipient IP addresses contained in each The Pseudo-Internal Intruder 50 packet’s header can be compared against a list of approved IP addresses to ensure that only authorized devices are communicating over the network. The network can also be scanned for unauthorized MAC addresses. A MAC address is a unique number assigned to each piece of network hardware by the manufacturer. The vast majority of network devices can be queried to report that device’s MAC address. System administrators can keep a list of the MAC address of all authorized devices and then compare the results of system wide queries to that list. Lastly, there are multiple ways to query a network device to see if it is ‘alive’ or still operating and connected to the network. There are several possible situations when a pseudo-internal intruder may need to disconnect a network device to either gain access to the network configuration, or perhaps borrow that device’s IP address (since no two devices can have the same IP address). So, if a network device disappears from the network, even for a short period of time, system administrators may want to physically check the status of that device. No defensive measure listed here is a singular solution to the problem of the pseudo-internal intruder. Each measure narrows the possibility of a successful pseudointernal intrusion. The measures do, however, represent an effective approach when all of the measures are implemented for a distributed system. Note that the majority of the suggestions for defending a distributed system against pseudo-internal intruders are costeffective and require little extra hardware and software. These techniques can, however, be combined with commercial intrusion detection systems for even more security. While it seems certain that future pseudo-internal intruders will develop techniques not considered by us, these techniques will still operate in the domain of a target system’s network configuration. Access to the network configuration by The Pseudo-Internal Intruder 51 unauthorized persons is prevented by physical perimeter defenses, network perimeter defenses, physical configuration control, and network configuration control. Network configuration monitoring provides warnings to system administrators of authorized persons committing unauthorized pseudo-internal intruder activities, and any unauthorized persons that somehow gained access to the distributed system. The Pseudo-Internal Intruder 52 Chapter 4: Case Study 4.1 Introduction The purpose of the case study was to illustrate the threat that a pseudo-internal intruder represents to an average distributed system and how to mitigate this threat. The case study had two phases. In the first phase, a set of pseudo-internal intruder attacks was executed against a distributed system using common state of practice network security. The results of the attacks and the ability of the system to detect the attacks were recorded to illustrate how vulnerable the common network is to a pseudo-internal intruder. The state of practice in network security is that a distributed system has adequate to exceptional network perimeter defenses, but very few security measures devoted to the detection of intruders within the network perimeter. A recent survey of security practitioners in corporations, government agencies, and educational institutions showed that out of 501 respondents only 42 utilized any form of internal intrusion detection; as opposed to the 91 respondents utilizing firewalls [Pow99]. Even those distributed systems that do have some sort of intra-network perimeter intrusion detection usually check for authorized users committing unauthorized actions. This commonly implemented type of internal intrusion detection does little to protect against pseudointernal intruders because the detection systems examine the use of user accounts. The second phase of the case study executed the same set of pseudo-internal intruder attacks against the same distributed system. However, in the second phase of the case study the network security recommendations of this thesis were implemented prior to executing the attacks. The results of the attacks and the ability of the system to detect the attacks were recorded in both phases. The benefits of the security recommendations The Pseudo-Internal Intruder 53 will be apparent by analyzing the differences between the results of the two phases of the case study. 4.2 The Target System The invasive nature of some pseudo-internal intruder attacks required that the case study be done on a testbed distributed system, as opposed to an active real world system. For example, it would not be feasible to execute a denial of service attack against an operational distributed system, since system functionality would be degraded. Although it was not possible to build a testbed distributed system as large as many real world systems, an attempt was made to build a testbed distributed system that was representative of a large real world system. Node Name Description OAS Operational Administration Server Operational Windows98 1 (Operational) Workstation 2 Operational Windows98 1 (Operational) Workstation 3 Mission Critical Linux 2.2 2 (Mission Critical) Database Server Mission Critical Windows95 2 (Mission Critical) Database Workstation Table 4-1: Nodes in Testbed Distributed System OWk2 OWk3 MCDS MCDW Operating System Linux 2.2 Segment (when applicable) 1 (Operational) Our testbed network had 5 nodes, 2 hubs, a router, and a firewall. The equipment was widely varying: nodes running multiple operating systems (Linux, Windows95, and Windows98) and network devices from different vendors (ODS Networks, and Cabletron). Additionally, the networking devices used were capable of supporting a much larger network. The router was a 10 Gigabit per second capable Cabletron 6500 The Pseudo-Internal Intruder 54 SmartSwitch with modules supporting Gigabit Ethernet, ATM, and Fast Ethernet. The network configuration diagrams (figures 4-1 and 4-2) are drawn to show “the rest of the network” cloud, which could contain many more nodes. The testbed distributed system was divided into two halves: an operational group connected to hub OP (Operational), and a mission critical group connected to hub MC (Mission Critical). Node OAS (Operational Administration Server) was running Linux 2.2 and was the machine used by the system administrator of the target system. Node OWk2 was a Windows98 operational workstation. Node OWk3 was another Windows98 operational workstation with an unauthorized modem attached. That unauthorized modem was connected to an outside phone line creating a rogue outside connect. Node MCDS (Mission Critical Database Server) was also running Linux 2.2. Node MCDW (Mission Critical Database Workstation) was running Windows95. Any communication to or from a mission critical node was considered to be mission critical communication. To simulate the activity of a distributed system, several communication activities were executed during each of the pseudo-internal intruder attacks. Nodes MCDS and MCDW communicated with each other. Node OAS communicated with node MCDS. Lastly, the user of node OWk3 connected to a pop mail server external to the testbed distributed system to retrieve mail messages. Having a user from one node establish a connection with another node and send a text file to that node simulated mission critical communication. Each text file contained “Mission Critical Information” as the first line and then information stating who the message was from and for whom it was intended. For the purposes of the case study, each pseudo-internal intruder attack had the goal of either intercepting or disrupting mission critical communication. Intercepting The Pseudo-Internal Intruder 55 user account names and passwords was a secondary goal. Pseudo-internal intruder attacks came from two different sources: the unauthorized laptop connected to hub OP, and the rogue outside connect created by the unauthorized modem on node OWk3. Both of these attack sources are plausible real world possibilities. The previously mentioned industrial espionage agent posing as a janitor could potentially gain access to a wiring closet containing a hub. Likewise, an unwitting employee could connect a modem to an office machine in order to be able to dial up from home and check e-mail without having to purchase Internet service at home. Figure 4-1: Network Configuration of Phase 1 Testbed System The Pseudo-Internal Intruder 56 As mentioned, the testbed distributed system in the first phase of the case study was designed to represent the state of common practice in terms of network security measures. The firewall was configured to let no outside traffic through that was not requested by an internal host. This allowed machines on the inside to communicate with the outside world, but only if the internal machine initiated the communication. In general, this is restrictive from the viewpoint of functionality (no outside accessible web pages), but is considered to be very strong network perimeter defense. This type of firewall configuration was chosen to illustrate that even the strongest network perimeter defenses have no effect on pseudo-internal intruders. The firewall will not be considered again since no pseudo-internal intruder attack will utilize the outside connect, and therefore no attack will be influenced by the presence of a firewall. Both the database and administration servers (nodes MCDS and OAS) had audit logs enabled. The audit logs recorded an entry each time a request for service or a query for information was received. Enabled audit logs represent average security practice as long as an administrator regularly reviews them. All network devices (routers and hubs) were configured in ‘out-of-box’ mode. That is, no changes were made to factory settings. Likewise, all software, including operating systems, was installed from the original retail media. That meant that no security patches or upgrades that were not shipped with the software product were installed. Although such practices are considered poor network security, one is more likely to encounter such installations rather than continuously updated software and specially configured network devices. Lastly, no internal encryption was used and no internal network intrusion detection packages were in use. The Pseudo-Internal Intruder 57 4.3 The Pseudo-Internal Intruder Attacks In order to adequately demonstrate the capabilities of a pseudo internal intruder, we defined six different attacks. At least one of each of the four types of pseudo-internal intruder attack tools and techniques (network assessment tools, packet sniffers, exploits, and denial of service attacks) was represented in the set of six attacks. Recall also that a pseudo-internal intruder requires one of two types of access: physical access to a part of the network configuration, or a rogue outside connect. The following set of attacks against the target system also included at least one attack from each form of access: 1) Packet Sniffer – Software [Laptop] 2) Network Assessment Tool – Active [Rogue Outside Connect] 3) Exploit – Ping of Death [Laptop] 4) Exploit (Hacker Program) – WinNuke (Ping of Death) [Laptop] 5) Denial of Service Attack – Ping Flood [Laptop] 6) Denial of Service Attack – Smurf Attack [Rogue Outside Connect] Attacks 1, 3, 4, and 5 were executed from a Pentium II class laptop running Windows 98. The laptop was connected to the non-mission critical half of the distributed system via an open port on hub OP (see diagram). As has been discussed, connecting the laptop to hub OP simulated a pseudo-internal intruder with physical access to at least one piece of the network configuration. Attacks 2 and 6 were executed from a remote laptop connected to node OWk3 via a modem. The unauthorized modem represents a rogue outside connect. The Pseudo-Internal Intruder 58 The first attack used a software packet sniffer from Network Associates called Sniffer Pro LAN. The goal of packet sniffing is to intercept mission critical communication and user account names and passwords. The network assessment tool used for the second attack was NetRecon by Axent Technologies. NetRecon allows the pseudo-internal intruder to direct it to actively scan a range of IP addresses or simply attempt to scan everything on the network. NetRecon provides the user with information about what operating systems nodes are running, what services are active on the nodes, and how those services are vulnerable to attack. The third attack was an exploit called the Ping of Death. It was found that sending an abnormally large ping packet to a Windows95 machine would cause the machine to either lock up or crash. When successful, such an attack eliminates the functionality of a Windows 95 machine until the machine is rebooted. Microsoft released a security patch for Windows 95 that prevented this problem from occurring, but many machines have never had the security patch installed. Unless the owner of a machine specifically downloaded and installed the security patch, then their Windows 95 machine is susceptible to the Ping of Death attack. The fourth attack was the same as the third, except that a hacker program called WinNuke was utilized by the pseudo-internal intruder. WinNuke is a program that runs on Windows 95 or 98 machines and executes a Ping of Death attack against any number of machines as directed by the user. The fifth attack was a denial of service attack called a ping flood. A ping flood is an attack where the pseudo-internal intruder directs the laptop to continuously send ping packets to a target machine at a high rate of speed. This attack effectively cuts off the The Pseudo-Internal Intruder 59 target machine from the network. The target machine is receiving so many ping packets that it cannot respond to any other request for service. Even when the machine is able to respond to a request for service, it is likely that the pathways of network communication are clogged with the ping packets thereby making communication with any other machine difficult. The last attack is a different kind of denial of service attack called a Smurf attack. In a Smurf attack, the pseudo-internal intruder directs a machine to send a ping packet to multiple machines. The ping packet is constructed to appear as if it came from some target machine. Therefore, all of the machines that receive the ping packet respond by sending a packet to the target machine, and not the pseudo-internal intruder’s machine. In this way, the target machine is overwhelmed in a manner similar to the above ping flood. This attack has the advantage of being indirect (the ping flood is not coming from the pseudo-internal intruder’s machine). The attack is shorter in duration unless the attack machine continues to send the bogus ping packets to multiple machines. 4.4 Expected Results Two results were recorded for each pseudo-internal intruder attack The first result was the success of the particular attack. Each attack had a stated goal, and the success of an attack was determined by comparing the result with the goal. The second recorded result was the ability of the distributed system to detect the attack, even if the attack succeeded. The ability of the distributed system to detect an attack was judged by examining the footprint of the attack and any security measures in place to examine The Pseudo-Internal Intruder 60 footprints. A footprint is any observable change in the network configuration of a distributed system. Results of Attacks on Target System – Phase 1 4.5 The following section will discuss the results of executing the set of attacks against the Phase 1 target system. 1) Packet Sniffer – Software [Laptop] - Result: The packet sniffer successfully captured the exchange of the mission critical text file and user names and passwords between nodes OAS and MCDS and nodes MCDS and MCDW. In any network each packet first goes to the gateway machine. The gateway decides whether the packet is for an external machine or an internal machine. If the packet is for an internal machine, the gateway broadcasts that packet back toward the network. In an unsegmented network the packet is broadcast to every machine. Any machine that is not the intended recipient of the packet simply ignores it, unless the machine is running a packet sniffer which records all packets. The packet sniffer even captures the packets between nodes on a different hub since each packet goes out to the gateway (which is also the firewall in this case) and then back to all devices (since there is no segmenting). The packet sniffer also captured the external POP Mail server account name and password of the user of node OWk2. - Footprint: The footprint for this attack is small. The only changes made to the network configuration by the packet sniffer were an additional port in use on hub OP (laptop plugged in to it) and an additional MAC and IP address in use on the The Pseudo-Internal Intruder 61 network. Without special configuration (not in use in this case), the laptop will answer any MAC address or IP address scan and would show up on a Network Assessment scan. That is, if the laptop receives any request to report its IP or MAC address, it will respond with the addresses it is using. But, in the first phase of the case study, none of these things are being monitored. Therefore, the footprint of this first attack is not observable without further security changes to the system. 2) Network Assessment Tool – Active [Rogue Outside Connect] - Result: The active network assessment, via the modem line, succeeded in gaining information on all nodes on the network, including what operating system was running and what services were active. The scan reported that node MCDW was a Windows 95 machine vulnerable to a Ping of Death attack. There were a few added obstacles that the pseudo-internal intruder had to surmount to achieve the successful scan. The user of node OWk3 that set up the modem has the option of requiring a password to remotely connect to node OWk3. The pseudo-internal intruder would have to obtain such a password to connect to node OWk3. Just as physical security was ignored for the purposes of the case study, this issue was also not considered, but it should be noted. - Footprint: The nature of the rogue outside connect required that the assessment tool be run in active mode. The Point to Point Protocol connection between the remote intruder and node OWk3 did not allow the intruder’s computer to passively “listen” to communication over the network. The intruder’s computer The Pseudo-Internal Intruder 62 must actively request information by sending a packet to a host that requires a response. Therefore, the footprint of this attack is larger than that of the packet sniffer. While the modem connection does not require an additional IP or MAC address to be assigned to the remote laptop, the active actions create traffic coming from node OWk3. So any machine with audit logs enabled will record that node OWk3 (the machine with the modem) was requesting information about what services were running on the server. Any review of the audit logs would reveal suspicious activity and likely result in the discovery of the unauthorized modem. Therefore, the intruder would have to follow up the active assessment with another activity since discovery is highly likely. 3) Exploit – Ping of Death [Laptop] - Result: The pseudo internal intruder was successful in locking up node MCDW by sending an abnormal size ping packet (Ping of Death attack) from the laptop on hub OP to node MCDW on hub MC. The workstation locked up and had to be rebooted. There was no warning as to why workstation locked up. Any unsaved work was lost and the functionality of the machine was eliminated until it was rebooted. - Footprint: The footprint for this attack is only slightly larger than the footprint for attack 1. Other than the existence of laptop issues discussed above, the only additional change in the network configuration is the presence of the abnormal size packet. Although there are servers with audit logs enabled that do receive the abnormal size ping packet (since all machines receive every packet), the servers The Pseudo-Internal Intruder 63 do not record the event since the packet is not intended for that machine. There are no other security measures in place in phase 1 to detect the Ping of Death attack. 4) Exploit (Hacker Program) – WinNuke (Ping of Death) [Laptop] - Result: Attack 4 was as successful as attack 3. In fact, the results were exactly the same. The only difference between the two attacks is that a windows program was used to launch the attack from the laptop instead of using the ping command. - Footprint: The footprint for this attack was no different than that of attack 3. The use of the program WinNuke instead of manually sending the abnormal size ping packet makes no difference with respect to the network configuration. 5) Denial of Service Attack – Ping Flood [Laptop] - Result: The pseudo-internal intruder laptop on hub OP sent continuous ping packets to node MCDS on hub MC. Nodes OAS and MCDW were observed to no longer be able to reliably communicate with node MCDS because node MCDS was too busy answering the pings from the laptop (intermittent communication was possible). The ability of any nodes to communicate with any other node was degraded due to the numerous ping packets saturating the entire network as each ping packet is first sent to the gateway and then to every node on the network. - Footprint: The footprint of attack 5 is similar to that of attacks 3 and 4. The existence of the laptop on the network creates unauthorized MAC and IP address The Pseudo-Internal Intruder 64 usage. Likewise, there are servers (node OAS) with audit logs enabled that see the ping packets, but do not record them since the pings are intended for another machine. Node MCDS audit logs would also show all of the incoming ping packets. The footprint was, however, more noticeable by all users of the network because of the “sluggishness” created by the saturation of the network by ping packets. There is no security tool in use for phase 1 of the case study that would indicate a ping flood attack in progress, but it is likely that system administrators would quickly realize there was something wrong with the network and investigate further. 6) Denial of Service Attack – Smurf Attack [Rogue Outside Connect] - Result: The results of this attack are similar to those of attack 5. Reliable communication between node MCDS and any other node was not possible. Communication for any node was degraded due to the saturation of the network by ping packets. The difference between attacks 5 and 6 was the way in which the attack was launched. Attack 6 was launched from the remote laptop connected to node OWk3 via a modem. The pseudo-internal intruder remote laptop sent ping packets to several other nodes. The ping packet was constructed to appear as if node MCDS had sent it. Therefore, all of the nodes replied to node MCDS. This process was repeated to create a continuous flow of ping packets directed at node MCDS. - Footprint: Attack 6 has a larger footprint than the other attacks because several nodes are receiving ping packets directed at them from node MCDS. Thus, The Pseudo-Internal Intruder 65 servers with audit logs would record the numerous requests to respond to node MCDS. As in attack 5, all users of the network would notice that the network was “sluggish” and unresponsive. It would certainly be noticeable by observing the audit logs of node MCDS that would show a large amount of pings. 4.6 Security Changes Made to Testbed System for Phase 2 In order to demonstrate the effectiveness of the security measures proposed by this thesis, the following security changes were made to the testbed distributed system prior to phase 2 of the case study. These changes are those advocated to mitigate the consequences of a pseudo-internal intruder gaining access to a target system and detecting, monitoring, and recording any intrusions. Specifically, the following suggestions are steps to increase network configuration control and network configuration monitoring. Denying the intruder access to the distributed system (physical perimeter defense and physical configuration control) were not considered for the case study. To limit the unintended recipients of a given packet, the testbed distributed system was divided into two segments. The first segment contained those nodes connected to hub OP. That segment represents the operation segment. The second segment contained those connected to hub MC. The second segment represents the mission critical segment. Any packet transmitted from the gateway (the firewall in this case) was only transmitted to nodes in the segment that contained the recipient of the packet. Also, in an effort to limit the unintended recipients of any mission critical packet, The Pseudo-Internal Intruder 66 all mission critical communication was encrypted. Likewise, all nodes were required to use secure (encrypted) telnet and secure file transfer protocol. A network intrusion detection monitoring device was inserted between the router and hub MC to monitor and protect the mission critical segment. The device was actually a router that contained a computer running Internet Secure Systems’ (ISS) RealSecure monitoring product. The network intrusion detection monitoring device was made by ODS Networks Inc. [ODS97, ODS98]. Each packet that passes through the network intrusion monitoring device was examined by the ISS RealSecure software. Each packet was compared to a list of packets used to execute many known attacks. For example, if a packet matched an oversized Ping of Death packet, then the packet would be discarded and not allowed to pass through to the segment protected by the intrusion detection monitoring device. The software also checks for attack patterns using multiple packets. For example, the software will allow several consecutive ping packets for a single machine to pass through, but too many consecutive ping packets would indicate a ping flood attack and such packets would be blocked from passing the intrusion detection monitoring device. Any suspicious packet activity found by the software is reported to the system administrator via e-mail. If the system is unable to send e-mail, it dials the system administrator’s digital pager using a modem connected to an outside phone line (out-of-band). In an effort to increase network configuration monitoring, each segment has one server that continuously scans for unauthorized MAC and IP address activity. A full network assessment utility is periodically run as well to search for unknown and unauthorized nodes. Likewise, an RMON (Remote Monitoring) compliant network The Pseudo-Internal Intruder 67 device monitoring utility is used on each segment. RMON is a protocol that that communicates remote network management information over the network. The monitoring device queries the network device for information like which ports are in use, what MAC addresses are using which port, and how much traffic is going through the network device. Some RMON compliant software can even analyze this data for trends or be configured to automatically notify the administrator when certain ports are in use or when the overall network traffic reaches some level. Figure 4-2: Network Configuration of Phase 2 Testbed System The Pseudo-Internal Intruder 68 Results of Attacks on Target System – Phase 2 4.7 The following section will discuss the results of executing the set of attacks against the phase 2 target system. 1) Packet Sniffer – Software [Laptop] - Result: The packet sniffer was only able to capture the external POP Mail server account name and password of the user of node OWk2. Since all communication between mission critical nodes was encrypted, the packets containing the mission critical text file and user account names and passwords were unreadable. Even if communications between nodes MCDS and MCDW were not encrypted, the sniffer would not capture them since packets not intended for nodes on segment 1 are not transmitted to segment 1 (where the laptop is connected). - Footprint: While the footprint is no different than it was in the first phase of the case study, there were more security measures in place to detect such footprints. The network administration server on the same segment as the laptop reported an unidentified MAC address and IP address in use (the laptop). The periodic active network assessment from node OAS also detected the laptop and reported on the operating system and services it was running. From that information, the system administrator on node OAS could conclude that there was an unidentified machine in use on the segment. Furthermore, RMON compliant monitoring software reported that an additional port on hub OP was in use. In this way the system administrator could determine the physical location of the unauthorized node visible on the network (by tracing the wiring from the unauthorized port on The Pseudo-Internal Intruder 69 hub OP). This was true for all attacks using the laptop, so it will not again be mentioned in detail. 2) Network Assessment Tool – Active [Rogue Outside Connect] - Result: In most segmenting schemes, system administrators use different ranges of IP addresses for different segments on the network. Without knowing the IP address scheme, a machine on one segment cannot send packets to a machine on another segment. For this reason, the active network assessment tool was only able to gain information about the nodes on the same segment as node OWk3. Without knowledge of the IP addresses of nodes MCDS and MCDW (segment 2 nodes), there was no way to gain information about those nodes. Therefore, the pseudo-internal intruder using the rogue outside connect had no way of knowing what operating systems were in use by segment 2 (Mission Critical) nodes, and what vulnerabilities segment 2 nodes might have. The active assessment still gained the same information as in the first phase of the case study about the nodes on segment 1 (Operational). Furthermore, the network intrusion detection monitoring device can be configured to deny some of the packets that contain request for information used by active network assessment tools. - Footprint: As in the first phase of the case study, the audit logs active on node OAS recorded the activities of the network assessment tool. As before, further investigation as to why node OWk3 was requesting information from other machines would lead the system administrator to discover the unauthorized modem. The Pseudo-Internal Intruder 70 3) Exploit – Ping of Death [Laptop] - Result: This attack was totally unsuccessful in phase 2 of the case study. The abnormal size ping packet sent from the laptop was stopped by the network intrusion detection monitoring device protecting the mission critical segment of hub MC. The device immediately reported, via e-mail to the system administrator, that a Ping of Death attack had been attempted against node MCDW. Node MCDW was never affected. - Footprint: Like the other attacks, the footprint of attack 3 was no different in phase 2 of the case study. The difference is that measures had been put in place to detect attack footprints. The network intrusion detection monitoring device immediately reported the attack to the system administrator and narrowed the source of the attack to the operational segment. The system administrator at node OAS would then be able to employee the methods discussed in attack 1 to quickly locate the unauthorized laptop. 4) Exploit (Hacker Program) – WinNuke (Ping of Death) [Laptop] - Result: The results were the same as those of attack 3. - Footprint: The footprint and the system’s ability to detect the footprint were the same as in attack 3. 5) Denial of Service Attack – Ping Flood [Laptop] The Pseudo-Internal Intruder 71 - Result: Attack 5 was partially successful. When the pseudo-internal intruder using the laptop attempted to ping flood node MCDS, the network intrusion detection monitoring device stopped the flood of ping packets from reaching any node on segment 2. Because of the segmenting of the network, the ability of nodes to communicate with each other was not degraded as badly as in phase 1. The ping packets are not rebroadcast by the gateway to all nodes on the network. Consequently, the only interference is from the original ping packets from the laptop to node MCDS. These ping packets were numerous enough to somewhat degrade the operational segment nodes’ ability to communicate over the network. The network intrusion detection monitoring device notified the system administrator via an out-of-band page. Since the network intrusion detection monitoring device is also a router, packets from node MCDS to node MCDW were sent to the router and then back to node MCDW. These packets did not have to go to the gateway since the router recognized the recipient as a mission critical segment node and directed the packets back to MCDW. The attack did not degrade the ability of mission critical segment nodes to communicate with each other. - Footprint: Once again, the footprint of attack 5 was the same as in phase 1, but the network intrusion detection monitoring device recognized the ping flood and reported the attack to the system administrator. As in the above attacks, the administrator was able to locate the unauthorized laptop. 6) Denial of Service Attack – Smurf Attack [Rogue Outside Connect] The Pseudo-Internal Intruder 72 - Result: The results of attack 6 were similar to those of attack 5. The first several pings from nodes on segment 1 were allowed through to node MCDS, but the network intrusion detection monitoring device prevented a large number of the pings through as soon as it recognized a Smurf ping flood attack. Additionally, attempts to use any node on segment 2 as a Smurf relay (the node sending out a ping to the target) failed because the network intrusion detection monitoring device stopped all attempts to use those machines as Smurf relays. These incidents were reported to the system administrator immediately. - Footprint: The footprint was the same as in phase 1, but like the previous attacks, the system administrator was able to use the information sent by the network intrusion detection monitoring device to locate the unauthorized laptop. 4.8 Summary Although not a large, real world distributed system, the testbed system was sufficient to illustrate the differences between state of practice and state of art security measures with respect to pseudo-internal intruders. The hardware that comprised the testbed system was diverse enough to be representative of the types of devices and machines found in a majority of distributed systems. The scalability of the testbed system, the fact that the testbed system could be the backbone of a thousand node system, made the testbed system representative of large real world distributed systems. The results of the first phase of the case study showed many of the network related vulnerabilities still present in a distributed system with state of practice security measures. State of practice security often does not provide internal access control for The Pseudo-Internal Intruder 73 users of the network. While security measures are in place to prevent unauthorized external access to the network, anyone inside the network perimeter can connect a device to the network with little difficulty. Nor did the testbed system have any network traffic control mechanisms. At no point inside the network perimeter was network traffic examined for authenticity (from a legitimate internal node) or danger to the network (Ping of Death packet, etc.). Lastly, state of practice security makes little effort to monitor the internal network for intruders. Such state of practice security depends upon network perimeter defenses to keep intruders out of the system and host based internal intruder detection packages to detect unauthorized actions by users. After executing the set of pseudo-internal intruder attacks, it was apparent that a pseudo-internal intruder can do great damage by exploiting the vulnerabilities found in a distributed system with only state of practice security. For the second phase, the security recommendations for combating the pseudointernal intruder were implemented prior to executing the set of attacks. Comparing the results of the attacks from the two phases, it is apparent that network configuration control and network configuration monitoring help mitigate the threat of the pseudointernal intruder. For each attack, the success of the attack decreased and the ability of the system administrator to detect the footprint increased in phase 2. Network configuration control measures make it more difficult for pseudointernal intruders to access the system. Such measures also decrease the ability of pseudo-internal intruders who do gain access to the system to gather information or do harm to the distributed system. Network configuration monitoring mitigates the danger of pseudo-internal intruders by promptly notifying the system administrator of intruders. The Pseudo-Internal Intruder 74 The results of the case study make it clear that through network configuration control and network configuration monitoring, system administrators can greatly decrease the possibility of and the danger of the pseudo-internal intruder. The Pseudo-Internal Intruder 75 Chapter 5: Conclusions and Future Work 5.1 Conclusions This thesis has defined a new access oriented intruder category: the pseudo- internal intruder. We have defined the pseudo-internal intruder as a new distinct category, as opposed to a subcategory, after examining it with respect to internal and external intruders in modern distributed systems. We have examined the tools and techniques usable by the pseudo-internal intruder as well as the danger such an intruder represents to a distributed system. Finally, we discussed an overall strategy for defending a distributed system against a pseudo-internal intruder and offered a case study as an example of how that defensive strategy can be implemented. It is clear that others in the intrusion detection field are concerned about internal network based attacks. Some intrusion detection system developers have started to address the question of network intrusions. There are several network intrusion detection systems that address the issue of intrusions via the internal network of a distributed system, as opposed to external intrusion attempts or user account misuse. NetSTAT, an extension of the State Transition Analysis Technique (STAT), was created because developers realized that network attacks “may be totally invisible from the audit trail (traditional intrusion detection) produced by the attacked host” [STA99]. Instead of focusing on nodes, NetSTAT used the “the network and its protocols” (network configuration) as its source of security related information [KV98]. Likewise, the ODS router and RealSecure software package used in the case study provides a network oriented intrusion detection system [ODS98]. There are currently multiple network intrusion detection efforts underway including [HF98] and [MHL94], among others. The Pseudo-Internal Intruder 76 While some of these network intrusion detection systems offer very promising results, few of the efforts made an attempt to formally define the scope of the network based intrusion problem. The existence of these ‘new’ efforts indicates an acceptance of a ‘new’ intruder problem. Any definition of this ‘new’ intruder problem will aid developers in efficiently and effectively addressing the problem. The pseudo-internal intruder category addresses an area of potential intrusions that did not exist prior to the proliferation of the networked distributed system. The pseudo-internal intruder category provides intrusion detection developers a platform on which to understand and define the capabilities of the pseudo-internal intruder, thereby facilitating the detection and defense against such intruders. 5.3 Future Work When Anderson defined the internal and external categories the principle defining aspect of intruder threats was whether the intruder was “authorized to use the computer system” [And80]. This thesis has argued that an additional defining aspect of intruder threat is whether the intruder has direct access to the internal network of a system. This additional defining aspect came into existence because of changing technology since the early 1980s. Therefore, it is possible that technology yet to be developed or yet to become mainstream will force a reexamination of the defining aspects of intruder threats. Such developing technology could force the further refinement of intruder categorization, resulting in more than three access oriented intruder categories. The Pseudo-Internal Intruder 77 References [AFV95] Anderson, Debra, Than Frivold, and Alfonso Valdes. “Next Generation Intrusion Detection Expert System (NIDES): A Summary.” SRI International. May 1995. [AKS96] Aslam, Taimur, Ivan Krsul, and Eugene H. Spafford. “Use of A Taxonomy of Security Faults.” Purdue University Technical Report,TR96-051. September 1996. [AN96] Abadi, Martin, and Roger Needham. “Prudent Engineering Practice for Cryptographic Protocols.” IEEE Transations on Software Engineering, 22 (1). January 1996. 6-15. [And80] Anderson, James P. “Computer Security Threat Monitoring and Surveillance.” James P. Anderson Co. February 1980. [And85] Anderson, James P. “A Unification of Computer and Network Security Concepts.” IEEE Proceedings of the 1985 Symposium on Security and Privacy. April 1985. 77-87. [And93] Anderson, Ross. “Why Cryptosystems Fail.” 1st ACM Conference on Computer and Communications Security. 1993. [Bar98] Barnes, Bruce H. “Computer Security Research: A British Perspective.” IEEE Software. IEEE Computer Society. September/October 1998. 3033. [Bou98] Boulander, A. “Catapults and Grappling Hooks: The Tools and Techniques of Information Warfare.” IBM Systems Journal, 37(1). 1998. 106-114. The Pseudo-Internal Intruder 78 [CH96] Cannady, J. and J. Harrell. “A Comparative Analysis of Current Intrusion Detection Technologies.” 4th Technology for Information Security Conference. May 1996. [CER94] 1994 CERT Coordination Center Annual Report. http://www.cert.org/annual_rpts/cert_rpt_94.html [CER98] 1998 CERT Coordination Center Annual Report. http://www.cert.org/annual_rpts/cert_rpt_98.html [CNE96] “Ping of Death Averted.” CNET News.com. November 25, 1996. [CNN99] “E-mail Virus Threatens.” Cable News Network. March 29, 1999. [Den83] Denning, Dorothy E. “Protecting Public Keys and Signature Keys.” Computer. IEEE Computer Society. February 1983. 27-35. [Den87] Denning, Dorothy E. “An Intrusion-Detection Model.” IEEE Transations on Software Engineering, SE-13(2). February 1987. 222-232. [Den99] Denning, Dorothy E. Information Warfare and Security. AddisonWesley. 1999. [DM98] Dowd, Patrick W. and John T. Henry. “Network Security: It’s Time to Take It Seriously.” Computer. IEEE Computer Society. September 1998. 24-28. [DV97] Davis, B. and B. Violino. “Security: Window of Vulnerability.” Information Week. March 10, 1997. The Pseudo-Internal Intruder 79 [Eck85] Eck, Wim van. “Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?” Computers & Security 4. Elsevier Science Publishers B.V. 1985. 269-286. [FOL99] Free On-Line Dictionary of Computing. 1999. Http://wombat.doc.ic.ac.uk/foldoc/index.html [GAO96] “Information Security: Computer Attacks at Department of Defense Pose Increasing Risks.” General Accounting Office Chapter Report, AIMD-9684. May 1996. [Gri95] Griffiths, B. “Optical Fibre Security Systems: Applications for Intrusion Detection.” Glass Technology, 36(5). October 1995. 150-152. [HF98] Hofmeyr, Steven A. and Stephanie Forrest. “Immunizing Computer Networks: Getting All the Machines in Your Network to Fight the Hacker Disease.” Submitted to: 1999 IEEE Symposium on Security and Privacy. November 1998. [ISV95] Icove, David, Karl Seger, and William VonStorch. Computer Crime: A Crimefighter’s Handbook. O’Reilly & Associates. 1995. [IKP95] Ilgun, Koral, Richard A. Kemmerer, and Phillip A. Porras. “State Transition Analysis: A Rule-Based Intrusion Detection Approach.” IEEE Transations on Software Engineering, 21(3). March 1995. 181-199. [JS99] Jones, Anita, and Robert Sielken. “Intrusion Detection.” University of Virginia Technical Report. May 1999. The Pseudo-Internal Intruder 80 [KV98] Kemmerer, R. and G. Vigna, "NetSTAT: A network-based intrusion detection approach," Proceedings of the 14th Annual Computer Security Applications Conference. December 1998. [Kor97] Kornblum, Janet. “Microsoft Posts Another Bug Fix.” CNET News.com. July 1, 1997. [LG97] Landwehr, Carl E. and David M. Goldschlag. “Security Issues in Networks with Internet Access.” Proceedings of the IEEE, 85(12). December 1997. 2034-2051. [LS90] Lu, Wen-Pai, and Malur K. Sundareshan. “A Model for Multilevel Security in Computer Networks.” IEEE Transations on Software Engineering, 16(6). June 1990. 647-659. [Lun93] Lunt, T.F. “A survey of Intrusion Detection Techniques.” Computer & Security 12. 1993. 405-418. [Mei99] Meier, Garry. “Off the Record: A Survey of Top INFOSEC Execs in Banking.” Electronic Trust: The Magazine of Information Security Trends. Q1, 1999. [MHL94] Mukherjee, B., L. T. Heberlein, and K. N. Levitt. “Network Intrusion Detection.” IEEE Network. May/June 1994. 26-41. [Nes87] Nessett, Dan M. “Factors Affecting Distributed System Security.” IEEE Transations on Software Engineering, SE-13(2). February 1987. 233248. The Pseudo-Internal Intruder 81 [Neu98] Neumann, Peter G. “Security, Survivability, Risks, etc.” Invited Lecturer. Department of Computer Science, University of Virginia. November 19, 1998. [ODS97] “Leading Security Companies Partner to Deliver New Class of Network Security Service.” ODS Networks Press Release. September 30, 1997. [ODS98] “Evaluating Your Network’s Security.” ODS Networks. April 1998. Http://www.ods.com/white/whi_0004.shtml [PCO97] Puketza, Nicholas, Mandy Chung, and Ronald A. Olsson. “A Software Platform for Testing Intrusion Detection Systems.” IEEE Software. September/October 1997. 43-50. [Pow99] Power, Richard. “1999 CSI/FBI Computer Crime and Security Survey.” Computer Security Journal, XV(2). 29-45. [PZ+96] Puketza, Nicholas, Kui Zhang, Mandy Chung, Biswanath Mukherjee, and Ronald A. Olsson. “A Methodology for Testing Intrusion Detection Systems. IEEE Transations on Software Engineering, 22(10). October 1996. 719-729. [Reu98a] “China Foils Cyber Bank Robbers.” Reuters Limited. October 22, 1998. [Reu98b] “Chinese Crackers Get Death.” Reuters Limited. December 28, 1998. [Sch96] Schneier, Bruce. Applied Cryptography, Second Edition. John Wiley & Sons Inc. 1996. The Pseudo-Internal Intruder 82 [Sel90] Seline, Christopher. “Eavesdropping on the Electromagnetic Emanations of Digital Equipment: The Law of Canada, England, and the United States.” June 1990. [Spa96] Spafford, Eugene H. Security Seminar. Department of Computer Science, Purdue University. January 1996. [SRI97] “What is NIDES?” SRI International / Computer Science Laboratory. Http://www.csl.sri.com/nides/index1.html [STA99] “Projects: The STAT Approach.” Reliable Software Group at University of California at Santa Barbara. Http://www.cs.ucsb.edu/~kemm/netstat.html/projects.html [Sun96] Sundaram, Aurobindo. “An Introduction to Intrusion Detection.” ACM Crossroads, 2(4). 1996. [Tan96] Tanenbaum, Andrew S. Computer Networks, Third Edition. Prentice Hall. 1996. [Win97] Wingfield, Nick. “Hole in Windows 95, NT fixed.” CNET News.com. May 12, 1997. The Pseudo-Internal Intruder