Lesson 4 Basics of Incident Detection Overview • Detection of Incidents • Basic IDS Theory • Types of IDSes UTSA IS 3523 ID & Incident Response What is an Incident? Incident - an event in an information system/network Time based security: Protection time >> detection time + reaction time Some say its all about vulnerability management UTSA IS 3523 ID & Incident Response Detection of Incidents Company X IDS End Users Help Desk System Administrators Security Human Resources UTSA IS 3523 ID & Incident Response Indicators IDS Detection of remote attack Numerous Failed Logons Logins into Dormant or Default Accounts Activity During non-working hours New Accounts not created by SysAdmins Unfamiliar files or executable programs Unexplained escalation of privileges Altered web pages Gaps in logs files or erasure in log files Slower system performance System crash Receipt of extortion email Notification by upstream/downstream sites Pornography/Music files/Movies Detection of Incident Process Firewall Logs IDS Logs DETECT Suspicious user System Admin UTSA IS 3523 ID & Incident Response Begin IR Checklist Activate CIRT Are Firewalls Enough? • You have the world's best firewall, your Windows computers update their antivirus software regularly and your Information Security staffers enforce your policies with an iron fist. Does this mean you're safe? • Maybe not. In 1998, a news story asserted that the firewall for the New York Times was one of the best. Yet at 7:08 a.m. on Sunday, Sept. 13, 1998, someone on the paper's network e-mailed reporters: – ...COM3 V1S1T HTTP://WWW.NYTIMES.COM AND S33 0UR LAT3ST P13C3 0F ART. 1F 1T D0ESN'T L0AD, JUST H1T 'REL0AD' A F3W T1MES. CL3V3R ADMINZ HAD S0M3 W3IRD CR0NTABZ OR S0METHING. – 0H. W3 0WN YOU. Y0U JUST HAV3NT N0T1C3D US 0N Y3R N3TW0RK Y3T. UNT1L THE N3XT T1M3... • No one at the Times had noticed weeks worth of the Hacking for Girliez gang on their network. The intruders finally chose to go public by defacing the opening page of their Web site—on the day the Times expected millions of visitors to view the Monica Lewinsky transcripts. Instead, visitors encountered soft porn . . . UTSA IS 3523 ID & Incident Response Personal Firewall UTSA IS 3523 ID & Incident Response Firewall Traffic Monitor UTSA IS 3523 ID & Incident Response Firewall Configuration UTSA IS 3523 ID & Incident Response Firewall Settings UTSA IS 3523 ID & Incident Response Firewall Event Summary UTSA IS 3523 ID & Incident Response Hostile Event? UTSA IS 3523 ID & Incident Response Traceback Option UTSA IS 3523 ID & Incident Response Ranum on Intrusion Detection • “The real value of intrusion detection is diagnosing what is going on…never collect more data than you could conceivably want to look at. If you don’t know what to do with the data, it doesn’t matter how much you’ve got.” Marcus Ranum Network Flight Recorder UTSA IS 3523 ID & Incident Response Intrusion and Misuse Detection • Remember the operational model of security – protection = prevention + (detection + response) • Access controls and filters seek to prevent unauthorized or damaging activity. • Intrusion and misuse detection mechanisms aim to detect it at its outset or after the fact. • Has its roots in audit log files • Operate on the principle that it is neither practical nor feasible to prevent all attacks. UTSA IS 3523 ID & Incident Response Intrusion Detection • Can be manual (review of logs), automated, or a combination. • Closely related to monitoring. – Workplace monitoring used to • Ensure quality • Assess performance • Comply with regulations (e.g. ensure stockbrokers aren’t using high-pressure tactics in violation of stock exchange rules) UTSA IS 3523 ID & Incident Response Audit Trails • Early intrusion detection involved reviewing system log or audit files. • What events can be audited varies from system to system. • Examples of auditable events include – – – – – – Reading/opening of a file Writing to or modifying a file Creation or deletion of an object Logins and Logouts Other administrative actions Special operations (e.g. changing a password) UTSA IS 3523 ID & Incident Response Unix Logging • Several sources of log files in Unix – – – – syslog – the system log sulog – records actions to switch users (su) utmp – keeps track of users currently logged on wtmp – stores historical data on login, logout, shutdown, and restart events. – lastlog – tracks each user’s most recent login time and the point of origin of the user. Successful and unsuccessful logins can be tracked. • At login, this information (about the last login) is often displayed UTSA IS 3523 ID & Incident Response Windows NT/2K Auditing • By default security auditing is not enabled • NT: Start|Programs|Administrative Tools| User Manager – User Manager select Policies|Audit – Logs => C:\WINNT\System32\Config\*.evt • WIN2K: Administrative Tools| Local Security Policy – Logs => C:\WINNT\System32\Config\*.evt UTSA IS 3523 ID & Incident Response Win 10 Logging • By default auditing is enabled – Logs => C:\WINDOWS\System32\LOGFILES • Right click Windows Logoļ Computer Management|Event Viewer|Windows Logs UTSA IS 3523 ID & Incident Response Computer Management Logging • • • • • UTSA IS 3523 ID & Incident Response Application Logs Security Logs Setup Logs System Logs Forwarded Events The Use of Tools • “An apprentice carpenter may want only a hammer and a saw, but a master craftsman employs many precision tools. Computer programming likewise requires sophisticated tools to cope with the complexity of real applications, and only practice with these tools will build skill in their use.” Robert L. Kruse Data Structures and Program Design UTSA IS 3523 ID & Incident Response Windows 10 Logs UTSA IS 3523 ID & Incident Response Computer Management UTSA IS 3523 ID & Incident Response Computer Mgt Event Viewer Windows Logs UTSA IS 3523 ID & Incident Response Event Viewer UTSA IS 3523 ID & Incident Response Event Viewer Application Log UTSA IS 3523 ID & Incident Response Event Viewer Security Log UTSA IS 3523 ID & Incident Response Event Viewer System Log UTSA IS 3523 ID & Incident Response Schneier on Auditing • “ Audit is vital whereever security is taken seriously. Audit is there so that you can detect a successful attack, figure out what happened after the fact, and then prove it in court.” Bruce Schneier Secrets & Lies Digital Security in a Networked World UTSA IS 3523 ID & Incident Response Another Obvious Quick Look Tool • Your Anti-virus software – Check AV log to see when last scan conducted – Check Quarantine area – If only interested in root cause analysis – Execute the AV software to see what turns up UTSA IS 3523 ID & Incident Response UTSA IS 3523 ID & Incident Response UTSA IS 3523 ID & Incident Response Intrusion Detection Systems • Various types of activities that an IDS checks for – – – – – – – – Attempted/successful break-ins Masquerading Penetration by legitimate users Leakage by legitimate users Inference by legitimate users Trojan horses Viruses Denial-of-service UTSA IS 3523 ID & Incident Response Approaches to IDS • Attempt to define and detect abnormal behavior • Attempt to define and detect anomalous activity UTSA IS 3523 ID & Incident Response Methods to perform IDS • Four major methods attempted to perform intrusion detection: – – – – User Profiling Intruder Profiling Signature Analysis Action-based (attack “signatures”) UTSA IS 3523 ID & Incident Response User Profiling • Basic Premise: the identity of any specific user can be described by a profile of commonly performed actions. • The user’s pattern of behavior is observed and established over a period of time. • Each user tends to – – – – use certain commands more than others, access the same files, login at certain times and at specific frequencies, and Execute the same programs. • A user profile can be established based on these activities and maintained through frequent updating. • A masquerading intruder will not match this profile. UTSA IS 3523 ID & Incident Response User Profiling • Types of activity to record may include – – – – – – – – – CPU and I/O usage Connect time and time of connection as well as duration Location of use Command usage Mailer usage Editor and compiler usage Directories and files accessed/modified Errors Network activity • Initial profile takes time & can generate many alarms. • Weighted actions often used (more recent activities more important than activities accomplished in past) UTSA IS 3523 ID & Incident Response Intruder Profiling • Concept similar to criminal profiles used in the Law Enforcement community. • Attempt to define the actions that an intruder will take when unauthorized action is obtained. – For example: when an intruder first gains access the action often taken is to check to see who else is on, will examine files and directories, … • Can also apply to insiders gaining access to files they are not authorized to access. • Problem with this method is that it is hard to define all possible intruder profiles and often the actions of a new user will appear similar to the actions of an intruder. UTSA IS 3523 ID & Incident Response Signature Analysis • Just as an individual has a unique written signature which can be used for identification purposes, individuals also have a “typing signature”. • This characteristic first noticed in telegraph days. • The time it takes to type certain pairs or triplets of letters can be measured and the collection of these digraphs and trigraphs together form a unique collections used to characterize individuals. • This technique requires special equipment. • Variation on this is to watch for certain abbreviations for commands and common errors. UTSA IS 3523 ID & Incident Response Action Based • Also sometimes referred to as signature based. • Specific activities or actions (attack signatures) known to be indicative of intrusive activity are watched for. – E.g. attempts to exploit known security holes. • Can also be used to look for unauthorized activity by insiders. • Problem is that not all methods are known so new signatures are constantly being created and thus intrusion detection systems constantly need to be updated. UTSA IS 3523 ID & Incident Response Summary • Detection of Incidents • Log File Analysis • Firewall Logs • Basic of IDS UTSA IS 3523 ID & Incident Response