01a-intro

advertisement
Topic 1
At the end of the lesson, the students are
able to:
 explain
different terminologies used in IDS
 make comparisons between different types
of IDSs
 explain the roles of IDS
mms©
2
 Threats
 Intrusion
detection system (IDS)
 Terminologies
 Types of IDS
 Roles of IDS
3
4
 Over


past 20 years
attackers have gained in intensity and frequency
Tools have evolved
 Today’s


attacker is motivated by profit
Where is the money?
In the applications!
©2009 KRvW Associates, LLC
5
 Network



and OS-level
Port-scanning and probing – stealth technique
Vulnerability scanning
Vulnerability exploits
 Application



Specific to application layer
Web apps common
OWASP Top-10
 Are

attacks
you under attack?
How do you know?
©2009 KRvW Associates, LLC
6

Port-scanning and probing

Remote inventory of all doors and windows




The key is to avoid detection
Stealth technique
Vulnerability scanning

What are the weak points?



what’s available?
Bad locks, unlocked doors, unpatched servers,
misconfigurations
Inventory of weaknesses
Vulnerability exploits


Now we know the weak points
Exploit them

Kick door in, pick the lock, buffer overflow, malware
©2009 KRvW Associates, LLC
7
Go for flaws in business software
 Specific to application
 XSS (Cross-site Scripting)
 SQL injection
 CSRF (Cross-Site Request Forgery)
 Authentication
 Access control
 Ad infinitum (~ “to infinity”)

©2009 KRvW Associates, LLC
8

XSS (Cross-site Scripting)


a type of computer security vulnerability typically found in web
applications that enables malicious attackers to inject client-side
script into web pages viewed by other users. An exploited crosssite scripting vulnerability can be used by attackers to bypass
access controls such as the same origin policy.
CSRF (Cross-Site Request Forgery)

a one-click attack or session riding and abbreviated as CSRF
("sea-surf") or XSRF, is a type of malicious exploit of a website
whereby unauthorized commands are transmitted from a user that
the website trusts. Unlike cross-site scripting (XSS), which exploits
the trust a user has for a particular site, CSRF exploits the trust
that a site has in a user's browser.
9


The Open Web Application Security Project (OWASP) Top Ten
Project provides a minimum standard for web application
security.
It lists the top ten most critical web application security
vulnerabilities, representing a broad consensus.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.

Injection
Cross Site Scripting (XSS)
Broken Authentication and Session Management
Insecure Direct Object References
Cross Site Request Forgery (CSRF)
Security Misconfiguration
Failure to Restrict URL Access
Unvalidated Redirects and Forwards
Insecure Cryptographic Storage
Insufficient Transport Layer Protection
Project members include a variety of security experts from
around the world who have shared their expertise to produce this
list.
10

Intrusion
Successful attempts of an intruder gaining access to machines they would
otherwise have no access to
 Destruction: After intrusion, any loss of data/information


Malicious code


Denial-of-service (DoS)


More of an inconvenience than a threat, spam is usually described as
unsolicited email, or email that you have not requested or do not want
Mailbombs


Websites claiming to be someone they are not, (e.g. e-banking systems) in
order to gain information they should not have (e.g. username and
passwords)
Spamming


Services provided by your website becomes inaccessible due to too many
requests from other sources
Forgery


E.g. virus, worm, etc.
Large amounts of email coming from one source causing DoS on mail servers
Hack threat

mms©
Scanning activities. People looking for a way in to your system.
11
 Two
1.
2.
types:
Passive attacks
Active attacks
12



Learn or make use of information from the
system but does not affect system
resources
Eavesdropping, monitoring, or
transmissions
Two types:
1.
2.
Release of message contents
Traffic analysis
13

Release of message contents for a
telephone conversation, an electronic mail
message, and a transferred file are subject
to these threats
14

Traffic analysis

Encryption masks the contents of what is
transferred so even if obtained by someone,
they would be unable to extract information
15


Involve some modification of the data
stream or the creation of a false stream
Four categories:
1.
2.
3.
4.
Masquerade
Replay
Modification
Denial of service
16

Masquerade takes place when one entity
pretends to be a different entity.
17

Replay involves the passive capture of a data
unit and its subsequent retransmission to
produce an unauthorized effect.
18

Modification of messages means that some
portion of a legitimate message is altered, or
that messages are delayed or reordered, to
produce an unauthorized effect.
19
Denial of service (DoS) prevents or inhibits
the normal use or management of
communications facilities


disable network or overload it with messages
20



Intruders: Intruders are attackers who try to find the way to hack
information by breaking the privacy of a network like LAN or
internet.
Masquerader: A user who does not have the authority to a system,
but tries to access the information as an authorized user. They are
generally outside users.
Misfeasor: They are commonly internal users and can be of two
types:
1.
2.

An authorized user with limited permissions.
A user with full permissions but misuses his powers.
Clandestine user: A user who acts as a supervisor and tries to use
his privileges so as to avoid being captured.
 Someone who seizes supervisory control of the system and uses this
control to evade auditing and access controls or to suppress audit
collection.

IDS can also be system-specific using custom tools and honey pots.
In the case of physical building security, IDS is defined as an alarm
system designed to detect unauthorized entry.
21





~ attack on a website that changes the visual appearance of the
site. These are typically the work of system crackers, who break
into a web server and replace the hosted website with one of
their own.
A message is often left on the webpage stating his or her
pseudonym and the output from "uname -a" and the "id"
command along with "shout outs" to his or her friends.
Sometimes, the Defacer makes fun of the system administrator
for failing to maintain server security.
Most times - harmless, but can sometimes be used as a
distraction to cover up more sinister actions such as uploading
malware.
A high-profile website defacement was carried out on the
website of the company SCO Group following its assertion that
Linux contained stolen code. The title of the page was changed
from "Red Hat v. SCO" to "SCO vs. World," with various satirical
content following.
[Linux news documenting SCO defacement]
22
 Unaccountable
disk utilization
 Unaccountable file system modification
 Unaccountable CPU utilization
 Network saturation
 Unknown process using sockets
 Abnormal network/system activity
mms©
24
25
 Simply
~ knowing you are under attack
 But it’s not that simple…
 How do you know?
 It might not be obvious
©2009 KRvW Associates, LLC
26

generally detects unwanted manipulations of computer
systems, mainly through the Internet. The manipulations
may take the form of attacks by crackers.

used to detect several types of malicious behaviors that
can compromise the security and trust of a computer
system. This includes network attacks against vulnerable
services, data driven attacks on applications, host based
attacks such as privilege escalation, unauthorized logins
and access to sensitive files, and malware (viruses, trojan
horses, and worms).
27




An IDS is a device (or application) that monitors network and/or
system activities for malicious activities or policy violations and
produces reports to a Management Station.
Intrusion prevention is the process of performing intrusion detection
and attempting to stop detected possible incidents.
Intrusion detection and prevention systems (IDPS) are primarily
focused on identifying possible incidents, logging information about
them, attempting to stop them, and reporting them to security
administrators. In addition, organizations use IDPSs for other
purposes, such as identifying problems with security policies,
documenting existing threats, and deterring individuals from violating
security policies. IDPSs have become a necessary addition to the
security infrastructure of nearly every organization.
IDPSs typically record information related to observed events, notify
security administrators of important observed events, and produce
reports. Many IDPSs can also respond to a detected threat by
attempting to prevent it from succeeding. They use several response
techniques, which involve the IDPS stopping the attack itself,
changing the security environment (e.g., reconfiguring a firewall), or
changing the attack’s content.
[Guide to IDPS, NIST, 2007]
28
Assume the behavior of the intruder differs from
the legitimate user
 Statistical anomaly detection




Collect data related to the behavior of legitimate users over
a period of time
Statistical tests are used to determine if the behavior is not
legitimate behavior
Rule-based detection


Rules are developed to detect deviation from previous
usage pattern
Expert system searches for suspicious behavior
29

Audit record

Native audit records


All OSs include accounting software that collects information on
user activity
Detection-specific audit records

Collection facility can be implemented that generates audit
records containing only that information required by the IDS
30
 Intrusion






detection system (IDS)
~ a software, hardware or combination of both
Used to detect intruder activity
Snort – an open source IDS
An IDS may have different capabilities depending
upon how complex and sophisticated the
components are
IDS appliances that are a combination of hw & sw
are available from many companies
IDS may use signatures, anomaly-based
techniques or both.
31
 Network



IDS (NIDS)
Capture data packets traveling on the network
media (cables, wireless) and match them to a
database of signatures.
Depending upon whether a packet is matched
with an intruder signature, an alert is generated
or the packet is logged to a file or database.
One major use of Snort is as a NIDS.
32
 Host



IDS (HIDS)
Host-based IDS are installed as agents on a host.
Can look into system and application log files to
detect any intruder activity.
Two types:


Reactive – they inform you only when something has
happened.
Proactive – they can sniff the network traffic coming
to a particular host on which the HIDS is installed and
alert you in real time.
33

Signatures





~ the pattern you look for inside a data packet.
Used to detect one or multiple types of attacks, e.g.
the presence of “scripts/iisadmin” in a packet may
indicate intruder activity
May present in different parts of a packet depending
upon the nature of the attack, e.g. in the IP header,
transport layer header (TCP or UDP header) and/or
application layer header or payload
Some vendor-specific IDS need updates from vendor
to add new signatures when a new type of attack is
discovered.
Snort allows you to update signatures yourself.
34
 Alerts




~ any sort of user notification of an intruder
activity.
to inform security administrator when IDS
detects an intruder
Can be in the forms of pop-up windows, logging
to a console, sending emails, etc.
Stored in log files or DBs – for later analysis by
experts
35
 Logs





Log messages are usually saved in files
Can be saved either in text or binary format.
The binary files can be viewed later using Snort
or tcpdump program.
Barnyard – can also be used to analyze binary log
files generated by Snort
Logging in binary format is faster because it
saves some formatting overhead. In high-speed
Snort implementations, logging in binary mode is
necessary.
36

False positive / False alarms

~ alerts generated due to an indication that is not an intruder
activity, e.g.


misconfigured internal hosts may sometimes broadcast messages
that trigger a rule resulting in generation of a false alert.
some routers, e.g. Linksys home routers, generate lots of UPnP
(Universal Plug and Play) related alerts
False positive errors will lead IDS users to ignore its output, as
it will classify legitimate actions as intrusions.
 If too many false positives are generated, the operators will
come to ignore the output of the system over time, which may
lead to an actual intrusion being detected but ignored by the
users.
 The occurrences of this type of error should be minimized (it
may not be possible to completely eliminate them) so as to
provide useful information to the operators.
 To avoid false alarms, you have to modify and tune different
default rules. In some cases you may need to disable some
rules.

37
 False




negative / miss
occurs when an action proceeds even though it is
an intrusion.
False negative errors are more serious than false
positive errors because they give a misleading
sense of security.
By allowing all actions to proceed, a suspicious
action will not be brought to the attention of the
operator.
The IDS is now a liability as the security of the
system is less than it was before the intrusion
detector was installed
38
 Sensor

The machine on which an IDS is running is also
called the sensor – it is used to “sense” the
network.
39
 Network
IDS (NIDS)
 Host-based
IDS (HIDS)
 Protocol-based
 Application
 Hybrid
IDS (PIDS)
Protocol-based IDS (APIDS)
IDS
40
 NIDS



independent platform which identifies intrusions
by examining network traffic and monitors
multiple hosts.
gain access to network traffic by connecting to a
hub, network switch configured for port
mirroring, or network tap.
Network “camera” monitors from afar



Where is the camera located?
What is it pointed at?
An example of a NIDS is Snort.
41
 HIDS


consists of an agent on a host which identifies
intrusions by analyzing system calls, application
logs, file-system modifications (binaries,
password files, capability/ACL databases) and
other host activities and state.
“Camera” located on each computer



Collects system-level log data, on the system
What do they see?
An example of a HIDS is OSSEC.
42
 PIDS



consists of a system or agent that would typically
sit at the front end of a server, monitoring and
analyzing the communication protocol between a
connected device (a user/PC or system).
For a web server this would typically monitor the
HTTPS protocol stream and understand the HTTP
protocol relative to the web server/system it is
trying to protect.
Where HTTPS is in use then this system would
need to reside in the "shim" or interface between
where HTTPS is un-encrypted and immediately
prior to it entering the Web presentation layer.
43
 APIDS


consists of a system or agent that would typically
sit within a group of servers, monitoring and
analyzing the communication on application
specific protocols.
For example; in a web server with database this
would monitor the SQL protocol specific to the
middleware/ business-login as it transacts with
the database.
44
 Hybrid



IDS
combines two or more approaches.
Host agent data is combined with network
information to form a comprehensive view of the
network.
An example of a Hybrid IDS is Prelude.
45
Sensors – generate security events
2. Console - monitor events and alerts and
control the sensors
3. Central Engine - records events logged by the
sensors in a database and uses a system of
rules to generate alerts from security events
received.
 There are several ways to categorize an IDS
depending on the type and location of the
sensors and the methodology used by the engine
to generate alerts. In many simple IDS
implementations all three components are
combined in a single device or appliance.
1.
46
 In

a passive system
The IDS sensor detects a potential security
breach, logs the information and signals an alert
on the console and/or owner.
 In
a reactive system, a.k.a. intrusion
prevention system (IPS)

the IDS responds to the suspicious activity by
resetting the connection or by reprogramming
the firewall to block network traffic from the
suspected malicious source. This can happen
automatically or at the command of an operator.
47
 Positive

Assume everything is dangerous/harmful unless
proven safe
 Negative


Assume everything is safe unless proven
dangerous
E.g. anti virus
 Which do you prefer?
 Almost all IDS is based on (-) approach
©2009 KRvW Associates, LLC
48


Though both relate to network security, but different.
Firewall
looks outwardly for intrusions in order to stop them from
happening.
 limits access between networks to prevent intrusion and do not
signal an attack from inside the network.
 A system which terminates connections is called an IPS, and is
another form of an application layer firewall.


IDS
evaluates a suspected intrusion once it has taken place and
signals an alarm.
 also watches for attacks that originate from within a system
 by examining network communications, identifying heuristics
and patterns (often known as signatures) of common computer
attacks, and taking action to alert operators.

49
 IDS
is an important component of defensive
measures protecting computer systems and
networks from abuse.
[John Mc Hugh, Alan Christie, and Julia Allen,
“Defending Yourself: The Role of Intrusion Detection Systems”,
IEEE Software, 2000.]
50
mms©
51
 To

Identify malicious or suspicious activities
 To

detect misuse
detect anomaly
Note activity that deviates from normal
behaviour
 To
conduct forensics
 To record and analyze network traffic
 To protect intellectual property
 To respond to the activity
mms©
52
 To
initiate sound, business-like incident
response process




Minimize damage
Maintain evidence
Protect the business
Criminal prosecution
 IDS
need to enable these things
©2009 KRvW Associates, LLC
53
Monitor and analyze user and system activities
 Auditing of system and configuration
vulnerabilities
 Assess integrity of critical system and data files
 Recognition of pattern reflecting known attacks
 Statistical analysis for abnormal activities
 Data trail, tracing activities from point of entry
up to the point of exit
 Installation of decoy servers (honey pots)
 Installation of vendor patches (some IDS)

mms©
54
mms©
55
 Attackers
don’t want to get caught
 ~ bypass detection by creating different
states on the IDS and on the targeted
computer.
 The adversary accomplishes this by
manipulating either the attack itself or the
network traffic that contains the attack.
 Discuss:

Ways to evade/defeat the IDS? i.e. to avoid being
detected
56

They will use techniques to try to confuse your IDS


Packet fragmentation (e.g. fragroute) – time-outs [link]
Insertion/evasion attacks









Requires complete reassembly of packets and knowledge of end
system exception handling
Encryption
DDoS attack (CPU, memory, bandwidth, false positives)
Polymorphism
Data encoding
Javascript obfuscation
Source spoofing
Distributed sources
Stealth probes
57



we can manually
redefine the fragments
(in a packet), put a
fragment 100 (IP) with a
bogus port 80.
IDS assume port 80 is
safe, and let it through.
But when the packet is
reassembled, it is
actually on port 443,
and contains the nasty
data/program xyzzy.
Port 443
IP
1
2
3
TCP
Data
[xyzzy]
4
58
 If
your attacker works for you
 Signature systems not likely to yield good
results
 Anomaly systems
 If attacker knows how IDS is deployed, it can
likely be fooled
©2009 KRvW
59
 Internal


NIDS can spot forbidden traffic
AIM, Skype, VPN
File/system sharing
 This
can alert security team to policy
violations
 Beware of cultural impact
 You do have a written policy, right?


General counsel coordination
Expectation of privacy
©2009 KRvW
60

Snort


Sorcefire
Open source,
commercially supported
Bro (freeware)
 Cisco Secure IDS
 Cyclops

©2009 KRvW
Dragon Sensor
 NetDetector – Cisco
 RealSecure Network –
IBM
 Shoki (freeware)
 SecureNet IDS
 SecurityMetrics

61
GFI Events Manager
 RealSecure Server Sensor
 Symantec Host IDS
 Swatch
 CSA Storm Watch
 SNIPS
 Sourcefire RUA
 Snare Agents
 NetIQ Security Manager

©2009 KRvW
62
Network Security
Platform (McAfee)
 RealSecure Guard
 IntruPro-IPS
 IPS-1 (Checkpoint)
 DefensePro
 UnityOne
 Strata Guard

©2009 KRvW
 Snort
Inline
 StoneGate IPS
 iPolicy Intrusion
Prevention Wall
 Netscreen
 SecureNet IPS
 DeepNines SES
 Sourcefire IPS
63
McAfee HIPS
 RealSecure Server
Sensor
 Dragon IP
 DefenseWall HIPS
 Primary Response
 Cisco Security Agent
 Host Intrusion
Prevention Service

©2009 KRvW
 Threat
Sentry
 Proventia Desktop
 WehnTrust
 System Safety
Monitor
 Prevx ABC
 AppDefend
 Third Brigade
64
 IDS
is only one piece of the whole security
puzzle
 IDS must be supplemented by other security
and protection mechanisms
 They are very important parts of your
security architectures but does not solve all
your problems
 The usage of different types of IDS depends
on the type of the user/organization
 Different types of IDS has its own strengths
and weaknesses
65

Guide to Intrusion Detection and Prevention Systems (IDPS), NIST
CSRC special publication SP 800-94, released 02/2007

Whitman, Michael, and Herbert Mattord. Principles of
Information Security. Canada: Thomson, 2009. Pages 290 & 301

"Symantec Internet Security Threat Report: Trends for JulyDecember 2007 (Executive Summary)" (PDF). Symantec Corp..
April 2008. pp. 1–3. Retrieved May 11, 2008.

Shiflett, Chris (December 13, 2004). "Security Corner: Cross-Site
Request Forgeries". php|architect (via shiflett.org). Retrieved
2008-07-03.
Acknowledgement: Parts of the course materials are the courtesy of Mrs.
Madihah Mohd Saudi and Dr. Solahuddin Shamsuddin; and Ken van Wyk,
KRvW Associates, LLC @ Adastra “Intrusion Detection and Prevention InDepth” professional course (25-27 May 2009, KL)
66
Download