Distributed IDS

advertisement
DISTRIBUTED INTRUSION DETECTION SYSTEM
Mohammad Hossein Salehi and Kiumars Talaee
Computer Engineering Department,
Mazandaran University of Science and Technology,
Distributes Systems Class Seminar
Supervisor: Hadi Salimi
mhss.pro@gmail.com , kiumars.talaee@gmail.com
DIDS
Introduction to DIDS
Why DIDS ?
DIDS
 Grow
of Web Based Technology and Network
 Distributed Attacks
 Critical Information on Web
Identification
 Availability

The Working of IDS
DIDS
 Sniff
Network Traffic
 Event Sensor
 Intrusion Detection
 Signature
base
 Anomaly base
 Alert
Generator
 Hardware IDS
 High
Secure
 Expensive
 Software
 Work
IDS
Easily
 Cheaper
DIDS
The Division of IDS
 Information
Source Based
 Strategist Analysis Based
 Time Event Based
 Structure Based
 The kinds of Response to Intrusion
DIDS
The Information Source Based IDS
 Audit
trails
 Network Packets
 Application logs
 Wireless Sensor Traffic
 Sensor Alerts
 Therefore We Have three Kind of Division
 HIDS
 NIDS
 DIDS
(Agent based IDS)
DIDS
The Information Source Based IDS

Therefore We Have three Kind of Division :
 HIDS
 NIDS
 DIDS
(Agent based IDS)
Client Based or HIDS
DIDS
 Just
secure The Host
 Increase the IDS Performance with Decrease The roles
 Have lower traffic than NIDS and DIDS
 Working on Application Layer And can’t detection
many of attacks on lower layer
Network Based or NIDS
DIDS
 Collecting
and Analyzed in Network Traffic Source
Information
 Have a Two Segment
 Monitor
 Agent
 Maybe
Have a Management Console
 Have a Problem in upper than 100 Mbps
 The Scope Dependency on local Segments
 This have good Performance on DoS Attacks
 If Network Traffic have a Encryption can not work
Agent Based or DIDS
DIDS
 Collecting
and Analyzed in NIDS and HIDS
 Have a Several NIDS or HIDS or Hybrid of these with
one Central Management Station
 Each IDS Sending Report to Central Management
Station
 Central Management Station Analyzed the Reports and
Generate the Alert for Security Officer
 Central Management Station Update the Role
Database
 In this system both collection and Analyzed the data
have a Distributed Structure
DIDS
The Picture of DIDS
Strategist Analysis Based
DIDS
 Anomaly
Based Detection or Statistical based
 Signature based Detection
Time Event Based
DIDS
 Real
time Detection
 Response
 Offline
 First
to the Attacks in Real time
Detection
Monitor and store the data and then Analyzed and
generate the Alerts
Stracture Based Division
DIDS
 Centralized
 Single
architecture
Monitored System
 Distributed
 Multiple
Architecture
Monitored Systems
Response Based Division
DIDS
 Active
Response
 Passive Response
DIDS
Distributed Intrusion Detection System

Intrusion Detection System with Distributed Planning
Easily can work on fast Network Traffic
 In Distributed Systems we have little single point of failure


DIDS with Distributed Sensors :
ASAX (Mouinji et al., 1995)
 NSTAT (Kemmerer, 1997)
 DIDS (Snapp etal., 1999)
 NetSTAT (Vigna and Kemmerer, 1999)


DIDS with Distributed Sensors and Level Architecture:
EMERALD (Porras and Neumann, 1997)
 GRIDS (Stanford _ Chen et al ., 1996)
 AAFID (spafford and Zamboi, 2000)
 CIDF (Stanford _ Chen et al ., 1998)
 MADAM ID (Ning et al., 2002)

DIDS
Distributed Intrusion Detection System
A
Hierarchical Architecture of Distributed Intrusion
Detection System with free communication between
layers
DIDS
Distributed Intrusion Detection System
 DIDS
Projects with Autonomous Agents
 AAFID
(Autonomous Agent for Intrusion Detection) in Purdu
University
 IDA (Intrusion Detection Agent System) Japan IT Agency
 JAM (Java Agent for Meta learning) in Columbia University
Mobile Agent in IDS
DIDS
 Overcoming
Network Latency
 Reducing Network Load
 Autonomous and Asynchronous Execution
 Dynamic Adaption
 Platform Independence
 Protocol Encapsulation
Two Usual Attack in Network
DIDS
 DDoS
or Distributed Denial of Service
 Probing
DIDS Problems
DIDS
 Increase
the Analyze Speed
 Security in Sending Management Packets
 Expensive
 Traffic Monitoring Rate
DIDS
References
[1] Ilija Basicevic, Miroslav Popovic, Vladimir Kovacevic ,"The Use of Distributed
Network-Based IDS Systems in Detection of Evasion Attacks",IEEE Advanced
Industrial Conference on elecommunications, AICT 2005, Lisbon, Portugal, July 1720, 2005
[2] Ashok Kumar Tummala, Parimal Patel, "Distributed IDS using Reconfigurable
Hardware," ipdps, pp.426, 2007 IEEE International Parallel and Distributed
Processing Symposium, 2007
[3] Kabiri, Peyman; Ghorbani, Ali, “A Rule-Based Temporal Alert Correlation System”,
International Journal of Network Security, Vol. 5, No.1, pp. 66-72, July 2007
[4] Ajith Abraham, Ravi Jain, Johnson Thomas and Sang Yong Han, “D-SCIDS:
Distributed SoftComputing intrusion detection system”, Journal of Network and
Computer Applications 30, PP 81–98, 2007
[5] Michael P. Brennan , “Author Retains Full Rights AD Using Snort For a Distributed
Intrusion Detection System”, Version 1.3, SANS Institute , 29.01.2002
DIDS
References
[6] Andrew Baker, Andrew R. Baker, Brian Caswell, Jay Beale, Joel Esler, “Snort IDS and IPS Toolkit”,
Syngress Media Inc Publishing, 2007
[7] Ronald L. Krutz, “Securing SCADA Systems”, Wiley Publishing, December 2005
[8] D. Gavrilis, E. Dermatas, “Real-Time Detection of Distributed Denial of Service Attack Using RBF
Network and Statistical Feature”, International Journal of Computer Network, Vol 48, pp
235-245, 2005.
[9] Paul Innella and Oba McMillan, “An Introduction to Intrusion Detection Systems”, Tetrad Digital
Integrity,. LLC, 2001
[10] A Mouinji, B L Charlier, D Zampunieris, N Habra, “Distributed Audit Trail Analysis”,
Proceedings of the ISOC 95 Symposium on Network and Distributed System Security”, pp. 102112, 1995
[11] R A Kemmerer, “NSTAT: a Model-based Real-time Network Intrusion Detection
System”, Technical Report TRCS97-18, Reliable Software Group, Department of Computer
Science, University of California at Santa Barbara, 1997
DIDS
References
[12] S R Snapp, J Bretano, G V Diaz, T L Goan, L T Heberlain, C Ho , K N Levitt, B
Mukherjee, S E Smaha, T Grance, D M Teal, D Mansur, “DIDS (Distributed Intrusion Detection
System) – motivation architecture and an early prototype”, Proceedings 14th National Computer
Security Conference, Washington DC, October, pp. 167-176, 1999
[13] G Vigna, R A Kemmerer, “NetSTAT: A network-based intrusion detection system”,
Journal Computer Security, Vol. 7, No, 1, pp. 37-71, 1999
[14] P A Porras, P G Neumann, “EMERALD: event monitoring enabling response to
anomalous live disturbances”, Proceedings 20th National Information Security Conference, NIST
1997
[15] S Staniford-Chen, S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, K Levitt, C
Wee, R Yipi, D Z Erkle, “GriDS – a large scale intrusion detection system for large networks”,
Proceedings 19th National Information Security Conference, Vol. 1, pp. 361-370, 1996
[16] E H Spafford, D Zamboni, “Intrusion detection using autonomous agents”, Computer
Networks, 34, pp. 547-570, 2000
DIDS
References
[17] ) S Staniford-Chen, S, B Tung, and D Schnackenberg, “The Common Intrusion Detection
Framework (CIDF)”. Proc. Information Survivability Workshop, Orlando FL, October 1998
[18] R Feiertag, S Rho, L Benzingher, S Wu, T Redmond, C Zhang, K Levitt, D Peticolas, M
Heckman, S Staniford, J McAlerney, “Intrusion Detection Inter-Component Adaptive Negotiation”.
Computer Networks, Vol. 34, pp. 605-621, 2000
[19] W Lee, R A Nimbalker, K K Yee, S B Patil, P H Desai, P P Tran, S J Stolfo, “A data mining
and CIDF based approach for detecting novel and distributed intrusions”, Proc. 3rd International
Workshop on Recent Advances in Intrusion Detection, 2000
[20] P Ning, S Jajodia, X S Wang, “Design and implementation of a decentralized prototype
system for detecting distributed attacks”, Computer Communications, Vol. 25, pp. 1374-1391, 2002
[21] Ajith Abraham, Johnson Thomas, “Distributed Intrusion Detection Systems: A Computational Intelligence
Approach”, ABBASS H.A. AND ESSAM D. (EDS.), IDEA GROUP INC. PUBLISHERS, USA , Vol. 5, pp.
105-135, 2005
2009 ،‫ دانشگاه صنعتی اصفهان‬،‫ آزمایشگاه تخصصی آپــا‬،Snort “ ‫” معرفي نرم افزار‬،‫[مسعود فریدونیان‬22]
2009 ،‫ دانشگاه فردوسي مشهد‬،‫ آزمایشگاه تخصصی آپــا‬،“‫”معرفي سیستمهاي تشخیص نفوذ‬،‫سیده مارال ضیایي‬،‫[ آالله حمیدي‬23]
Download