Network Security Monitoring COEN 250 Indicators and Warnings Indicator “an item of information which reflects the intention or capability of a potential enemy to adopt or reject a course of action”* Indications and Warnings “the strategic monitoring of world military, economic, and political events to ensure that they are not the precursor to hostile or other activities which are contrary to U.S. interests”** * DoD Dictionary of Military Terms ** U.S. Army Intelligence, Document on Indicators in Operations Other Than War Indicators and Warnings Indicators generated by an Intrusion Detection System (IDS) are alerts Examples: Warnings Web server initiates outbound FTP to a site in Russia Spike in ICMP messages Result of analyst’s interpretation of indicator Escalation of warning Conclusion that warning warrants further analysis Conclusion that warning is indeed an incident Triggers Incident Response Intrusion Detection Systems Intrusion Detection Process of monitoring events occurring in a computer system or network Analyzing them for signs of possible incidents Incident Violation or imminent threat computer security policies acceptable use policies standard security practices Arise from Malware Attacks Honest errors of violation of Intrusion Detection Systems Intrusion Detection System Software that automatizes the detection process Intrusion Prevention System Additionally has the capacity to stop some possible incidents Intrusion Detection Systems Key functions of IDS Technology Recording information related to observed events Notifying security administrators of important observed events Producing reports IDPS technology can be augmented by human analysis Intrusion Detection Systems Key functions of IPS technology IPS stops attack itself Terminate network connection Terminate user session Block access to target from offending user account IP address Block all access to target IPS changes security environment IPS changes configuration of other security controls to disrupt attack Reconfiguring a network device Altering a host based firewall Apply patches to a host it detects is vulnerable Intrusion Detection Systems Key functions of IPS technology IPS changes attack’s contents Remove or replace malicious portions of an attack Remove an infected file attachment from e-mail, but allow e-mail sans attachment to reach destination IPS acts as proxy and normalizes incoming requests Intrusion Detection Systems Current IDPS technology has false positives and false negatives. Attackers use evasion techniques E.g using escaping Intrusion Detection Systems Common Detection Methodologies Signature Based Detection Signature is a patterns corresponding to a known threat. Examples Telnet attempt with user name “root” e-mail with “You received a picture from a *” OS system log entry indicating that host’s auditing has been disabled Intrusion Detection Systems Common Detection Methodologies Signature-Based Detection Very effective against known threats Basically ineffective against unknown threats Subject to evasion by polymorphic attacks Intrusion Detection Systems Common Detection Methodologies Anomaly-Based Detection Relies on defining normal activity against observed events Identifies significant deviations Anomaly-Based IDPS has profiles Representing normal Users Hosts Network connections Applications Developed behavior of actors and activities through observation over time Intrusion Detection Systems Common Detection Methodologies Anomaly-Based Detection Profile Examples: Amount of email a user sends Bandwidth of web activities Number of failed login attempts for a host Level of processor utilization for a host Intrusion Detection Systems Common Detection Methodologies Anomaly-Based Detection Can be effective at detecting unknown threats Depend on accuracy of profiles Inadvertent inclusion of malicious activity in a profile Dynamic profiles can be subverted by an attacker increasing slowly activity Static profiles generate false positives if usage patterns differ Subject to stealth attacks Make it difficult for human analyst to find reason for an alert Intrusion Detection Systems Common Detection Methodologies Stateful Protocol Analysis Sometimes known as “deep packet inspection” Compares predetermined profiles of generally accepted definitions of benign protocol activity for each protocol state against observed events to identify deviations “Stateful” refers to IDPS capability of understanding protocols Intrusion Detection Systems Common Detection Methodologies Stateful Protocol Analysis Can identify unexpected sequences of commands Allows tracking of authenticators for each session Helpful for human analysis of suspicious activity Typically includes reasonableness check for individual commands E.g. minimum and maximum length of arguments Intrusion Detection Systems Common Detection Methodologies Stateful Protocol Analysis Uses protocol models based on standards But most standards are underspecified Many implementations are not completely compliant Very resource intensive Cannot detect attacks that do not violate a protocol Detects protocol bending attacks Intrusion Detection Systems Network Based IDPS Wireless IDPS Network Behavior Analysis (NBA) Host-Based IDPS Intrusion Detection Systems Components Sensors / Monitors Agent Used for network activity monitoring Used for host-based IDPS Management Server Centralized component that receives data from agents and monitors Perform correlation: Database server Matching event information from different monitors Repository for previously recorded event information Console Interface for IDPS Network Monitors Deployment Depends on monitoring zones Perimeter External firewall through boundary router to internet DMZ Wireless Intranet(s) Network Monitors Data Collection Tools Hubs SPAN (Switched Port Analyzer) TAPs (Test Access Port) Inline Devices Network Monitors Sensor Management Console access Hard to manage In-band remote access Potential for loss of data confidentiality Not functioning during a successful DoS attack Virtual LAN Potential for loss of data confidentiality Not functioning during a successful DoS attack Out-of-band remote access E.g. modem Intrusion Detection Systems Networks Security Capabilities Information Gathering OS identification of hosts General characteristics of networks Logging to confirm alerts to investigate incidents to correlate events with other sources need to be protected against an attacker need to deal with clock drift Intrusion Detection Systems Networks Security Capabilities Detection Capabilities Typically require tuning and customization Thresholds Blacklists and Whitelists Alert Settings IDPS code viewing and editing Prevention Capabilities Vary with technology / field Intrusion Detection Systems Management Implementation Architecture Design Placement of sensors Reliability of sensors Location of other components System interfaces Systems to which IDPS provide data Systems which IDPS resets for prevention Systems that manage IDPS components Patch management software Network management software Intrusion Detection Systems Management Implementation Component Testing and Deployment Consider deployment in a test environment E.g. to prevent surge of false positives IDPS deployment usually interrupts networks or systems for component installation Configuration typically a major effort Intrusion Detection Systems Management Implementation Securing IDPS components IDPS are often targeted by attackers Because of effects on security Because of sensitive data collected by IDPS System hardening Usual means Separate accounts for each IDPS user and administrator Configure firewalls, routers, etc to limit direct access to IDPS components Protect IDPS management communication Physically Logically Encryption Strong Authentication Intrusion Detection Systems Management Operations and Maintenance Typically GUI, but sometimes command lines Typical capabilities Drill down Reporting functions Database open to scripted searches Need for ongoing solution maintenance Monitor IDPS components for operational and security issues Periodic test of proper functioning Regular vulnerability assessments Receipt of notifications of security problems from vendor Receipt of notifications for updates Intrusion Detection Systems Management Operations and Maintenance Acquiring and Applying Updates Of signature files Of IDPS software components Intrusion Detection Systems Management Building and maintaining personnel skills Basic security training Vendor training Product documentation Technical support Professional services (consulting by vendors) User communities Network Based IDPS Typical components Appliance Specialized hardware and sensor software / firmware Host-based Only software Network Based IDPS Architecture and Sensor Locations Inline All traffic monitored must pass through it Typically placed where firewalls etc. would be placed Either hybrid devices Or placed on the more secure side Network Based IDPS Architecture and Sensor Locations Passive Monitors a copy of actual network traffic Spanning Port Network Tap IDS Load Balancer Receives copies of traffic from several sensors Aggregates traffic from different networks Distributes copies to one or more listening devices Typically not capable of prevention Network Based IDPS Typical detection capabilities Application layer reconnaissance and attacks Typically analyze several dozen application protocols Detect Banner grabbing Buffer overflows Format string attacks Password guessing Malware transmission Network Based IDPS Typical detection capabilities Transport Detects Port scanning Unusual packet fragmentation SYN floods Network layer reconnaissance and attacks layer reconnaissance and attacks Detects Spoofed IP addresses Illegal IP header values Network Based IDPS Typical detection capabilities Unexpected application services Detects Uses Tunneled protocols Backdoors Hosts running unauthorized application services Stateful protocol analysis Anomaly detection Policy violations Detects Use of inappropriate Web sites Use of forbidden application protocols Network Based IDPS Detection Accuracy High degree of false Difficulty based on positives and false negatives Complexity of activities monitored Different interpretation of meaning of traffic between IDPS sensor and client / server Cannot deal with encrypted VPN, HTTP over SSL, SSH Have limited capacity Number of connections Depth of analysis Longevity of connections network traffic Network Based IDPS Attacks on network based IDPS DDoS attacks generate unusually large volumes of traffic Generate loads of anomalous traffic to exhaust IDPS resources Blinding Generates many IDPS alerts Real attack is separate, but contemporary Network Based IDPS Prevention capabilities Passive sensors only Ending current TCP session Session sniping: sending resets to both partners Inline only Perform inline firewalling Throttle bandwidth usage Alter malicious content Both passive and inline Reconfigure other network security devices Run a third party program or script Wireless IDPS Wireless attacks typically require proximity to access points or stations Typically, need access to radio link between stations and access points Many WLANs are configured with no or weak authentication Wireless IDPS Components Same as for network-based Consoles Database servers Management servers Sensors IDPS These function differently than for wired IDPS Needs to monitor two bands (2.4 GHz and 5 GHz) Divided into channels Sensor only models a single channel Channel scanning (monitor a channel for seconds at most) Wireless IDPS Wireless sensors Dedicated sensors Typically completely passive Fixed or mobile Bundled with an access point Bundled with a wireless switch Host-based IDPS sensor to be installed on a station Wireless IDPS Wireless IDPS Sensor Locations Physical security Often deployed in open locations because of greater range than in closed locations Sensor range Cost AP and wireless switch locations Consider bundling or collocation Wireless IDPS Security capabilities Information Identifying WLAN devices gathering Typically based on SSIDs and MAC addresses Identifying WLANs Keep track of observed WLANs identified by SSID Logging capability Wireless IDPS Security capabilities Detection capability Events Unauthorized WLANs and WLAN devices Poorly secured WLAN devices A station is using WEP instead of WPA2 Unusual usage patterns The use of (active) wireless network scanners Denial of service (DoS) attacks and conditions Impersonation and man-in-the-middle attacks Wireless IDPS Detection accuracy Usually quite high due to limited scope Tuning and Customization Specify authorized WLANs, access points, stations Set thresholds for anomaly detection Some use blacklists and whitelists Wireless IDPS Wireless IDPS cannot detect: Attacker passively monitoring traffic Attackers with evasion techniques Attacker can identify IDPS product Physical survey Fingerprinting by prevention actions Attacker takes advantage of product’s channel scanning scheme Short bursts of attack packages on channels not currently monitored Attack on two channels at the same time Wireless IDPS Attacks on wireless IDPS Same DDoS techniques Physical attacks Jamming Wireless IDPS Prevention capabilities Wireless Terminate connections between rogue or misconfigured stations and rogue or misconfigured access point Send discontinue messages to endpoints Wired prevention prevention Block network activity involving a particular station or access point Network Behavior Analysis (NBA) Examines Network traffic or Statistics on network traffic Identifies unusual traffic flows Host Based IDPS Monitors a single host and events occuring within that host Wired network traffic Wireless network traffic System logs Running processes File access and modification System and application configuration changes Host Based IDPS Components and architectures Agents (typically detection software) Monitor activity on a single host Transmit date to management servers Agents can be implemented as dedicated appliances Monitors: Servers Clients An application service ( application based IDPS) Host Based IDPS Host Based IDPS Agent locations Commonly deployed to critical hosts But could be in a majority of systems including laptops and desktops Host Based IDPS Host architecture Agents often alter internal architecture of hosts Done by a shim Layer of code placed between existing layers of code Shim intercepts data when it is passed between different layers Shim analyzes data and determines whether data is allowed or not Host Based IDPS Security capabilities Logging Detection Code analysis Code behavior analysis in a sandbox Buffer overflow detection through detecting tell-tale sequences of instructions or memory accesses System call monitoring Keylogger COM object loading Driver loading Application and library lists Host Based IDPS Security capabilities Detection Network traffic analysis Network traffic filtering Host based IDPS contains a host based firewall File system monitoring Basically the same a network or wireless IDPS would do File integrity checking File attribute checking File access attempts Log analysis of OS and application logs Network configuration monitoring Host Based IDPS Technology limits Alert generation delays Centralized reporting delays Host resource usage Conflicts with existing security controls Rebooting hosts to update IDPS Host Based IDPS Prevention capabilities Code analysis Network traffic analysis Network traffic filtering File system monitoring Removable media restrictions Audio-visual device monitoring Automatic host hardening Process status monitoring Network traffic sanitization