intrusion detection cs461/ece422 spring 2012. reading material chapter 8 of the text

25
Intrusion Detection CS461/ECE422 Spring 2012

Upload: leo-haynes

Post on 16-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Intrusion Detection

CS461/ECE422Spring 2012

Page 2: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Reading Material

• Chapter 8 of the text

Page 3: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Outline

• What are intrusions? Who are intruders• Host-based Intrusion Detection• Network-based Intrusion Detection

Page 4: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

What is an Intrusion?

Page 5: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Who are the Intruders

• Hackers– Possibly benign– Outside access– Clever, plenty of time. Community to share with.

• Criminal Organizations– Outside access, mostly. Social-engineering– In it for the money. Not benign

• Insiders– Should have some access– May be exploiting degree of access or intent of access– May work from the inside to increase access– Motivated by money, revenge

Page 6: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Who are the Intruders?

• Masquerader– Pretend to be a legitimate user. E.g., guess a

password• Misfeasor

– Legitimate user behaving badly• Clandestine

– Seizes privileged control of the system. Able to clean up audit logs and evade access controls

Page 7: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Intrusion Detection

• Holy Grail: Detect and correct “bad” system behaviour

• Detection can be viewed as two classes– Anomaly detection: Use statistical techniques to determine

unusual behaviour– Mis-use detection: Use signatures to determine occurrence

of known attacks• Detection can be performed on host data (HIDS),

network data (NIDS), or a hybrid of both

Page 8: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Bad Detections

• False Positive– Detect activity as an intrusion, but it isn’t– Reduce by loosening intrusion detection rules

• False Negative– Miss reporting bad behavior as an intrusion– Reduce by tightening intrusion detection rules

Page 9: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

IDS Architecture• Agents/sensors run at the lowest level gathering data. Perform

some basic processing.• Agents send data to a Director/analyzer that performs more

significant processing of the data. Potentially there is a hierarchy of agents and directors– Director has information from multiple sources and can perform a time-

based correlation to derive more significant actions• Directors invoke Notifiers to perform some action in response to a

detected attack– Popup a window on a screen– Send an email or a page– Send a new syslog message elsewhere.– Adjust a firewall or some other policy to block future action from the attacker

– User interface– Reviewing events– Configuring system

Page 10: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

IDS Elements

Page 11: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Data Sources

• Direct data– Network packets– System calls

• Indirect data– Syslog data, Windows event logs– Events from other intrusion detection systems– Netflow information generated by routers about

network traffic

Page 12: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Anomaly/statistical detection

• Seems like using statistics will result in a more adaptable and self-tuning system– Statistics, neural networks, data mining, etc.

• How do you characterize normal?– Create training data from observing “good” runs– Threshold detection vs Profile-based

• How do you adjust to real changes in behaviour?– Gradual changes can be easily addressed. Gradually adjust expected

changes over time– Rapid changes can occur. E.g., different behaviour after work hours or

changing to a work on the next project

Page 13: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Example Anomaly Detection

• System call analysis– Forrest’s Paper

http://www.cs.unm.edu/~forrest/publications/acsac08.pdf• Profile each program on the sequence of system calls

– Keep a running window of n consecutive systems calls– During training runs build up data base of system call

sequences• During normal operation, check for sequences not in the

database– Indicative of malicious operation either via code injection or

abnormal execution for the environment

Page 14: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Evasion

• Mimicry: tailor attack sequences to include conform to statistical patterns– E.g., use same sequences of system calls as normal

software, with different arguments• Training: confuse training into classifying

malicious behavior as good– Affect training phase– Gradually change statistical patterns (“frog

boiling”)

Page 15: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Mis-use/Signature Detection• Fixed signatures are used in most deployed Network IDS products

– E.g., Cisco, ISS, Snort• Like virus scanners, part of the value of the product is the team of

people producing new signatures for newly observed malevolent behaviour

• The static signature mechanism has obvious problems in that a dedicated attacker can adjust his behaviour to avoid matching the signature.

• The volume of signatures can result in many false positives– Must tune the IDS to match the characteristics of your network– E.g., what might be unusual in a network of Unix systems might be

normal in a network of Windows Systems (or visa versa)– Can result in IDS tuned too low to miss real events– Can hide real attacks in the mass of false positives

Page 16: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Creating Signatures

• Rule-based anomaly detection– Analyze historical data– Build rules to describe patterns found in historical

data• Rule-based penetration identification

– Use knowledge of attacks to build rules to detect those attacks

– E.g, rules to detect brute force password attacks

Page 17: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Example Signature

• Signature for port sweep– A set of TCP packets attempting to connect to a

sequence of ports on the same device in a fixed amount of time

• In some environments, the admin might run nmap periodically to get an inventory of what is on the network– You would not want to activate this signature in

that case

Page 18: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Host Based IDS

• Tripwire – Very basic detection of changes to installed binaries

• More recent HIDS. Look at patterns of actions of system calls, file activity, etc. to permit, deny, or query operations– Cisco Security Agent– Symantec– McAfee Entercept

Page 19: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Classical NIDS deployment

NIDS Agent

Outside Inside

Management

Promiscuous Interface

NIDS Director

Page 20: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

NIDS Remediation Options

• Log the event• Send text or email

• Reset the connection• Change the configuration of a nearby router or

firewall to block future connections

Page 21: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Intrusion Protection Systems (IPS)

• Another name for inline NIDS• Latest buzz among the current NIDS vendors• Requires very fast signature handling

– Slow signature handling will not only miss attacks but it will also cause the delay of valid traffic

– Specialized hardware required for high volume gateways• When IDS is inline, the intrusion detector can take

direct steps to remediate.• If you move IDS into the network processing path,

how is this different from really clever firewalling?

Page 22: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Network IPS scenario

NIDS Agent

Outside Inside

NIDS Director

Page 23: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Honey Pots

• Reconnaissance for the good guys• Deploy a fake system

– Observe it being attacked• Resource management

– Cannot be completely passive• Must provide enough information to keep attacker

interested– Must ensure that bait does not run away

• Scale– Host, network, dark address space

Page 24: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Honey Pots

Page 25: Intrusion Detection CS461/ECE422 Spring 2012. Reading Material Chapter 8 of the text

Summary

• Detecting intrusions accurately enough is difficult

• Dynamic IDS is necessary to keep up with attackers

• IDS can be applied to hosts and networks