38
Information Systems 365 October 7, 2008 Intrusion Detection and Prevention

Intrusion Detection And Prevention

Embed Size (px)

Citation preview

Page 1: Intrusion Detection And Prevention

Information Systems 365October 7, 2008

Intrusion Detection and Prevention

Page 2: Intrusion Detection And Prevention

What is Intrusion Detection?

• An Intrusion detection system (IDS) is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems.

Page 3: Intrusion Detection And Prevention

Examples

• Industrial Espionage

• Malware• Disgruntled

Employees

Page 4: Intrusion Detection And Prevention

What does an IDS Detect?

• Attacks against a specific service, such as File Transfer Protocol (FTP)

• Data driven attacks at the application layer. For example, SQL injection error could be used to crash an application.

Page 5: Intrusion Detection And Prevention

What Does and IDS Detect?

• Host Based Attacks (privilege escalation)

• Malware, Viruses, Trojan Horses, Worms

Page 6: Intrusion Detection And Prevention

IDS Components• Sensors - Generate security

events such as log files• Console – Monitors events,

alerts and controls sensors• Engine – Analyzes the data

using artificial intelligence to generate alerts from the events received

• 3 in 1 (sometimes all three are in one appliance)

Page 7: Intrusion Detection And Prevention

Sensor, Looks Boring

Page 8: Intrusion Detection And Prevention

Types of Intrusion Detection Systems

• Network Based Intrusion Detection System (NDS)

• Protocol Based Intrusion Detection System (PIDS)

• Application Protocol Based Intrusion Detection System (APIDS)

• Host Based Intrusion Detection System (HIDS)

• Hybrid System

Page 9: Intrusion Detection And Prevention

Network Intrusion Detection System

• Is an independent platform which identifies intrusions by examining network traffic and monitors multiple hosts. Network Intrusion Detection Systems gain access to network traffic by connecting to a hub, network switch configured for port mirroring, or network tap. An example of a NIDS is Snort.

Page 10: Intrusion Detection And Prevention
Page 11: Intrusion Detection And Prevention

Protocol Based Intrusion Detection System

• Consists of a system or agent that would typically sit at the front end of a server, monitoring and analyzing the communication protocol between a connected device (a user/PC or system).

Page 12: Intrusion Detection And Prevention

Application Protocol Based Intrusion Detection System

• Consists of a system or agent that would typically sit within a group of servers, monitoring and analyzing the communication on application specific protocols. For example; in a web server with database this would monitor the SQL protocol specific to the middleware/business-login as it transacts with the database.

Page 13: Intrusion Detection And Prevention

Host Based Intrusion Detection System

• Consists of an agent on a host which identifies intrusions by analyzing system calls, application logs, file-system modifications (binaries, password files, capability/acl databases) and other host activities and state. An example of a HIDS is OSSEC

Page 14: Intrusion Detection And Prevention

Passive vs. Reactive IDS• In a passive system, the

intrusion detection system (IDS) sensor detects a potential security breach, logs the information and signals an alert on the console and or owner

Page 15: Intrusion Detection And Prevention

Passive vs. Reactive IDS• In a reactive system, also

known as an Intrusion Prevention System (IPS), the IDS responds to the suspicious activity by resetting the connection or by reprogramming the firewall to block network traffic from the suspected malicious source.

Page 16: Intrusion Detection And Prevention

How Is A Firewall Different from and IDS?

• Firewalls look outwardly and protect from external attacks

• An IDS evaluates a suspected intrusion once it has taken place and signals an alarm.

• An IDS also watches for attacks that originate from within a system.

Page 17: Intrusion Detection And Prevention

Firewall vs. IDS

• This is traditionally achieved by examining network communications, identifying heuristics and patterns (often known as signatures) of common computer attacks, and taking action to alert operators

Page 18: Intrusion Detection And Prevention

IDS Evasion Techniques

• Bypass detection by creating unrecognized states on the IDS and on the targeted computer. The adversary accomplishes this by manipulating either the attack itself or the network traffic that contains the attack.

Page 19: Intrusion Detection And Prevention

Obfuscating Attack Payload

• Encoding the attack payload in a way that the target computer will reverse but the IDS will not. In the past, an adversary using the Unicode character could encode attack packets that an IDS would not recognize but that an IIS web server would decode and become attacked.

Page 20: Intrusion Detection And Prevention

Obfuscating Attack Payload

• Speaking French to a bilingual computer, while the IDS only speaks English

Page 21: Intrusion Detection And Prevention

Polymorphic Code• Is another

means to circumvent signature-based IDS by creating unique attack patterns, so that the attack does not have a single detectable signature.

Page 22: Intrusion Detection And Prevention

Using HTTPS to Obfuscate

• Attacks on encrypted protocols such as HTTPS are obfuscated if the attack is encrypted.

Page 23: Intrusion Detection And Prevention

Fragmentation and Small Packets

• One basic technique is to split the attack payload into multiple small packets

• The IDS must reassemble the packet stream to detect the attack.

Page 24: Intrusion Detection And Prevention

Fragmentation Continued• By itself, small packets will not

evade any IDS that reassembles packet streams. However, small packets can be further modified in order to complicate reassembly and detection.

• One evasion technique is to pause between sending parts of the attack, hoping that the IDS will time out before the target computer does

Page 25: Intrusion Detection And Prevention

Protocol Violations • Some IDS evasion techniques

involve deliberately violating the TCP or IP protocols in a way the target computer will handle differently than the IDS. For example, the TCP Urgent Pointer is handled differently on different operating systems and may not be handled correctly by the IDS.

Page 26: Intrusion Detection And Prevention

Denial of Service

• An adversary can evade detection by disabling or overwhelming the IDS. This can be accomplished by exploiting a bug in the IDS, using up computational resources on the IDS, or deliberately triggering a large number of alerts to disguise the actual attack.

Page 27: Intrusion Detection And Prevention

What is a Denial of Service Attack Anyway?

Page 28: Intrusion Detection And Prevention

Inserting Traffic at the IDS

• An adversary can send packets that the IDS will see but the target computer will not. For example, the attacker could send packets whose Time to live fields have been crafted to reach the IDS but not the target computers it protects. This technique will result in an IDS with different state than the target.

Page 29: Intrusion Detection And Prevention

Intrusion Prevention Goes One Step Further than IDS

• An intrusion prevention system is a network security device that monitors network and/or system activities for malicious or unwanted behavior and can react, in real-time, to block or prevent those activities.

Page 30: Intrusion Detection And Prevention

Unified Threat Management (UTM)

• Next generation devices• Firewall• Virus Scanning• Content Filtering• VPN• Anti-Spam• Intrusion Detection and

Prevention

Page 31: Intrusion Detection And Prevention

How IDS and IPS Differ

• Intrusion Prevention systems are designed to sit inline with traffic flows and prevent attacks in real-time

• In addition, most IPS solutions have the ability to look at (decode) layer 7 protocols like HTTP, FTP, and SMTP

Page 32: Intrusion Detection And Prevention

Rate Based IPS• RBIPS can identify abnormal rates

for certain types of traffic• Connections per second • Packets per connection • Packets to specific ports etc.• Attacks are detected when

thresholds are exceeded. • The thresholds are dynamically

adjusted based on time of day, day of the week etc., drawing on stored traffic statistics.

Page 33: Intrusion Detection And Prevention

Host-based vs. Network IPS • Benefit of HIPS• HIPS can

handle encrypted and unencrypted traffic equally, because it can analyze the data after it has been decrypted on the host.

Page 34: Intrusion Detection And Prevention

Host-based vs. Network IPS

• Benefit of NIPS• NIPS does not use processor and

memory on computer hosts but uses its own CPU and memory.

Page 35: Intrusion Detection And Prevention

Host-based vs. Network IPS• NIPS drawback AND benefit,

depending on how you look at it• NIPS is a single point of failure,

which is considered a disadvantage; however, this property also makes it simpler to maintain.

• Use failover or load balancing to combat this NIPS disadvantage

Page 36: Intrusion Detection And Prevention

Host-based vs. Network IPS

• NIPS can detect events scattered over the network (e.g. low level event targeting many different hosts, like a worm) and can react

• With a HIPS, only the host’s data itself is available to take a decision

• It would take too much time to report it to a central decision making engine and report back to block.

Page 37: Intrusion Detection And Prevention

Some IDS and IPS Movies

• Cisco Sensor• Cisco IDS/IPS Overview• Snort With Add On Tools

Page 38: Intrusion Detection And Prevention

Questions?