19
Intrusion Detection and Prevention Systems Jim Thavisay University of Tulsa SFS Cyber Corps Security+, CNSS, NSTISSI

Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

  • Upload
    others

  • View
    11

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

Intrusion Detection and

Prevention Systems Jim Thavisay

University of Tulsa

SFS Cyber Corps

Security+, CNSS, NSTISSI

Page 2: Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

Overview

• Intrusion Detection and Prevention Systems

• Documentation

• Types of IDS/IPS

• Available Tools

• Sample Implementation

• Concerns

• IDS/IPS Evasion

• Development Needs

Page 3: Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

Intrusion Detection and

Prevention Systems

• “Intrusion detection is a process of

monitoring the events occurring in a

computer system or network and

analyzing them for signs of possible

incidents, which are violations or

imminent threats…” (NIST SP800-94, 2007)

Page 5: Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

Documentation

• National Security Agency (NSA)

– Factfeet: Best Practices for Keeping Your

Home Network Security

– Highlight: Install a comprehensive host-

based security suite

• National Institute of Standards and

Technology (NIST)

– Guide to Intrusion Detection and

Prevention Systems

Page 6: Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

Type of IDS/IPS

• Signature

• Anomaly (Non-baseline activities)

• Stateful Protocol (Appropriate protocol usage)

• Logging

• Detection

• Prevention

• Host

• Network

Page 7: Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

Available Tools

• OSSEC (IDS/IPS)

• Snort (IDS/IPS)

• OSSIM (SIEM)

• Splunk (SIEM)

• Squil (NetSec Monitoring)

• Arcsight SIEM Platform (NetSec Monitoring)

• HoneyD (Honeypot)

• Hippo (Logs brute force SSH Attacks)

• PortSentry (Detects/Prevent Port Scanning)

Page 8: Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

Sample Implementation

• Tools

– Webmin

– PortSentry

– Nmap

– Wireshark

• OS

– Ubuntu 11.04

(Oneiric Ocelot)

Page 9: Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

Tools: Webmin

Page 10: Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

Tools: PortSentry

Page 11: Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

Tools: PortSentry, cont’d

Page 12: Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

Tools: Nmap

• Nmap

– sudo nmap –v 192.168.1.100

– sudo nmap –v 192.168.1.100 -S

192.168.1.192 –e wlan0

Page 13: Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

Wireshark Capture

Page 14: Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

Thresholds

• Compatibility

– Software/OS/Hardware

• User-friendly Interface

– Home-users/”Average Joes”

• Evasion

Page 15: Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

IDS/IPS Evasion

• String Matching Weaknesses

• Polymorphic Shell Code

• Session Splicing

• Fragmentation Attacks

• Fragmentation Overlap

• Snort Signatures

• Denial-of-Service

• Spoofing

• 0-day Attacks

Page 16: Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

Development Needs

• Easy UI for home-users

• Professional concern:

– IDS/IPS services should be integrated by

professionals to ensure integrity of host

and networks are to baseline activity

Page 17: Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

Summary

• IDS/IPS

• Documentation available

• Types of IDS/IPS

• Available Applications

• Thresholds

• IDS/IPS Evasion

• Development Needs

Page 18: Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

References

• http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf

• http://www.symantec.com/connect/articles/ids-evasion-techniques-and-tactics

• http://en.wikipedia.org/wiki/Intrusion_detection_system_evasion_techniques

• http://www.nsa.gov/ia/_files/factsheets/Best_Practices_Datasheets.pdf

• http://rfc-ref.org/RFC-TEXTS/3514/kw-intrusion_detection_system.html

• http://sectools.org/tag/ids/

Page 19: Intrusion Detection and Prevention Systemspersonal.utulsa.edu/~james-childress/cs5493/... · Intrusion Detection and Prevention Systems •“Intrusion detection is a process of monitoring

Questions?