15
FORESEC Academy NETWORK-BASED INTRUSION DETECTION FORESEC Academy Security Essentials (III)

Network-Based Intrusion Detection

  • Upload
    toya

  • View
    42

  • Download
    0

Embed Size (px)

DESCRIPTION

FORE SEC Academy Security Essentials (III). Network-Based Intrusion Detection. Need for Network-based Intrusion Detection. Most attacks come from the Internet Detecting these attacks allows a site to tune defenses If we correlate data from a large number of sources we increase our - PowerPoint PPT Presentation

Citation preview

Page 1: Network-Based Intrusion Detection

FORESEC Academy

NETWORK-BASED INTRUSIONDETECTION

FORESEC Academy Security Essentials (III)

Page 2: Network-Based Intrusion Detection

FORESEC Academy

Need for Network-basedIntrusion Detection

Most attacks come from the Internet Detecting these attacks allows a site to

tune defenses If we correlate data from a large

number of sources we increase ourcapability

The statistic that 90% of all attacks are perpetrated by

insiders is dead wrong.

Page 3: Network-Based Intrusion Detection

FORESEC Academy

Inside a Network Attack

WinNuke, (also called OOBNuke), uses TCP 139 and OOB Data, even if NetBIOS is not enabled. It results in the “Blue Screen of Death”.

Patches/service packs are available

OOB stands for Out Of Band and is actually misnamed;it should say .Urgent mode., which is Urgent bit set inthe TCP header flags and the urgent pointer.

Page 4: Network-Based Intrusion Detection

FORESEC Academy

Nuke’eM Screen

Page 5: Network-Based Intrusion Detection

FORESEC Academy

BlackIce – Nuke ‘Em Detection

Page 6: Network-Based Intrusion Detection

FORESEC Academy

Network IntrusionDetection 101

Page 7: Network-Based Intrusion Detection

FORESEC Academy

BlackIce - Enable Logging

Page 8: Network-Based Intrusion Detection

FORESEC Academy

BlackIce - Viewing Logs

Page 9: Network-Based Intrusion Detection

FORESEC Academy

BlackIce - Visualization Tools

Page 10: Network-Based Intrusion Detection

FORESEC Academy

Libpcap-based Systems

Page 11: Network-Based Intrusion Detection

FORESEC Academy

Network Intrusion DetectionWith Snort

Page 12: Network-Based Intrusion Detection

FORESEC Academy

Snort Design Goals

Low cost, lightweight Suitable for monitoring multiple

sites/sensors Low false alarm rate Efficient detect system Low effort for reporting

Page 13: Network-Based Intrusion Detection

FORESEC Academy

Snort

Page 14: Network-Based Intrusion Detection

FORESEC Academy

Writing Snort Rules

Can create custom rules to filter on specific content.

Pre-loaded with hundreds of rules (but you may need to create one or more custom

rules) Simple to write yet powerful enough to

capture most types of traffic Options

- Basic (Pass, Log, Alert) - Advanced (Activate, Dynamic)

Page 15: Network-Based Intrusion Detection

FORESEC Academy