52
Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University October 3, 2003

Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

  • View
    223

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

Real-Time Intrusion Detection with Emphasis on Insider Attacks

Shambhu Upadhyaya Computer Science and Engineering

University at Buffalo

Polytechnic University

October 3, 2003

Page 2: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @2

Some Facts & Figures (CSI/FBI 03)

Page 3: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @3

Source of Attack

Page 4: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @4

Attack Types

Page 5: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @5

Actions Taken

Page 6: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @6

What Could be Learned From It?

Good prevention techniques must be in place

Good policies must be set up

Need to know what is important

Need to know the application environment

IDS is a must

But there is no IDS that is applicable to all environments

Page 7: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @7

Outline of the Talk

General introduction

Evolution of IDS

Major players

Insider threats and how to mitigate?

Conclusion

Page 8: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @8

Outline of the Talk

General introduction

Evolution of IDS

Major players

Insider Threats and how to mitigate?

Conclusion

Page 9: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @9

What is an IDS?

In its general sense –

Acquires information about its environment to analyze

system behavior

Aims to discover security breaches, attempted breaches,

open vulnerabilities that could lead to potential breaches

Types of information –

Long term info. – a knowledge base of attacks (static)

Configuration info. – a model of the current state (static)

Audit info. – describing the events happening (dynamic)

Page 10: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @10

IDS Architecture(Macroscopic View)

System Model ofSystem

Analyzer Visual Presentation

Database,Storage

DATA

Slide adopted from UCDavis, Jeff Rowe

Page 11: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @11

IDS Side-effects

False negatives (failed detection)

poor coverage

False positives (wrong indictment)

poor QOS

Degrade normal operation

poor performance

Page 12: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @12

Outline of the Talk

General introduction

Evolution of IDS

Major players

Insider Threats and how to mitigate?

Conclusion

Page 13: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @13

Evolution of IDS

Paul Innella’s timeline:

Page 14: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @14

Current State-of-the-art

1st generation tools are largely signature based

Security is by penetrate and patch

Today’s focus is on detecting novel intrusions

New techniques must consider insider attacks, social

engineering based break-ins etc.,

Need for new paradigms – Design for Security?

New ideas –

Combining IDS with vulnerability analysis

Detection is not fool-proof; must be merged with recovery

Page 15: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @15

Outline of the Talk

General introduction

Evolution of IDS

Major players

Insider Threats and how to mitigate?

Conclusion

Page 16: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @16

Major Players – Academia Purdue –

CERIAS

UC Davis –

Developed GrIDS (Graph based IDS)

CMU – Home of CERT/CC

Cornell

Language-based security

Columbia

IDS and Data mining

Above list is incomplete

Page 17: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @17

Major Players – Industries

IBM Watson

Global Security Analysis Laboratory

Microsoft

Started the Trustworthy Computing initiative in 2002

Cisco

Does research and development

Builds intrusion detection appliances – sensors and software

MAFTIA

European Union of academia and industries

Page 18: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @18

Major Players – Labs/Government SRI International –

Developer of EMERALD through funds from ITO, DARPA

Air Force Research Lab –

Defensive Information Warfare Branch

Naval Research Lab –

Center for High Assurance Computer Systems

Multi-level security

National Institute of Standards and Technology –

Computer Security Resource Center

National Security Agency –

Research and education

Page 19: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @19

Popular Websites

SANS (System Administration, Networking and Security) Institute

http://www.sans.org/aboutsans.php

CERT/CC

http://www.cert.org/

CERIAS (Center for Education and Research in Information

Assurance and Security)

http://www.cerias.purdue.edu/

NIST (National Institute of Standards and Tech.)

http://csrc.nist.gov/index.html

Page 20: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @20

IDS Tools List Mike Sobirey (copyright: Dr. Michael Sobirey)

List of ID Tools from 1995-2000

92 host- and network based Intrusion Detection (&

Response) Systems

Additions are appreciated

NIST Intrusion Detection Tools

Coverage is only up to 1996 (not up-to-date)

About 20+ tools listed

The above two lists have little overlap (cover >110)

Page 21: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @21

Recent Releases Responsible for real-time packet capture and analysis (http://www.prelude-ids.org/) on Linux/Unix

Prelude platforms

Portsentry – An IDS that detects and responds to port scans against a target host in real-

time (http://www.psionic.com/products/)

SPADE – Statistical Packet Anomaly Detection Engine (http://www.silicondefense.com/)

inspects recorded data for anomalous behavior based on a computer score

Stealthwatch (Lancope), Stormwatch (Okena)

Stackguard – Protects from stack smashing attacks (

http://www.cse.ogi.edu/DISC/projects/immunix/StackGuard/)

Netscreen -- http://www.netscreen.com/products/

There is no tool that is universally applicable

Page 22: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @22

Outline of the Talk

General introduction

Evolution of IDS

Major players

Insider Threats and how to mitigate?

Conclusion

Page 23: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @23

Who is an Insider?

Page 24: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @24

How to Deal with the Problem?

We focus on the detection only

Model the Insider

Prevention of Insider Misuse

Detection, Analysis and Identification of Misuse

Page 25: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @25

IDS with Emphasis on Insider

Current systems are signature-based and they

use audit-trail or rule-based protection

Not effective for insider attack detection

Anomaly detection is applicable, but not very

effective

New theory needed, proactive mechanisms

needed

Page 26: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @26

Guidelines for Effective Anomaly Detection

Use the principle of least privilege to achieve better

security

Use mandatory access control wherever appropriate

Data used for intrusion detection should be kept

simple and small

Intrusion detection capabilities are enhanced if

environment specific factors are taken into account

Page 27: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @27

Our Approach An out-of-the-box Reasoning Framework for intrusion

detection

Technique used:

Control flow checking from FT (basis for encapsulation of

owner’s intent)

Reasoning based on Theory of Risk Analysis from

Economics

Problem is similar to Pricing Under Uncertainty S. Upadhyaya, R. Chinchani, K. Kwiat, “An Analytical Framework for Reasoning about Intrusions”,

IEEE SRDS 2001

Page 28: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @28

User Intent Encapsulation

Obtain the intent of the

user either by inference

or query

Session scope serves as

a certificate

Reduces the search

space during monitoring

Page 29: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @29

Illustration of Search Space Reduction

Kernel

Resources

Commands and System

calls

Audit data

reduces as we go

higher up Typical audit data

User

Page 30: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @30

InterfaceUser

Sequence of Operations

Resource

Disk Network

CPU Memory

System

Overall Layout of System Operation

Page 31: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @31

Expected Sequences

Certain “normal” ways of doing a job

Also, certain “less normal” ways of doing them

A job is completed by performing a sequence of

operations

May not be possible to enumerate all the

sequences

Page 32: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @32

Cost Analysis

Cost of Operation = Co

Proportional to the amount of resources used

Cost of Sequence = Cd

Proportional to the difference between current

chosen operation and past history

Cost of Job = *Co + *Cd

Page 33: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @33

Job Activity Stochastic

At any stage, a user “chooses an operation”

with a probability

“Choice of an operation” is a random variable

Sequences of operations construct a discrete

stochastic process

Page 34: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @34

User Activity as a Martingale

Theorem:

Let the lateral sequence of random

variables for any state i of a sequence of

operations be denoted as:

X1(ti, ), X2(ti, ), … Xn(ti, )

Such a sequence of user activity is a

Martingale

Page 35: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @

An Example

nfrm pine exit nop nop

pine ls exit nop nop

mail finger nfrm pine exit

nfrm pine finger exit nop

(nfrm, pine, ls, mail, exit, finger, nop)

Page 36: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @36

A Note on Martingale

Martingale uses concepts of conditional probability and

has applications in economics

Model is used to predict market parameters like a share of

a stock

Future price of a commodity depends only on the last

known distribution and not on the entire history of the

prices

There is a parallel between uncertainties in intrusion

detection and the concept of pricing under uncertainty

Page 37: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @37

Reasoning

Non-intrusive

Non-deterministic

Intrusive

Monotonically increasing costs

ThTl

Page 38: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @38

Cost Scenarios

Low Co + Low Cd

Non-intrusive

Maps into the non-intrusive region

High Co + Low Cd

Intrusive and tending toward a DoS attack on

resources

Maps into the non-deterministic region

Page 39: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @39

…contd.

Low Co + High Cd

The intruder??

Maps into the non-deterministic region

High Co + High Cd

The clumsy attack

Maps into the intrusive region

Page 40: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @40

Quantification of Thresholds

Threshold Tl

Minimum cost over longest sequence

Threshold Th

Maximum cost over shortest sequence

Page 41: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @41

Algorithm: INIT_DISTR(Generates the initial distribution)

Enumerate all possible

sequences

Find the longest sequence

Create a discrete stochastic

process

Generate probabilities at

each stage and shape the

distribution

Page 42: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @42

Algorithm: MODIFY_DISTR(Modifies the existing distribution)

Check to see at each stage of the

sequence if the user is conforming to the

profile

At the job termination, if the sequence is

not intrusive, update the frequency

distributions and probabilities

Page 43: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @43

Algorithm: DECIDE(Makes a decision in the non-deterministic region)

Calculate the longest sequence from

current stage to complete the job. Move Tl

to that position

The window (Th – Tl) depends on the

gradient of the cost accumulated since

DECIDE was last invoked

Page 44: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @44

Sketch of the Overall Algorithm User logs into the system

Chooses the job s/he wishes to performCheck the size of the session scope

If too large,warn userUser wants to change it

Launch inter work-space level monitor

Create workspaces for the jobs

Launch workspace level monitor thread per workspaceLaunch command level monitor thread per command

Authenticate command

Monitor Command

YES

LoopReport command type

Report object accessed

Page 45: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @45

Preliminary Implementation

Developed in Java on Solaris 2.8

A university environment was simulated

Monitoring at basic command level

Limited sequence monitoring

Not many scenarios

Perhaps, not realistic for actual deployment

Page 46: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @46

Test Cases

User activity collected over two months

Test cases grouped into four categories

1-user, 1-user with multiple logins, multiple users, multiple users

with multiple logins

Two sets of experiments – worst case and average case

Legitimate and intrusive operations

32 attacks

Obvious ones such as transferring /etc/passwd files, exploiting

vulnerabilities such as rdist, perl 5.0.1

Subtle attacks similar to mimicry attacks

Page 47: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @47

Summary of Results

Summary 1 User, No Multiple Logins 1 User, With Multiple Logins 2 Users, No Multiple Logins 2 Users, With Multiple LoginsUser Detection 87.50% 78.60% 74.90% 91.90%and Latency 33.4 35 36.1 29User False Positives 12.50% 21.40% 25.10% 8.10%

False Negatives 0% 0% 0% 0%User Detection 98% 89% 100% 94.70%and Latency 0 11 0 9.6

Intruder False Positives 0% 0% 0% 0%False Negatives 2% 11% 0% 5.30%

Intruder Detection 99% 100% 98.20% 100%and Latency 0.4 0.7 0.6 0.5User False Positives 0% 0% 0% 0%

False Negatives 1.40% 0% 1.80% 0%Intruder Detection 56% 81.30% 77.40% 91.50%

and Latency 15.9 14.8 17 27Intruder False Positives 0% 0% 0% 0%

False Negatives 44% 18.70% 22.60% 8.50%

Page 48: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @48

Types of Detected Intrusions

It can detect internal attacks -

A cracker logs in and executes commands

Inadvertent operator faults

Internal abuse

External attacks -

Masquerading

Subversion attacks by presenting overly

permissive session-scope (penalty in terms of

reduced QoS)

Page 49: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @49

Undetected Intrusive Activity

It cannot contain or detect -

External Denial of Service attacks

Extremely low-level network based attacks

Page 50: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @50

Ongoing Research

Addressing outstanding issues like

State explosions due to partial orderings

Scalability

Values of α, β , ??

A more realistic prototype implementation and

testing

Project is currently funded by DARPA

Page 51: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @51

Concluding Remarks – Vision Insider threat is very much real

Penetrate and Patch method is not adequate

CMU and other studies show current IDS are not effective

Anomaly detection schemes, that are environment-independent

may be in the focus

Monitoring at user command level has distinct advantages

Conceptually independent of systems and applications

As the no. of threats grows, IDS will become a required element

of system security

Page 52: Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University

CEISARE @52

Concluding Remarks – Research IDS and vulnerability analysis

Effective means of system evaluation

Good metrics for performance, coverage etc.

Return on investment studies

Merge IDS with firewalls

Merge IDS with recovery

It is not possible to detect all intrusions

Protection against unknown threats – Proactive mechanisms

Rapid Incident Response