Advanced Security and Forensic Computing. Advanced Security and Forensic Computing

Size: px
Start display at page:

Download "Advanced Security and Forensic Computing. Advanced Security and Forensic Computing"

Transcription

1 Advanced Security and Forensic Computing Dr Dr Bill Buchanan, Reader, School of of Computing. >Unit 3: 3: Intrusion Detection Systems Advanced Security and Forensic Computing WJ Buchanan. ASFC (1)

2 Data Systems People Enemy can penetrate the main defence, and cause problems Even the best defence can be breached WJ Buchanan. ASFC (2)

3 even defence in depth can be breached Forth-line defence Third-line defence Second-line defence First-line defence Defence-in-depth WJ Buchanan. ASFC (3)

4 intrusion detection can reduce breaches Intrusion detection Intrusion Detection WJ Buchanan. ASFC (4)

5 Data stealing Worms/Viruses Our trusted system Corporate access access WWW access Network perimeter Terrorism DoS (Denial-of-Service) External hack Personal abuse Fraud External Threats WJ Buchanan. ASFC (5)

6 Data stealing Personal abuse Data stealing Worms/Viruses Internal hack Our trusted system Worms/Viruses Fraud Corporate access access WWW access Terrorism Network perimeter Terrorism DoS (Denial-of-Service) External hack Personal abuse Fraud External and Internet Threats WJ Buchanan. ASFC (6)

7 Data stealing Personal abuse CIA found that: 80% of abuse was internal Data stealing Worms/Viruses Internal hack Our trusted system Worms/Viruses Fraud Corporate access access WWW access Terrorism External and Internet Threats This firewall cannot stop internal attacks DoS (Denial-of-Service) External hack Personal abuse Terrorism Fraud WJ Buchanan. ASFC (7)

8 Untrusted network Audit/ logging De-Militarized Zone (DMZ) WWW server Public FTP server Thus we need intrusion detection systems throughout our system which will react to internal and external attacks N Intrusion Detection System Intrusion Detection System Intrusion Detection Systems WJ Buchanan. ASFC (8)

9 Intrusion Detection - Misuse Detection. This attempts to model attacks on a system as specific patterns, and then scans for occurrences of these. Its disadvantage is that it struggles to detect new attacks. - Anomaly Detection. This assumes that abnormal behaviour by a user can be correlated with an intrusion. Its advantage is that it can typically react to new attacks, but can often struggle to detect variants of known attacks, particularly if they fit into the normal usage pattern of a user. Another problem is that the intruder can mimic the behavioural pattern of the user. Intrusion Detection WJ Buchanan. ASFC (9)

10 Intrusion Detection Types - Network intrusion detection systems (NIDS). These monitor packets on the network and tries to determine an intrusion. This is either host based (where it runs on a host), or can listen to the network using a hub, router or probe. - System integrity verifiers (SIV). These monitor system files to determine if an intruder has changed them (a backdoor attack). A good example of this is Tripwire. It can also watch other key system components, such as the Windows registry and root/administrator level privileges. - Log file monitors (LFM). These monitor log files which are generated by network services, and look for key patterns of change. Swatch is a good example. - User profiling. This is currently being research, and involves monitoring the behaviour of a user. The system then checks the normal behaviour of a user against the current user behaviour. Intrusion Detection Types WJ Buchanan. ASFC (10)

11 Software bugs: Buffer overflows Unexpected combinations Unhandled input Race conditions System configuration: These will be covered in Unit 5 Default configurations: Lazy administrators Hole creation: Trust relationships Sniffing unsecured traffic: Shared medium Server sniffing Remote sniffing Design flaws: TCP/IP protocol flaws UNIX design flaws Others: DoS IP Spoofing WWW browser attacks WWW server attacks CGI weakness IMAP SQL/Database Java Some of the methods that Intruders might use WJ Buchanan. ASFC (11)

12 Intruder gains public information about the systems, such as DNS and IP information Intruder gains more specific Information, such as subnet layout, and network devices. Outside Outside reconnaissance reconnaissance Inside Inside reconnaissance reconnaissance From code yellow to code red Profit Profit Data stealing, system damage, user abuse, and so on. Foothold Foothold Once into the system, the Intruder can then advance up levels. Exploit Exploit Intruder finds a weakness, such as cracking a password, breaching a firewall, and so on. Steps that could be taken by an intruder WJ Buchanan. ASFC (12)

13 Untrusted network IDS De-Militarized Zone (DMZ) WWW server Public FTP server Host-based IDS listens to the traffic into and out of the host. Network-based IDS listens to all the traffic on the network Intrusion Detection System Host-based Intrusion Detection System Intrusion Detection System Host-based and Network-based IDS WJ Buchanan. ASFC (13)

14 Hub Switch IDS can listen to all the incoming and outgoing network This IDS cannot hear any traffic which is not addressed to it as it connects to a switch. A Network-based IDS must be able to listen to traffic WJ Buchanan. ASFC (14)

15 WJ Buchanan. ASFC (15) 0/1 0/2 0/5 interface FastEthernet0/1 port monitor FastEthernet0/2 port monitor FastEthernet0/5 port monitor VLAN2! interface FastEthernet0/2! interface FastEthernet0/3 switchport access vlan 2! interface FastEthernet0/4 switchport access vlan 2! interface FastEthernet0/5! interface VLAN1 ip address no ip directed-broadcast no ip route-cache!

16 Untrusted network WWW server De-Militarized Zone (DMZ) Public FTP server Host The IDS is the last line of defence IDS s are applied to hosts and servers WJ Buchanan. ASFC (16)

17 DMZ Untrusted WWW server FTP server Proxy Trusted Trusted IDS s applied across the system WJ Buchanan. ASFC (17)

18 Untrusted DMZ Trusted WWW server FTP server Proxy Trusted IDS s applied across the system WJ Buchanan. ASFC (18)

19 This IDS detects successful attacks against firewall This IDS detects attacks against main firewall Host These IDS s detect host attacks De-Militarized Zone (DMZ) Public FTP server These IDS s detect internal attacks Placing IDS s WJ Buchanan. ASFC (19)

20 The main IDS is Snort ( Other tools include: tcptrace. To identity TCP sessions. tcpflow. To reconstruct TCP sessions. Ethereal. To capture network traffic. Rules file (.rules) Snort Event data Log Detection either by: Signatures detection. Identify well-known patterns of attack. Anomaly detection. Statistical anomalies, such as user logins, changes to files, and so on. Snort WJ Buchanan. ASFC (20)

21 alert tcp any any -> / (content:" a5 "; msg:"mountd access";) alert log pass activate dynamic Generate an alert and log packet Log packet Ignore the packet Alert and activate another rule Remain idle until activated by an activate rule Snort Rules - Actions WJ Buchanan. ASFC (21)

22 alert tcp any any -> / (content:" a5 "; msg:"mountd access";) tcp udp icmp ip Transport layer protocols Network layer protocol Snort Rules - Protocols WJ Buchanan. ASFC (22)

23 alert tcp any any -> / (content:" a5 "; msg:"mountd access";) Source IP Destination IP Source port (any, or m:n for m to n) Destination port (any, or m:n for m to n) Snort Rules - Source and and Destinations IP/port WJ Buchanan. ASFC (23)

24 alert tcp any any -> / (content:" a5 "; msg:"mountd access";) Payload detection: Hex sequence Text sequence " a5 " "USER root" Modifiers: rawbytes offset distance within uricontent bytejump Snort Rules - Payload Detection WJ Buchanan. ASFC (24)

25 alert tcp any any -> / (content:" a5 "; msg:"mountd access";) Message to display Snort Rules - Displaying a Message WJ Buchanan. ASFC (25)

26 There are also various configuration commands that can be used in the rules file, such as: config decode_arp - snort -a config payload config decode_data_link config interface config nolog - Disable logging, but alerts still occur config quiet - snort -q config verbose - snort -v config show_year config min_ttl:x The SID and REV represent know Snort rules: Less 100 Reserved for future use Between 100 and 1,000,000 are rules included with the Snort distribution More than 1,000,000 is for local rules For example: sid:336; rev:7; represents an attempt to change to the system administrator s account in FTP. Configuration options in rules file WJ Buchanan. ASFC (26)

27 WJ Buchanan. ASFC (27) Aims and objectives of the organisation Legal, moral and social responsibilities Technical feasibility Policy Definition Policy Implementation Management Technical Verification Audit

28 Video/Audio Streaming Why? Wasted bandwidth Hacking Why? Data/System loss. Fraud. Chat Programmes Why? Wasted time. P2P programs Why? Copyright issues. Viruses/Worms Why? Data/System loss. Porn Why? Moral/legal issues. Non-business Why? Wasted resources. Running server applications Why? Corporate issues. Bad Traffic Why? Wasted resources. Types of Traffic that Organisations Typically Want to Detect WJ Buchanan. ASFC (28)

29 # (C) Copyright 2001,2002, Martin Roesch, Brian Caswell, et al. # All rights reserved. # $Id: ftp.rules,v /12/16 22:14:42 cazz Exp $ # # FTP RULES (edited) # FTP server port Attempt to access root account! # bad directories alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"ftp CWD ~root attempt"; flow:to_server,established; content:"cwd"; nocase; content:"~root"; nocase; distance:1; pcre:"/^cwd\s+~root/smi"; reference:cve,cve ; reference:arachnids,318; classtype:badunknown; sid:336; rev:7;) Attempt to get the password file! # BAD FILES alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"ftp passwd retrieval attempt"; flow:to_server,established; content:"retr"; nocase; content:"passwd"; reference:arachnids,213; classtype:suspicious-filename-detect; sid:356; rev:5;) Suspicious login! # suspicious login attempts alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"ftp ADMw0rm ftp login attempt"; flow:to_server,established; content:"user"; nocase; content:"w0rm"; nocase; distance:1; pcre:"/^user\s+w0rm/smi"; reference:arachnids,01; sid:144; classtype:suspicious-login; rev:8;) $HOME_NET $EXTERNAL_NET Our network Every network outside our own network Snort - Some FTP Rules WJ Buchanan. ASFC (29)

30 # (C) Copyright 2001,2002, Martin Roesch, Brian Caswell, et al. # All rights reserved. # $Id: p2p.rules,v /10/20 15:03:11 chrisgreen Exp $ # These signatures look for usage of P2P protocols, which are usually # against corporate policy alert tcp $HOME_NET any -> $EXTERNAL_NET 8888 (msg:"p2p napster login"; flow:to_server,established; content:" "; offset:1; depth:3; classtype:policy-violation; sid:549; rev:6;) alert tcp $HOME_NET any -> $EXTERNAL_NET 8888 (msg:"p2p napster new user login"; flow:to_server,established; content:" "; offset:1; depth:3; classtype:policy-violation; sid:550; rev:6;) alert tcp $EXTERNAL_NET any -> $HOME_NET 8888 (msg:"p2p napster download attempt"; flow:to_server,established; content:" 00 cb00 "; offset:1; depth:3; classtype:policy-violation; sid:551; rev:5;) alert tcp $EXTERNAL_NET > $HOME_NET any (msg:"p2p napster upload request"; flow:from_server,established; content:" 00 5f02 "; offset:1; depth:3; classtype:policyviolation; sid:552; rev:5;) alert tcp $HOME_NET any -> $EXTERNAL_NET!80 (msg:"p2p GNUTella GET"; flow:to_server,established; content:"get "; offset:0; depth:4; classtype:policy-violation; sid:1432; rev:4;) alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"p2p Outbound GNUTella client request"; flow:to_server,established; content:"gnutella CONNECT"; depth:40; classtype:policy-violation; sid:556; rev:5;) alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"p2p GNUTella client request"; flow:to_server,established; content:"gnutella OK"; depth:40; classtype:policy-violation; sid:557; rev:6;) alert tcp $EXTERNAL_NET any -> $HOME_NET 1214 (msg:"p2p Fastrack (kazaa/morpheus) GET request"; flow:to_server,established; content:"get "; depth:4; reference:url, reference:url, classtype:policyviolation; sid:1383; rev:4;) Snort - 2P2 Rules - Detecting Kazaa/Napster/GNUTella WJ Buchanan. ASFC (30)

31 # (C) Copyright 2001,2002, Martin Roesch, Brian Caswell, et al. # All rights reserved. # $Id: chat.rules,v /10/20 15:03:05 chrisgreen Exp $ # These signatures look for people using various types of chat programs (for # example: AIM, ICQ, and IRC) which may be against corporate policy alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"chat ICQ access"; flow:to_server,established; content: "User-Agent\:ICQ"; classtype:misc-activity; sid:541; rev:6;) alert tcp $EXTERNAL_NET 80 -> $HOME_NET any (msg:"chat ICQ forced user addition"; flow:established,to_client; content:"content-type\: application/x-icq"; content:"[icq User]"; reference:bugtraq,3226; reference:cve,can ; classtype:misc-activity; sid:1832; rev:3;) alert tcp $HOME_NET any <> $EXTERNAL_NET 1863 (msg:"chat MSN message"; flow:established; content:"msg "; depth:4; content:"content-type\:"; content:"text/plain"; distance:1; classtype:misc-activity; sid:540; rev:8;) alert tcp $HOME_NET any <> $EXTERNAL_NET 1863 (msg:"chat MSN file transfer request"; flow:established; content:"msg "; depth:4; content:"content-type\:"; nocase; distance:0; content:"text/x-msmsgsinvite"; nocase; distance:0; content:"application-name\:"; content:"file Transfer"; nocase; distance:0; classtype:policy-violation; sid:1986; rev:1;) alert tcp $HOME_NET any <> $EXTERNAL_NET 1863 (msg:"chat MSN file transfer accept"; flow:established; content:"msg "; depth:4; content:"content-type\:"; content:"text/xmsmsgsinvite"; distance:0; content:"invitation-command\:"; content:"accept"; distance:1; classtype:policy-violation; sid:1988; rev:1;) alert tcp $HOME_NET any <> $EXTERNAL_NET 1863 (msg:"chat MSN file transfer reject"; flow:established; content:"msg "; depth:4; content:"content-type\:"; content:"text/xmsmsgsinvite"; distance:0; content:"invitation-command\:"; content:"cancel"; distance:0; content:"cancel-code\:"; nocase; content:"reject"; nocase; distance:0; classtype:policyviolation; sid:1989; rev:1;) alert tcp $HOME_NET any -> $EXTERNAL_NET 1863 (msg:"chat MSN user search"; flow:to_server,established; content:"cal "; depth:4; nocase; classtype:policy-violation; sid:1990; rev:1;) alert tcp $HOME_NET any -> $EXTERNAL_NET 1863 (msg:"chat MSN login attempt"; flow:to_server,established; content:"usr "; depth:4; nocase; content:" TWN "; distance:1; nocase; classtype:policy-violation; sid:1991; rev:1;) Snort - Chat Rules WJ Buchanan. ASFC (31)

32 # (C) Copyright 2001,2002, Martin Roesch, Brian Caswell, et al. # All rights reserved. # $Id: multimedia.rules,v /10/20 15:03:10 chrisgreen Exp $ # # MULTIMEDIA RULES # # These signatures look for people using streaming multimedia technologies. # Using streaming media may be a violation of corporate policies. alert tcp $HOME_NET any -> $EXTERNAL_NET 80 (msg:"multimedia Quicktime User Agent access"; flow:to_server,established; content:"user-agent\: Quicktime"; classtype:policy-violation; sid:1436; rev:2;) alert tcp $EXTERNAL_NET 80 -> $HOME_NET any (msg:"multimedia Windows Media audio download"; flow:from_server,established; content:"content-type\: audio/x-ms-wma"; content:" 0a "; within:2; classtype:policy-violation; sid:1437; rev:3;) alert tcp $EXTERNAL_NET 80 -> $HOME_NET any (msg:"multimedia Windows Media Video download"; flow:from_server,established; content:"content-type\: video/x-ms-asf"; content:" 0a "; within:2;classtype:policy-violation; sid:1438; rev:3;) alert tcp $EXTERNAL_NET 80 -> $HOME_NET any (msg:"multimedia Shoutcast playlist redirection"; flow:from_server,established; content:"content-type\: audio/x-scpls"; content:" 0a "; within:2; classtype:policy-violation; sid:1439; rev:3;) alert tcp $EXTERNAL_NET 80 -> $HOME_NET any (msg:"multimedia Icecast playlist redirection"; flow:from_server,established; content:"content-type\: audio/x-mpegurl"; content:" 0a "; within:2; classtype:policy-violation; sid:1440; rev:3;) alert tcp $HOME_NET any -> /23 any (msg:"multimedia audio galaxy keepalive"; flow:established; content:" 45 5F "; offset:0; depth:5; classtype:misc-activity; sid:1428; rev:3;) Snort - Streaming Rules WJ Buchanan. ASFC (32)

33 # (C) Copyright 2001,2002, Martin Roesch, Brian Caswell, et al. # All rights reserved. Files, such as PIF, VBS and # $Id: virus.rules,v /10/20 15:03:13 chrisgreen Exp $ # HTA can breach the system # VIRUS RULES # alert tcp any any -> any 139 (msg:"virus - Possible QAZ Worm Infection"; flags:a; content: " a e "; reference:mcafee,98775; sid:732; classtype:misc-activity; rev:3;) alert tcp $SMTP_SERVERS any -> $EXTERNAL_NET 25 (msg:"virus OUTBOUND.pif file attachment"; flow:to_server,established; content:"content-disposition 3a "; content:"filename= 22 "; distance:0; within:30; content:".pif 22 "; distance:0; within:30; nocase; classtype:suspiciousfilename-detect; sid:721; rev:4;) alert tcp $SMTP_SERVERS any -> $EXTERNAL_NET 25 (msg:"virus OUTBOUND.shs file attachment"; flow:to_server,established; content:"content-disposition 3a "; content:"filename= 22 "; distance:0; within:30; content:".shs 22 "; distance:0; within:30; nocase; classtype:suspiciousfilename-detect; sid:730; rev:4;) alert tcp $SMTP_SERVERS any -> $EXTERNAL_NET 25 (msg:"virus OUTBOUND.exe file attachment"; flow:to_server,established; content:"content-disposition 3a "; content:"filename= 22 "; distance:0; within:30; content:".exe 22 "; distance:0; within:30; nocase; classtype:suspiciousfilename-detect; sid:2160; rev:1;) alert tcp $SMTP_SERVERS any -> $EXTERNAL_NET 25 (msg:"virus OUTBOUND.doc file attachment"; flow:to_server,established; content:"content-disposition 3a "; content:"filename= 22 "; distance:0; within:30; content:".doc 22 "; distance:0; within:30; nocase; classtype:suspiciousfilename-detect; sid:2161; rev:1;) alert tcp $SMTP_SERVERS any -> $EXTERNAL_NET 25 (msg:"virus OUTBOUND.vbs file attachment"; flow:to_server,established; content:"content-disposition 3a "; content:"filename= 22 "; distance:0; within:30; content:".vbs 22 "; distance:0; within:30; nocase; classtype:suspiciousfilename-detect; sid:793; rev:4;) alert tcp $SMTP_SERVERS any -> $EXTERNAL_NET 25 (msg:"virus OUTBOUND.hta file attachment"; flow:to_server,established; content:"content-disposition 3a "; content:"filename= 22 "; distance:0; within:30; content:".hta 22 "; distance:0; within:30; nocase; classtype:suspiciousfilename-detect; sid:2162; rev:1;) Port 25 is SMTP ( SMTP server outbound) Snort - Some Virus Rules WJ Buchanan. ASFC (33)

34 Open port 10? Open port 11?.. Open port 8888? Typical scans: Ping sweeps. TCP scans. UDP scans. OS identification scans. Account scans. A particular threat is the TCP/UDP port scanner, which scans for open ports on a host. If an intruder finds one, it may try and connect to it. An open port is in the LISTEN state. Port Scanning WJ Buchanan. ASFC (34)

35 Ping ? Ping ?.. Ping ? Ping ? Typical scans: Ping sweeps. TCP scans. UDP scans. OS identification scans. Account scans. A particular threat is the ping port scanner, which pings multiple hosts to see which ones are alive If an intruder finds one, it may try and connect to it. Typically Typically pings pings are are barred barred the the gateway gateway to to the the organisation organisation Ping Scanning WJ Buchanan. ASFC (35)

36 Login anonymous Login fred fred Login user password Login root Login default Typical scans: Ping sweeps. TCP scans. UDP scans. OS identification scans. Account scans. Anonymous logins Using the same password as user ID Using password as password. Using root login Using system default logins Account Scanning WJ Buchanan. ASFC (36)

37 # (C) Copyright 2001,2002, Martin Roesch, Brian Caswell, et al. # All rights reserved. # $Id: scan.rules,v /11/20 20:56:57 cazz Exp $ # # SCAN RULES # # These signatures are representitive of network scanners. These include # port scanning, ip mapping, and various application scanners. # # NOTE: This does NOT include web scanners such as whisker. Those are # in web* # Attempt to connect to 8080 alert tcp $EXTERNAL_NET > $HOME_NET any (msg:"scan myscan"; ttl: >220; ack: 0; flags: S;reference:arachnids,439; classtype:attempted-recon; sid:613; rev:1;) alert tcp $EXTERNAL_NET any -> $HOME_NET 113 (msg:"scan ident version request"; flow:to_server,established; content: "VERSION 0A "; depth: 16;reference:arachnids,303; classtype:attempted-recon; sid:616; rev:3;) alert tcp $EXTERNAL_NET any -> $HOME_NET 80 (msg:"scan cybercop os probe"; flags: SF12; dsize: 0; reference:arachnids,146; classtype:attempted-recon; sid:619; rev:1;) alert tcp $EXTERNAL_NET any -> $HOME_NET 3128 (msg:"scan Squid Proxy attempt"; flags:s,12; classtype:attempted-recon; sid:618; rev:4;) alert tcp $EXTERNAL_NET any -> $HOME_NET 1080 (msg:"scan SOCKS Proxy attempt"; flags:s,12; reference:url,help.undernet.org/proxyscan/; classtype:attempted-recon; sid:615; rev:4;) alert tcp $EXTERNAL_NET any -> $HOME_NET 8080 (msg:"scan Proxy Port 8080 attempt"; flags:s,12; classtype:attempted-recon; sid:620; rev:5;) alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"scan FIN"; flags:f,12; reference:arachnids,27; classtype:attempted-recon; sid:621; rev:2;) alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"scan ipeye SYN scan"; flags:s; seq: ; reference:arachnids,236; classtype:attempted-recon; sid:622; rev:2;) alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"scan NULL"; flags:0; seq:0; ack:0; reference:arachnids,4; classtype:attempted-recon; sid:623; rev:1;) alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"scan SYN FIN";flags:SF,12; reference:arachnids,198; classtype:attempted-recon; sid:624; rev:2;) Snort - Some Scan Rules WJ Buchanan. ASFC (37)

38 File bill.rules: alert tcp any any -> any any (content:"the"; msg:"the found...";) Snort -v -c bill.rules -l /log Alert.ids (in \log) [**] [1:0:0] The found... [**] [Priority: 0] 01/16-22:27: :60:B3:68:B1:10 -> 0:3:6D:FF:2A:51 type:0x800 len:0x :445 -> :3554 TCP TTL:128 TOS:0x0 ID:774 IpLen:20 DgmLen:347 DF ***AP*** Seq: 0xF842A9D3 Ack: 0x3524EE7B Win: 0x4321 TcpLen: 20 [**] [1:0:0] The found... [**] [Priority: 0] 01/16-22:27: :3:6D:FF:2A:51 -> 0:60:B3:68:B1:10 type:0x800 len:0x :3554 -> :445 TCP TTL:128 TOS:0x0 ID:1086 IpLen:20 DgmLen:394 DF ***AP*** Seq: 0x3524EE7B Ack: 0xF842AB06 Win: 0x42E4 TcpLen: 20 [**] [1:0:0] The found... [**] [Priority: 0] 01/16-22:27: :60:B3:68:B1:10 -> 0:3:6D:FF:2A:51 type:0x800 len:0x5d :445 -> :3554 TCP TTL:128 TOS:0x0 ID:775 IpLen:20 DgmLen:79 DF ***AP*** Seq: 0xF842AB06 Ack: 0x3524EFDD Win: 0x41BF TcpLen: 20 Running Snort WJ Buchanan. ASFC (38)

39 16 January 10:27pm [**] [1:0:0] The found... [**] [Priority: 0] 01/16-22:27: :60:B3:68:B1:10 -> 0:3:6D:FF:2A:51 type:0x800 len:0x :445 -> :3554 TCP TTL:128 TOS:0x0 ID:774 IpLen:20 DgmLen:347 DF ***AP*** Seq: 0xF842A9D3 Ack: 0x3524EE7B Win: 0x4321 TcpLen: 20 Analysing Snort s Alert.ids file (Data frame) WJ Buchanan. ASFC (39)

40 0 0 Version Version D D IP Header Header Header length length Total length Type Type of of service service Total length Identification Identification M Fragment Fragment Offset Offset Time-to-Live Time-to-Live Protocol Protocol Header Header Checksum Checksum Source Source IP IP Address Address Destination Destination IP IP Address Address TCP Header Data offset Data offset Src MAC Des MAC Type Len IP TCP Source Source port port Destination Destination port port Sequence number Sequence number Acknowledgement number Acknowledgement number Reserved/Flags Reserved/Flags Window Window Checksum Checksum UrgentPtr UrgentPtr [**] [1:0:0] The found... [**] [Priority: 0] 01/16-22:27: :60:B3:68:B1:10 -> 0:3:6D:FF:2A:51 type:0x800 len:0x :445 -> :3554 TCP TTL:128 TOS:0x0 ID:774 IpLen:20 DgmLen:347 DF ***AP*** Seq: 0xF842A9D3 Ack: 0x3524EE7B Win: 0x4321 TcpLen: 20 Remember IP addresses can be spoofed the MAC addresses can t (well it s difficult). Analysing Snort s Alert.ids file (Data frame) Ethernet Data frame WJ Buchanan. ASFC (40)

41 0 0 Version Version D D IP Header Header Header length length Total length Type Type of of service service Total length Identification Identification M Fragment Fragment Offset Offset Time-to-Live Time-to-Live Protocol Protocol Header Header Checksum Checksum Source Source IP IP Address Address Destination Destination IP IP Address Address TCP Header Data offset Data offset Source Source port port Destination Destination port port Sequence number Sequence number Acknowledgement number Acknowledgement number Reserved/Flags Reserved/Flags Window Window Checksum Checksum UrgentPtr UrgentPtr [**] [1:0:0] The found... [**] [Priority: 0] 01/16-22:27: :60:B3:68:B1:10 -> 0:3:6D:FF:2A:51 type:0x800 len:0x :445 -> :3554 TCP TTL:128 TOS:0x0 ID:774 IpLen:20 DgmLen:347 DF ***AP*** Seq: 0xF842A9D3 Ack: 0x3524EE7B Win: 0x4321 TcpLen: 20 Analysing Snort s Alert.ids file (IP) WJ Buchanan. ASFC (41)

42 0 0 Version Version D D IP Header Header Header length length Total length Type Type of of service service Total length Identification Identification M Fragment Fragment Offset Offset Time-to-Live Time-to-Live Protocol Protocol Header Header Checksum Checksum Source Source IP IP Address Address Destination Destination IP IP Address Address TCP Header Data offset Data offset Source Source port port Destination Destination port port Sequence number Sequence number Acknowledgement number Acknowledgement number Reserved/Flags Reserved/Flags Window Window Checksum Checksum UrgentPtr UrgentPtr [**] [1:0:0] The found... [**] [Priority: 0] 01/16-22:27: :60:B3:68:B1:10 -> 0:3:6D:FF:2A:51 type:0x800 len:0x :445 -> :3554 TCP TTL:128 TOS:0x0 ID:774 IpLen:20 DgmLen:347 DF ***AP*** Seq: 0xF842A9D3 Ack: 0x3524EE7B Win: 0x4321 TcpLen: 20 Analysing Snort s Alert.ids file (TCP) WJ Buchanan. ASFC (42)

43 + log TCP_ ids TCP_ ids TCP_ ids TCP_ ids TCP_ ids TCP_ ids 01/16-22:11: :3423 -> :445 TCP TTL:128 TOS:0x0 ID:975 IpLen:20 DgmLen:48 DF ******S* Seq: 0x26885B8B Ack: 0x0 Win: 0x4000 TcpLen: 28 TCP Options (4) => MSS: 1460 NOP NOP SackOK =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 01/16-22:11: :445 -> :3423 TCP TTL:128 TOS:0x0 ID:653 IpLen:20 DgmLen:48 DF ***A**S* Seq: 0xE9A4004C Ack: 0x26885B8C Win: 0x4470 TcpLen: 28 TCP Options (4) => MSS: 1460 NOP NOP SackOK =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 01/16-22:11: :3423 -> :445 TCP TTL:128 TOS:0x0 ID:977 IpLen:20 DgmLen:40 DF ***A**** Seq: 0x26885B8C Ack: 0xE9A4004D Win: 0x4470 TcpLen: 20 =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ Analysing Snort s Log Log of traffic between port 3423 and 455 to/from WJ Buchanan. ASFC (43)

44 TCP Header Source Source port port Destination port Destination port Sequence number Sequence number Acknowledgement number Acknowledgement number Data Data offset offset Window Window Checksum Checksum UrgentPtr UrgentPtr UAPRSF UAPRSF Flags the flag field is defined as UAPRSF, U is the urgent flag (URG). A the acknowledgement flag (ACK). P the push function (PSH). R the reset flag (RST). S the sequence synchronize flag (SYN). F the end-of-transmission flag (FIN). Analysis TCP Flags WJ Buchanan. ASFC (44)

45 Originator Recipient 1. CLOSED LISTEN 2. SYN-SENT -> <SEQ=999><CTL=SYN> SYN-RECEIVED 3. ESTABLISHED <SEQ=100><ACK=1000><CTL=SYN,ACK> <- SYN-RECEIVED 4. ESTABLISHED -> <SEQ=1000><ACK=101> <CTL=ACK> ESTABLISHED 5. ESTABLISHED -> <SEQ=1000><ACK=101> <CTL=ACK><DATA> ESTABLISHED Flags the flag field is defined as UAPRSF, U is the urgent flag (URG). A the acknowledgement flag (ACK). P the push function (PSH). R the reset flag (RST). S the sequence synchronize flag (SYN). F the end-of-transmission flag (FIN). The SYN flag identifies a connection Analysis TCP Flags WJ Buchanan. ASFC (45)

46 An incoming SYN flag is important in detecting the start of a connection. The main flags are: F FIN S SYN R RST P PSH A ACK U URG The following modifiers can be set to change the match criteria: + match on the specified bits, plus any others * match if any of the specified bits are set! match if the specified bits are not set Example to test for SYN flag: alert tcp any any -> any any (flags:s;) Connection? WWW server Testing Flags in Snort WJ Buchanan. ASFC (46)

47 It is often important to know the flow direction. The main flow rules options are: to_client. Used for server responses to client. to_server Used for client requests to server. from_client. Used on client responses. from_server. Used on server responses. established. Established TCP connections. Example to test for an FTP connection to the users computer: alert tcp any any -> $HOME_NET 21 (flow: from_client; content: "CWD incoming"; nocase; Connection? WWW server Testing Flow in Snort WJ Buchanan. ASFC (47)

48 0 0 Version Version D D IP Header Header Header length length Total length Type Type of of service service Total length Identification Identification M Fragment Fragment Offset Offset Time-to-Live Time-to-Live Protocol Protocol Header Header Checksum Checksum Source Source IP IP Address Address Destination Destination IP IP Address Address Data offset Data offset Source Source port port Destination Destination port port Sequence number Sequence number Acknowledgement number Acknowledgement number Window Window Checksum Checksum UrgentPtr UrgentPtr 01/16-22:11: :3423 -> :445 TCP TTL:128 TOS:0x0 ID:975 IpLen:20 DgmLen:48 DF ******S* Seq: 0x26885B8B Ack: 0x0 Win: 0x4000 TcpLen: 28 TCP Options (4) => MSS: 1460 NOP NOP SackOK =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 01/16-22:11: :445 -> :3423 TCP TTL:128 TOS:0x0 ID:653 IpLen:20 DgmLen:48 DF ***A**S* Seq: 0xE9A4004C Ack: 0x26885B8C Win: 0x4470 TcpLen: 28 TCP Options (4) => MSS: 1460 NOP NOP SackOK =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 01/16-22:11: :3423 -> :445 TCP TTL:128 TOS:0x0 ID:977 IpLen:20 DgmLen:40 DF ***A**** Seq: 0x26885B8C Ack: 0xE9A4004D Win: 0x4470 TcpLen: 20 =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ Analysing Snort s Log TCP Header UAPRSF UAPRSF WJ Buchanan. ASFC (48)

49 Switch Devices can only communicate directly if they have they have the MAC address and IP address. ARP request: Who has ? ARP request is broadcast to the network 01/16-09:31: ARP who-has tell /16-09:45: ARP who-has tell /16-09:45: ARP reply is-at 0:20:18:38:B8:63 01/16-09:46: ARP who-has tell /16-09:46: ARP who-has tell /16-09:46: ARP who-has tell ARP reply is sent to the network, on which every node on the segment updates its ARP table Analysing Snort s ARP log WJ Buchanan. ASFC (49)

50 So what does Snort tell us? Logs date/time of alerts and data packets. Generates alerts (alert.ids) Logs every data packet and every connection. Logs ARP requests and responses. Logs MAC addresses with IP addresses. But how to we generate evidence for breaches? this will be covered in Unit 6 (Forensic Computing) For For 99.99% 99.99% of of the the time, time, the the monitoring monitoring of of data data packets packets may may not not be be important important but but every every so so often often there s there s a breach, breach, and and the the evidence evidence must must be be picked picked through through So how can Snort help us? WJ Buchanan. ASFC (50)

51 User User profile profile Typing Typing speed: speed: 20wpm 20wpm Applications Applications run: run: Word, Word, Excel Excel Typical Typical commands commands run: run: dir, dir, cd cd Files Files accessed: accessed: doc, doc, xls xls Working Working times: times: etc etc 1. Profile downloaded to agent on host 2. Agent then checks current usage against user profile. If they differ greatly contact Administrator on a possible intrusion. 3. Profile updated when user completes their work and finally the ultimate IDS User profiling WJ Buchanan. ASFC (51)

52 This device has all the required weaknesses, such as: Default administrator/password. Dummy users with weak passwords. Ports open for connection. React to virus/worm systems (but simulate conditions). Sometimes it is possible to create a honey-pot or lures, which attracts an intruder so that they can be caught before they do any damage. and finally (again) the honeypot WJ Buchanan. ASFC (52)

3 Intrusion Detection Systems

3 Intrusion Detection Systems 3 Intrusion Detection Systems 3.1 Introduction In Unit 1 the concept of defence-in-depth was discussed, where a defence system has many layers of defence (Figure 3.1). Unfortunately, as in military systems,

More information

2 Intrusion Detection Systems

2 Intrusion Detection Systems 2 Intrusion Detection Systems http://buchananweb.co.uk/security00.aspx, Select Principles of IDS. 2.1 Introduction In Chapter 1 the concept of defence in depth was discussed, where a defence system has

More information

Advanced Security and Forensic Computing

Advanced Security and Forensic Computing Advanced Security and Forensic Computing Unit 2: Network Security Elements Dr Dr Bill Buchanan, Reader, School of of Computing. >Unit 2: 2: Network Security Elements Advanced Security and Forensic Computing

More information

Defence. Defence. Eve (Intruder) Intrusion Detection. Author: Bill Buchanan. Author: Prof Bill Buchanan

Defence. Defence. Eve (Intruder) Intrusion Detection. Author: Bill Buchanan. Author: Prof Bill Buchanan ` Intrusion Systems Introduction Threats Types Host or Network? Agent-based Snort A simple rule A few intrusions User profiling Honeypots IPS Conclusions Intrusion Defence Eve (Intruder) Defence Intrusion

More information

Prof. Bill Buchanan Room: C.63

Prof. Bill Buchanan Room: C.63 Wireless LAN CO72047 Unit 7: Filtering Prof. Bill Buchanan Contact: w.buchanan@napier.ac.uk Room: C.63 Telephone: X2759 MSN Messenger: w_j_buchanan@hotmail.com WWW: http://www.dcs.napier.ac.uk/~bill http://buchananweb.co.uk

More information

Advanced Security and Mobile Networks

Advanced Security and Mobile Networks WJ Buchanan. ASMN (1) Advanced Security and Mobile Networks Unit 1: Network Security Application Presentation Session Transport Network Data Link Physical OSI Application Transport Internet Internet model

More information

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Internet Security Mechanisms Prevent: Firewall, IPsec, SSL Detect: Intrusion Detection Survive/ Response:

More information

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS 1 FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN ooding: attacker

More information

To use Snort for deep packet inspection, for log analysis, and to detect reconnaissance attacks from a Windows Application

To use Snort for deep packet inspection, for log analysis, and to detect reconnaissance attacks from a Windows Application Lab 7B: Intrusion Detection Systems (IDS) 2 (Invoking Snort from C# - Advanced) Details Aim: To use Snort for deep packet inspection, for log analysis, and to detect reconnaissance attacks from a Windows

More information

Snort 初探. Aphyr Lee

Snort 初探. Aphyr Lee Snort 初探 Aphyr Lee aphyr@www.elites.org 2004.11.20 Outline How to IDSs detect intrusions Snort s Inner Workings Playing by the Rules Conclusion How to IDSs detect intrusions (1/6) Any way they can Specialized

More information

Pre processors. Detection Engine

Pre processors. Detection Engine Packet Decoder Pre processors Detection Engine Logging and Alerting System Output Modules Filesystem Syslog Database XML Firewall config You should know how the rules are constructed in order to fully

More information

IDS: Signature Detection

IDS: Signature Detection IDS: Signature Detection Idea: What is bad, is known What is not bad, is good Determines whether a sequence of instructions being executed is known to violate the site security policy Signatures: Descriptions

More information

Exam Number/Code: Exam Name: Computer Hacking. Version: Demo. Forensic Investigator.

Exam Number/Code: Exam Name: Computer Hacking. Version: Demo. Forensic Investigator. Exam Number/Code:312-49 Exam Name: Computer Hacking Forensic Investigator Version: Demo http://www.it-exams.com QUESTION NO: 1 When an investigator contacts by telephone the domain administrator or controller

More information

Study of Snort Ruleset Privacy Impact

Study of Snort Ruleset Privacy Impact Study of Snort Ruleset Privacy Impact Nils Ulltveit-Moe and Vladimir Oleshchuk University of Agder Presented at: Fifth International PrimeLife/IFIP Summer School, Nice, France 7.-11. September 2009. This

More information

Intrusion Detection - Snort. Network Security Workshop April 2017 Bali Indonesia

Intrusion Detection - Snort. Network Security Workshop April 2017 Bali Indonesia Intrusion Detection - Snort Network Security Workshop 25-27 April 2017 Bali Indonesia Issue Date: [31-12-2015] Revision: [V.1] Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied

More information

Overview of Firewalls. CSC 474 Network Security. Outline. Firewalls. Intrusion Detection System (IDS)

Overview of Firewalls. CSC 474 Network Security. Outline. Firewalls. Intrusion Detection System (IDS) CSC 474 Network Security Topic 8.4 Firewalls and Intrusion Detection Systems (IDS) 1 Outline Firewalls Filtering firewalls Proxy firewalls Intrusion Detection System (IDS) Rule-based IDS Anomaly detection

More information

Intrusion Detection. What is Intrusion Detection

Intrusion Detection. What is Intrusion Detection Intrusion Detection 1 What is Intrusion Detection We are referering to the act of detecting an unauthorized intrusion by a computer on a Network. Attemp to compromise or otherwise do harm, to other Network

More information

Intrusion Detection - Snort

Intrusion Detection - Snort Intrusion Detection - Snort 1 Sometimes, Defenses Fail Our defenses aren t perfect Patches aren t applied promptly enough AV signatures not always up to date 0-days get through Someone brings in an infected

More information

Intrusion Detection - Snort

Intrusion Detection - Snort Intrusion Detection - Snort Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 Sometimes, Defenses Fail Our defenses aren t perfect Patches aren t applied promptly enough AV signatures

More information

CSCI 454/554 Computer and Network Security. Topic 8.4 Firewalls and Intrusion Detection Systems (IDS)

CSCI 454/554 Computer and Network Security. Topic 8.4 Firewalls and Intrusion Detection Systems (IDS) CSCI 454/554 Computer and Network Security Topic 8.4 Firewalls and Intrusion Detection Systems (IDS) Outline Firewalls Filtering firewalls Proxy firewalls Intrusion Detection System (IDS) Rule-based IDS

More information

Certified Ethical Hacker

Certified Ethical Hacker Certified Ethical Hacker ECCouncil 312-49 Dumps Available Here at: /eccouncil-exam/312-49-dumps.html Enrolling now you will get access to 316 questions in a unique set of 312-49 dumps Question 1 When an

More information

Outline. Internet Security Mechanisms. Basic Terms. Example Attacks

Outline. Internet Security Mechanisms. Basic Terms. Example Attacks Outline AIT 682: Network and Systems Security Topic 8.4 Firewalls and Intrusion Detection Systems (IDS) Firewalls Filtering firewalls Proxy firewalls Intrusion Detection System (IDS) Rule-based IDS Anomaly

More information

AIT 682: Network and Systems Security

AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 8.4 Firewalls and Intrusion Detection Systems (IDS) Instructor: Dr. Kun Sun Firewalls Filtering firewalls Proxy firewalls Outline Intrusion Detection System

More information

Chapter 8 roadmap. Network Security

Chapter 8 roadmap. Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing

More information

Computer Security and Privacy

Computer Security and Privacy CSE P 590 / CSE M 590 (Spring 2010) Computer Security and Privacy Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for

More information

Advanced Network Forensics User/Password Crack. Port Scan. Signature Detection. Converted Formats. ARP Spoofing. DDoS Detection.

Advanced Network Forensics User/Password Crack. Port Scan. Signature Detection. Converted Formats. ARP Spoofing. DDoS Detection. Advanced Network Forensics User/Password Crack. Port Scan. Signature Detection. Converted Formats. ARP Spoofing. DDoS Detection. Setup Setup 192.168.47.171 192.168.47.200 Snort -i 1 -c 1.rules alert.ids

More information

IDS / SNORT. Matsuzaki maz Yoshinobu stole slides from Fakrul Alam

IDS / SNORT. Matsuzaki maz Yoshinobu stole slides from Fakrul Alam IDS / SNORT Matsuzaki maz Yoshinobu stole slides from Fakrul Alam 1 Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied promptly enough Antivirus signatures not

More information

ELEC5616 COMPUTER & NETWORK SECURITY

ELEC5616 COMPUTER & NETWORK SECURITY ELEC5616 COMPUTER & NETWORK SECURITY Lecture 17: Network Protocols I IP The Internet Protocol (IP) is a stateless protocol that is used to send packets from one machine to another using 32- bit addresses

More information

K2289: Using advanced tcpdump filters

K2289: Using advanced tcpdump filters K2289: Using advanced tcpdump filters Non-Diagnostic Original Publication Date: May 17, 2007 Update Date: Sep 21, 2017 Topic Introduction Filtering for packets using specific TCP flags headers Filtering

More information

Packet Header Formats

Packet Header Formats A P P E N D I X C Packet Header Formats S nort rules use the protocol type field to distinguish among different protocols. Different header parts in packets are used to determine the type of protocol used

More information

Lab1. Definition of Sniffing: Passive Sniffing: Active Sniffing: How Does ARP Spoofing (Poisoning) Work?

Lab1. Definition of Sniffing: Passive Sniffing: Active Sniffing: How Does ARP Spoofing (Poisoning) Work? Lab1 Definition of Sniffing: A program or device that captures vital information from the network traffic specific to a particular network. Passive Sniffing: It is called passive because it is difficult

More information

Network Security. Kitisak Jirawannakool Electronics Government Agency (public organisation)

Network Security. Kitisak Jirawannakool Electronics Government Agency (public organisation) 1 Network Security Kitisak Jirawannakool Electronics Government Agency (public organisation) A Brief History of the World 2 OSI Model vs TCP/IP suite 3 TFTP & SMTP 4 ICMP 5 NAT/PAT 6 ARP/RARP 7 DHCP 8

More information

Detecting Specific Threats

Detecting Specific Threats The following topics explain how to use preprocessors in a network analysis policy to detect specific threats: Introduction to Specific Threat Detection, page 1 Back Orifice Detection, page 1 Portscan

More information

CIT 480: Securing Computer Systems

CIT 480: Securing Computer Systems CIT 480: Securing Computer Systems Intrusion Detection CIT 480: Securing Computer Systems Slide #1 Topics 1. Definitions and Goals 2. Models of Intrusion Detection 3. False Positives 4. Architecture of

More information

VG422R. User s Manual. Rev , 5

VG422R. User s Manual. Rev , 5 VG422R User s Manual Rev 1.0 2003, 5 CONGRATULATIONS ON YOUR PURCHASE OF VG422R... 1 THIS PACKAGE CONTAINS... 1 CONFIRM THAT YOU MEET INSTALLATION REQUIREMENTS... 1 1. INSTALLATION GUIDE... 2 1.1. HARDWARE

More information

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 29. Firewalls Paul Krzyzanowski Rutgers University Fall 2015 2013-2015 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive data & systems not accessible Integrity:

More information

Firewalls N E T W O R K ( A N D D ATA ) S E C U R I T Y / P E D R O B R A N D Ã O M A N U E L E D U A R D O C O R R E I A

Firewalls N E T W O R K ( A N D D ATA ) S E C U R I T Y / P E D R O B R A N D Ã O M A N U E L E D U A R D O C O R R E I A Firewalls N E T W O R K ( A N D D ATA ) S E C U R I T Y 2 01 6 / 2 017 P E D R O B R A N D Ã O M A N U E L E D U A R D O C O R R E I A Slides are based on slides by Dr Lawrie Brown (UNSW@ADFA) for Computer

More information

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Computer Security And Privacy Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

Attack Prevention Technology White Paper

Attack Prevention Technology White Paper Attack Prevention Technology White Paper Keywords: Attack prevention, denial of service Abstract: This document introduces the common network attacks and the corresponding prevention measures, and describes

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

NIDS: Snort. Group 8. Niccolò Bisagno, Francesco Fiorenza, Giulio Carlo Gialanella, Riccardo Isoli

NIDS: Snort. Group 8. Niccolò Bisagno, Francesco Fiorenza, Giulio Carlo Gialanella, Riccardo Isoli NIDS: Snort Group 8 Niccolò Bisagno, Francesco Fiorenza, Giulio Carlo Gialanella, Riccardo Isoli 1 Summary NIDS Snort Syn Flood Attack Exploit Kit Detection: Bleeding Life Packet Level Evasion Snort as

More information

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE UNIT III STUDY GUIDE Course Learning Outcomes for Unit III Upon completion of this unit, students should be able to: 1. Recall the terms port scanning, network scanning, and vulnerability scanning. 2.

More information

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1 Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol

More information

Computer Network Vulnerabilities

Computer Network Vulnerabilities Computer Network Vulnerabilities Objectives Explain how routers are used to protect networks Describe firewall technology Describe intrusion detection systems Describe honeypots Routers Routers are like

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

ECCouncil EC Ethical Hacking and Countermeasures V7. Download Full Version :

ECCouncil EC Ethical Hacking and Countermeasures V7. Download Full Version : ECCouncil EC1-350 Ethical Hacking and Countermeasures V7 Download Full Version : https://killexams.com/pass4sure/exam-detail/ec1-350 QUESTION: 250 The traditional traceroute sends out ICMP ECHO packets

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways Firewalls 1 Overview In old days, brick walls (called firewalls ) built between buildings to prevent fire spreading from building to another Today, when private network (i.e., intranet) connected to public

More information

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive

More information

Chapter 9. Firewalls

Chapter 9. Firewalls Chapter 9 Firewalls The Need For Firewalls Internet connectivity is essential Effective means of protecting LANs Inserted between the premises network and the Internet to establish a controlled link however

More information

Network Intrusion Detection Systems. Beyond packet filtering

Network Intrusion Detection Systems. Beyond packet filtering Network Intrusion Detection Systems Beyond packet filtering Goal of NIDS Detect attacks as they happen: Real-time monitoring of networks Provide information about attacks that have succeeded: Forensic

More information

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition Chapter 2 Investigating Network Traffic Objectives After completing this chapter, you should be able to: Understand network

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

COMPUTER NETWORK SECURITY

COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (9 th Week) 9. Firewalls and Intrusion Prevention Systems 9.Outline The Need for Firewalls Firewall Characterictics and Access Policy Type of Firewalls

More information

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr.

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr. Applied IT Security System Security Dr. Stephan Spitz Stephan.Spitz@de.gi-de.com Overview & Basics System Security Network Protocols and the Internet Operating Systems and Applications Operating System

More information

CS155 Firewalls. Why Firewalls? Why Firewalls? Bugs, Bugs, Bugs

CS155 Firewalls. Why Firewalls? Why Firewalls? Bugs, Bugs, Bugs CS155 - Firewalls Simon Cooper Why Firewalls? Need for the exchange of information; education, business, recreation, social and political Need to do something useful with your computer Drawbacks;

More information

Week Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development

Week Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development Weekly Tasks Week 5 Rich Macfarlane 2013 Week Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development Aim: The aim of these labs are to further investigate the Snort, network IDS, and methods

More information

SCP SC Security Certified Program. Download Full Version :

SCP SC Security Certified Program. Download Full Version : SCP SC0-502 Security Certified Program Download Full Version : https://killexams.com/pass4sure/exam-detail/sc0-502 building and exactly opposite Troytec. The device is not in your office, and you will

More information

Basics of executing a penetration test

Basics of executing a penetration test Basics of executing a penetration test 25.04.2013, WrUT BAITSE guest lecture Bernhards Blumbergs, CERT.LV Outline Reconnaissance and footprinting Scanning and enumeration System exploitation Outline Reconnaisance

More information

Lab 6: Advanced Network Attack Analysis

Lab 6: Advanced Network Attack Analysis Lab 6: Advanced Network Attack Analysis A Evidence Bag The malicious activity has been captured in the file: https://dl.dropboxusercontent.com/u/40355863/newtrace.rar Video: http://youtu.be/sup4juplmgq

More information

Hands-On Ethical Hacking and Network Defense

Hands-On Ethical Hacking and Network Defense Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified 1-11-17 Objectives Describe the TCP/IP protocol stack Explain the basic concepts of IP addressing Explain the

More information

20-CS Cyber Defense Overview Fall, Network Basics

20-CS Cyber Defense Overview Fall, Network Basics 20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter

More information

Unit 4: Firewalls (I)

Unit 4: Firewalls (I) Unit 4: Firewalls (I) What is a firewall? Types of firewalls Packet Filtering Statefull Application and Circuit Proxy Firewall services and limitations Writing firewall rules Example 1 Example 2 What is

More information

Why Firewalls? Firewall Characteristics

Why Firewalls? Firewall Characteristics Why Firewalls? Firewalls are effective to: Protect local systems. Protect network-based security threats. Provide secured and controlled access to Internet. Provide restricted and controlled access from

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

Author: Prof Bill Buchanan

Author: Prof Bill Buchanan Data Loss Prevention 2. Data in-motion Magic Numbers/Discriminators. Detecting from network traffic. Regular Expressions. Extracting Content from traces. Converted formats. http://asecuritysite.com/dlp

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

REMINDER course evaluations are online

REMINDER course evaluations are online REMINDER course evaluations are online http://web.mit.edu/subjectevaluation please fill them out they provide extremely valuable feedback to all instructors 6.033 Spring 2016 Lecture #23 Combating network

More information

Interconnecting Networks with TCP/IP

Interconnecting Networks with TCP/IP Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol

More information

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking 1 Review of TCP/IP working Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path Frame Path Chapter 3 Client Host Trunk Link Server Host Panko, Corporate

More information

Network Security. Thierry Sans

Network Security. Thierry Sans Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability

More information

Tato pravidla byla povolena v následujících souborech jejich umístění /etc/suricata/rules/

Tato pravidla byla povolena v následujících souborech jejich umístění /etc/suricata/rules/ Suricata Tato pravidla byla povolena v následujících souborech jejich umístění /etc/suricata/rules/ emerging-icmp_info.rules "; icode:0; itype:8; classtype:misc-activity; sid:2100384; rev:6;) *NIX"; itype:8;

More information

Anomaly Detection in Communication Networks

Anomaly Detection in Communication Networks Anomaly Detection in Communication Networks Prof. D. J. Parish High Speed networks Group Department of Electronic and Electrical Engineering D.J.Parish@lboro.ac.uk Loughborough University Overview u u

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

CS419 Spring Computer Security. Vinod Ganapathy Lecture 13. Chapter 6: Intrusion Detection

CS419 Spring Computer Security. Vinod Ganapathy Lecture 13. Chapter 6: Intrusion Detection CS419 Spring 2010 Computer Security Vinod Ganapathy Lecture 13 Chapter 6: Intrusion Detection Security Intrusion & Detection Security Intrusion a security event, or combination of multiple security events,

More information

9. Security. Safeguard Engine. Safeguard Engine Settings

9. Security. Safeguard Engine. Safeguard Engine Settings 9. Security Safeguard Engine Traffic Segmentation Settings Storm Control DoS Attack Prevention Settings Zone Defense Settings SSL Safeguard Engine D-Link s Safeguard Engine is a robust and innovative technology

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

Stateless Firewall Implementation

Stateless Firewall Implementation Stateless Firewall Implementation Network Security Lab, 2016 Group 16 B.Gamaliel K.Noellar O.Vincent H.Tewelde Outline : I. Enviroment Setup II. Today s Task III. Conclusion 2 Lab Objectives : After this

More information

network security s642 computer security adam everspaugh

network security s642 computer security adam everspaugh network security s642 adam everspaugh ace@cs.wisc.edu computer security today Announcement: HW3 to be released WiFi IP, TCP DoS, DDoS, prevention 802.11 (wifi) STA = station AP = access point BSS = basic

More information

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Int ernet w orking Internet Security Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Internet Security Internet security is difficult Internet protocols were not originally designed for security The

More information

Implementing Firewall Technologies

Implementing Firewall Technologies Implementing Firewall Technologies Network firewalls separate protected from non-protected areas preventing unauthorized users from accessing protected network resources. Technologies used: ACLs Standard,

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Attack Protection Configuration Guide Part number: 5998-2650 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

Network Security: Firewall, VPN, IDS/IPS, SIEM

Network Security: Firewall, VPN, IDS/IPS, SIEM Security: Firewall, VPN, IDS/IPS, SIEM Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II Our Narrow Focus 15-441 15-441 Computer Networking 15-641 Lecture 22 Security: DOS Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Yes: Creating a secure channel for communication (Part I) Protecting

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

Internet Security: Firewall

Internet Security: Firewall Internet Security: Firewall What is a Firewall firewall = wall to protect against fire propagation More like a moat around a medieval castle restricts entry to carefully controlled points restricts exits

More information

Introduction to TCP/IP networking

Introduction to TCP/IP networking Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set

More information

Chapter 7. Network Intrusion Detection and Analysis. SeoulTech UCS Lab (Daming Wu)

Chapter 7. Network Intrusion Detection and Analysis. SeoulTech UCS Lab (Daming Wu) SeoulTech UCS Lab Chapter 7 Network Intrusion Detection and Analysis 2015. 11. 3 (Daming Wu) Email: wdm1517@gmail.com Copyright c 2015 by USC Lab All Rights Reserved. Table of Contents 7.1 Why Investigate

More information

AN TOÀN LỚP 4: TCP/IP ATTACKS NGUYEN HONG SON PTITHCM

AN TOÀN LỚP 4: TCP/IP ATTACKS NGUYEN HONG SON PTITHCM 1 AN TOÀN LỚP 4: TCP/IP ATTACKS NGUYEN HONG SON PTITHCM 2 Introduction (1/2) TCP provides a full duplex reliable stream connection between two end points A connection is uniquely defined by the quadruple

More information

Topics. Principles of Intrusion Detection. Intrusion Detection. Characteristics of systems not under attack

Topics. Principles of Intrusion Detection. Intrusion Detection. Characteristics of systems not under attack Intrusion Detection Topics 1. Principles 2. Models of Intrusion Detection 3. False Positives 4. Architecture of an IDS 5. IDS Deployment 6. Active Response (IPS) 7. Host-based IDS and IPS 8. IDS Evasion

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT Transport Protocols UDP User Datagram Protocol TCP Transport Control Protocol and many others UDP One of the core transport protocols Used

More information

Network Security. Chapter 0. Attacks and Attack Detection

Network Security. Chapter 0. Attacks and Attack Detection Network Security Chapter 0 Attacks and Attack Detection 1 Attacks and Attack Detection Have you ever been attacked (in the IT security sense)? What kind of attacks do you know? 2 What can happen? Part

More information

INF5290 Ethical Hacking. Lecture 3: Network reconnaissance, port scanning. Universitetet i Oslo Laszlo Erdödi

INF5290 Ethical Hacking. Lecture 3: Network reconnaissance, port scanning. Universitetet i Oslo Laszlo Erdödi INF5290 Ethical Hacking Lecture 3: Network reconnaissance, port scanning Universitetet i Oslo Laszlo Erdödi Lecture Overview Identifying hosts in a network Identifying services on a host What are the typical

More information

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content Intrusion Detection INFO404 - Lecture 13 21.04.2009 nfoukia@infoscience.otago.ac.nz Content Definition Network vs. Host IDS Misuse vs. Behavior Based IDS Means for Intrusion Detection Definitions (1) Intrusion:

More information

Introduction to Network. Topics

Introduction to Network. Topics Introduction to Network Security Chapter 7 Transport Layer Protocols 1 TCP Layer Topics Responsible for reliable end-to-end transfer of application data. TCP vulnerabilities UDP UDP vulnerabilities DNS

More information

Software Engineering 4C03 Answer Key

Software Engineering 4C03 Answer Key Software Engineering 4C03 Answer Key DAY CLASS Dr. William M. Farmer DURATION OF EXAMINATION: 2 Hours MCMASTER UNIVERSITY FINAL EXAMINATION April 2002 (1) [2 pts.] Conventional encryption cannot be used

More information

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Network Model. Why a Layered Model? All People Seem To Need Data Processing Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation

More information