Security System and COntrol 1
Network Security
Reading list Recommended: www.cert.org Security System and COntrol 3
Internet Connectivity Advantage: private networks able to reach and communicate with the outside word Disadvantage: outside world can also reach and interact with the private network Security System and COntrol 4
Computing Networks: Advantages Resource sharing Distributed workload Increased reliability Expandability Security System and COntrol 5
Computing Networks: Disadvantages Increased risk of security violations Sources of security problems: Sharing: increased number of users System complexity: heterogeneous operating and control systems Unknown perimeter: shared nodes, new nodes Many points of attack: hosts and communications as a unit Anonymity: location and identity of attacker Unknown routing: delivery path of messages Security System and COntrol 6
Security Threat Analysis Local threats Local nodes Local communications Local storage Local devices Network related threats Network gateways Network communications Network control resources Network routers Network resources Security System and COntrol 7
Security Threats Interception of data in transit Access to programs or date at remote hosts Modification of programs or data at remote hosts Modification of data in transit Insertion of communications impersonating a user Insertion of a repeat of a previous communication Blocking a selected traffic Runninga program on a remote host Security System and COntrol 8
Web/Network Security Client Side What can the server do to the client? Fool it Install or run unauthorized software, inspect/alter files Server Side What can the client do to the server? Bring it down (denial of service) Gain access (break-in) Network Is anyone listening? (Sniffing) Is the information genuine? Are the parties genuine? Security System and COntrol 9
Packet Sniffing EVERY NETWORK INTERFACE CARD HAS A UNIQUE 48-BIT MEDIA ACCESS CONTROL (MAC) ADDRESS, e.g. 00:0D:84:F6:3A:10 24 BITS ASSIGNED BY IEEE; 24 BY CARD VENDOR Client Packet Sniffer Server NETWORK INTERFACE CARD ALLOWS ONLY PACKETS FOR THIS MAC ADDRESS PACKET SNIFFER SETS HIS CARD TO PROMISCUOUS MODE TO ALLOW ALL PACKETS THROUGH Security System and COntrol 10
Network Security Problem REMOVABLE MEDIA USER REMOTE LOCATION MODEM + TELEPHONE LOCAL AREA NETWORK INTERNET CONNECTION RADIO EMISSIONS BACKDOOR INTERNET CONNECTION WIRELESS USER ISP REMOTE USER VENDORS AND SUBCONTRACTORS SOURCE: CERT Security System and COntrol 11
Sophistication v. Intruder Knowledge SOURCE: CERT Security System and COntrol 12
Firewall A device placed between two networks or machines All traffic in and out must pass through the firewall Only authorized traffic is allowed to pass The firewall itself is immune to penetration Firewall Company Network Internet SOURCE: ADAM COLDWELL Security System and COntrol 13
Enterprise Access Security Internet Access Internet RSA Agent Firewall Web Server Enterprise Access RSA Agent Authentication Server RSA Agents Mainframe Enterprise RSA Agent RAS Intranet UNIX Remote Access SOURCE: RSA Security System and COntrol 14
Denial-of-Service Attacks Attack to disable a machine (server) by making it unable to respond to requests Use up resources Bandwidth, swap space, RAM, hard disk Some attacks yield millions of service requests per second Security System and COntrol 15
Ping Flooding Internet Attacking System(s) Victim System SOURCE: PETER SHIPLEY Security System and COntrol 16
Three-Way Handshake SYN ACK Client 1: Send SYN seq=x 2: Send SYN seq=y, ACK x+1 3: Send ACK y+1 SYN ACK Server SOURCE: PETER SHIPLEY Security System and COntrol 17
SMURF ATTACK ICMP echo (spoofed source address of victim) Sent to IP broadcast address ICMP echo reply ICMP = Internet Control Message Protocol INTERNET 1 SYN PERPETRATOR VICTIM 10,000 SYN/ACKs -- VICTIM IS DEAD INNOCENT REFLECTOR SITES BANDWIDTH MULTIPLICATION: A T1 (1.54 Mbps) can easily yield 100 MBbps of attack SOURCE: CISCO Security System and COntrol 18
Distributed Denial of Service Attack INTRUDER INTRUDER SENDS COMMANDS TO HANDLERS VICTIM SOURCE: CERT Security System and COntrol 19
DDOS Attack SOURCE: CERT Security System and COntrol 20
DDOS Attack SOURCE: CERT Security System and COntrol 21
Rate Limiting Allows network managers to set bandwidth limits for users and by traffic type. Prevents deliberate or accidental flooding of the network 50 Mbps Rate Limiting for Different Classes of Users Network Manager Teachers 10 Mbps 2 Mbps Students SOURCE: CISCO Security System and COntrol 22
Virus executable code Code Attacks that attaches itself to other executable code (infection) to reproduce itself (spread) replicator+concealer+payload Rabbit, Worm program that makes many copies of itself and spreads them. Each copy makes copies, etc. Worm spreads via networks. Trojan Horse performs unauthorized activity while pretending to be another program. Example: fake login program Security System and COntrol 23
Virus Detection Some virus families have common characteristics Presence or absence of particular strings Antiviral software Only detects what it know how to detect. Must be upgraded regularly for new viruses. Symantec encyclopedia File virus Compare size with known backup copy. Presence of strings, like.exe Retrovirus Attacks or disables antivirus software Security System and COntrol 24
Network Attacks SOURCE: CERT Security System and COntrol 25
Security System and COntrol 26
Intro to Firewalls
Outline What is a firewall? Who needs a firewall? What are the OSI and TCP/IP Network models? What different types of firewalls are there? What are pros and cons of a firewall? What is iptables? Security System and COntrol 28
What is a firewall? Protects networked computers from intentional hostile intrusion. Junction point between two networks. A private and a public network. Earliest were simple routers. The term come from the concept of firewalls and firedoors in buildings. They limit damage that could spread from one subnet to another. Security System and COntrol 29
Hardware Firewall Security System and COntrol 30
Software Firewall Security System and COntrol 31
A Firewall Can filter traffic based on their source and destination addresses, port numbers, protocol used, and packet state. Cannot prevent individual users with modems from dialing in and out of the network. Cannot protect against social engineering and dumpster diving. Security System and COntrol 32
Who needs a firewall? Anyone who is responsible for a private network that is connected to a public network. Anyone who connects so much as a single computer to the internet via modem. Security System and COntrol 33
Basic Firewall Operation Security System and COntrol 34
The OSI and TCP/IP Models Security System and COntrol 35
Professional Firewall Model Security System and COntrol 36
Types of Firewalls Packet Filter Circuit Level Gateways Application Level Gateways Stateful Multilayer Inspection Security System and COntrol 37
Packet Filtering Firewall Security System and COntrol 38
Circuit Level Gateway Security System and COntrol 39
Application Level Gatway Security System and COntrol 40
Stateful Multilayer Inspection Security System and COntrol 41
Implementing your firewall Choose the access denial methodology. Determine inbound access policy. Determine outbound access policy. Determine if dial-in or dial-out access is required. (VPN) Decide whether to buy a complete firewall product or implement one yourself. Security System and COntrol 42
Access denial methodology Deny access by default Security System and COntrol 43
Inbound Access Policy May be simple NO ACCESS NAT NAT + protocol filtering Complex stateful multilayer inspection Security System and COntrol 44
Outbound Access Policy Open Access Per User outbound policy (Proxy) Security System and COntrol 45
Other Considerations Dial-in/out Buy a solution Hardware -- PIX, Sonicwall, WatchGuard Software -- CheckPoint, ISA, Boarder Manager Build a solution Linux -- IPTables BSD -- IPFW, IPFilter, pf Security System and COntrol 46
IPTables In Linux 2.2 can limit spoofed packets. In Linux 2.4 can check for suspicious packets with unclean extension. Also can check for malformed or non-standard packets. Can check all TCP Flags. (NEW) Security System and COntrol 47
IPTables Can filter on MAC address. Can match TCP or UDP packets based on a series of source and destination ports. (NEW) Can return packets with original destination info. (NEW) Security System and COntrol 48
IPTable Targets Has IPChains: REJECT, DENY, ACCEPT MIRROR TOS, MARK MASQUERADE, DNAT, SNAT, REDIRECT Security System and COntrol 49
IPTables Stateful Inspection Associate all the packets of a particular connection with each other. Tries to make sense out of the higher level protocols: NFS, HTTP, FTP Can be used to block port scans or malicious hack attempt. Dynamic allocation of arbitrary ports used by many protocols for data exchange. Security System and COntrol 50
IPTables Stateful Inspection States NEW RELATED INVALID ESTABLISHED RELATED+REPLY Security System and COntrol 51
IPTable Address Translation New additions DNAT : Destination address NAT SNAT : Source address NAT REDIRECT : DNAT that alters the destination to localhost Security System and COntrol 52
Security System and COntrol 53
Intrusion Control
Historical Research - Prevention It is better to prevent something than to plan for loss. Security System and COntrol 55
Misuse Prevention Prevention techniques: first line of defense Secure local and network resources Techniques: cryptography, identification, authentication, authorization, access control, security filters, etc. Problem: Losses occur! Security System and COntrol 56
Contributing Factors for Misuse Many security flaws in systems Secure systems are expensive Secure systems are not user-friendly Secure systems still have flaws Insider Threat Hackers skills and tools improve Security System and COntrol 57
Need: Intrusion Prevention: protect system resources Intrusion Detection: (second line of defense) discriminate intrusion attempts from normal system usage Intrusion Recovery: cost effective recovery models Security System and COntrol 58
Why Intrusion Detection? Second line of defense Deter intruders Catch intruders Prevent threats to occur (real-time IDS) Improve prevention/detection techniques Security System and COntrol 59
Intrusion Detection - Milestones 1980: Deviation from historical system usage (Anderson) 1987: framework for general-purpose intrusion detection system (Denning) 1988: intrusion detection research splits Attack signatures based detection (MIDAS) Anomaly detection based detection (IDES) Security System and COntrol 60
Intrusion Detection - Milestones Early 1990s: Commercial installations IDES, NIDES (SRI) Haystack, Stalker (Haystack Laboratory Inc.) Distributed Intrusion Detection System (Air Force) Late 1990s -today: Integration of audit sources Network based intrusion detection Hybrid models Immune system based IDS Security System and COntrol 61
Terminology Audit: activity of looking at user/system behavior, its effects, or the collected data Profiling: looking at users or systems to determine what they usually do Anomaly: abnormal behavior Misuse: activity that violates the security policy Outsider: someone without access right to the system Insider: someone with access right to the system Intrusion: misuse by outsiders and insiders Security System and COntrol 62
Phases of Intrusion Intelligence gathering: attacker observes the system to determine vulnerabilities Planning: attacker decide what resource to attack (usually least defended component) Attack: attacker carries out the plan Hiding: attacker covers tracks of attack Future attacks: attacker installs backdoors for future entry points Security System and COntrol 63
Times of Intrusion Detection Real-time intrusion detection Advantages: May detect intrusions in early stages May limit damage Disadvantages: May slow down system performance Trade off between speed of processing and accuracy Hard to detect partial attacks Security System and COntrol 64
Times of Intrusion Detection Off-the-line intrusion detection Advantages: Able to analyze large amount of data Higher accuracy than real-time ID Disadvantages: Mostly detect intrusions after they occurred Security System and COntrol 65
Audit Data Format, granularity and completeness depend on the collecting tool Examples System tools collect data (login, mail) Additional collection of low system level Sniffers as network probes Application auditing Needed for Establishing guilt of attackers Detecting subversive user activity Security System and COntrol 66
Audit-Based Intrusion Detection Audit Data Profiles, Rules, etc. Intrusion Detection System Decision Need: Audit data Ability to characterize behavior Security System and COntrol 67
Anomaly versus Misuse Non-intrusive use Intrusive use Looks like NORMAL behavior False negative Non-anomalous but Intrusive activities False positive Non-intrusive but Anomalous activities Does NOT look Like NORMAL behavior Security System and COntrol 68
False Positive v.s. False Negative False positive: non-intrusive but anomalous activity Security policy is not violated Cause unnecessary interruption May cause users to become unsatisfied False negative: non-anomalous but intrusive activity Security policy is violated Undetected intrusion Security System and COntrol 69
Intrusion Detection Techniques 1. Anomaly Detection 2. Misuse Detection 3. Hybrid Misuse/Anomaly Detection 4. Immune System Based IDS Security System and COntrol 70
Statistical techniques: Rules and Profiles Collect usage data to statistically analyze data Good for both anomaly-based and misuse-based detection: Anomaly-based: standards for normal behavior. Warning when deviation is detected Misuse-based: standards for misuse. Warning when phases of an identified attack are detected Threshold detection E.g., number of failed logins, number of accesses to resources, size of downloaded files, etc. Security System and COntrol 71
Rule-based techniques: Rules and Profiles Define rules to describe normal behavior or known attacks Good for both anomaly-based and misuse-based detection: Anomaly-based: looks for deviations from previous usage Misuse-based: define rules to represent known attacks Security System and COntrol 72
Anomaly Detection Techniques Assume that all intrusive activities are necessarily anomalous flag all system states that very from a normal activity profile. Security System and COntrol 73
Need: Anomaly Detection Techniques Selection of features to monitor Good threshold levels to prevent false-positives and false-negatives Efficient method for keeping track and updating system profile metrics Update Profile Audit Data System Profile Deviation Attack State Generate New Profile Security System and COntrol 74
Misuse Detection Techniques Represent attacks in the form of pattern or a signature (variations of same attack can be detected) Problem! Cannot represent new attacks Security System and COntrol 75
Misuse Detection Techniques Expert Systems Model Bases Reasoning State Transition Analysis Neutral Networks Audit Data Timing Information Modify Rules System Profile Add New Rules Rule Match Attack State Security System and COntrol 76
Hybrid Misuse / Anomaly Detection Anomaly and misuse detection approaches together Example: 1. Browsing using nuclear is not misuse but might be anomalous 2. Administrator accessing sensitive files is not anomalous but might be misuse Security System and COntrol 77
Immune System Based ID Detect intrusions by identifying suspicious changes in system-wide activities. System health factors: Performance Use of system resources Need: identify system-wide measurements Security System and COntrol 78
Immune System Based ID Principal features of human immune system that are relevant to construct robust computer systems: 1. Multi-layered protection 2. Distributed detection 3. Diversity of detection 4. Inexact matching ability 5. Detection of unseen attacks Security System and COntrol 79
Doorknob rattling Masquerade attacks Diversionary Attack Coordinated attacks Chaining Loop-back Intrusion Types Security System and COntrol 80
Doorknob Rattling Attack on activity that can be audited by the system (e.g., password guessing) Number of attempts is lower than threshold Attacks continue until All targets are covered or Access is gained Security System and COntrol 81
Change identity: I m Y Login as X Target 1 Masquerading Login as Y Target 2 Y Legitimate user Attacker Security System and COntrol 82
Diversionary Attack Create diversion to draw attention away from real target TARGET Real attack Fake attacks Security System and COntrol 83
Coordinated attacks Attacker Target Compromise system to attack target Multiple attack sources, maybe over extended period of time Security System and COntrol 84
Attacker Chaining Move from place to place To hide origin and make tracing more difficult Target Security System and COntrol 85
Intrusion Recovery Actions to avoid further loss from intrusion. Terminate intrusion and protect against reoccurrence. Reconstructive methods based on: Time period of intrusion Changes made by legitimate users during the effected period Regular backups, audit trail based detection of effected components, semantic based recovery, minimal rollback for recovery. Security System and COntrol 86
Security System and COntrol 87