CE Advanced Network Security

Similar documents
CSE 565 Computer Security Fall 2018

CS 392 Network Security. Nasir Memon Polytechnic University Module 5 Intrusion Detection

IDS: Signature Detection

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Intrusion Detection Systems

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng

Introduction Challenges with using ML Guidelines for using ML Conclusions

2. INTRUDER DETECTION SYSTEMS

CS419 Spring Computer Security. Vinod Ganapathy Lecture 13. Chapter 6: Intrusion Detection

Computer Security: Principles and Practice

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

Enhancing Byte-Level Network Intrusion Detection Signatures with Context

Managing Latency in IPS Networks

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Chapter 9. Firewalls

Basic Concepts in Intrusion Detection

CS Review. Prof. Clarkson Spring 2017

Network Security Terms. Based on slides from gursimrandhillon.files.wordpress.com

Network Security. Chapter 0. Attacks and Attack Detection

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Intrusion Detection System

Raj Jain. Washington University in St. Louis

Network Security: Firewall, VPN, IDS/IPS, SIEM

Intrusion Detection Systems Overview

CIT 480: Securing Computer Systems

Snort: The World s Most Widely Deployed IPS Technology

ARAKIS An Early Warning and Attack Identification System

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

Intrusion Detection and Malware Analysis

CS 161 Computer Security

CE Advanced Network Security Anonymity II

Emerging Threat Intelligence using IDS/IPS. Chris Arman Kiloyan

Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT

CSE 565 Computer Security Fall 2018

Introduction to Security

COMPUTER NETWORK SECURITY

Anomaly Detection in Communication Networks

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

CSC 574 Computer and Network Security. Firewalls and IDS

Alfonso Valdes Keith Skinner SRI International

Overview Intrusion Detection Systems and Practices

Intrusion Detection Systems (IDS)

Network Intrusion Detection Systems. Beyond packet filtering

Mechanisms for Database Intrusion Detection and Response. Michael Sintim - Koree SE 521 March 6, 2013.

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

Security Information & Event Management (SIEM)

Network Security. Tadayoshi Kohno

Developing the Sensor Capability in Cyber Security

CE Advanced Network Security Honeypots

RSA INCIDENT RESPONSE SERVICES

How AlienVault ICS SIEM Supports Compliance with CFATS

Intrusion Detection Systems and Network Security

UMSSIA INTRUSION DETECTION

Unit 4: Firewalls (I)

RSA INCIDENT RESPONSE SERVICES

Scrutinizer Flow Analytics

Intruders. significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders:

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Introduction and Statement of the Problem

Access Control Using Intrusion and File Policies

CE Advanced Network Security Network Forensics

SIEM Overview with OSSIM Case Study. Mohammad Husain, PhD Cal Poly Pomona

INTRUSION DETECTION AND CORRELATION. Challenges and Solutions

Firewalls, Tunnels, and Network Intrusion Detection

Introduction to IA Class Notes. 2 Copyright 2018 M. E. Kabay. All rights reserved. 4 Copyright 2018 M. E. Kabay. All rights reserved.

Introduction to Computer Security

Very Fast Containment of Scanning Worms. Nicholas Weaver, Stuart Staniford, Vern Paxson ICSI, Nevis Networks, ICSI & LBNL

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

APPLICATION OF INTRUSION DETECTION SOFTWARE TO PROTECT TELEMETRY DATA IN OPEN NETWORKED COMPUTER ENVIRONMENTS.

Intrusion Detection. Comp Sci 3600 Security. Introduction. Analysis. Host-based. Network-based. Distributed or hybrid. ID data standards.

Cisco Firepower NGFW. Anticipate, block, and respond to threats

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Check Point DDoS Protector Simple and Easy Mitigation

Firewalls, IDS and IPS. MIS5214 Midterm Study Support Materials

NETWORK THREATS DEMAN

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

SOC Operations on the Autobahn. Don t let the green grass fool you

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Securing CS-MARS C H A P T E R

Cisco Intrusion Prevention Solutions

Mapping Internet Sensors with Probe Response Attacks

You will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent.

Mapping Internet Sensors with Probe Response Attacks

ProCurve Network Immunity

Cisco Firepower NGFW. Anticipate, block, and respond to threats

CE Advanced Network Security Botnets

ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE

CSCI 454/554 Computer and Network Security. Topic 8.4 Firewalls and Intrusion Detection Systems (IDS)

Configuring attack detection and prevention 1

Intrusion Detection & Password Management

Intruders and Intrusion Detection. Mahalingam Ramkumar

Overview of Firewalls. CSC 474 Network Security. Outline. Firewalls. Intrusion Detection System (IDS)

Outline. Internet Security Mechanisms. Basic Terms. Example Attacks

AIT 682: Network and Systems Security

Distributed Denial of Service (DDoS)

Intrusion Detection and Prevention

Flashback.. Internet design goals. Security Part One: Attacks and Countermeasures. Why did they leave it out? Security Vulnerabilities

this security is provided by the administrative authority (AA) of a network, on behalf of itself, its customers, and its legal authorities

Authors: Mark Handley, Vern Paxson, Christian Kreibich

Transcription:

CE 817 - Advanced Network Security Lecture 5 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained from other sources. Reference is noted on the bottom of each slide, when the content is fully obtained from another source. Otherwise a full list of references is provided on the last slide.

Problem Attack Sophistication Carnegie Mellon University 2

Fighting intrusion Prevention: isolate from network, strict authentication measures, encryption Preemption: do to others before they do to you Deterrence: dire warnings, we have a bomb too. Deflection: diversionary techniques to lure away Detection Counter attacks [memon03] 3

Defense in Depth More generically, most single defenses can fail We always need defense in depth multiple layers, of different designs and philosophies One such layer: Intrusion Detection Systems [Stolfo06] 4

What is IDS? An Intrusion Detection System (IDS) is a system that attempts to identify intrusions. Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking resources. [memon03] 5

Examples of IDS in daily life Car Alarms House Alarms Surveillance Systems Spy Satellites, and spy planes (U2 and SR-71) [memon03] 6

Elements of Intrusion Detection Primary assumptions: System activities are observable Normal and intrusive activities have distinct evidence Components of intrusion detection systems: From an algorithmic perspective: Features - capture intrusion evidence from audit data Models - piece evidence together; infer attack From a system architecture perspective: Audit data processor, knowledge base, decision engine, alarm generation and responses [Stolfo06] 7

Where Are IDS Deployed? Host-based Monitor activity on a single host Advantage: better visibility into behavior of individual applications running on the host Network-based (NIDS) Often placed on a router or firewall Monitor traffic, examine packet headers and payloads Advantage: single NIDS can protect many hosts and look for global patterns [shmatikov] 8

Host-Based IDSs Using OS auditing mechanisms E.G., BSM on Solaris: logs all direct or indirect events generated by a user strace for system calls made by a program Monitoring user activities E.G., Analyze shell commands Monitoring execution of system programs E.G., Analyze system calls made by sendmail [Stolfo06] 9

Basic Audit Modules (Hosts) eventlog - Uses the windows Event Logging system to track entries into all three of the windows event logs: System, Security, Application netstat - Uses the information from the program netstat to provide information about network usage on the machine health - Runs the program health to give current information about the system (CPU usage, mem usage, swap usage) ps - Uses information from the /proc virtual file system as a data source [Stolfo06] 10

Network IDSs Deploying sensors at strategic locations E.G., Packet sniffing via tcpdump at routers Inspecting network traffic Watch for violations of protocols and unusual connection patterns Monitoring user activities Look into the data portions of the packets for malicious command sequences May be easily defeated by encryption Data portions and some header information can be encrypted Other problems [Stolfo06] 11

Architecture of Network IDS [Stolfo06] 12

Firewall Versus Network IDS Firewall Active filtering Fail-close Network IDS Passive monitoring Fail-open [Stolfo06] 13

Requirements of Network IDS High-speed, large volume monitoring No packet filter drops Real-time notification Broad detection coverage Economy in resource usage Resilience to stress Resilience to attacks upon the IDS itself! [Stolfo06] 14

Eluding Network IDS What the IDS sees may not be what the end system gets. Insertion and evasion attacks. IDS needs to perform full reassembly of packets. But there are still ambiguities in protocols and operating systems: E.G. TTL, fragments. Need to normalize the packets. [Stolfo06] 15

Insertion Attack http://www.securityfocus.com/infocus/1852 16

Insertion Attack First. This is where the operating System favors the original fragments with a given offset. For example, Windows 95/98/NT4/ME/W2K/XP/2003. Last. This is where the operating System favors the subsequent fragments with a given offset. For example, Cisco IOS. http://www.securityfocus.com/infocus/1852 17

DoS Attacks on Network IDS Resource exhaustion CPU resources Memory Network bandwidth Abusing reactive IDS False positives [Stolfo06] 18

Hybrid NIDS and HIDS [Stolfo06] 19

Hybrid NIDS and HIDS Correlate information from multiple sources How do you trust your sources? 20

Taxonomy of IDS s 21

Intrusion Detection Approaches Modeling Features: evidences extracted from audit data Analysis approach: piecing the evidences together Misuse detection (a.k.a. signature-based) Anomaly detection (a.k.a. statistical-based) Deployment: Network-based or Host-based Development and maintenance Hand-coding of expert knowledge Learning based on audit data [Stolfo06] 22

A Generic IDS [Stolfo06] 23

Characteristics of IDS [Stolfo06] 24

Detection Paradigm State-based versus transition-based IDS State-based: Identifies intrusions on the states Transition-based: Watches events that trigger transition from one state to another Non-perturbing versus pro-active analysis of state or transition Non-perturbing: Acquire information transparently Pro-active: Analysis by explicitly triggering events [Stolfo06] 25

IDS: Time aspect Real-time IDS Analyzes the data while the sessions are in progress Raises an alarm immediately when the attack is detected Off-line IDS Analyzes the data after the information has been already collected Useful for understanding the attackers behavior [Stolfo06] 26

Knowledge-based IDS Good accuracy, bad completeness Drawback: need regular update of knowledge Difficulty of gathering the information Maintenance of the knowledge is a time-consuming task Knowledge-based IDS Expert systems Signature analysis State-transition analysis [Stolfo06] 27

Misuse Detection The system is equipped with a number of attack descriptions ( signature ). Then matched against the audit data to detect attacks. Pro: less false positives (But there still some!) Con: cannot detect novel attacks, need to update the signatures often. Approaches: pattern matching, security rule specification. [Stolfo06] 28

Specification-based Detection Manually develop specifications that capture legitimate (not only previous seen) system behavior. Any deviation from it is an attack Pro: can avoid false-positive since the specification can capture all legitimate behavior. Con: hard to develop a complete and detailed specification, and error-prone. Approach: state machines [Stolfo06] 29

Today s IT Security Tools We make lists of bad behavior Virus definitions SPAM filters and blacklists IDS signatures Policies We distribute the lists to applications and detection systems They flag behavior that fits the pattern The system is about to collapse Delays Administrative Overhead False positives [Stolfo06] 30

Behavior-based IDS Good completeness, bad accuracy Detect intrusion by observing a deviation from the normal or expected behavior of the system or the users Can detect attempts to exploit new and unforeseen vulnerabilities Behavior-based IDS Statistics Expert systems Neural networks User intention identification [Stolfo06] 31

Anomaly Detection Build models of normal behavior of a system using machine learning or data mining. Any large deviation from the model is thought as anomaly. Pro: can detect previous unseen attacks Con: have higher false positives, and hard to train a system for a very dynamic environment. Approaches: statistical methods, clustering, outlier detection, SVM [Stolfo06] 32

Anomaly Detection Relatively high false positive rate - anomalies can just be new normal activities. [Stolfo06] 33

Anomaly Detection Algorithm Supervised / unsupervised Compute online? Data source / feature selection Depends on expert knowledge now Cost Computation cost Feature audit and construction cost Damage cost Goal: detect attacks accurately and promptly [Stolfo06] 34

Data sources Single packet src and dst ip, port (most commonly used) All packet header fields A sequence of packets Follow the automaton for the protocols (specification-based) Reconstructed connections Connection status, frequency (commonly used) Traffic flows Volume / velocity. [Stolfo06] 35

Learning Supervised Statistical tests Build distribution model for normal behavior, then detect low probability events SVM Unsupervised Outlier detection Clustering OCSVM [Stolfo06] 36

Examples of IDS Misuse detection SNORT : signature based commercial IDS STAT: real time IDS using state transition analysis, attack scenarios specified by STATL. (Higher level signature, abstract from raw packet) [Vigna 03] Bro: real time, events driven, security policy written in a specialized script language. [Paxson 99] Anomaly detection MADAM ID ADAM: mining association rule + Bayes classifier Specification-based detection [Sekar 02] [Stolfo06] 37

IDS Evaluation Accuracy: false positives and false negatives should be minimized. Performance: the rate at which audit events are processed. Completeness: to detect all attacks. Fault tolerance: resistance to attacks. Timeliness: time elapsed between intrusion and detection. [memon03] 38

Key Performance Metrics Algorithm Alarm: A; Intrusion: I Detection (true alarm) rate: P(A I) False negative rate P( A I) False alarm rate: P(A I) True negative rate P( A I) Architecture Scalable Resilient to attacks Which is a bigger problem? Attacks are fairly rare events IDS often suffer from base-rate fallacy 39

Base-Rate Fallacy 1% of traffic is SYN floods; IDS accuracy is 90% IDS classifies a SYN flood as attack with prob. 90%, classifies a valid connection as attack with prob. 10% What is the probability that the connection flagged as a SYN flood by IDS is actually valid? [shmatikov] 40

Problems with (Commercial) IDS Cost of update and keeping current is growing Organizations lack internal expertise Knowledge based IDS systems suffer from False Negative Problem New augmented IDS with Anomaly Detectors are appearing in the commercial market IDS are inherently noisy and chatty and suffer from the False Positive problem Volumes of alerts are crushing Zooming in on most serious threats is hard NIDS positioned at the perimeter The most serious/predominant threat is the insider Host and LAN-based IDS now more crucial [Stolfo06] 41

What new solutions are needed for these problems? Maintenance problem Automatic Update Data Reduction problem Human can t be in the loop Insider problem Look inward, not only outward [Stolfo06] 42

Next Generation Detection Systems Behavior-based (like credit card fraud): Automated analysis Learn site specific characteristics (e.g., outbound traffic) and prioritize attacks per cost modeling Reduce time to update and deploy Increase analyst/security staff productivity Discover New Attacks Offload and load balance detection tasks among separate specialized modules Correlation among distributed sites provides new opportunities for Real-time global detection (early warning) Detecting attackers [Stolfo06] 43

Acknowledgments/References [stolfo06] Part of COMS W4180 - Network Security. Salvatore J. Stolfo, Columbia University. [shmatikov] CS 378, Network Security and Privacy, Fall 2007. Vitaly Shmatikov. University of Texas at Austin. [memon03] Network Security. Cs 682, Fall 2003. Nasir Memon. Polytechnic University. 44