Scrigroup - Documente si articole

     

HomeDocumenteUploadResurseAlte limbi doc
BulgaraCeha slovacaCroataEnglezaEstonaFinlandezaFranceza
GermanaItalianaLetonaLituanianaMaghiaraOlandezaPoloneza
SarbaSlovenaSpaniolaSuedezaTurcaUcraineana

AdministrationAnimalsArtBiologyBooksBotanicsBusinessCars
ChemistryComputersComunicationsConstructionEcologyEconomyEducationElectronics
EngineeringEntertainmentFinancialFishingGamesGeographyGrammarHealth
HistoryHuman-resourcesLegislationLiteratureManagementsManualsMarketingMathematic
MedicinesMovieMusicNutritionPersonalitiesPhysicPoliticalPsychology
RecipesSociologySoftwareSportsTechnicalTourismVarious

Intrusion Detection System

computers



+ Font mai mare | - Font mai mic



Intrusion Detection System

Intrusion Detection Basics



v      What is intrusion detection

Ø      Process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusion.

v      Types of Intrusion Detection Systems

Ø      Information Sources: the different sources of event information used to determine whether an intrusion has taken place.

t         Network-based IDS

t         Host-based IDS

t         Application-Based IDS

Ø      Analysis: the most common analysis approaches are

t         Misuse Detection

t         Anomaly Detection

Ø      Response: the set of actions that the system takes once it detects intrusions.

t         Passive measure: reporting IDS findings to humans, who are then expected to take action based on those reports.

t         Active measure: involving some automated intervention on the part of the system.

v      Misuse Detection (signature-based ID)

Ø      Looking for events or sets of events that match a predefined pattern of events that describe a known attack. The patterns are called signatures.

Ø      Rule-based systems: encoding intrusion scenarios as a set of rules.

Ø      State-based intrusion scenario representations.

Ø      Advantages:

t         Very effective at detecting attacks without generating an overwhelming number of false alarms.

Ø      Disadvantages

t         Can only detect those attacks they know abouttStherefore they must be constanly updated with signatures of new attacks.

t         Many misuse detectors are designed to use tighly defined signatures that prevent them from detecting variants of common attacks.

v      Anomaly Detection

Ø      Identify abnormal unusual behavior (anomalies) on a host or network. They function on the assumption that attacks are different from tnormalt (legitimate) activity and can therefore be detected by systems that identify these differences.

Ø      Static and dynamic:

t         Static: Static means a portion of the system remain constant, e.g. data integrity, tripwire, virus checkers.

t         Dynamic: profile. A profile consists of a set of observed measures of behavior for each of a set of dimensions. Frequently used dimensions include:

t         Preferred choices, e.g., log-in time, log-in location, and favorite editor.

t         Resources consumed cumulatively or per unit time.

t         Representative sequences of actions.

t         Program profiles: system call sequence.

Ø      Methods

t         Threshold detection: certain attributes of user and system behavior are expressed in terms of counts, with some level established as permissible. Such behavior attributes can include the number of files accessed by a user in a given period of time, the number of failed attempts to login to the system, the amount of CPU utilized by a process, etc.

t         Statistical measures

t         Parametric: The distribution of the profiled attributes is assumed to fit a particular pattern

t         Non-parametric: The distribution of the profiled attributes is tlearnedt from a set of historical values, observed over time.

t         Rule-based measures: similar to non-parametric statistical measures in that ooberved data defines acceptable usage patterns, but differs in that those patterns are specified as rules, not numeric quantities.

t         Other methods:

t         Machine learning

t         Data mining

t         Neural networks, genetic algorithms, etc.

Ø      Advantages

t         Can detect unusual behavior and thus have the ability to detect symptoms of attacks without specific knowledge of details.

t         Can produce information that can in turn be used to define signatures for misuse detectors.

Ø      Disadvantages

t         Usually produce a large number of false alarms due to the unpredictable behaviors of users and networks.

t         Often require extensive ttraining setst of system event records in order to characterize normal behavior patterns.

v      Host-based IDS

Ø      Using OS auditing mechanisms: e.g. BSM in Solaris logs all direct and indirect events generated by a user; strace monitors system calls made by a program.

Ø      Monitoring user activities: analyzing shell commands.

Ø      Monitoring executions of system programs, e.g. sendmail's system calls.

Ø      Advantages

t         Can detect attacks that cannot be seen by NIDS

t         Can operate in an environment in which network traffic is encrypted

t         Unaffected by switched networks

t         Can help detect Trojan horse or other attacks that involve software integrity breaches

Ø      Disadvantages

t         Since at least the information sources reside on the host targeted by attacks, the IDS may be attacked and disabled as port of the attack

t         Are not well suited by detecting network scans or other such surveillance that targets an entire network

t         Since they use the computing resources of the hosts they are monitoring, therefore inflicting a performance cost on the monitored systems.

v      Network Intrusion Detection Systems (NIDS)

Ø      Using packet sniffing.

Ø      Looking at IP header as well as data parts.

Ø      Disadvantages of Network-Based IDSs:

t         NIDS may have difficult processing all packets in a large or busy network and therefore, may fail to recognize an attack launched during periods of high traffic.

t         Modern switch-based networks make NIDS more difficult: Switches subdivide networks into many small segments and provide dedicated links between hosts serviced by the same switch. Most switches do not provide universal monitoring ports

t         NIDS cannot analyze encrypted information.

t         Most NIDS cannot tell whether or not an attack was successful.

v      Evaluating an IDS

Ø      False positive

Ø      False negative

Ø      ROC curve: Receive Operating Characteristic

v      IDS strengths and limitations

Ø      Up side:

t         Detect an ever-growing number of serious problems

t         New signatures are added.

t         New methods are being developed.

Ø      Down side:

t         IDs look for known weaknesses (patterns or normal behavior)

t         False positive


Eluding Network Intrusion Detection

v      Insertion: Defeating signature analysis

Ø      Conceptual Example

Ø      Real example: 'Get /cgi-bin/phf?'

Ø      Solution: make the IDS as strict as possible in processing packets read off the wire.

v      Evasion

Ø      Conceptual Example

v      How to achieve Insertion/Evasion Attacks based on IP

Ø      Checksum (easy to solve)

Ø      TTL: large enough for IDS monitor, but not enough for the end system.

Ø      Don't fragment

Ø      IP Options:

t         Many OS automatically reject source routed packets.

t         Timestamp: discard packets with illegal formats

Ø      MAC address: address the faked packet to IDSts Mac address, so the end system will not receive it.

Ø      IP Reassembly Problem

Ø      IDS also needs to reassembly packets.

Ø      Subject to DOS attacks.

Ø      IDS must drop incomplete fragments (or late fragments) the same manner as the end system does. Otherwise inconsistence exists.

Ø      Overlapping fragments: must process them in the same manner as the end system.

t         Windows NT 4.0: always favors old data

t         Solaris 2.6: always favors old data

t         4.4BSD: Favors New data for forward overlap

t         Linux: Favors New data for forward overlap

v      How to achieve Insertion/Evasion Attacks based on TCP?

Ø      TCP Code: packets with illegal code will be discarded.

Ø      SYN packet may carry data, and some implementation may not process these data.

Ø      TCP Window size: inconsistence between end system and IDS can cause problems.

Ø      TCP Overlapping: NT 4.0 favors old data; others favor new data.

Ø      Establishing TCP Connections: consistency between IDS and end systems.

Ø      Tearing Down TCP Connections: consistency

v      Denial of Service Attacks on IDS

Ø      CPU, memory, bandwidth



Politica de confidentialitate | Termeni si conditii de utilizare



DISTRIBUIE DOCUMENTUL

Comentarii


Vizualizari: 780
Importanta: rank

Comenteaza documentul:

Te rugam sa te autentifici sau sa iti faci cont pentru a putea comenta

Creaza cont nou

Termeni si conditii de utilizare | Contact
© SCRIGROUP 2024 . All rights reserved