Intrusion Detection Technique (Idt) 4.1 Introduction To Intrusion Detection (ID)
Intrusion Detection Technique (Idt) 4.1 Introduction To Intrusion Detection (ID)
49
specific system actions in a specific sequence known to constitute an intrusion or those
intruders whose behavior pattern statistically varies from a norm. Internal intruders are
said to comprise at least fifty percent of intruders [ODS99], but OS intrusion detection
systems are frequently insufficient to catch such intruders since they neither perform the
specific intrusive actions because they are already legitimate users of the system, nor
significantly deviate from expected behavior.
We hypothesize that application specific intrusion detection systems can use the
semantics of the application to detect more subtle attacks such as those carried out by
internal intruders who possess legitimate access to the system and its data and act within
their bounds of normal behavior, but who are actually abusing the system. This research
will explore the opportunities and limits of utilizing application semantics to detect
internal intruders through general discussion and extensive exeimples. We will also
investigate the potential for application intrusion detection systems (AppIDS) to
cooperate with OS intrusion detection systems (OS IDS) to further increase the level of
defense offered by the collective intrusion detection system.
50
usually consist of a software agent. Some application-based IDS are also part of this
category. An example of a HIDS is OSSEC.
51
4.4 Statistical anomaly and signature based IDSs
All Intrusion Detection Systems use one of two detection techniques:
4.4.1 Statistical anomaly-based IDS
A statistical anomaly-based IDS determines normal network activity like what
sort of bandwidth is generally used, what protocols are used, what ports and devices
generally connect to each other- and alert the administrator or user when traffic is
detected which is anomalous(not normal). [9]
4.4.2 Signature-based IDS
Signature based IDS monitors packets in the Network and compares with
preconfigured and predetermined attack patterns knovra as signatures. The issue is that
there will be lag between the new threat discovered and Signature being applied in IDS
for detecting the threat .During this lag time your IDS will be unable to identify the
threat. [2]
4.5 Generic Characteristics of IDS
After analyzing the approaches taken by IDS at the operating system and network
levels, some generic characteristics of intrusion detection became apparent. To
characterize OS ID and then compare it to Application Intrusion Detection (App ID), we
first need to define some terminology that will allow us to discuss the characteristics of
both more precisely[9]. This terminology is similar to that used for prior software and
hardware error detection research.
A relation is an expression of how two or more values are associated. An
observable entity is any object, such as a user, data object, or system device that has or
produces a value in the monitored system that can be used in defining a relation.
Examples of operating system level observable entities include CPU time usage, the
number of files associated with a user, and the timestamp of the last modification to a
file. There are two basic types of relations although some blending between the two is
possible[9]. Statistical relations can be used to compare the current value of an
observable entity to a profile, a collection of statistical and other relevant information
characterizing normal or anomalous behavior. These are most often used in anomaly
52
detection. Rule-based relations relate the immediate or accumulated value to a
predefined expected value and are most often used in misuse detection.
Thresholds can be set for the relations regardless of whether they are statistical or
rule-based. Thresholds determine how the result of the relation will be interpreted;
results outside of the threshold will be considered anomalous and results within the
threshold will be considered normal. Thresholds are normally characterized by a certain
number of standard deviations for statistical distributions or by a range, either fixed in
size or as a percentage of the expected value, for rule-based analysis.
Setting the thresholds will impact the effectiveness of the IDS in detecting
intrusions. Tighter thresholds, permitting less discrepancy, allow for greater detection
but at the risk of more false alarms, an indication of an intrusion in the absence of an
intrusion. Looser thresholds produce fewer false alarms but potentially at the cost of
diminished detection.
The frequency with which a relation is evaluated can also impact the effectiveness
of the intrusion detection system. It is possible for the IDS to evaluate all relations
immediately after each event, the results of actions taken by users, processes, or devices
that may be related to a potential intrusion. However, this may place an intolerable
processing burden on the IDS. Therefore, events are typically collected in audit records
over a period of time. Audit records entries can be reduced by combining some events
into a single entry for analysis. For example, a single, failed log-in attempt is most likely
insignificant, but many failed log-in attempts over a relatively short period of time may
indicate a possible intrusion. The period of time between audit record analysis may be
determined using real time or logical time where the relations are evaluated after a certain
number of events have occurred. Audit records only deal with notions defined by the OS.
Many aspects of the application are not visible to the OS and thus are not in the audit
records.
53
4.6 Intrusion Detection Technique
In our system IDS is installed on the server side, which serves local hosts and
users over internet as shovra in Figure 4.1. There are four actors in the system namely
monitor, user, network £ind system administrator. User sends request to the server over
the internet or LAN and IDT will analyze the packets received by the server. This IDT
detects both internal and external intrusions. If it detects any intrusion then it alerts
system administrator.
U.ser Ann2
Router
54
Intrusion is detected and system administrator is alerted about the kind of
intrusion when any one of the following events takes place:
There are two ways to handle subversion attempts. One way is to prevent
subversion itself by building a completely security system. We could, for example,
require all users to identify and authenticate themselves; we could protect data by various
cryptographic methods and very tight access control mechanisms. However, this is not
really feasible because of the following reasons:
55
1. In practice, it is not possible to build a completely secure system. Miller
gives a compelling report on bugs in popular programs and operating
systems that seems to indicate that (a) bug free software is still a dream
and (b) no one seems to make the effort to try to develop such software.
Apart from the fact that we do not seem to be getting our money's worth
when we buy software, there are also security implications when our e-
mail software, for example, can be attacked. Designing and implementing
a totally secure system is thus an extremely difficult task.
2. The vast installed base of systems worldwide guarantees that any
transaction to a secure system (if it ever developed) will be long in
coming.
3. Cryptographic methods have their own problems. Passwords can be
cracked, user can lose their passwords, and entire crypto-systems can be
broken.
4. Even a truly secure system is vulnerable to abuse by insiders who abuse
their privileges.
5. It has been seen that the relationship between the level of access control
and user efficiency is an inverse one, which means that the stricter the
mechanisms, the lower the efficiency becomes.
We thus see that we are struck with systems that have vulnerabilities for a while
to come. If there are attacks on a system, we could like to detect them as soon as possible
(preferably in real-time) and take appropriate action. This is essentially what an IDS
does. An IDS does not usually take preventive measures when an attack is detected; it is a
reactive rather than proactive agent. It plays the role of an informant rather than a police
officer.
The most popular way to detect intrusion has been by using the audit data
generated by the operating system. An audit trail is a record of activities on a system that
are logged to a file in chronologically sorted order. Since almost all activities are logged
on a system, it is possible that a manual inspection of these logs would allow intrusions to
be detected. However, the incredibly large sizes of audit data generated (on the order of
56
100 Megabytes a day) make the manual analysis impossible. IDSs automate the drudgery
of wading through the audit data jungle. Audit trails are particularly useful because they
can be used to establish guilt of attackers, and they are often the only way to detect
unauthorized but subversive user activity.
Many times, even after an attack has occurred, it is important to analyze the audit
data so that the extent of damage can be determined, the tracking down of the attackers is
facilitated, and steps may be taken to prevent such attacks in fiiture. An IDS can also be
used to analyze audit data for such insights. This makes IDSs valuable as real-time as
well as post-mortem analysis tools.
Spafford (The COAST Project, Department of Compute Science, Purdue
University, IN) reports:
• Information theft is up over 250% in the last five years.
• 99% of all major companies report at least one major incident.
• Telecom and computer fraud totaled $ 10 billion in the US alone.
It is thus more important than ever before that since it seems obvious that we
cannot prevent subversion, we should at least try to detect it and prevent similar attacks in
ftiture.
4.8 Chapter Summary
In this chapter we discuss the need for ID and different types of IDs techniques in the
first four sections. The general characteristics of IDs, different of IDTs and the need for
IDs are discussed clearly in the subsequent chapters.
57