0% found this document useful (0 votes)
114 views

Intruders

The document discusses various types of intruders and intrusion techniques, as well as approaches to intrusion detection. It describes classes of intruders such as masqueraders, misfeasors, and clandestine users. Common intrusion techniques involve password guessing, password capture, and exploiting buffer overflows. Approaches to intrusion detection include analyzing audit records, detecting statistical anomalies, using rule-based systems, and dealing with the base-rate fallacy problem. Distributed intrusion detection and honeypots are also covered.

Uploaded by

xsnox
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views

Intruders

The document discusses various types of intruders and intrusion techniques, as well as approaches to intrusion detection. It describes classes of intruders such as masqueraders, misfeasors, and clandestine users. Common intrusion techniques involve password guessing, password capture, and exploiting buffer overflows. Approaches to intrusion detection include analyzing audit records, detecting statistical anomalies, using rule-based systems, and dealing with the base-rate fallacy problem. Distributed intrusion detection and honeypots are also covered.

Uploaded by

xsnox
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

07/07/2009

Overview
13.a Intruders
• Introduction
• Classes of Intruders
• Intrusion Techniques
– Password Guessing
Dr Joseph Sevilla – Password Capture
MIT 8342 Cryptography and Information Security – Buffer Overflows
• Intrusion Detection
– Approaches
– Audit Record Analysis
– Statistical Anomaly Detection
– Rule-Based Intrusion Detection
– Base-Rate Fallacy
• Distributed Intrusion Detection
• Honeypots
1

Intruders Classes of Intruders

• A significant security problem for networked systems is • Masquerader:


hostile or unwanted access by users or software. – Unauthorised individual who penetrates a system’s access
controls to exploit a legitimate user’s account.
– Via network or local access.
– Usually outsider.
– Unauthorised logon or acquisition of privileges.
• Misfeasor:
– Software intrusion: viruses, worms, Trojan horses.
– Legitimate user who abuses privileges to access data, programs
• We will examine the nature of attacks and strategies for or resources.
detection and prevention. – Usually insider.
– Detection: Learning of an attack, either before or after its success. • Clandestine user:
– Prevention: Attempt to thwart all possible attacks. – Individual who seizes supervisory control and uses it to evade
auditing and access controls.
– Insider or outsider.

3 4

Intruders Intrusion Techniques

• Two types of hackers: • Aim: Gain access and/or increase privileges on a system.
– Benign intruders: simply wish to explore to find out what is there. – Typically involves knowledge of some info that should have been
• May seem tolerable, but still cost resources.
protected: e.g. a user’s password.
– Malign intruders: perform unauthorised modifications or disrupt system. • Systems maintain a file that associates passwords to
• You can’t tell in advance whether an attack will be benign or malign. authorised users.
• May use compromised system to launch other attacks. • Protection of password files:
• Two levels of hackers: 1. One-way function
– Sophisticated users with thorough knowledge of the technology. • Store value of a function based on the user’s password.
– Low-level ‘foot soldiers’, merely use available cracking programs with • User presented password is transformed and compared with the
little understanding of the technology.
stored value.
• Awareness of intruders has led to the development of Computer • In practice, system performs a one-way transformation in which
Emergency Response Teams (CERTs): the password is used to generate a key for the one-way function.
– Collect information about system vulnerabilities and disseminate them to 2. Access Control
IT managers.
– Hackers also have access to such reports. • Access to password file limited to one or very few accounts.

5 6

1
07/07/2009

Password Guessing Password Capture

• One of the most common attacks.


• Attacker knows a login name (from email/web page, • Another attack involves password capture.
etc). – Use of Trojan Horse program.
• Then attempts to guess password for it: • E.g. via a game.
– Defaults, short passwords, common word searches. – Monitoring an insecure network login tapping the line between
– User info (variations on names, birthday, phone no, number remote user and host system.
plates, common words/hobbies). • E.g. Telnet, FTP, web, email.
– Exhaustively searching all possible passwords. – Extracting recorded info after successful login (web history/cache,
• Success depends on password chosen by user. last number dialled, etc.).
– Surveys show that many users choose passwords poorly. • Using valid login/password can impersonate user.
• However, it is tedious and can be countered.
– Block users after several invalid attempts (but an attacker
may copy encrypted password file and try off-line).
7 8

Buffer Overflows Intrusion Detection

• Does not require learning a password. • Inevitably, intrusion prevention will have security failures.
• Need for detection as a second line of defence.
• Intruders get access to the system by exploiting – The sooner an intrusion is detected, the less the amount of
attacks such as buffer overflows on a program that damage and faster recovery is achievable.
runs with certain privileges. – Effective IDS can be a deterrent thus preventing intrusions.
– Enables collection of information that could be used to improve
• Privilege escalation can be done also in this way. security.
• Based on the assumption that intruder will behave
differently from a legitimate user.
– This is not exactly distinct! Expected overlap in behaviour.
– Means some false positives or false negatives may be arrived at in
trying to catch intruders.

9 10

Approaches to Intrusion Detection Audit Records

• Statistical anomaly detection: collection of data related to • Fundamental tool for intrusion detection. Two plans:
behaviour of legitimate users over time.
– Statistical tests applied to observed behaviour to determine with high
• Native audit records
level of confidence the legitimacy of a certain behaviour. – Collects info on user activity and is part of all common multi-user
– Threshold detection: define thresholds for the frequency of occurrence O/S.
of events – independent of user. • Advantages: software already present for use.
– Profile based: A profile for each user is developed and used to detect • Disadvantage: may not contain the information required or
changes in behaviour.
may have it in an inconvenient format.
• Rule-based detection: define a set of rules that determine an
intruder. • Detection-specific audit records
– Anomaly detection: detect deviation from previous patterns. – Created specifically to collect information required by the IDS.
– Penetration identification: expert system approach to search for – Could me made vendor independent and ported to different
suspicious behaviour. systems.
• In practice, a combination of both approaches will be more effective. – Additional overhead (two auditing packages running).

11 12

2
07/07/2009

Statistical Anomaly Detection Audit Record Analysis

• Threshold detection: • Foundation of statistical approaches.


– Count occurrences of specific event over time.
• If count exceeds reasonable value an intrusion is assumed.
• Audit records provide input to the IDS.
– Alone it is a crude and ineffective detector. – Designer must decide what metrics to use to measure
• Variability across users, likely to generate either many false user behavior and in the long run define typical
positives or false negatives. behavior.
• Useful in conjunction with other techniques. – Current audit records used as input to detect intrusion.
• Profile-based systems: • Some metrics used include:
– Characterise past behaviour of users (or groups of users).
– Detect significant deviations from this.
– Counter (logins/hr, commands per session etc), gauge,
interval timer (e.g. length of time between successive
– Profile usually multi-parameter (deviation from one parameter may
not be sufficient to signal an alert). logins), resource utilisation.

13 14

Audit Record Analysis Rule-Based Intrusion Detection

• Given metrics, various tests are performed to determine if • Observe events on system & apply rules to decide
current behavior is acceptable using approaches such as: if activity is suspicious or not.
– mean & standard deviation, multivariate, Markov process, time • Approaches focus on either anomaly detection or
series, operational.
penetration identification.
• Advantage of statistical profiles: no prior knowledge of
security flaws is required. • Rule-based anomaly detection:
– The detector program learns what is normal and then looks for – Analyse historical audit records to identify usage
deviations. patterns & auto-generate rules that define them.
– Not based on system-dependent characteristics and – Then observe current behavior & match against rules to
vulnerabilities. see if conforms.
– Portable between systems. – Like statistical anomaly detection does not require prior
knowledge of security flaws.
15 16

Rule-Based Intrusion Detection Base-Rate Fallacy

• Rule-based penetration identification. • Need for IDSs to detect a substantial percentage


– Uses expert systems technology. of intrusions while keeping false alarms at an
– Use rules identifying known penetrations, exploit of acceptable level.
known weakness, or identify suspicious behaviour. – If too few intrusions detected -> false security.
– Compare audit records or states against rules. – If too many false alarms -> managers start to ignore /
– Rules usually machine & O/S specific. too much time spent analyzing false alarms.
– Rules are generated by experts who interview & • This is very hard to do.
codify knowledge of security and system admins
• Existing systems seem not to have a good record.
(rather than by automated analysis).
– Quality depends on how well this is done.
17 18

3
07/07/2009

Distributed Intrusion Detection Distributed Intrusion Detection

• Traditional focus is on single systems. • Centralised


• But typically, we need to defend a distributed collection of – Single point of collection and analysis and easier
hosts supported on a LAN. correlation of incoming reports.
– More effective defence has IDSs across the network working
together. – Potential bottleneck and single point of failure.
• Issues in design of a distributed IDS: • Decentralised
– Dealing with varying native audit record formats.
– More than one analysis centre.
– Integrity & confidentiality of raw or summary data being
transmitted over the network. – Need for co-ordination of activities and exchange of
– Either centralised or decentralised architecture may be used. information.

19 20

Distributed Intrusion Detection – Distributed Intrusion Detection -


Example of Architecture Components

• Host agent module


– Audit collection module operating as a background process on a
monitored system.
– Collects data on security related events on the host and transmit
them to the central manager.
• LAN monitor agent module
– Analyses LAN traffic and reports results to central manager.
• Central manager module
– Processes the reports from the above and correlates the to detect
intrusion.

21 22

Distributed Intrusion Detection –


Agent Architecture
Honeypots

• Decoy systems to lure attackers.


• Filter is applied on what agent
– Divert attention from accessing critical systems.
has captured to retain only that
which is of security interest. – Collect information on attacker's activities.
– Encourage attacker to stay on system long enough for the
• Records standardised to Host
administrator to respond.
Audit Record (HAR) format.
• Designed with fabricated information that appears
• Template driven logic module
analyses records for suspicious
valuable.
activity. – Legitimate users would not access it.
• If suspicious activity is detected – Any access to the honeypot is suspect.
an alert is sent to the central • System is instrumented with sensitive monitors and
manager which includes an event loggers.
expert system that can be used – Able to detect accesses and collect detailed information on
to draw inferences from attackers activities.
received data. 23 24

4
07/07/2009

Honeypots References

• Because an attack is made to look successful, admins


have time to mobilise and log and track attacker • Most of the material in the previous slides was
without exposing the real systems. taken from:
• Administrators can use information obtained to figure – Cryptography and Network Security by Stallings, 4 Ed
out defences. • Supplemental material from:
• Current evolution from single host honeypots to
• Lawrie Brown Slides
honeynets of multiple dispersed systems.
– Simulates an entire network with actual or simulated traffic.
www.cisa.umbc.edu/courses/cmsc/487/slides/ch18.ppt
• The IETF Intrusion Detection Working Group is
currently drafting standards to support interoperability
of IDS info (both honeypot and normal IDS) over a
wide range of systems & O/S’s.
25 26

You might also like