Foundation of Information Security: Lecture-14
Foundation of Information Security: Lecture-14
Security
Lecture-14
Today’s Content
• Intruders
• Intrusion Detection
• Host-Based Intrusion Detection
• Distributed Host-Based Intrusion Detection
• Network-Based Intrusion Detection
• Honeypots
Intrusion Detection System
- aims to detect attacks
Types of intruders
Cyber criminals: Individuals or members of an organized crime group
with a goal of financial reward.
Example: identity theft, theft of financial credentials, corporate espionage, data
theft, or data ransoming.
Activists/hacktivists: Individuals, usually working as insiders, or
members of a larger group of outsider attackers, who are motivated by
social or political causes.
Example: To promote and publicize their cause, typically through -
website defacement, denial of service attacks, or the theft and distribution of
data that results in negative publicity or compromise of their targets.
Types of intruders
State-sponsored organizations: Groups of hackers sponsored by
governments to conduct espionage or sabotage activities, also known as
Advanced Persistent Threats (APTs), due to the covert nature and
persistence over extended periods involved with many attacks in this class.
Example: information revealed by Edward Snowden, indicate the widespread
nature and scope of these activities by a wide range of countries and their
intelligence allies.
Others: Hackers with motivations other than those listed above,
including classic hackers or crackers who are motivated by technical
challenge or by peer-group esteem and reputation.
Example: Those responsible for discovering new categories of buffer overflow
vulnerabilities, given the wide availability of attack toolkits, there is a pool of
“hobby hackers” using them to explore system and network security.
Types of intruders based on Skill Level
Apprentice
• Hackers with minimal technical skill who primarily use existing attack toolkits.
• largest number of attackers, including many criminal and activist attackers.
• are the easiest to defend against.
Journeyman
• Hackers with sufficient technical skills to modify and extend attack toolkits to
use newly discovered vulnerabilities; or to focus on different target groups.
• The changes in attack tools make identifying and defending against such
attackers harder.
Master
• Hackers with high-level technical skills capable of discovering brand new
categories of vulnerabilities, or writing new powerful attack toolkits.
• some of those employed by some state-sponsored organizations
• Defending against these attacks of the highest difficulty.
Example of Intrusion
• Remote root compromise of an e-mail server
• Defacing a Web server
• Guessing and cracking passwords
• Copying a database containing credit card numbers
• Viewing sensitive data, including payroll records and medical information,
without authorization
• Running a packet sniffer on a workstation to capture usernames and passwords
• Using a permission error on an anonymous FTP server to distribute pirated
software and music files
• Posing as an executive, calling the help desk, resetting the executive’s e-mail
password, and learning the new password
• Using an unattended, logged-in workstation without permission
Intruder Behavior
• Target acquisition and information gathering
• Initial access
• Privilege escalation
• Information gathering or system exploit
• Maintaining access
• Covering tracks
Intrusion Detection
• Security Intrusion: A security event, or a combination of multiple
security events, that constitutes a security incident in which an
intruder gains, or attempts to gain, access to a system (or system
resource) without having authorization to do so.
• Intrusion Detection: A security service that monitors and analyzes
system events for the purpose of finding, and providing real-time or
near real-time warning of, attempts to access system resources in an
unauthorized manner.
Intrusion Detection Systems: Types
• Host-based IDS (HIDS): Monitors the characteristics of a single host
and the events occurring within that host, such as process identifiers
and the system calls they make, for evidence of suspicious activity.
• Network-based IDS (NIDS): Monitors network traffic for particular
network segments or devices and analyzes network, transport, and
application protocols to identify suspicious activity.
• Distributed or hybrid IDS: Combines information from a number of
sensors, often both host and network-based, in a central analyzer
that is able to better identify and respond to intrusion activity.
Intrusion Detection Systems: Types
• Host-based IDS (HIDS): Monitors the characteristics of a single host
and the events occurring within that host, such as process identifiers
and the system calls they make,
Common forcomponents:
evidence of suspicious activity.
• Network-based IDS (NIDS):Sensors: for collecting
Monitors networkdata:
trafficpackets, log files, and
for particular
network segments or devices system
andcall traces tonetwork,
analyzes forward totransport,
the analyzer.
and
Analyzers:
application protocols to identify for determining
suspicious activity.if an intrusion has
occurred.
• Distributed or hybrid IDS: Combines information
User interface: from
to view output a number
from the system of or
sensors, often both host and network-based,
control the behavior ofinthe
a central
system. analyzer
that is able to better identify and respond to intrusion activity.
IDS principles
• Assumption: intruder behavior differs from legitimate users
False positives:
valid user identified as intruder
False negatives:
intruder not identified
IDS requirements
• Run continually with minimal human supervision.
• Fault tolerant: recover from system crashes and reinitializations.
• Resist subversion: monitor itself and detect if it has been modified by an
attacker.
• Impose a minimal overhead on the system where it is running.
• Configurable according to the security policies of the system that is being
monitored.
• Adapt to changes in system and user behavior over time.
• Scale to monitor a large number of hosts.
• Provide graceful degradation of service: if some components of the IDS stop
working, the rest of them should be affected as little as possible.
• Allow dynamic reconfiguration: to reconfigure the IDS without requiring restart.
Detection Techniques