CISCO Secure Intrusion Detection System
CISCO Secure Intrusion Detection System
Marsa Rayani
Maryam Shahpasand
Ali Falsafi
Contents:
Introduction CSIDS definition CSIDS components CSIDS features CSIDS Platforms Cisco Security Agent Advantages Disadvantages CSIDS VS. Snort Summery references
Introduction:
Cisco security experts believe that The most effective intrusion detection strategy is to implement both host-based and network-based IDS. Typically, most organizations implement network-based IDS first, because its effective against attacks originating externally. Adding host-based IDS further enhances protection from attack, especially from attacks that are generated from internal sources.
To achieve these elements, Cisco implements a line of IDS products that can be integrated into current network routers switches deployed as separate IDS appliances run as software applications on management workstations.
Cisco Secure IDS is a network-based intrusion detection system that uses a signature database to trigger intrusion alarms
Components:
The major components are:
1. 2. 3. 4. Sensor Configuration Manager Event Manager Software
Components :
1. Sensor : This performs real-time monitoring of network traffic, searching for patterns that could represent an attack.
2. Configuration manager :
The configuration manager provides configuration management for the sensor pushing configuration and policy settings to the sensor.
The configuration manager may be co-located with the sensor (typical for smaller sensor deployments) or may be separately located at a central location (typical for larger sensor deployments).
3. Event manager :
The event manager is used to
collect events generated by sensors. Cisco Secure IDS event management platforms include a Network Security Database (NSDB), which includes detailed information about each attack that is detected by a sensor. This information provides analysis support for security administrators who must decipher and respond to detected attacks.
Cisco Secure IDS sensors have extremely limited event management capabilities; hence the event manager is always separate from the sensor.
4. Software: Cisco Secure IDS (CSIDS) isnt just a set of hardware componentsit also includes software that has evolved over years.
Reliability
Redundancy
Fault Tolerance
2. Intrusion Response
The Cisco Secure IDS sensor can directly respond to an attack using one or more of the following
methods:
I.
TCP reset:
The TCP reset response is available only for TCPbased attacks. Its implemented by the sensor sending a TCP reset packet to the host that is being attacked (the target). This causes the attacked system to close the connection, destroying any processes and memory associated with the connection.
II. IP blocking
The IP blocking response (also known as shunning) allows a sensor to apply an access control list (ACL) to a perimeter router interface, blocking IP connectivity from an attacking system. You can also manually block a host or network from the sensor management platform if you see any suspicious activity
III. IP logging
When a sensor detects an attack, an alarm is generated and forwarded to the event management platform. The IP logging response allows a sensor to write alarm information to a local log file as well. The information written to the log file contains much more information than is sent to the event management platform, so you can use this option to provide detailed analysis of specific attacks.
Other Features
Cisco Secure IDS also includes an Active Updates feature, which allows customers to subscribe to regular e-mail notifications generated by the Cisco Countermeasures Research Team (C-CRT). download new signature updates to a central location on the network, and then have multiple sensors automatically update their signature databases on a regular basis. Customize signatures: you create your own signatures that can detect some new attack. This functionality is provided by a complete signature language, which is similar to a scripting language, providing a powerful tool for customization.
The sensor uses an extensive signature database that allows it to capture security attacks in realtime from large amounts of IP traffic. Sensor possesses packet-reassembly features that prevent IDS bypass techniques. Once an attack is detected, the sensor sends an alarm to an event management platform and can optionally place that alarm information in a local log file. The sensor can also automatically reset a TCPbased connection that is associated with the attack and/or block the source IP address of the attacking system.
Cisco produces three main sensor platforms dedicated to IDS: 4200 series sensors Catalyst 6000/6500 IDS module (IDSM) Cisco 2600/3600/3700 IDS network modules
Sensors Interface
All of these sensor platforms are passive sensors, in that they passively monitor network traffic traversing one or more segments for intrusive activity. Each of these sensors contains two interfaces: I. Command-and-control interface II.Monitoring interface
I.
Command-and-control interface
provides a management interface for the sensor. The command-and-control interface allows the sensor to be managed via TCP/IP. lets the sensor send alarms to the event management platform. The command-and-control interface is the only interface that contains an IP address.
The Cisco Security Agent provides a variety of features that ensure that critical systems and applications are protected from attacks. Its designed to detect known and unknown attacks based on the following intrusive activities:
I.
Probing
Probing relates to the activities associated with reconnaissance being performed against the host or an attempt to break into a host by guessing security information. The following are some of the probe attacks that the Cisco Security Agent detects: Ping Port scans Password and username guessing
II. Penetration
Penetration refers to the process of gaining unauthorized access to processes running and/or data stored on the target system. The Cisco Security Agent can detect a possible attack based on events that indicate the host is in the process of being compromised or penetrated. The following are some of the events related to penetration attacks that the Cisco Security Agent detects: Mail attachments Buffer overflows ActiveX controls Back doors
III. Persistence
Persistence refers to events that result from a successful attack and subsequent infection of a host system. The following are some of the events that indicate that a system has been compromised and that some form of unauthorized action, application, or service is present: File creation File modification Security settings modification Installation of new services Trap doors
IV. Propagation
Propagation refers to the automatic selfreplication of an attack to other systems after an initial target system has been infected. There are some of the events related to propagation that the Cisco Security Agent detects: E-mail copies of the attack Web and FTP connections Internet Relay Chat (IRC) connections Propagation via file shares
V. Paralyzing
Paralyzing refers to the complete or partial removal of the availability and responsiveness of computing resources on a target system. The following are some of the events related to system paralysis that the Cisco Security Agent detects: File modification and deletion Computer crashes Denial of service Stealing of sensitive/confidential information
Advantages:
1. 2. 3. 4. Accurate attack detection Intelligent attack investigation Ease of security management Flexible deployment options for all network design models and topologies 5. you can create your own signatures that can detect some new attack.
Cont.
6. combines leading Cisco security solutions with a rich ecosystem of complementary programs, products, partners and services. 7. Focuses on large businesses 8. Assumes a security policy
Disadvantaged
Expensive Black box design, youll have no idea why it does anything that it does. Closed signature language, you have no ability to see what or how theyre trying to detect anything. Difficult to install. Difficult to administer
References
www.cisco.com CCSP Complete study book by Cisco www.net-security.org/ www.ciscopress.com/articles https://itaudit.sans.org/community/papers/aud iting-cisco-secure-ids-system-auditorsperspective_114