Lecture-7: Intrusion Detection
Lecture-7: Intrusion Detection
Intrusion Detection
Firewalls and Intrusion Prevention Systems
Operating System Security
Classes of Intruders –
Cyber Criminals
Individuals or members of an organized crime group with
a goal of financial reward
Their activities may include:
Identity theft
Theft of financial credentials
Corporate espionage
Data theft
Data ransoming
Classes of Intruders –
Activists
Are either individuals, usually working as insiders, or
members of a larger group of outsider attackers, who
are motivated by social or political causes
Also known as hacktivists
Skill level is often quite low
Aim of their attacks is often to promote and publicize
their cause typically through:
Website defacement
Denial of service attacks
Theft and distribution of data that results in
negative publicity or compromise of their targets
Classes of Intruders –
State-Sponsored Organizations
Groups of hackers sponsored by governments to
conduct espionage or sabotage activities
Also known as Advanced Persistent Threats (APTs) due to
the covert nature and persistence over extended
periods involved with any attacks in this class
Widespread nature and scope of these
activities by a wide range of countries
from China to the USA, UK, and their
intelligence allies
Intruder Skill Levels –
Apprentice
Hackers with minimal technical skill who primarily use
existing attack toolkits
They likely comprise the largest number of attackers,
including many criminal and activist attackers
Given their use of existing known tools, these attackers
are the easiest to defend against
Also known as “script-kiddies” due to their use of existing
scripts (tools)
Intruder Skill Levels –
Journeyman
• Hackers with sufficient technical skills to modify and
extend attack toolkits to use newly discovered, or
purchased, vulnerabilities
• They may be able to locate new vulnerabilities to
exploit that are similar to some already known
• Hackers with such skills are likely found in all intruder
classes
• Adapt tools for use by others
Intruder Skill Levels –
Master
• Hackers with high-level technical skills capable of
discovering brand new categories of vulnerabilities
• Write new powerful attack toolkits
• Some of the better known classical hackers are of
this level
• Some are employed by state-sponsored
organizations
• Defending against these attacks is of the
highest difficulty
Examples of Intrusion
• Remote root compromise
• Web server defacement
• Guessing/cracking passwords
• Copying databases containing
credit card numbers
• Viewing sensitive data without authorization
• Running a packet sniffer
• Distributing pirated software
• Using an unsecured modem to access internal
network
• Impersonating an executive to get information
• Using an unattended workstation
Target
acquisition and Privilege
Initial access
information escalation
gathering
Information
Maintaining
gathering or Covering tracks
access
system exploit
Host-based IDS (HIDS)
Monitors the characteristics of
a single host for suspicious
activity
Scale to Provide
monitor large graceful Allow dynamic
numbers of degradation of reconfiguration
systems service
Host-Based Intrusion
Detection (HIDS)
• Adds a specialized layer of security software
to vulnerable or sensitive systems
• Monitors activity to detect suspicious
behavior
o Primary purpose is to detect intrusions, log suspicious
events, and send alerts
o Can detect both external and internal intrusions
Data Sources and Sensors
Common data
sources include:
A fundamental • System call traces
• Audit (log file) records
component of
• File integrity
intrusion detection checksums
is the sensor that • Registry access
collects data
LAN Monitor Host Host
Agent
module
Router
Internet
Central Manager
Manager
module
Alerts
Logic Analysis Central
module Notable
module manager
activity; Query/
Signatures; response
Noteworthy
sessions
Templates
Modifications
Comprised of a number of
sensors, one or more servers Analysis of traffic patterns
for NIDS management may be done at the sensor,
functions, and one or more the management server or a
management consoles for combination of the two
the human interface
Network traffic
Monitoring interface
(no IP, promiscuous mode)
NIDS
sensor
Management interface
(with IP)
LAN switch
or router external
firewall
1
workstation
networks
service network
(Web, Mail, DNS, etc.)
4 LAN switch internal
or router firewall
• Source IP address
• Destination IP address
• Source and destination transport-level address
• IP protocol field
• Interface
Advantages:
• Filtering rules can be tailored to the host
environment
• Protection is provided independent of topology
• Provides an additional layer of protection
Personal Firewall
Controls traffic between a personal computer or
workstation and the Internet or enterprise network
For both home or corporate use
Typically is a software module on a personal computer
Can be housed in a router that connects all of the home
computers to a DSL, cable modem, or other Internet
interface
Typically much less complex than server-based or stand-
alone firewalls
Primary role is to deny unauthorized remote access
May also monitor outgoing traffic to detect and block
worms and malware activity
Intrusion Prevention Systems
(IPS)
Also known as Intrusion Detection and Prevention
System (IDPS)
Is an extension of an IDS that includes the capability
to attempt to block or prevent detected malicious
activity
Can be host-based, network-based, or
distributed/hybrid
Host-Based IPS
(HIPS)
• Can make use of either signature/heuristic or anomaly
detection techniques to identify attacks
• Signature: focus is on the specific content of application
network traffic, or of sequences of system calls, looking for
patterns that have been identified as malicious
• Anomaly: IPS is looking for behavior patterns that indicate
malware
• Examples of the types of malicious behavior addressed by
a HIPS include:
• Modification of system resources
• Privilege-escalation exploits
• Buffer-overflow exploits
• Access to e-mail contact list
• Directory traversal
Network-Based IPS
(NIPS)
Inline NIDS with the authority to modify or discard
packets and tear down TCP connections
Makes use of signature/heuristic detection and
anomaly detection
May provide flow data protection
Requires that the application payload in a sequence of
packets be reassembled
Methods used to identify malicious packets:
2. Notifications Passive
Correlation sensor Honeypot
server
1. Malware
execution
Remote sensor
Application
3. Forward
server
features
6. Application update
Instrumented applications
System
security Initial Should stage
begins with installation and validate all
the installation should install Critical that the patches on the
of the the minimum system be kept
necessary for test systems
operating up to date, with
the desired all critical
before
system system security related deploying
patches them in
installed production
Full installation
Ideally new and hardening
systems process should
should be occur before the
constructed system is
on a deployed to its
protected intended
network location
Remove
Unnecessary
Services,
• When performing the
Applications, initial installation the
Protocols supplied defaults should
not be used
o Default configuration is set
to maximize ease of use
• If fewer software and functionality rather
than security
packages are available
to run the risk is reduced o If additional packages are
needed later they can be
• System planning process
installed when they are
should identify what is required
actually required for a
given system
• System planning process
should consider:
Configure o Categories of users on the
Users, Groups, system
and o Privileges they have
Authentication o Types of information they can
access
Generates significant
Range of data acquired
Information can be volumes of information
should be determined
generated by the system, and it is important that
during the system planning
network and applications sufficient space is allocated
stage
for them
Automated analysis is
preferred
Data Backup and Archive
Performing regular Needs and policy
backups of data is Backup Archive relating to
a critical control backup and
that assists with archive should be
maintaining the The process of The process of determined
integrity of the making copies of retaining copies of
during the system
data over extended
system and user data at regular
periods of time in planning stage
intervals
data order to meet legal
and operational
requirements to
May be legal or access past data
operational Kept online or
requirements for offline
the retention of
data
Stored locally or
transported to a
remote site
• Trade-offs
include ease of
implementation
and cost versus
greater security
and robustness
against different
threats
Linux/Unix Security
• Patch management
• Keeping security patches up to date is a widely recognized and critical
control for maintaining security
• Application and service configuration
• Most commonly implemented using separate text files for each
application and service
• Generally located either in the /etc directory or in the installation tree for
a specific application
• Individual user configurations that can override the system defaults are
located in hidden “dot” files in each user’s home directory
• Most important changes needed to improve system security are to
disable services and applications that are not required
Linux/Unix Security
• Users, groups, and permissions
• Access is specified as granting read, write, and execute
permissions to each of owner, group, and others for each
resource
• Guides recommend changing the access permissions for
critical directories and files
• Local exploit
• Software vulnerability that can be exploited by an attacker to gain
elevated privileges
• Remote exploit
• Software vulnerability in a network server that could be triggered by a
remote attacker
Windows Security
Users administration
Patch management and access controls
•“Windows Update” and •Systems implement
“Windows Server Update discretionary access controls
Service” assist with regular resources
maintenance and should
be used •Vista and later systems
include mandatory integrity
•Third party applications controls
also provide automatic
update support •Objects are labeled as being
of low, medium, high, or
system integrity level
•System ensures the subject’s
integrity is equal or higher
than the object’s level
•Implements a form of the
Biba Integrity model
Windows systems also
define privileges Combination of share and
NTFS permissions may be
•System wide and granted to user
accounts
used to provide additional
security and granularity
when accessing files on a
shared resource