SlideShare a Scribd company logo
1 of 31
INTRUSION DETECTION
By : Umesh Dhital
udh001@latech.edu
PRESENTATION OUTLINE
 Introduction
 What ?
 Why ?
 History
 Typical Intrusion Scenario
 Types of Attacks
 What IDS does ?
 Types of IDS
 Based on detection approach
 Advantages/ Disadvantages
 Based on protected system
 Network / Host based detection
 Evaluation of IDS
 Commercially available IDS
 Snort
 References
 Q/A
1/31/2015
2
INTRUSIONDETECTION
WHAT IS INTRUSION DETECTION SYSTEM?
1/31/2015
3
INTRUSIONDETECTION
 Intrusion
 Any unauthorized access, not permitted attempt to
access/damage or malicious use of information resources
 Intrusion Detection
 Detection of break-ins and break-in attempts via
automated software systems
 Intrusion Detection Systems(IDS)
 Defense systems, which detect and possibly prevent
intrusion detection activities
WHAT IS NOT AN IDS ?
 Network logging systems
 Security Scanners
 vulnerability assessment tools to check flaws in OS,N/W
 Antivirus products
 Security/Cryptographic systems
 E.g. VPN,SSL, Kerbose
 Firewalls
1/31/2015INTRUSIONDETECTION
4
WHY IDS ?
1/31/2015
5
INTRUSIONDETECTION
Straight Forward Reason
to protect data and system integrity.
Fact :
can not be done with ordinary password and file security
Misconception :
 A network firewall will keep the bad guys off my network, right?
 My anti-virus will recognize and get rid of any virus I might catch, right?
 And my password-protected access control will stop the office cleaner
trawling through my network after I've gone home, right?
So that's it – “I'm fully protected”
 Anti-virus systems are only good at detecting viruses they
already know about
 Passwords can be hacked or stolen or changed by other
 Firewalls DO NOT recognize attacks and block them
 Simply a fence around your network
 no capacity to detect someone is trying to break-in(digging a
hole underneath it)
 Can’t determine whether somebody coming through gate is
allowed to enter or not.
 Roughly 80% of financial losses occur hacking from inside the
network
“BEWARE OF INTERNAL INTRUDERS”
 Example :
In April 1999, many sites were hacked via a bug in ColdFusion. All had firewalls
to block other access except port 80. But it was the Web Server that was hacked.
HERE IS THE REALITY
1/31/2015
6
INTRUSIONDETECTION
ID- A BRIEF HISTORY
 1980 - James Anderson Paper Computer Security
Threat Monitoring and Surveillance
 Concept of “detecting” misuse and specific user events
emerged
 1984 - Dr. Dorothy Denning and SRI developed first
model for intrusion detection, Intrusion Detection Expert
System developed
 1988 – HayStack Project at University of California Lab,
released intrusion detection system for US Air force
 1989 – Commercial company HayStack Labs released
Stalker
 1990 – UC’s Todd Heberlein introduced idea of Network
Detection System”
 Developed Network Security Monitor
 SAIC developed Computer Misuse Detection System
1/31/2015
7
INTRUSIONDETECTION
HISTORY – CONTD..
 US Air force developed Automated Security
Measurement System
 ID Market gain popularity around 1997
 1998 ISS developed RealSecure
 Cisco purchased Wheel Group
 First host-based detection company Centrax
Corporation emerged
 Currently IDS is the top selling security technology
1/31/2015
8
INTRUSIONDETECTION
Source : www.symantic.com/connect/articles/evolution-detection-systems
TYPICAL INTRUSION SCENARIO
1/31/2015
9
INTRUSIONDETECTION
Information Gathering
Further Information Gathering
Attack !
Successful Intrusion
Fun and Profit
-Find as much as info. As possible
-whois lookup and DNS Zone transfers
-Normal browsing ; gather important info.
-ping sweeps, port scanning
-web server vulnerabilities
-version of application/services
-start trying out different attacks
- UNICODE attack if has IIS installed
-try to find misconfigured running services
-Passive Attack / Active Attack
-install own backdoors and delete log files
-replace existing services with own Trojen
horses that have backdoor passwords or
create own user accounts
- Steal confidential information
- Use compromised host to lunch further
attacks
- Change the web-site for FUN
1/31/2015
10
INTRUSIONDETECTION
TYPES OF ATTACK
 Unauthorized access to the resources
 Password cracking
 Spoofing e.g. DNS spoofing
 Scanning ports & services
 Network packet listening
 Stealing information
 Unauthorized network access
 Uses of IT resources for private purpose
 Unauthorized alternation of resources
 Falsification of identity
 Information altering and deletion
 Unauthorized transmission and creation of data
 Configuration changes to systems and n/w services
1/31/2015
11
INTRUSIONDETECTION
TYPES OF ATTACK CONTD..
 Denial of Service
 Flooding
 Ping flood
 Mail flood
 Compromising system
 Buffer overflow
 Remote system shutdown
 Web application attack
“Most attacks are not a single attack but a series of
individual events developed in coordinated manner”
1/31/2015
12
INTRUSIONDETECTION
1/31/2015
13
INTRUSIONDETECTION
Source : http://members.autobahn.mb.ca/~het/terror_war/evote.html
WHAT AN IDEAL IDS IS SUPPOSED TO DO ?
 Identify possible incidents
 detect an attacker has compromised system
 Report administrator
 Log information
 keep log of suspicious activities
 Can be configured to
 Recognize violations of security policies
 Monitor file transfers
 Copying a large database onto a user’s laptop
 Identify reconnaissance activity
 Attack tools and worms perform reconnaissance activity
like : host and port scans
1/31/2015
14
INTRUSIONDETECTION
IDS CLASSIFICATION
1/31/2015
15
INTRUSIONDETECTION
Source : http://www.windowsecurity.com/articles/IDS-Part2-Classification-methods-techniques.html
IDS TYPES : BASED ON DETECTION APPROACH
 Knowledge-based or Signature-based
 Behavior-based or Anomaly-based
 Knowledge-based
 Matching signature of well-known attacks against state-
change in systems or stream of packets flowing through
network
 Example of signatures :
 A telnet attempt with username “root” which is violation of an
organization’s security policy
 An e-mail with a subject “Free Pictures” and an attachment
“freepics.exe” -characteristics of a malware
1/31/2015
16
INTRUSIONDETECTION
ADVANTAGE / DISADVANTAGES OF KB-IDS
 Very few false alarm
 Very effective to detect previously known threats
 Ineffective to detect new threats
 Threats disguised by use of evasion techniques
 Compares a current unit of activity (e.g. a n/w packet or
a log entry) to a list of signatures using string
comparisons operations
 Little understanding of n/w or application protocol and
can’t track the state of complex communication
 e.g. can’t pair request with the corresponding response
 Cant remember a previous request while
processing the current request
1/31/2015
17
INTRUSIONDETECTION
BEHAVIOR-BASED IDS
 Compares normal event against observed events to
identify significant deviation
 Has profiles to represent normal behavior of
 Users, hosts, network connections or applications
 Developed by monitoring the characteristics of typical
activity over a period of time
 Profiles can be for behavioral attributes like:
 Number of email sent by a user, number of failed logins
for a host, level of processor usage etc.
 Example
A profile for a network might show that in an average, 13% of network
bandwidth are due to Web activities during typical workday hours. Then IDS can
use statistical methods to compare current Web activity bandwidth with expected
one and alert administrator if high bandwidth is being occupied by web activities
1/31/2015
18
INTRUSIONDETECTION
STATIC VS. DYNAMIC PROFILES
 Profiles are generated over a period of time (days
or sometimes weeks)
 Static profile is unchanged unless required to
generate new profile
 Change in systems and/or networks inaccurate
static profile (Generate Again)
 Dynamic profile defect : susceptible to evasion
attempts from attackers
 Frequently performing malicious activity
1/31/2015
19
INTRUSIONDETECTION
ADVANTAGES / DISADVANTAGES OF BBIDS
 Very effective to detect unknown threats
 Example :
Suppose computer is infected with a new type of malware. The malware
consumes large computer’s processor resources and send large number of
emails, initiating large number of network connections. This is definitely a
significantly different behavior from established profiles.
 High false alarm rate
 All activities excluded during training phase
 Making a profile is very challenging
1/31/2015
20
INTRUSIONDETECTION
NETWORK BASED INTRUSION DETECTION
 IDS are placed on the network, nearby system(s)
being monitored
 Monitors n/w traffic for particular n/w segments or
devices
 The network interface card placed in promiscuous
mode to capture all n/w traffic
 Sensors placed on n/w segment to check the
packets
 Primary types of signatures are
 String signature
 Port Signature
 Header Condition Signature
1/31/2015
21
INTRUSIONDETECTION
NETWORK BASED INTRUSION DETECTION
CONTD..
 String Signature
 Look text/string that may indicate possible attack
 Example: UNIX system “cat” “+ +” > /.rhosts”
 Port Signature
 Watch for connection attempts to well-known, frequently attacked ports
 Example : telnet (TCP port 23) , FTP (TCP port 21/20)
 Ports are not used but packets are coming that port.
 Header Signature
 Watch for dangerous or illogical combination of packet headers
 Example : TCP packet with both SYN and FIN flags set
 Request wished to start and stop the connection at the same time.
 Limitations
 Can not detect attacks on encrypted n/w traffic (E.g. HTPS, VPN)
 IDS sensors are susceptible to various attacks
 Large volume of traffic can crash IDS sensor itself
1/31/2015
22
INTRUSIONDETECTION
1/31/2015
23
INTRUSIONDETECTION
Source : WindowsSecurity.com
HOST BASED IDS
 Piece or pieces of software on the system to be
monitored
 Uses log files and network traffic in/out of that host
as data source
 Monitors:
 Incoming packets
 Login activities
 Root activities
 File systems
 Host based IDS might monitor
 Wired and wireless network traffic ;Systems logs
 Running process; file access/modification
1/31/2015
24
INTRUSIONDETECTION
1/31/2015
25
INTRUSIONDETECTION
Source : WindowsSecurity.com
EVALUATION OF IDS’S
1/31/2015
26
INTRUSIONDETECTION
Source : Iftikhar Ahmad , Azween B Abdullah and Abdullah S Alghamdi ,“Comparative Analysis of
Intrusion Detection Approaches”, 12th International Conference on Computer Modelling and
Simulation, 2010
CURRENTLY AVAILABLE IDSS
Network Based IDS Host Based IDS
Internet Security Systems Real
Secure
Internet Security Systems Real
Secure
Symantec Net Prowler Symantec Intruder Alert
Network Ice Black Ice Defender Tripwire
CyberSafe Centrax Cyber Safe Centrax
Detection Appliance
1/31/2015
27
INTRUSIONDETECTION
Snort, Fragroute /Fragrouter, OSSEC HIDS, are some of the most
popular Open Source IDS
SNORT
 Open source NIDS developed by Sourcefire
 It combines the benefits of signature based and
behavior based intrusion detection techniques
 It has 300,000 registered users
1/31/2015
28
INTRUSIONDETECTION
 How to install SNORT (in Linux)
http://www.youtube.com/watch?v=TZ0Hj0t5b5k&feature=related
 How to install and use SNORT (in XP)
http://www.youtube.com/watch?v=nAWN989WA0A&feature=related
 carbo.dll is the file that can be used to remotely view any file your
web server has permissions to view
1/31/2015
29
INTRUSIONDETECTION
REFERENCES
 Roman V. Yampolskiy and Venu Govindaraju, “Computer Security: a Survey of Methods
and Systems”, Journal of Computer Science 3 (7), 2007
 Iftikhar Ahamad, Azween B Abdullah and Abdullah S Alghamdi, “Comparative Analysis of
Intrusion Detection Approaches”, 12 th International Conference on Computer Modeling
and Simulation,2010
 David Elson, “Intrusion Detection, Theory and Practice”, www.symantec.com
 Karen Scarfone, Peter Mell, “Guide to Intrusion Detection and Prevention Systems
(IDPS)” , Special Publication 800-94
 ISS, “Network- vs. Host-based Intrusion Detection”, A Guide to Intrusion Detection
Technology
 FAQ's : http://www.sans.org/security-resources/idfaq/
 http://ids.nic.in/JCES%20TNL%20OCT%202008/IDS/IDS.htm
 http://sectools.org/ids.html
 http://www.snort.org/
 http://www.wikipedia.org
1/31/2015
30
INTRUSIONDETECTION
QUESTIONS / COMMENTS
1/31/2015
31
INTRUSIONDETECTION

More Related Content

What's hot

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Sweta Sharma
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Akhil Kumar
 

What's hot (20)

Ids(final)
Ids(final)Ids(final)
Ids(final)
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
 

Viewers also liked

Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypot
mmubashirkhan
 

Viewers also liked (19)

Push N Pull
Push N PullPush N Pull
Push N Pull
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
 
Push & Pull
Push & PullPush & Pull
Push & Pull
 
Hcl
HclHcl
Hcl
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
Snort
SnortSnort
Snort
 
Snort ppt
Snort pptSnort ppt
Snort ppt
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypot
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
 
Snort IDS/IPS Basics
Snort IDS/IPS BasicsSnort IDS/IPS Basics
Snort IDS/IPS Basics
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
 
Key management
Key managementKey management
Key management
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection Solution
 
Wireshark
WiresharkWireshark
Wireshark
 

Similar to Intrusion detection

Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
Loay Elbasyouni
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention Systems
Alison Hall
 
The Security Of Information Security
The Security Of Information SecurityThe Security Of Information Security
The Security Of Information Security
Rachel Phillips
 

Similar to Intrusion detection (20)

Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
 
1776 1779
1776 17791776 1779
1776 1779
 
1776 1779
1776 17791776 1779
1776 1779
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Euro mGov Securing Mobile Services
Euro mGov Securing Mobile ServicesEuro mGov Securing Mobile Services
Euro mGov Securing Mobile Services
 
A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...
 
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention Systems
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
The Security Of Information Security
The Security Of Information SecurityThe Security Of Information Security
The Security Of Information Security
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
IS - Firewall
IS - FirewallIS - Firewall
IS - Firewall
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
 
Network seurity
Network seurityNetwork seurity
Network seurity
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Intrusion detection

  • 1. INTRUSION DETECTION By : Umesh Dhital udh001@latech.edu
  • 2. PRESENTATION OUTLINE  Introduction  What ?  Why ?  History  Typical Intrusion Scenario  Types of Attacks  What IDS does ?  Types of IDS  Based on detection approach  Advantages/ Disadvantages  Based on protected system  Network / Host based detection  Evaluation of IDS  Commercially available IDS  Snort  References  Q/A 1/31/2015 2 INTRUSIONDETECTION
  • 3. WHAT IS INTRUSION DETECTION SYSTEM? 1/31/2015 3 INTRUSIONDETECTION  Intrusion  Any unauthorized access, not permitted attempt to access/damage or malicious use of information resources  Intrusion Detection  Detection of break-ins and break-in attempts via automated software systems  Intrusion Detection Systems(IDS)  Defense systems, which detect and possibly prevent intrusion detection activities
  • 4. WHAT IS NOT AN IDS ?  Network logging systems  Security Scanners  vulnerability assessment tools to check flaws in OS,N/W  Antivirus products  Security/Cryptographic systems  E.g. VPN,SSL, Kerbose  Firewalls 1/31/2015INTRUSIONDETECTION 4
  • 5. WHY IDS ? 1/31/2015 5 INTRUSIONDETECTION Straight Forward Reason to protect data and system integrity. Fact : can not be done with ordinary password and file security Misconception :  A network firewall will keep the bad guys off my network, right?  My anti-virus will recognize and get rid of any virus I might catch, right?  And my password-protected access control will stop the office cleaner trawling through my network after I've gone home, right? So that's it – “I'm fully protected”
  • 6.  Anti-virus systems are only good at detecting viruses they already know about  Passwords can be hacked or stolen or changed by other  Firewalls DO NOT recognize attacks and block them  Simply a fence around your network  no capacity to detect someone is trying to break-in(digging a hole underneath it)  Can’t determine whether somebody coming through gate is allowed to enter or not.  Roughly 80% of financial losses occur hacking from inside the network “BEWARE OF INTERNAL INTRUDERS”  Example : In April 1999, many sites were hacked via a bug in ColdFusion. All had firewalls to block other access except port 80. But it was the Web Server that was hacked. HERE IS THE REALITY 1/31/2015 6 INTRUSIONDETECTION
  • 7. ID- A BRIEF HISTORY  1980 - James Anderson Paper Computer Security Threat Monitoring and Surveillance  Concept of “detecting” misuse and specific user events emerged  1984 - Dr. Dorothy Denning and SRI developed first model for intrusion detection, Intrusion Detection Expert System developed  1988 – HayStack Project at University of California Lab, released intrusion detection system for US Air force  1989 – Commercial company HayStack Labs released Stalker  1990 – UC’s Todd Heberlein introduced idea of Network Detection System”  Developed Network Security Monitor  SAIC developed Computer Misuse Detection System 1/31/2015 7 INTRUSIONDETECTION
  • 8. HISTORY – CONTD..  US Air force developed Automated Security Measurement System  ID Market gain popularity around 1997  1998 ISS developed RealSecure  Cisco purchased Wheel Group  First host-based detection company Centrax Corporation emerged  Currently IDS is the top selling security technology 1/31/2015 8 INTRUSIONDETECTION Source : www.symantic.com/connect/articles/evolution-detection-systems
  • 9. TYPICAL INTRUSION SCENARIO 1/31/2015 9 INTRUSIONDETECTION Information Gathering Further Information Gathering Attack ! Successful Intrusion Fun and Profit -Find as much as info. As possible -whois lookup and DNS Zone transfers -Normal browsing ; gather important info. -ping sweeps, port scanning -web server vulnerabilities -version of application/services -start trying out different attacks - UNICODE attack if has IIS installed -try to find misconfigured running services -Passive Attack / Active Attack -install own backdoors and delete log files -replace existing services with own Trojen horses that have backdoor passwords or create own user accounts - Steal confidential information - Use compromised host to lunch further attacks - Change the web-site for FUN
  • 11. TYPES OF ATTACK  Unauthorized access to the resources  Password cracking  Spoofing e.g. DNS spoofing  Scanning ports & services  Network packet listening  Stealing information  Unauthorized network access  Uses of IT resources for private purpose  Unauthorized alternation of resources  Falsification of identity  Information altering and deletion  Unauthorized transmission and creation of data  Configuration changes to systems and n/w services 1/31/2015 11 INTRUSIONDETECTION
  • 12. TYPES OF ATTACK CONTD..  Denial of Service  Flooding  Ping flood  Mail flood  Compromising system  Buffer overflow  Remote system shutdown  Web application attack “Most attacks are not a single attack but a series of individual events developed in coordinated manner” 1/31/2015 12 INTRUSIONDETECTION
  • 14. WHAT AN IDEAL IDS IS SUPPOSED TO DO ?  Identify possible incidents  detect an attacker has compromised system  Report administrator  Log information  keep log of suspicious activities  Can be configured to  Recognize violations of security policies  Monitor file transfers  Copying a large database onto a user’s laptop  Identify reconnaissance activity  Attack tools and worms perform reconnaissance activity like : host and port scans 1/31/2015 14 INTRUSIONDETECTION
  • 15. IDS CLASSIFICATION 1/31/2015 15 INTRUSIONDETECTION Source : http://www.windowsecurity.com/articles/IDS-Part2-Classification-methods-techniques.html
  • 16. IDS TYPES : BASED ON DETECTION APPROACH  Knowledge-based or Signature-based  Behavior-based or Anomaly-based  Knowledge-based  Matching signature of well-known attacks against state- change in systems or stream of packets flowing through network  Example of signatures :  A telnet attempt with username “root” which is violation of an organization’s security policy  An e-mail with a subject “Free Pictures” and an attachment “freepics.exe” -characteristics of a malware 1/31/2015 16 INTRUSIONDETECTION
  • 17. ADVANTAGE / DISADVANTAGES OF KB-IDS  Very few false alarm  Very effective to detect previously known threats  Ineffective to detect new threats  Threats disguised by use of evasion techniques  Compares a current unit of activity (e.g. a n/w packet or a log entry) to a list of signatures using string comparisons operations  Little understanding of n/w or application protocol and can’t track the state of complex communication  e.g. can’t pair request with the corresponding response  Cant remember a previous request while processing the current request 1/31/2015 17 INTRUSIONDETECTION
  • 18. BEHAVIOR-BASED IDS  Compares normal event against observed events to identify significant deviation  Has profiles to represent normal behavior of  Users, hosts, network connections or applications  Developed by monitoring the characteristics of typical activity over a period of time  Profiles can be for behavioral attributes like:  Number of email sent by a user, number of failed logins for a host, level of processor usage etc.  Example A profile for a network might show that in an average, 13% of network bandwidth are due to Web activities during typical workday hours. Then IDS can use statistical methods to compare current Web activity bandwidth with expected one and alert administrator if high bandwidth is being occupied by web activities 1/31/2015 18 INTRUSIONDETECTION
  • 19. STATIC VS. DYNAMIC PROFILES  Profiles are generated over a period of time (days or sometimes weeks)  Static profile is unchanged unless required to generate new profile  Change in systems and/or networks inaccurate static profile (Generate Again)  Dynamic profile defect : susceptible to evasion attempts from attackers  Frequently performing malicious activity 1/31/2015 19 INTRUSIONDETECTION
  • 20. ADVANTAGES / DISADVANTAGES OF BBIDS  Very effective to detect unknown threats  Example : Suppose computer is infected with a new type of malware. The malware consumes large computer’s processor resources and send large number of emails, initiating large number of network connections. This is definitely a significantly different behavior from established profiles.  High false alarm rate  All activities excluded during training phase  Making a profile is very challenging 1/31/2015 20 INTRUSIONDETECTION
  • 21. NETWORK BASED INTRUSION DETECTION  IDS are placed on the network, nearby system(s) being monitored  Monitors n/w traffic for particular n/w segments or devices  The network interface card placed in promiscuous mode to capture all n/w traffic  Sensors placed on n/w segment to check the packets  Primary types of signatures are  String signature  Port Signature  Header Condition Signature 1/31/2015 21 INTRUSIONDETECTION
  • 22. NETWORK BASED INTRUSION DETECTION CONTD..  String Signature  Look text/string that may indicate possible attack  Example: UNIX system “cat” “+ +” > /.rhosts”  Port Signature  Watch for connection attempts to well-known, frequently attacked ports  Example : telnet (TCP port 23) , FTP (TCP port 21/20)  Ports are not used but packets are coming that port.  Header Signature  Watch for dangerous or illogical combination of packet headers  Example : TCP packet with both SYN and FIN flags set  Request wished to start and stop the connection at the same time.  Limitations  Can not detect attacks on encrypted n/w traffic (E.g. HTPS, VPN)  IDS sensors are susceptible to various attacks  Large volume of traffic can crash IDS sensor itself 1/31/2015 22 INTRUSIONDETECTION
  • 24. HOST BASED IDS  Piece or pieces of software on the system to be monitored  Uses log files and network traffic in/out of that host as data source  Monitors:  Incoming packets  Login activities  Root activities  File systems  Host based IDS might monitor  Wired and wireless network traffic ;Systems logs  Running process; file access/modification 1/31/2015 24 INTRUSIONDETECTION
  • 26. EVALUATION OF IDS’S 1/31/2015 26 INTRUSIONDETECTION Source : Iftikhar Ahmad , Azween B Abdullah and Abdullah S Alghamdi ,“Comparative Analysis of Intrusion Detection Approaches”, 12th International Conference on Computer Modelling and Simulation, 2010
  • 27. CURRENTLY AVAILABLE IDSS Network Based IDS Host Based IDS Internet Security Systems Real Secure Internet Security Systems Real Secure Symantec Net Prowler Symantec Intruder Alert Network Ice Black Ice Defender Tripwire CyberSafe Centrax Cyber Safe Centrax Detection Appliance 1/31/2015 27 INTRUSIONDETECTION Snort, Fragroute /Fragrouter, OSSEC HIDS, are some of the most popular Open Source IDS
  • 28. SNORT  Open source NIDS developed by Sourcefire  It combines the benefits of signature based and behavior based intrusion detection techniques  It has 300,000 registered users 1/31/2015 28 INTRUSIONDETECTION
  • 29.  How to install SNORT (in Linux) http://www.youtube.com/watch?v=TZ0Hj0t5b5k&feature=related  How to install and use SNORT (in XP) http://www.youtube.com/watch?v=nAWN989WA0A&feature=related  carbo.dll is the file that can be used to remotely view any file your web server has permissions to view 1/31/2015 29 INTRUSIONDETECTION
  • 30. REFERENCES  Roman V. Yampolskiy and Venu Govindaraju, “Computer Security: a Survey of Methods and Systems”, Journal of Computer Science 3 (7), 2007  Iftikhar Ahamad, Azween B Abdullah and Abdullah S Alghamdi, “Comparative Analysis of Intrusion Detection Approaches”, 12 th International Conference on Computer Modeling and Simulation,2010  David Elson, “Intrusion Detection, Theory and Practice”, www.symantec.com  Karen Scarfone, Peter Mell, “Guide to Intrusion Detection and Prevention Systems (IDPS)” , Special Publication 800-94  ISS, “Network- vs. Host-based Intrusion Detection”, A Guide to Intrusion Detection Technology  FAQ's : http://www.sans.org/security-resources/idfaq/  http://ids.nic.in/JCES%20TNL%20OCT%202008/IDS/IDS.htm  http://sectools.org/ids.html  http://www.snort.org/  http://www.wikipedia.org 1/31/2015 30 INTRUSIONDETECTION