Distributed Intrusion Detection

Download Report

Transcript Distributed Intrusion Detection

Distributed Intrusion Detection
Mamata Desai (99305903)
M.Tech.,CSE dept,
IIT Bombay
Overview
 What is intrusion ?
 Dealing with intrusion
 Intrusion detection principles
 Our problem definition
 Packages analyzed
 Our approach
 Experiments and Results
 Conclusions
What is intrusion ?
 The potential possibility of a deliberate
unauthorized attempt to:
1. Access information
2. Manipulate information
3. Render a system unreliable or unusable
 Types of intrusions:
–
External attacks
•
–
–
Password cracks, network sniffing, machine &
services discovery utilities, packet spoofing,
flooding utilities, DOS attacks
Internal penetrations – Masqueraders,
clandestine users
Misfeasors – authorized misuse
Example attacks
 Password cracking
 Buffer overflow
 Network reconnaissance
 Denial of service (DoS)
 IP spoofing
Dealing with intrusion
 Prevention
– isolate from n/w, strict auth, encryption
 Preemption
– “do unto others, before they do unto you”
 Deterrence
– dire warnings: “we have a bomb too”
 Deflection
– diversionary techniques to lure away
 Counter measures
 Detection
Intrusion Detection principles
 Anomaly-based
– Form an opinion on what constitutes “normal”,
and decide on a threshold to flag as “abnormal”
– Cannot distinguish illegal from abnormal
 Signature-based
– Model signatures of previous attacks and flag
matching patterns
– Cannot detect new intrusions
 Compound
System characteristics
 Time of detection
 Granularity of data processing
 Source of audit data
 Response to detected intrusions
– passive v/s active
 Locus of data-processing
 Locus of data-collection
 Security
 Degree of inter-operability
Host-based v/s Network-based IDS
 Host-based IDS
1. Verifies success or failure of an attack
2. Monitors specific system activities
3. Detects attacks that n/w based systems miss
4. Well-suited for encrypted and switched
environments
5. Near-real-time detection and response
6. Requires no additional hardware
7. Lower cost of entry
…contd.
 Network-based IDS
1. Lower cost of ownership
2. Detects attacks that host-based systems miss
3. More difficult for an attacker to remove
evidence
4. Real-time detection and response
5. Detects unsuccessful attacks and malicious
intent
6. Operating system independence
7. Performance issues
Our problem definition
 Portscanning
 Our laboratory setup
– Multiple machines with similar configuration
 Portscan on a single machine
 Distributed portscan - Small evasive scans
on multiple machines
 Aim – Detect such distributed scans
Typical lab setup
Types of Portscans
 Scan types:
– TCP connect() scan
– Stealth SYN scan
– Stealth FIN scan
– Xmas scan
– Null scan
 Scan sweeps:
– One-to-one, one-to-many, many-to-one, manyto-many
Normal sequence of packets
Source
Network Messages
Target
Send SYN, seq=x
Receive SYN segment
Send SYN, seq=y, ACK x+1
Receive SYN +
ACK segment
Send ACK y+1
Receive ACK segment
… more packet exchanges
Send ACK+FIN+RST
Receive ACK+FIN+RST
Stealth SYN scan
Source
Network Messages
Target
Send SYN, seq=x
Receive SYN segment
Receive SYN +
ACK segment
Send SYN, seq=y, ACK x+1
Send RST
Receive RST
Stealth FIN scan
Source
Network Messages
Target
Send FIN
Receive FIN
Stealth Xmas scan
Source
Network Messages
Target
Send FIN+PSH+URG
Receive FIN+PSH+URG
Packages analyzed
 Sniffit (http://sniffit.rug.ac.be/sniffit/sniffit.html)
– A network sniffer for TCP/UDP/ICMP packets
– Interactive mode
 Tcpdump (http://www.tcpdump.org)
– A tool for network monitoring and data acquisition
 Nmap (http://www.nmap.org)
– “Network mapper” for network exploration, security auditing
– Various types of TCP/UDP scans, ping scans
…contd
 Portsentry (http://www.psionic.com/abacus/portsentry)
– Host-based TCP/UDP portscan detection and active defense
system
– Stealth scan detection
– Reacts to portscans by blocking hosts
– Internal state engine to remember previously connected hosts
– All violations reported to syslog
 Snort (http://www.snort.org)
– Network-based IDS – real-time analysis and traffic logging
– Content searching/matching to detect attacks and probes – buffer
overflows, CGI attacks, SMB probes, OS fingerprinting attacks
– Rules language to describe traffic to collect or pass
– Alerts via syslog, user files, WinPopUp messages
– 3 functional modes – sniffer, packet logger, NIDS
…contd
 Portsentry
– Binds to all ports to be monitored
– A static “list” of ports monitored
– State engine – different hosts
 Snort
– Preprocessor – connections to P ports in T
seconds
– V1.8 – only one-to-one and one-to-many
portscans detected
Our approach
 Pick up network packets
 Based on which type of portscan is to be
analyzed, identify the scan signature
 Add each source and target IP address, to
the correlation lists
 Use the correlation lists to infer the scan
sweep – one-to-one, one-to-many, many-toone, many-to-many
Experimental Setup
Detection algorithm
 Examine each TCP packet on the network.
 Extract source and target IP addrs and ports.
 For each scan type to be detected, maintain
a list of “valid” connections.
 When a scan signature is detected, add
source and target IP addrs to 2 correlation
lists pointed to by srcIP and tarIP, remove
entry from connections list.
…contd
 Identical correlation lists record source and
target IP addrs info, along with number of
scans.
 Scan sweeps one-to-one, one-to-many,
many-to-one, and many-to-many are
detected by passes thru the correlation lists.
Experiments
Source
pro-13
pro-15
pro-17
Target
pro-19
pro-21
pro-23
TCP ports
25, 119
21, 23, 80
22, 79
One-to-one scan
Source Target TCP ports
pro-13 pro-19 7, 20, 21
pro-21 22, 23, 25, 53
pro-23 69, 79, 80, 88
pro-15 pro-19 110, 111, 119
pro-21 139, 143, 194, 220
One-to-many scan
…contd
Source
pro-13
pro-15
pro-17
Target
pro-21
pro-21
pro-21
TCP ports
443, 513, 518
873, 3130, 6667
107, 20, 21, 23
Source Target TCP ports
pro-13 pro-19 7, 20, 21, 79
pro-21 80, 113, 119, 139
pro-23 143, 194, 667
pro-15 …
…
pro-17 …
…
Many-to-one scan
Many-to-many scan
Conclusions
 All the scans performed by nmap were
detected successfully by our detector and
the correlations were accurate.
 Some stray incidents of ident lookups did
get classified as scans, due to the way
closed ports behave.