Report: Intrusion Detection Systems
Download
Report
Transcript Report: Intrusion Detection Systems
Intrusion Detection System
Marmagna Desai
[ 520 Presentation]
Contents
Computer Security
IDS - Introduction
Intrusion Detection System
Network
System
Network Based (NIDS)
Host Based (HIDS)
ID Expert Systems
IDS Techniques
Misuse Detection
Anomaly Detection
Immune System Approach
Architecture
Requirements
Conclusion
References
Thanks
Computer Security – CIA
Confidentiality-Integrity-Authentication
Network Security
Protecting
Network equipment.
Network servers and
transmissions.
Eavesdropping.
Data Integrity
System Security
User access
Authentication controls
Assignment of
privilege
Maintaining file and file
system integrity
Monitoring processes
Log-keeping
Backups
Intrusion Detection System
IDS - Definition
Monitors either a Network boundary (Network
IDS) or a single host (Host IDS) in real-time,
looking for patterns that indicate Attacks.
Functional Blocks..
Sensor
Monitor
Resolver
Controller
Sensor
System Specific Data Gathering Component.
Track Network traffic, Log files, System behaviour
Monitor
Monitor Components, Get Events from Sensor.
Correlates Events against Behaviour-Model
Produce Alerts.
Resolver
Determine Response against Alerts.
E.g. Logging, Changing System Mechanism,
Setting Firewall Rule etc.
Controller - Coordination and Administration
Network IDS
NIDS Sensors collect information from
Network Connections.
Uses Packet Sniffing on NIC in Promiscuous
Mode.
No Auditing / Logging required.
Agents can introduced without affecting Data
Source at NIC level.
Detects Network Level Attacks (e.g. SYN Atk)
Can NOT scan Protocols or Content of
Network Traffic if encrypted.
Host IDS
HIDS Sensors collect information reflecting the
System Activity.
Based on Operating System Audit Trails, Logs
and Process Trees.
User and Application Level Analysis
Process Behaviour Analysis
Operate in Encrypted Environments.
Platform Specific, Large Overhead for OS and
Higher Management/Deployment Costs
ID Expert Systems
A set of System Tools Working in Coordination
Users Behave in a Consistent Manner
Behaviour can be Summarised in a Profile.
Profile can be generated by Advanced
Statistical Analysis.
Oracle Database is used for Profiles.
Provides Real-Time Response to Intrusion.
IDS Approaches
Misuse Detection
Models Abnormal behaviour
E.G. HTTP request referring to the cmd.exe file
Uses Pattern Matching of system setting and
user activities against database of known
attacks. (Signature Analysis)
Highly Efficient – Tightly Defined Signature.
Vulnerable to novel attacks.
Anomaly Detection
Models Normal Behaviour
E.g. Expected System Calls, generated by User
Process (Root/Non-root).
Statistical profiles for system objects are
created by measuring attributes of normal use.
Detects Novel and Complex attacks.
Low Efficiency
False Positive
Legitimate action classified as Anomalous.
Anomaly Detection - continued
Immune System Approach
Models in terms of Sequence of System Calls.
Sequence for
Normal Behaviour
Error Condition
Anomaly
Kernel-Level System-Call Monitoring.
E.g. “exec “ System call produces trace in all
above situations.
System Call Execution Process
System Call
Dispatcher
System Call
Implementation
User Process
Schedular
Kernel Level System Monitoring
System Call
Dispatcher
User Process
IDS Module
Schedular
System Call
Implementation
Architecture
Monolithic
Single Application contains sensor, monitor,
resolver and controller
Most Simplest Architecture, unable to detect
attack made by distributed normal events.
Hierarchic
Resolver and Controller at root of hierarchy.
Monitors at sub-system (logical group) level.
Sensors at Node-Level
Centralised controller correlates information
from different Monitors and Resolver take
Architecture – continued
Agent Based
Distributed Sensors/Monitors/Resolver and
Controller.
Multi-Hierarchy of Monitors
High Scalability
Recently used in various IDS.
Requirements
Accuracy
Prevention, not just detection
Broad attack coverage
Analyze all relevant traffic
Highly granular detection and response
Sophisticated forensics and reporting
Maximum sensor uptime
Wire-speed performance
Requirements...
Accuracy
Reduced False +ve and -ve
Thorough Protocol Analysis
Prevention
Real Time Prevention
Reconfiguration and Response
Self Learning Profiles
Broad Attack Coverage
Protects against all Attacks
Requirements...
Analyze all relevant traffic (NIDS)
Deploy IDS to suit varying Networks Topology
Granular Detection and Response
One size does not fit all.
Forensic and Reporting
Extensive Historic Analysis and Report
Wire-Speed
Multi – Giga bit Performance
Conclusion
IDS will merge all Network components and
tools which exist today, into a complete and
cooperative system, dedicated to keeping
networks Stable and Secure.
Distributed elements performing specific jobs.
Hierarchical correlation and analysis.
Novel approaches like AI, Data-Mining etc.
References
http://www.securityfocus.com
http://www.citeseer.com
“Intrusion Detection Techniques and
Approaches” [ Theuns Verwoerd and Ray Hunt ]
“Computer System Intrusion Detection: A
Survey” [ Anita K. Jones and Robert S. Sielken]
http://www.insecure.org/
http://nss.co.uk/
Thank You!!
Questions
?