Distributed Intrusion Detection
Download
Report
Transcript Distributed Intrusion Detection
Distributed Intrusion Detection
Mamata Desai (99305903)
M.Tech.,CSE dept,
IIT Bombay
Overview
What is intrusion ?
Dealing with intrusion
Intrusion detection principles
Our problem definition
Packages analyzed
Our approach
Experiments and Results
Conclusions
What is intrusion ?
The potential possibility of a deliberate
unauthorized attempt to:
1. Access information
2. Manipulate information
3. Render a system unreliable or unusable
Types of intrusions:
–
External attacks
•
–
–
Password cracks, network sniffing, machine &
services discovery utilities, packet spoofing,
flooding utilities, DOS attacks
Internal penetrations – Masqueraders,
clandestine users
Misfeasors – authorized misuse
Example attacks
Password cracking
Buffer overflow
Network reconnaissance
Denial of service (DoS)
IP spoofing
Dealing with intrusion
Prevention
– isolate from n/w, strict auth, encryption
Preemption
– “do unto others, before they do unto you”
Deterrence
– dire warnings: “we have a bomb too”
Deflection
– diversionary techniques to lure away
Counter measures
Detection
Intrusion Detection principles
Anomaly-based
– Form an opinion on what constitutes “normal”,
and decide on a threshold to flag as “abnormal”
– Cannot distinguish illegal from abnormal
Signature-based
– Model signatures of previous attacks and flag
matching patterns
– Cannot detect new intrusions
Compound
System characteristics
Time of detection
Granularity of data processing
Source of audit data
Response to detected intrusions
– passive v/s active
Locus of data-processing
Locus of data-collection
Security
Degree of inter-operability
Host-based v/s Network-based IDS
Host-based IDS
1. Verifies success or failure of an attack
2. Monitors specific system activities
3. Detects attacks that n/w based systems miss
4. Well-suited for encrypted and switched
environments
5. Near-real-time detection and response
6. Requires no additional hardware
7. Lower cost of entry
…contd.
Network-based IDS
1. Lower cost of ownership
2. Detects attacks that host-based systems miss
3. More difficult for an attacker to remove
evidence
4. Real-time detection and response
5. Detects unsuccessful attacks and malicious
intent
6. Operating system independence
7. Performance issues
Our problem definition
Portscanning
Our laboratory setup
– Multiple machines with similar configuration
Portscan on a single machine
Distributed portscan - Small evasive scans
on multiple machines
Aim – Detect such distributed scans
Typical lab setup
Types of Portscans
Scan types:
– TCP connect() scan
– Stealth SYN scan
– Stealth FIN scan
– Xmas scan
– Null scan
Scan sweeps:
– One-to-one, one-to-many, many-to-one, manyto-many
Normal sequence of packets
Source
Network Messages
Target
Send SYN, seq=x
Receive SYN segment
Send SYN, seq=y, ACK x+1
Receive SYN +
ACK segment
Send ACK y+1
Receive ACK segment
… more packet exchanges
Send ACK+FIN+RST
Receive ACK+FIN+RST
Stealth SYN scan
Source
Network Messages
Target
Send SYN, seq=x
Receive SYN segment
Receive SYN +
ACK segment
Send SYN, seq=y, ACK x+1
Send RST
Receive RST
Stealth FIN scan
Source
Network Messages
Target
Send FIN
Receive FIN
Stealth Xmas scan
Source
Network Messages
Target
Send FIN+PSH+URG
Receive FIN+PSH+URG
Packages analyzed
Sniffit (http://sniffit.rug.ac.be/sniffit/sniffit.html)
– A network sniffer for TCP/UDP/ICMP packets
– Interactive mode
Tcpdump (http://www.tcpdump.org)
– A tool for network monitoring and data acquisition
Nmap (http://www.nmap.org)
– “Network mapper” for network exploration, security auditing
– Various types of TCP/UDP scans, ping scans
…contd
Portsentry (http://www.psionic.com/abacus/portsentry)
– Host-based TCP/UDP portscan detection and active defense
system
– Stealth scan detection
– Reacts to portscans by blocking hosts
– Internal state engine to remember previously connected hosts
– All violations reported to syslog
Snort (http://www.snort.org)
– Network-based IDS – real-time analysis and traffic logging
– Content searching/matching to detect attacks and probes – buffer
overflows, CGI attacks, SMB probes, OS fingerprinting attacks
– Rules language to describe traffic to collect or pass
– Alerts via syslog, user files, WinPopUp messages
– 3 functional modes – sniffer, packet logger, NIDS
…contd
Portsentry
– Binds to all ports to be monitored
– A static “list” of ports monitored
– State engine – different hosts
Snort
– Preprocessor – connections to P ports in T
seconds
– V1.8 – only one-to-one and one-to-many
portscans detected
Our approach
Pick up network packets
Based on which type of portscan is to be
analyzed, identify the scan signature
Add each source and target IP address, to
the correlation lists
Use the correlation lists to infer the scan
sweep – one-to-one, one-to-many, many-toone, many-to-many
Experimental Setup
Detection algorithm
Examine each TCP packet on the network.
Extract source and target IP addrs and ports.
For each scan type to be detected, maintain
a list of “valid” connections.
When a scan signature is detected, add
source and target IP addrs to 2 correlation
lists pointed to by srcIP and tarIP, remove
entry from connections list.
…contd
Identical correlation lists record source and
target IP addrs info, along with number of
scans.
Scan sweeps one-to-one, one-to-many,
many-to-one, and many-to-many are
detected by passes thru the correlation lists.
Experiments
Source
pro-13
pro-15
pro-17
Target
pro-19
pro-21
pro-23
TCP ports
25, 119
21, 23, 80
22, 79
One-to-one scan
Source Target TCP ports
pro-13 pro-19 7, 20, 21
pro-21 22, 23, 25, 53
pro-23 69, 79, 80, 88
pro-15 pro-19 110, 111, 119
pro-21 139, 143, 194, 220
One-to-many scan
…contd
Source
pro-13
pro-15
pro-17
Target
pro-21
pro-21
pro-21
TCP ports
443, 513, 518
873, 3130, 6667
107, 20, 21, 23
Source Target TCP ports
pro-13 pro-19 7, 20, 21, 79
pro-21 80, 113, 119, 139
pro-23 143, 194, 667
pro-15 …
…
pro-17 …
…
Many-to-one scan
Many-to-many scan
Conclusions
All the scans performed by nmap were
detected successfully by our detector and
the correlations were accurate.
Some stray incidents of ident lookups did
get classified as scans, due to the way
closed ports behave.