Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Intrusion detection
1. 1
INTRUSION DETECTION
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection
Mr. RAJASEKAR RAMALINGAM
Department of IT, College of Applied
Sciences, Sur.
Sultanate of Oman.
http://vrrsekar.wixsite.com/raja
Based on
William Stallings, Lawrie Brown,
Computer Security: Principles and
Practice, Third Edition
3. 8.1 INTRUDERS
• A significant security problem for networked systems is
unwanted trespass by users or software.
1) User trespass: Unauthorized logon to a machine,
acquisition of privileges or performance of actions
beyond those that have been authorized.
2) Software trespass: Form of a virus, worm, or Trojan
horse.
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 3
4. 8.2 Classes of intruders:
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 4
5. 8.3 Examples of Intrusion
• Remote root compromise
• Web server defacement
• Guessing / cracking passwords
• Copying viewing sensitive data / databases
• Running a packet sniffer
• Distributing pirated software
• Using an unsecured modem to access net
• Impersonating a user to reset password
• Using an unattended workstation
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 5
6. 8.4 Security Intrusion & Detection
1) Security Intrusion
A security event, or combination of multiple security
events, that constitutes a security incident in which an
intruder gains, or attempts to gain, access to a system
(or system resource) without having authorization to
do so.
2) Intrusion Detection
A security service that monitors and analyzes system
events for the purpose of finding, and providing real-
time or near real-time warning of attempts to access
system resources in an unauthorized manner.
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 6
7. 8.5 Intrusion Techniques
• Objective is to gain access to or increase privileges on
a system.
• Most initial attacks use system or software
vulnerabilities that allow a user to execute code
– To opens a back door into the system. E.g., buffer
overflow.
– To gain protected information. E.g., password.
• Intruder behavior patterns
– Hacker
– Criminal Enterprise
– Internal threat
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 7
8. 8.5.1 Hackers
• Motivated by thrill of access and status
– Hacking community is a strong meritocracy.
– Status is determined by level of competence.
1
• Select the target using IP lookup tools such as NSLookup, Dig, and others
2
• Map network for accessible services using tools such as NMAP
3
• Identify potentially vulnerable services (in this case, pcAnywhere)
4
• Brute force (guess) pcAnywhere password
5
• Install remote administration tool called DameWare
6
• Wait for administrator to log on and capture his password
7
• Use that password to access remainder of network
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 8
9. 8.5.2 Criminal Enterprise
• Organized groups of hackers now a threat
– Corporation / government / loosely affiliated gangs
– Typically young
– Common target is a credit cards on e-commerce server
Criminal Enterprise - Patterns of Behavior
Act quickly and precisely to make their activities harder
to detect
Exploit perimeter via vulnerable ports
Use Trojan horses (hidden software) to leave back
doors for re-entry
Use sniffers to capture passwords
Do not stick around until noticed
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 9
10. 8.5.3 Insider Attacks
• Among most difficult to detect and prevent
• Employees have access & systems knowledge
Internal Threat - Patterns of Behavior
Create network
accounts for
themselves and
their friends
Access accounts
and applications
they wouldn't
normally use for
their daily jobs
E-mail former and
prospective
employers
Conduct furtive
instant-messaging
chats
Visit web sites that
cater to
disgruntled
employees, such as
f'dcompany.com
Perform large
downloads and file
copying
Access the
network during
off hours
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 10
11. 8.6 Intrusion Detection Systems
• Classify intrusion detection systems (IDSs) as:
– Host-based IDS: monitor single host activity
– Network-based IDS: monitor network traffic
• Logical components:
– Sensors - collect data
– Analyzers - determine if intrusion has occurred
– User interface - manage / direct / view IDS
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 11
12. 8.7 IDS Principles
• Assume intruder behavior differs from legitimate
users
– Expect overlap as shown
– Observe deviations
from past history
– Problems of:
• False positives
• False negatives
• Must compromise
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 12
13. 8.8 IDS Requirements
run continually be fault tolerant resist subversion
impose a minimal
overhead on system
configured
according to system
security policies
adapt to changes in
systems and users
scale to monitor
large numbers of
systems
provide graceful
degradation of
service
allow dynamic
reconfiguration
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 13
14. 8.9 Host-Based IDS
• Specialized software to monitor system activity to detect
suspicious behavior
– primary purpose is to detect intrusions, log suspicious
events, and send alerts
– can detect both external and internal intrusions
• Two approaches, often used in combination:
– anomaly detection - defines normal/expected behavior
• Threshold detection
• Profile based
– signature detection - defines proper behavior
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 14
15. 8.9.1 Anomaly Detection
• Threshold detection
– Checks excessive event occurrences over time
– Alone a crude and ineffective intruder detector
– Must determine both thresholds and time intervals
• Profile based
– Characterize past behavior of users / groups
– Then detect significant deviations
– Based on analysis of audit records
• Gather metrics: counter, guage, interval timer, resource utilization
• Analyze: mean and standard deviation, multivariate, markov process,
time series, operational model
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 15
16. 8.9.2 Signature Detection
• Observe events on system and applying a set of rules
to decide if intruder
• Approaches:
– Rule-based anomaly detection
• Analyze historical audit records for expected
behavior, then match with current behavior
– Rule-based penetration identification
• Rules identify known penetrations / weaknesses
• Often by analyzing attack scripts from Internet
• Supplemented with rules from security experts
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 16
17. 8.10 Network-Based IDS
• Network-based IDS (NIDS)
– Monitor traffic at selected points on a network
– In (near) real time to detect intrusion patterns
– May examine network, transport and/or
application level protocol activity directed
toward systems
• Comprises a number of sensors
– Inline (possibly as part of other net device)
– Passive (monitors copy of traffic)
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 17
18. 8.10.1 NIDS Sensor Deployment
• Inline sensor
• inserted into a network
segment so that the
traffic that it is
monitoring must pass
through the sensor
• Passive sensors
• monitors a copy of
network traffic
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 18
20. 8.10.2 NIDS - Intrusion Detection Techniques
• Signature detection
– At application, transport, network layers; unexpected
application services, policy violations
• Anomaly detection
– of denial of service attacks, scanning, worms
• When potential violation detected sensor sends an
alert and logs information
– Used by analysis module to refine intrusion detection
parameters and algorithms
– By security admin to improve protection
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 20
21. 8.11 Intrusion Detection Exchange Format
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 21
22. 8.12 Honeypot
• Decoy systems designed to:
– lure a potential attacker away from critical systems
– collect information about the attacker’s activity
– encourage the attacker to stay on the system long enough for administrators to
respond
• filled with fabricated information that a legitimate user of the system
wouldn’t access
• resource that has no production value
– incoming communication is most likely a probe, scan, or attack
– outbound communication suggests that the system has probably been
compromised
• once hackers are within the network, administrators can observe
their behavior to figure out defensesITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 22
23. Honeypot Classifications
• Low interaction honeypot
– Consists of a software package that emulates particular
IT services or systems well enough to provide a
realistic initial interaction,
• but does not execute a full version of those services
or systems
– Provides a less realistic target
– Often sufficient for use as a component of a distributed
IDS to warn of imminent attack
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 23
24. • High interaction honeypot
– A real system, with a full operating system, services and
applications,
• which are instrumented and deployed where they can be
accessed by attackers
– Is a more realistic target that may occupy an attacker for an
extended period
– However, it requires significantly more resources
– If compromised could be used to initiate attacks on other
systems
ITSY3104 COMPUTER SECURITY - A - LECTURE 8 - Intrusion Detection 24