Скачать презентацию Advances in Network Security Case Study Intrusion Detection Скачать презентацию Advances in Network Security Case Study Intrusion Detection

6528c992a9cd48a3458ef227da95a921.ppt

  • Количество слайдов: 58

Advances in Network Security Case Study: Intrusion Detection Max Lakshtanov Comp 529 T 7 Advances in Network Security Case Study: Intrusion Detection Max Lakshtanov Comp 529 T 7 -10 1

Intrusion Detection n Introduction and Background n Overview of Mobile Agents n Mobile Agents Intrusion Detection n Introduction and Background n Overview of Mobile Agents n Mobile Agents VS. Intruders n Other Intrusion Detection Techniques n Conclusion n Questions 2

Network Security: preventive and reactive n Preventive approach: n Prevent intrusions from occurring n Network Security: preventive and reactive n Preventive approach: n Prevent intrusions from occurring n User authentication – logins and passwords n Firewalls – filter network traffic n Reactive approach: n Intrusion Detection System (IDS) n How to detect intrusions n How to respond 3

Firewalls Firewall is a security device that allows limited access out of and into Firewalls Firewall is a security device that allows limited access out of and into one’s network from the Internet n Piece of hardware connected to a network for protection n Only permits approved traffic in and out of one’s local site n Allows administrator to select applicable services necessary to one’s business and screens out the rest n 4

Types of Attacks Internet Corporate Intranet Hacker Mail server HR/Finance Mobile worker Web site Types of Attacks Internet Corporate Intranet Hacker Mail server HR/Finance Mobile worker Web site Supplier Manufacturing Hacker Branch Office Engineering Hacker 5

Why firewalls are not enough? Not all access to the Internet occurs through the Why firewalls are not enough? Not all access to the Internet occurs through the firewalls n Not all threats originate from outside the firewall n Firewalls are subject to attack themselves n Little protection against data-driven attacks (i. e. virus-infected programs or data files, as well as malicious Java applets and Active. X controls) n 6

What is an Intrusion Detection System? Concept established in 1980 by J. P. Anderson What is an Intrusion Detection System? Concept established in 1980 by J. P. Anderson n Abbreviated as IDS, it is a defense system, which detects hostile activities in a network n IDS complements firewalls by allowing a higher level of analysis of traffic on a network, and by monitoring its behavior of the sessions on the servers n Helps computer and network systems prepare for and deal with an attack n 7

Basic Intrusion Detection Target System Respond Monitor Intrusion Detection System Report Intrusion Detection System Basic Intrusion Detection Target System Respond Monitor Intrusion Detection System Report Intrusion Detection System Infrastructure 8

Desirable characteristics Run continually n Fault tolerant n Resist subversion n Minimal overhead n Desirable characteristics Run continually n Fault tolerant n Resist subversion n Minimal overhead n Configurable n Adaptable n Scalable n Provide graceful degradation of service n Allow dynamic reconfiguration n 9

What does an IDS do? IDS inspects all inbound and outbound network activity and What does an IDS do? IDS inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack n In a passive system, the IDS detects a potential security breach, logs the information and signals an alert n In a reactive system, the IDS logs off a user or reprograms the firewall to block network traffic from the suspected malicious source n 10

First major type of IDS n Host based IDS n loaded n make n First major type of IDS n Host based IDS n loaded n make n on each protected asset use of system resources disk space, RAM, CPU time n detect host-related activity n analyze operating system, application, and system audit trails n can be self-contained or remotely managed n some attacks cannot be detected at a single location 11

Host based IDS 12 Host based IDS 12

Second major type of IDS n Network based IDS n monitor n usually activity Second major type of IDS n Network based IDS n monitor n usually activity on a specific network segment dedicated platforms with two components: n Sensor – passively analyzes network traffic n Management system n displays alarm information n configure the sensors n perform n high rules-based or expert system analysis network load scalability problems n problems with encrypted communication 13

Network based IDS 14 Network based IDS 14

Audit Data Example n From Operating System n n Shell command records From Network Audit Data Example n From Operating System n n Shell command records From Network n Network connection records 15

What are False Positives? n n Occur when the system classifies an action as What are False Positives? n n Occur when the system classifies an action as a possible intrusion when it is a legitimate action Any alert that was triggered incorrectly n alerts about telnet connections that are legitimate Common Causes n Abnormal traffic patterns n Too much traffic (High Bandwidth Connections) n Incorrectly configured software Results n Tend to clutter up the displays n Attacker may use this to cause Do. S attacks using auto responses 16

Analysis Techniques n Misuse Detection predetermined knowledge base n high levels of detection accuracy Analysis Techniques n Misuse Detection predetermined knowledge base n high levels of detection accuracy n minimal number of false positives n n Problems relies heavily on the thorough and correct construction of this knowledge base n variations of known attacks n intrusions not in knowledge base n traditionally requires human domain experts n 17

Analysis Techniques n Anomaly Detection events unlike normal system behavior n variety of techniques Analysis Techniques n Anomaly Detection events unlike normal system behavior n variety of techniques including n n statistical modeling n neural networks n hidden Markov models baseline model that represents normal system behavior against which anomalous events can be distinguished n threshold of the range of normal behavior n 18

Anomaly Detection n Advantages ability to identify new and previously unseen attacks n automated, Anomaly Detection n Advantages ability to identify new and previously unseen attacks n automated, do not require expert knowledge of computer attacks n n Problems attacks that resemble normal behavior n higher numbers of false positives n n all anomalous events assumed to be intrusive n false positive if implementation errors 19

Unrealistic Expectations n n n They are not silver bullets for security They can Unrealistic Expectations n n n They are not silver bullets for security They can not compensate for weak identification and authentication mechanisms They can not conduct investigations of attacks without human intervention They can not compensate for weakness in network protocols, applications, systems, …. They can not analyze all of the traffic on a network They can not always deal with problems involving packet-level attacks 20

Problems of existing monolithic IDS n Central data collection and analysis n Single point Problems of existing monolithic IDS n Central data collection and analysis n Single point of failure n Network traffic n Computational workload n Ad Hoc Networks n Possibility of distributed, coordinated attacks n Lack of common vocabulary or standards 21

Wireless Ad Hoc Networks n n n Collection of mobile nodes No pre-existing communication Wireless Ad Hoc Networks n n n Collection of mobile nodes No pre-existing communication infrastructure Each node can act as router as well as host Dynamic participation of each node No centralized authority for authentication and monitoring 22

Vulnerabilities of ad hoc networks n n Wireless communication (open media) Cooperation among nodes Vulnerabilities of ad hoc networks n n Wireless communication (open media) Cooperation among nodes is necessary (lack of centralized author. ) Don’t rely on existing infrastructure Have many operational limitations: n n n Transmission Range and Bandwidth Energy, CPU, and Memory Autonomous units capable of roaming independently n n easily captured and compromised without physical protection very expensive and not scalable if physically protected 23

Vulnerabilities of ad hoc networks n n Usually used in situations where rapid deployment Vulnerabilities of ad hoc networks n n Usually used in situations where rapid deployment is necessary Usually deployed in hostile (not physically protected) places Dynamic topology change (due to mobility) Lack of key concentration points (e. g. switches and routers) n n No firewalls or gateways Difficult to distribute and update signatures (detection database) 24

ID Techniques n Mobile Agents n Haystack Algorithm n Indra n Detection at network ID Techniques n Mobile Agents n Haystack Algorithm n Indra n Detection at network layer n Multi-layer detection 25

What are Mobile Agents? n n n executing programs that can migrate from machine What are Mobile Agents? n n n executing programs that can migrate from machine to machine in a heterogeneous network under their own control correlate all suspicious events occurred in different monitored hosts may have these characteristics: n n n autonomous goal-driven reactive social adaptive mobile 26

Mobile Agent Characteristics n n n n can be programmed to satisfy one or Mobile Agent Characteristics n n n n can be programmed to satisfy one or more goals move independently from one device to another on a network generally serializable and persistent provide more accurate alarms dynamically increase/reduce the suspicion level of certain host or login user evade attackers can resurrect themselves if attacked 27

Components n Two Components Agent n Agent Platform n n The mobile agent contains Components n Two Components Agent n Agent Platform n n The mobile agent contains code and state information needed for carrying out computation tasks on an agent platform 28

Advantages of Mobile Agents n Reducing Network Load - move logic, not data n Advantages of Mobile Agents n Reducing Network Load - move logic, not data n Overcoming Network Latency - agents operate directly on the host n Autonomous Execution - still function when portions of the IDS get destroyed or separated Platform Independence - inserts an OS independent layer between the hosts and the IDS using agents Dynamic Adaption - reconfigure at run-time n n n Upgradability - signature database and the detection algorithms are up-to-date n Scalability – reduce computational and network load 29

Problems of Mobile Agents n Security - several security implications that must be considered: Problems of Mobile Agents n Security - several security implications that must be considered: n the host (and the agent platform) must be protected against malicious code n certificates, n agents can be modified/eavesdropped when they move over the network n encrypting n digital signatures agents mobile agents can be attacked by a malicious agent platform itself n difficult to fight when agents need unrestricted movement around the network 30

Problems of Mobile Agents n Code Size n n n Complex piece of software Problems of Mobile Agents n Code Size n n n Complex piece of software Agents might get large Transferring agent’s code over the network takes time Only needed once, when hosts store agent code locally Performance n n n Often written in scripting or interpreted languages to be easily ported between different platforms. This mode of execution is very slow compared to native code. As an IDS has to process a large amount of data under very demanding timing constraints (near real-time), the use of MAs could degrade its performance. 31

IDSs using agents n Autonomous Agents For Intrusion Detection (AAFID) at Purdue n Local IDSs using agents n Autonomous Agents For Intrusion Detection (AAFID) at Purdue n Local Intrusion Detection System (LIDS) n Mobile Agent Intrusion Detection Systems (MAIDS) n Intrusion Detection Agent System (IDA) at IPA, Japan 32

MA Systems - AAFID: Autonomous Agents for Intrusion Detection 33 MA Systems - AAFID: Autonomous Agents for Intrusion Detection 33

The problem Monolithic IDS Host n Limited scalability n Single point of Host failure The problem Monolithic IDS Host n Limited scalability n Single point of Host failure n Difficult Host configurability n Prone to insertion and evasion attacks n Host IDS Host 34

AAFID architecture Distributed data collection and analysis n Autonomous agents n n n Independent AAFID architecture Distributed data collection and analysis n Autonomous agents n n n Independent entities Hierarchical structure 35

System Architecture D C B Agents Monitors Transceivers Filters Control Data E A UI System Architecture D C B Agents Monitors Transceivers Filters Control Data E A UI 36

Communications organization C UI A B D E 37 Communications organization C UI A B D E 37

What is an Agent? n Independently-running entity n Usually a separate process or thread What is an Agent? n Independently-running entity n Usually a separate process or thread Can keep state n May perform arbitrary actions n n n Can be very simple or very complex May exchange data with other entities 38

What is a Transceiver? Communications backbone for a host n Handles all the agents What is a Transceiver? Communications backbone for a host n Handles all the agents in a host n May do processing on data received from agents n Interacts with a monitor n 39

What is a Monitor? Highest level entity n Main control and data processing entity What is a Monitor? Highest level entity n Main control and data processing entity n Handles one or more transceivers n Can control other monitors n Can be connected hierarchically to other monitors n May interact with a user interface n 40

What is a Filter? n Platform and OS specific entity n Extract necessary data What is a Filter? n Platform and OS specific entity n Extract necessary data providing hardware and OS abstraction layer n Subscription-based mechanism n Allows for increased portability of agents 41

AAFID 2 prototype Road-test the architecture n Focus on usability and flexibility n Run-time AAFID 2 prototype Road-test the architecture n Focus on usability and flexibility n Run-time distribution of code n Little focus on performance n Provides infrastructure for development n Uses pipes and TCP for communication n Implemented in Perl 5 n n Easy portability, easy to install and run it 42

Development support APIs for development of Agents and Filters n Code generation tool for Development support APIs for development of Agents and Filters n Code generation tool for agents already exists n The APIs implement generic behavior, so implementers only need to add specific functionality. n 43

Graphical User Interface Very simple support for starting and controlling entities n Implemented in Graphical User Interface Very simple support for starting and controlling entities n Implemented in Perl/Tk n n Current status: Prototype distributed to the public n ftp: //coast. cs. purdue. edu/pub/coast/AAFID/ n http: //www. cs. purdue. edu/coast/projects/auto nomous-agents. html 44

Performance impact n Measurements on 22 machines in the COAST lab over 14 hours. Performance impact n Measurements on 22 machines in the COAST lab over 14 hours. n n Sparc LX, Sparc 5, Sparc 10, Ultra 1, Ultra 2 On average: 45

Detection ARP cache poisoning n Writable user and configuration files n Suspicious sequences of Detection ARP cache poisoning n Writable user and configuration files n Suspicious sequences of commands n Accesses to network services n Health of system services n Repeated login failures n Configuration problems in ftp and www servers n 46

Benefits of AAFID Graceful degradation of service n Scalability n Easier to modify configuration Benefits of AAFID Graceful degradation of service n Scalability n Easier to modify configuration n Information can be collected at the end host n Can combine host-based and networkbased approaches to intrusion detection n 47

Drawbacks of AAFID n Monitors may still be single points of failure n n Drawbacks of AAFID n Monitors may still be single points of failure n n n Ensure consistent information among redundant monitors Detection of intrusions at monitor level delayed until all information reaches the monitor Difficult to keep global state Data reduction is not implemented correctly n n Solution: Hierarchical structure, redundancy Still creates a lot of network traffic More difficult to do failure tolerance 48

MA Systems - LIDS: Local Intrusion Detection System 49 MA Systems - LIDS: Local Intrusion Detection System 49

ID in ad hoc wireless network Mobile Agents LIDS Mobile Agents LIDS 50 ID in ad hoc wireless network Mobile Agents LIDS Mobile Agents LIDS 50

Features of LIDS Reliable n Flexible n Behavior based n Blackboard-based architecture n Controlled Features of LIDS Reliable n Flexible n Behavior based n Blackboard-based architecture n Controlled by autonomous agents n Learning and adapting capability n Low maintenance cost n Uses building blocks of computational intelligence as intrusion analyzer n Low rate of false positives n 51

ID Systems Other intrusion detection techniques 52 ID Systems Other intrusion detection techniques 52

Haystack Algorithm Host-based system n A statistical anomaly detection algorithm n Requires a designated Haystack Algorithm Host-based system n A statistical anomaly detection algorithm n Requires a designated node to act as a central administrator n Uses audit trail generated from host n Analyzes users’ session vectors n Weight-scoring with threshold vectors n Able to detect several types of intrusions n 53

Indra - Intrusion Detection and Rapid Action A Peer-to-peer Approach n Makes use of Indra - Intrusion Detection and Rapid Action A Peer-to-peer Approach n Makes use of cross-monitoring or “neighborhood watch” n Information on attempted attacks gathered by intended victims n Victim notify adjacent hosts on attack or peer nodes detect attack and sound alarm n Uses daemons n Web-of-trust model for certification of nodes n 54

Detection at network layer n Watchdog Verify that next node in path forwards packet Detection at network layer n Watchdog Verify that next node in path forwards packet n Listening in promiscuous mode n n Control Messages n n Adding two control messages to DSR protocol Neighborhood Watch Observing route protocol behavior n Listening to transmission of next node n Alarm messages n 55

Multi-layer IDS (m. IDS) Detection on one layer can be initiated or aided by Multi-layer IDS (m. IDS) Detection on one layer can be initiated or aided by evidence from other layers. n Aggregation of evidence allows a more informed decision n Improved performance – higher true positive and lower false positive rates n 56

Conclusion n Ø Ø Ø Ø Ø Mobile Agent Benefits Run continually Fault tolerant Conclusion n Ø Ø Ø Ø Ø Mobile Agent Benefits Run continually Fault tolerant Resist subversion Minimal overhead Configurable Adaptable Scalable Provide graceful degradation of service Allow dynamic reconfiguration 57

Questions & Answers Mobile Agents For Intrusion Detection 58 Questions & Answers Mobile Agents For Intrusion Detection 58