SlideShare a Scribd company logo
 
Definition  Intrusion Detection Intrusion detection is a technique of detecting unauthorized access to a computer system or a computer network.  An intrusion into a system is an attempt by an outsider to the system to illegally gain access to the system.  Intrusion prevention, on the other hand, is the art of  preventing an unauthorized access of a system’s resources.  The two processes are related in a sense that while intrusion detection passively detects system intrusions,  intrusion prevention actively filters network traffic to prevent intrusion attempts.
Intrusion An  intrusion  is  a deliberate unauthorized attempt, successful or not, to break into, access, manipulate, or misuse some valuable property and where the misuse may result into or render the property unreliable or unusable.  The person who intrudes is an  intruder .
There are six types of intrusions: Attempted break-ins, which are detected by atypical  behavior profiles or violations of security constraints. An intrusion detection system for this type is called  anomaly-based IDS. Masquerade attacks, which are detected by atypical  behavior profiles or violations of security constraints. These intrusions are also detected using anomaly-based IDS. Penetrations of the security control system, which are  detected by monitoring for specific patterns of activity.  Leakage, which is detected by atypical use of system  resources. Denial of service, which is detected by atypical use of  system resources. Malicious use, which is detected by atypical behavior  profiles, violations of security constraints, or use of special privileges.
Intrusion Detection Systems (IDSs)  An  intrusion detection system (IDS)  is a system used to detect unauthorized intrusions into computer systems and networks.  Intrusion  detection  as a technology is not  new, it has been used for generations to defend valuable resources. These are three models of  intrusion detection mechanisms:  anomaly-based  detection,  signature-based  detection, and  hybrid   detection.
Anomaly-based detection Anomaly-based detection  is the process of comparing definitions of what activity is considered normal against observed events to identify significant deviations. An IDPS using anomaly-based detection has  profiles  that represent the normal behavior of such things as users, hosts, network connections, or applications. The profiles are developed by monitoring the characteristics of typical activity over a period of time. For example, a profile for a network might show that Web activity comprises an average of 13% of network bandwidth at the Internet border during typical workday hours. The IDPS then uses statistical methods to compare the characteristics of current activity to thresholds related to the profile, such as detecting when Web activity comprises significantly more bandwidth than expected and alerting an administrator of the anomaly. Profiles can be developed for many behavioral attributes, such as the number of e-mails sent by a user, the number of failed login attempts for a host, and the level of processor usage for a host in a given period of time.  The major benefit of anomaly-based detection methods is that they can be very effective at detecting previously unknown threats. For example, suppose that a computer becomes infected with a new type of malware. The malware could consume the computer’s processing resources, send large numbers of emails, initiate large numbers of network connections, and perform other behavior that would be significantly different from the established profiles for the computer.  An initial profile is generated over a period of time (typically days, sometimes weeks) sometimes called a  training period . Profiles for anomaly-based detection can either be static or dynamic. Once generated, a static profile is unchanged unless the IDPS is specifically directed to generate a new profile. A dynamic profile is adjusted constantly as additional events are observed. Because systems and networks change over time, the corresponding measures of normal behavior also change; a static profile will eventually become inaccurate, so it needs to be regenerated periodically. Dynamic profiles do not have this problem, but they are susceptible to evasion attempts from attackers. For example, an attacker can perform small amounts of malicious activity occasionally, then slowly increase the frequency and quantity of activity. If the rate of change is sufficiently slow, the IDPS might think the malicious activity is normal behavior and include it in its profile. Malicious activity might also be observed by an IDPS while it builds its initial profiles.
Signature-Based Detection  A  signature  is a pattern that corresponds to a known threat.  Signature-based detection  is the process of comparing signatures against observed events to identify possible incidents. Examples of signatures are as follows:  A telnet attempt with a username of “root”, which is a violation of an organization’s security policy  An e-mail with a subject of “Free pictures!” and an attachment filename of “freepics.exe”, which are characteristics of a known form of malware  An operating system log entry with a status code value of 645, which indicates that the host’s auditing has been disabled.  Signature-based detection is very effective at detecting known threats but largely ineffective at detecting previously unknown threats, threats disguised by the use of evasion techniques, and many variants of known threats. For example, if an attacker modified the malware in the previous example to use a filename of “freepics2.exe”, a signature looking for “freepics.exe” would not match it.  Signature-based detection is the simplest detection method because it just compares the current unit of activity, such as a packet or a log entry, to a list of signatures using string comparison operations. Signature-based detection technologies have little understanding of many network or application protocols and cannot track and understand the state of complex communications. For example, they cannot pair a request with the corresponding response, such as knowing that a request to a Web server for a particular page generated a response status code of 403, meaning that the server refused to fill the request. They also lack the ability to remember previous requests when processing the current request. This limitation prevents signature-based detection methods from detecting attacks that comprise multiple events if none of the events contains a clear indication of an attack. Hybrid Detection - Because of the difficulties with both the anomaly-based  and signature-based detections, a hybrid model is being developed. Much research is now focusing on  this hybrid model.
Types of Intrusion Detection Systems   Intrusion detection systems are classified based on their monitoring scope. There are: network-based intrusion detection and host-based detections.  Network-Based Intrusion Detection  Systems (NIDSs) NIDSs have the whole network as the monitoring scope. They  monitor the traffic on the network to detect  intrusions.  They are responsible for detecting anomalous, inappropriate, or other data that may be considered unauthorized  and harmful occurring on a network. There are striking differences between NIDS and firewalls.
Host-Based Intrusion Detection Systems (HIDS)  Host-based intrusion detection is the technique of detecting malicious activities on a single computer.  A host-based intrusion detection system, is therefore, deployed on a single target computer and it  uses software that monitors operating system specific logs  including system, event, and security  logs on Windows  systems and syslog in Unix environments to monitor sudden changes in these logs.  When a change is detected in any of these files, the HIDS compares the new log entry with its configured attack signatures to see if there is a match. If a match is detected then this signals the presence of an illegitimate activity.
The Hybrid Intrusion Detection System Both NIDS and HIDS are each patrolling its own area of the network for unwanted and illegal network traffic. They, however, complement each other. Both bring to the security of the network their own strengths and weaknesses that nicely complement and augment the security of the network.  Hybrids are new and need a great deal of  support to gain on their two cousins. However, their success will depend to a great extent on  how well the interface receives and distributes the incidents and  integrates the reporting structure  between the different types of sensors  in the  HIDS and NIDS  spheres. Also the interface should be able to smartly and intelligently gather and report  data from the network or systems being monitored.
The Changing Nature of IDS Tools Recent  studies  have shown that the majority of system intrusion actually come from insiders. So newer IDS tools are focusing on this issue and are being built to counter  systems intrusion, new  attack patterns  are being developed to take this human behavior unpredictability into account.  To keep abreast of all these changes, ID systems are changing constantly.  The primary focus of ID systems has been on a network as a unit where they collect  network packet data by watching network packet traffic and then analyzing  it based on network protocol patterns “norms,” “normal” network traffic signatures, and network traffic anomalies built in the rule base. But since  networks are getting larger,  traffic heavier, and local networks more splintered, it is becoming more and more difficult for the ID system to “see” all traffic on  a switched network such as an Ethernet. This is leading to new designs of IDS.
Other Types of  Intrusion Detection Systems Although NIDS and HIDS and their hybrids are the most widely used tools in network intrusion detection, there are others that are less used but more targeting and, therefore, more specialized.  Because many of these tools are so specialized, many are still not considered as  being  intrusion detection systems but rather  intrusion detection add-ons or tools.
System Integrity Verifiers (SIVs) SIVs monitor critical files in a system, such as system files, to find whether an intruder has changed  them. They can also  detect  other system components’ data; for example, they detect when a normal  user somehow acquires root/administrator level privileges.  In addition, they also  monitor system registries in order to find well known signatures.  Log File Monitors (LFM)  LFMs first create a record of log files generated by network services. Then they monitor this record, just like  NIDS, looking  for  system trends,  tendencies, and patterns in the log files that would suggest an intruder is attacking.
Response to System Intrusion A good intrusion detection system  alert should produce a corresponding response. A good response must consist of  pre-planned defensive measures that include an incident response team and ways to collect IDS logs for future use and for evidence when needed.
Incident Response Team An  incident response team  (IRT)  is a primary and  centralized group of  dedicated people charged with  the responsibility of being the first  contact team whenever  an incidence occurs. An IRT must have the following responsibilities: keeping up-to-date with the latest threats  and incidents, being the  main point of contact for  incident reporting, notifying others whenever an incident occurs, assessing the damage and impact of every  incident, finding out how to avoid exploitation of the same  vulnerability, and recovering from the incident.
IDS Logs as Evidence  IDS logs can be kept as a way to protect the organization in case of legal proceedings. If  sensors to monitor the internal network are to be deployed, verify that there is a published policy explicitly stating that use of the network is consent to monitoring.
Challenges to Intrusion Detection Systems   Deploying IDS in Switched Environments Network-based IDS sensors must be deployed in areas where they can “see” network traffic packets. However, in switched networks this is not possible because by their very nature, sensors in switched networks are shielded from most of the network traffic. Sensors are allowed to “see” traffic only from specified components of the network.  One way to handle this situation has traditionally been to attach a network sensor to a mirror port on the switch. But port mirroring, in addition to putting an overhead on the port, gets unworkable when there is an increase in traffic on that port because overloading one port with traffic from other ports may cause the port to bulk and miss some traffic.
Other issues still limiting IDS technology are: False alarms. Though the tools have come a long  way, and are slowly  gaining acceptance as they gain  widespread  use, they still produce a significant number of both false positives and negatives,  The technology is not yet ready to handle a large-scale attack. Because of its very nature it has to literally scan every packet, every contact point,  and every traffic  pattern in the network. For larger networks and in a large-scale attack, it  is not possible that the technology can be relied on to keep working  with acceptable quality and grace.  Unless there is a  breakthrough today,  the technology in its current  state cannot handle very fast and large quantities of traffic  efficiently.
Implementing an Intrusion Detection System An effective IDS does not stand alone. It must be supported by a number of other systems. Among the things to consider, in addition to the IDS,  in setting up a good IDS for the company network are: Operating Systems.  A good operating system that has logging and auditing features. Most of the modern operating systems including Windows, Unix, and other variants of Unix have these features. These features can be used to  monitor security critical resources.  Services . All applications on  servers such as Web servers, e-mail servers, and databases should include logging/auditing features as well.  Firewalls . A good firewall should have some network intrusion detection capabilities.  Network management platform . Whenever network  management services such as OpenView are used, make sure that they do have tools to help in setting up alerts on suspicious activity.
Intrusion Prevention Systems (IPSs)   Although IDS have been one of the cornerstones of  network security, they have covered only one component of the total network security picture since they have been and they are a passive component which only detects and reports without preventing.  A promising new model of  intrusion  is developing and picking up momentum. It is the  intrusion prevention system  (IPS)  which, is to prevent  attacks.  Like their  counterparts the IDS, IPS fall into two categories: network-based and host-based.
Network-Based  Intrusion Prevention Systems (NIPSs) Because NIDSs are passively detecting intrusions into the network without preventing them from entering the networks, many organizations in recent times have been bundling up  IDS and firewalls to create a model that can detect and then prevent.  The bundle works as follows.  The IDS fronts the network with a firewall behind it. On the detection of  an attack, the IDS then goes into the prevention mode by altering the firewall access control rules on the firewall. The action may result in the attack being blocked based on all the access control regimes administered by the firewall.  The IDS can also affect prevention through the TCP resets; TCP utilizes the RST (reset) bit in the TCP header for resetting a TCP connection, usually sent as a response request to a non-existent connection. But this kind of bundling is both expensive and complex, especially to an  untrained security team.  It suffers from  latency  – the time it takes for the IDS to either modify the firewall rules or issue a TCP reset command. This period of time is critical in the  success of an attack.
Host-Based  Intrusion Prevention Systems (HIPSs)  Most HIPSs work by  sand-boxing , a  process of restricting the definition of  acceptable behavior rules used on HIPSs. HIPS prevention occurs at the agent residing at the host. The agent intercept system calls or system messages by utilizing dynamic linked libraries (dll) substitution.  The substitution is accomplished by injecting existing system dlls with vendor stub dlls that perform the interception.

More Related Content

Idps

  • 1.  
  • 2. Definition Intrusion Detection Intrusion detection is a technique of detecting unauthorized access to a computer system or a computer network. An intrusion into a system is an attempt by an outsider to the system to illegally gain access to the system. Intrusion prevention, on the other hand, is the art of preventing an unauthorized access of a system’s resources. The two processes are related in a sense that while intrusion detection passively detects system intrusions, intrusion prevention actively filters network traffic to prevent intrusion attempts.
  • 3. Intrusion An intrusion is a deliberate unauthorized attempt, successful or not, to break into, access, manipulate, or misuse some valuable property and where the misuse may result into or render the property unreliable or unusable. The person who intrudes is an intruder .
  • 4. There are six types of intrusions: Attempted break-ins, which are detected by atypical behavior profiles or violations of security constraints. An intrusion detection system for this type is called anomaly-based IDS. Masquerade attacks, which are detected by atypical behavior profiles or violations of security constraints. These intrusions are also detected using anomaly-based IDS. Penetrations of the security control system, which are detected by monitoring for specific patterns of activity. Leakage, which is detected by atypical use of system resources. Denial of service, which is detected by atypical use of system resources. Malicious use, which is detected by atypical behavior profiles, violations of security constraints, or use of special privileges.
  • 5. Intrusion Detection Systems (IDSs) An intrusion detection system (IDS) is a system used to detect unauthorized intrusions into computer systems and networks. Intrusion detection as a technology is not new, it has been used for generations to defend valuable resources. These are three models of intrusion detection mechanisms: anomaly-based detection, signature-based detection, and hybrid detection.
  • 6. Anomaly-based detection Anomaly-based detection is the process of comparing definitions of what activity is considered normal against observed events to identify significant deviations. An IDPS using anomaly-based detection has profiles that represent the normal behavior of such things as users, hosts, network connections, or applications. The profiles are developed by monitoring the characteristics of typical activity over a period of time. For example, a profile for a network might show that Web activity comprises an average of 13% of network bandwidth at the Internet border during typical workday hours. The IDPS then uses statistical methods to compare the characteristics of current activity to thresholds related to the profile, such as detecting when Web activity comprises significantly more bandwidth than expected and alerting an administrator of the anomaly. Profiles can be developed for many behavioral attributes, such as the number of e-mails sent by a user, the number of failed login attempts for a host, and the level of processor usage for a host in a given period of time. The major benefit of anomaly-based detection methods is that they can be very effective at detecting previously unknown threats. For example, suppose that a computer becomes infected with a new type of malware. The malware could consume the computer’s processing resources, send large numbers of emails, initiate large numbers of network connections, and perform other behavior that would be significantly different from the established profiles for the computer. An initial profile is generated over a period of time (typically days, sometimes weeks) sometimes called a training period . Profiles for anomaly-based detection can either be static or dynamic. Once generated, a static profile is unchanged unless the IDPS is specifically directed to generate a new profile. A dynamic profile is adjusted constantly as additional events are observed. Because systems and networks change over time, the corresponding measures of normal behavior also change; a static profile will eventually become inaccurate, so it needs to be regenerated periodically. Dynamic profiles do not have this problem, but they are susceptible to evasion attempts from attackers. For example, an attacker can perform small amounts of malicious activity occasionally, then slowly increase the frequency and quantity of activity. If the rate of change is sufficiently slow, the IDPS might think the malicious activity is normal behavior and include it in its profile. Malicious activity might also be observed by an IDPS while it builds its initial profiles.
  • 7. Signature-Based Detection A signature is a pattern that corresponds to a known threat. Signature-based detection is the process of comparing signatures against observed events to identify possible incidents. Examples of signatures are as follows: A telnet attempt with a username of “root”, which is a violation of an organization’s security policy An e-mail with a subject of “Free pictures!” and an attachment filename of “freepics.exe”, which are characteristics of a known form of malware An operating system log entry with a status code value of 645, which indicates that the host’s auditing has been disabled. Signature-based detection is very effective at detecting known threats but largely ineffective at detecting previously unknown threats, threats disguised by the use of evasion techniques, and many variants of known threats. For example, if an attacker modified the malware in the previous example to use a filename of “freepics2.exe”, a signature looking for “freepics.exe” would not match it. Signature-based detection is the simplest detection method because it just compares the current unit of activity, such as a packet or a log entry, to a list of signatures using string comparison operations. Signature-based detection technologies have little understanding of many network or application protocols and cannot track and understand the state of complex communications. For example, they cannot pair a request with the corresponding response, such as knowing that a request to a Web server for a particular page generated a response status code of 403, meaning that the server refused to fill the request. They also lack the ability to remember previous requests when processing the current request. This limitation prevents signature-based detection methods from detecting attacks that comprise multiple events if none of the events contains a clear indication of an attack. Hybrid Detection - Because of the difficulties with both the anomaly-based and signature-based detections, a hybrid model is being developed. Much research is now focusing on this hybrid model.
  • 8. Types of Intrusion Detection Systems Intrusion detection systems are classified based on their monitoring scope. There are: network-based intrusion detection and host-based detections.  Network-Based Intrusion Detection Systems (NIDSs) NIDSs have the whole network as the monitoring scope. They monitor the traffic on the network to detect intrusions.  They are responsible for detecting anomalous, inappropriate, or other data that may be considered unauthorized and harmful occurring on a network. There are striking differences between NIDS and firewalls.
  • 9. Host-Based Intrusion Detection Systems (HIDS) Host-based intrusion detection is the technique of detecting malicious activities on a single computer. A host-based intrusion detection system, is therefore, deployed on a single target computer and it uses software that monitors operating system specific logs including system, event, and security logs on Windows systems and syslog in Unix environments to monitor sudden changes in these logs. When a change is detected in any of these files, the HIDS compares the new log entry with its configured attack signatures to see if there is a match. If a match is detected then this signals the presence of an illegitimate activity.
  • 10. The Hybrid Intrusion Detection System Both NIDS and HIDS are each patrolling its own area of the network for unwanted and illegal network traffic. They, however, complement each other. Both bring to the security of the network their own strengths and weaknesses that nicely complement and augment the security of the network. Hybrids are new and need a great deal of support to gain on their two cousins. However, their success will depend to a great extent on how well the interface receives and distributes the incidents and integrates the reporting structure between the different types of sensors in the HIDS and NIDS spheres. Also the interface should be able to smartly and intelligently gather and report data from the network or systems being monitored.
  • 11. The Changing Nature of IDS Tools Recent studies have shown that the majority of system intrusion actually come from insiders. So newer IDS tools are focusing on this issue and are being built to counter systems intrusion, new attack patterns are being developed to take this human behavior unpredictability into account. To keep abreast of all these changes, ID systems are changing constantly. The primary focus of ID systems has been on a network as a unit where they collect network packet data by watching network packet traffic and then analyzing it based on network protocol patterns “norms,” “normal” network traffic signatures, and network traffic anomalies built in the rule base. But since networks are getting larger, traffic heavier, and local networks more splintered, it is becoming more and more difficult for the ID system to “see” all traffic on a switched network such as an Ethernet. This is leading to new designs of IDS.
  • 12. Other Types of Intrusion Detection Systems Although NIDS and HIDS and their hybrids are the most widely used tools in network intrusion detection, there are others that are less used but more targeting and, therefore, more specialized. Because many of these tools are so specialized, many are still not considered as being intrusion detection systems but rather intrusion detection add-ons or tools.
  • 13. System Integrity Verifiers (SIVs) SIVs monitor critical files in a system, such as system files, to find whether an intruder has changed them. They can also detect other system components’ data; for example, they detect when a normal user somehow acquires root/administrator level privileges. In addition, they also monitor system registries in order to find well known signatures. Log File Monitors (LFM) LFMs first create a record of log files generated by network services. Then they monitor this record, just like NIDS, looking for system trends, tendencies, and patterns in the log files that would suggest an intruder is attacking.
  • 14. Response to System Intrusion A good intrusion detection system alert should produce a corresponding response. A good response must consist of pre-planned defensive measures that include an incident response team and ways to collect IDS logs for future use and for evidence when needed.
  • 15. Incident Response Team An incident response team (IRT) is a primary and centralized group of dedicated people charged with the responsibility of being the first contact team whenever an incidence occurs. An IRT must have the following responsibilities: keeping up-to-date with the latest threats and incidents, being the main point of contact for incident reporting, notifying others whenever an incident occurs, assessing the damage and impact of every incident, finding out how to avoid exploitation of the same vulnerability, and recovering from the incident.
  • 16. IDS Logs as Evidence IDS logs can be kept as a way to protect the organization in case of legal proceedings. If sensors to monitor the internal network are to be deployed, verify that there is a published policy explicitly stating that use of the network is consent to monitoring.
  • 17. Challenges to Intrusion Detection Systems Deploying IDS in Switched Environments Network-based IDS sensors must be deployed in areas where they can “see” network traffic packets. However, in switched networks this is not possible because by their very nature, sensors in switched networks are shielded from most of the network traffic. Sensors are allowed to “see” traffic only from specified components of the network. One way to handle this situation has traditionally been to attach a network sensor to a mirror port on the switch. But port mirroring, in addition to putting an overhead on the port, gets unworkable when there is an increase in traffic on that port because overloading one port with traffic from other ports may cause the port to bulk and miss some traffic.
  • 18. Other issues still limiting IDS technology are: False alarms. Though the tools have come a long way, and are slowly gaining acceptance as they gain widespread use, they still produce a significant number of both false positives and negatives, The technology is not yet ready to handle a large-scale attack. Because of its very nature it has to literally scan every packet, every contact point, and every traffic pattern in the network. For larger networks and in a large-scale attack, it is not possible that the technology can be relied on to keep working with acceptable quality and grace. Unless there is a breakthrough today, the technology in its current state cannot handle very fast and large quantities of traffic efficiently.
  • 19. Implementing an Intrusion Detection System An effective IDS does not stand alone. It must be supported by a number of other systems. Among the things to consider, in addition to the IDS, in setting up a good IDS for the company network are: Operating Systems. A good operating system that has logging and auditing features. Most of the modern operating systems including Windows, Unix, and other variants of Unix have these features. These features can be used to monitor security critical resources. Services . All applications on servers such as Web servers, e-mail servers, and databases should include logging/auditing features as well. Firewalls . A good firewall should have some network intrusion detection capabilities. Network management platform . Whenever network management services such as OpenView are used, make sure that they do have tools to help in setting up alerts on suspicious activity.
  • 20. Intrusion Prevention Systems (IPSs) Although IDS have been one of the cornerstones of network security, they have covered only one component of the total network security picture since they have been and they are a passive component which only detects and reports without preventing. A promising new model of intrusion is developing and picking up momentum. It is the intrusion prevention system (IPS) which, is to prevent attacks. Like their counterparts the IDS, IPS fall into two categories: network-based and host-based.
  • 21. Network-Based Intrusion Prevention Systems (NIPSs) Because NIDSs are passively detecting intrusions into the network without preventing them from entering the networks, many organizations in recent times have been bundling up IDS and firewalls to create a model that can detect and then prevent. The bundle works as follows. The IDS fronts the network with a firewall behind it. On the detection of an attack, the IDS then goes into the prevention mode by altering the firewall access control rules on the firewall. The action may result in the attack being blocked based on all the access control regimes administered by the firewall. The IDS can also affect prevention through the TCP resets; TCP utilizes the RST (reset) bit in the TCP header for resetting a TCP connection, usually sent as a response request to a non-existent connection. But this kind of bundling is both expensive and complex, especially to an untrained security team. It suffers from latency – the time it takes for the IDS to either modify the firewall rules or issue a TCP reset command. This period of time is critical in the success of an attack.
  • 22. Host-Based Intrusion Prevention Systems (HIPSs) Most HIPSs work by sand-boxing , a process of restricting the definition of acceptable behavior rules used on HIPSs. HIPS prevention occurs at the agent residing at the host. The agent intercept system calls or system messages by utilizing dynamic linked libraries (dll) substitution. The substitution is accomplished by injecting existing system dlls with vendor stub dlls that perform the interception.