Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Post on 16-Sep-2020

17 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

Transcript

Intruders Intrusion Detection References

Intrusion Detection

Daniel Bosk

Department of Information and Communication Systems,Mid Sweden University, Sundsvall.

intrusion.tex 2093 2014-11-26 12:20:57Z danbos

1

Intruders Intrusion Detection References

Overview

1 IntrudersIntrudersBehaviour PatternsIntrusion Techniques

2 Intrusion DetectionIntrusion DetectionAudit RecordsStatistical Anomaly DetectionRule-Based Intrusion DetectionDistributed Intrusion DetectionHoneypots

2

Intruders Intrusion Detection References

Overview

1 IntrudersIntrudersBehaviour PatternsIntrusion Techniques

2 Intrusion DetectionIntrusion DetectionAudit RecordsStatistical Anomaly DetectionRule-Based Intrusion DetectionDistributed Intrusion DetectionHoneypots

3

Intruders Intrusion Detection References

Intruders

Masquerader A user who is not authorized to use the system whopenetrates the access control of the system to exploitthe user account of a legitimate user. Typicallyoutsider.

Misfeasor A legitimate user who accesses resources for whichsuch access is not authorized, or who misuses his orher privileges. Typically insider.

Clandestine user An individual who seizes supervisory control of thesystem and uses this control to evade auditing or tosupress audit collection. Can be either insider oroutsider.

4

Intruders Intrusion Detection References

Behaviour Patterns

The behaviour will typically be different from that of ordinaryusers.The “hacker” will look for targets of opportunities. Exploratoryin nature.This is the designated target for IDSs.

5

Intruders Intrusion Detection References

Behaviour Patterns

The criminal organisations will target specific systems ofinterest.They will try to obscure the usage patterns.These usually make a quick hit, once in they gather as muchinformation as possible and then leave. Think APT.A little harder for IDSs to detect due to quick nature.

6

Intruders Intrusion Detection References

Behaviour Patterns

The insider will just take information available to him or her.This means no access control is usually breached.Counter by principle of least privilege, logs, strongauthentication, terminate employees’ accounts.This is usually very hard for an IDS to detect.

7

Intruders Intrusion Detection References

Intrusion Techniques

1 Try default passwords with standard accounts.2 Exhaustively try all short passwords.3 Try a dictionary attack.4 Collect information about the system users; e.g. full names,

names of spouses and children, pictures in their offices.5 Try users’ phone numbers, personal ID number, room numbers.6 Try license plate numbers.7 Use a Trojan horse to bypass restrictions on access.8 Tap the connection between a remote user and the host

system.

8

Intruders Intrusion Detection References

Overview

1 IntrudersIntrudersBehaviour PatternsIntrusion Techniques

2 Intrusion DetectionIntrusion DetectionAudit RecordsStatistical Anomaly DetectionRule-Based Intrusion DetectionDistributed Intrusion DetectionHoneypots

9

Intruders Intrusion Detection References

Intrusion Detection

Intrusion detection is a difficult task.Based on the assumption that behaviour of intruder andlegitimate user can be quantified, and hence differences found.Problem is these behaviours might sometimes overlap.

10

Intruders Intrusion Detection References

Intrusion Detection

Figure 11.1 Profiles of Behavior of Intruders and Authorized Users

overlap in observedor expected behavior

profile ofintruder behavior

profile ofauthorized user

behavior

Measurable behaviorparameter

average behaviorof intruder

average behaviorof authorized user

Probabilitydensity function

Figure: User behavioural profiles. Image: [Sta13].

11

Intruders Intrusion Detection References

Intrusion Detection

False positives: authorised users detected as intruders.False negatives: intruders detected as legitimate users.We can reasonably well distinguish masqueraders through pasthistory.Misfeasors can be detected by defining what’s unauthoriseduse.Clandestine user is very difficult to detect automatically.

12

Intruders Intrusion Detection References

Audit Records

Native audit records: log all (relevant) user activity usingsystem logs.Detection-specific audit records: filters out events interestingfor the IDS.Example: copying a file.

13

Intruders Intrusion Detection References

Statistical Anomaly Detection

Threshold detection: defining thresholds independent of users.Profile based: use a profile for each user to detect changes inbehaviour.

14

Intruders Intrusion Detection References

Rule-Based Intrusion Detection

Rule-based detection: defines rules for attack patterns, alsocalled signature detection.

15

Intruders Intrusion Detection References

Distributed Intrusion Detection

Central Manager

LAN Monitor Host Host

Agentmodule

Router

WAN

Figure 11.2 Architecture for Distributed Intrusion Detection

Managermodule

Figure: Distributed Intrusion Detection System. Image: [Sta13].

16

Intruders Intrusion Detection References

Honeypots

Internet

Externalfirewall

Honeypot

Honeypot

Honeypot

LAN switchor router

LAN switchor router

Figure 11.4 Example of Honeypot Deployment

Internalnetwork

Service network(Web, Mail, DNS, etc.)

2

1

3

Figure: An illustration of honeypots. Image: [Sta13].

17

Intruders Intrusion Detection References

Referenser I

William Stallings. Network security essentials :applications and standards. 5th ed. International Edition.Pearson Education, 2013. ISBN: 978-0-273-79336-6.

18

top related