Top Banner
Intruders Intrusion Detection References Intrusion Detection Daniel Bosk Department of Information and Communication Systems, Mid Sweden University, Sundsvall. intrusion.tex 2093 2014-11-26 12:20:57Z danbos 1
18

Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Sep 16, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Intruders Intrusion Detection References

Intrusion Detection

Daniel Bosk

Department of Information and Communication Systems,Mid Sweden University, Sundsvall.

intrusion.tex 2093 2014-11-26 12:20:57Z danbos

1

Page 2: Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Intruders Intrusion Detection References

Overview

1 IntrudersIntrudersBehaviour PatternsIntrusion Techniques

2 Intrusion DetectionIntrusion DetectionAudit RecordsStatistical Anomaly DetectionRule-Based Intrusion DetectionDistributed Intrusion DetectionHoneypots

2

Page 3: Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Intruders Intrusion Detection References

Overview

1 IntrudersIntrudersBehaviour PatternsIntrusion Techniques

2 Intrusion DetectionIntrusion DetectionAudit RecordsStatistical Anomaly DetectionRule-Based Intrusion DetectionDistributed Intrusion DetectionHoneypots

3

Page 4: Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Intruders Intrusion Detection References

Intruders

Masquerader A user who is not authorized to use the system whopenetrates the access control of the system to exploitthe user account of a legitimate user. Typicallyoutsider.

Misfeasor A legitimate user who accesses resources for whichsuch access is not authorized, or who misuses his orher privileges. Typically insider.

Clandestine user An individual who seizes supervisory control of thesystem and uses this control to evade auditing or tosupress audit collection. Can be either insider oroutsider.

4

Page 5: Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Intruders Intrusion Detection References

Behaviour Patterns

The behaviour will typically be different from that of ordinaryusers.The “hacker” will look for targets of opportunities. Exploratoryin nature.This is the designated target for IDSs.

5

Page 6: Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Intruders Intrusion Detection References

Behaviour Patterns

The criminal organisations will target specific systems ofinterest.They will try to obscure the usage patterns.These usually make a quick hit, once in they gather as muchinformation as possible and then leave. Think APT.A little harder for IDSs to detect due to quick nature.

6

Page 7: Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Intruders Intrusion Detection References

Behaviour Patterns

The insider will just take information available to him or her.This means no access control is usually breached.Counter by principle of least privilege, logs, strongauthentication, terminate employees’ accounts.This is usually very hard for an IDS to detect.

7

Page 8: Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Intruders Intrusion Detection References

Intrusion Techniques

1 Try default passwords with standard accounts.2 Exhaustively try all short passwords.3 Try a dictionary attack.4 Collect information about the system users; e.g. full names,

names of spouses and children, pictures in their offices.5 Try users’ phone numbers, personal ID number, room numbers.6 Try license plate numbers.7 Use a Trojan horse to bypass restrictions on access.8 Tap the connection between a remote user and the host

system.

8

Page 9: Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Intruders Intrusion Detection References

Overview

1 IntrudersIntrudersBehaviour PatternsIntrusion Techniques

2 Intrusion DetectionIntrusion DetectionAudit RecordsStatistical Anomaly DetectionRule-Based Intrusion DetectionDistributed Intrusion DetectionHoneypots

9

Page 10: Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Intruders Intrusion Detection References

Intrusion Detection

Intrusion detection is a difficult task.Based on the assumption that behaviour of intruder andlegitimate user can be quantified, and hence differences found.Problem is these behaviours might sometimes overlap.

10

Page 11: Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Intruders Intrusion Detection References

Intrusion Detection

Figure 11.1 Profiles of Behavior of Intruders and Authorized Users

overlap in observedor expected behavior

profile ofintruder behavior

profile ofauthorized user

behavior

Measurable behaviorparameter

average behaviorof intruder

average behaviorof authorized user

Probabilitydensity function

Figure: User behavioural profiles. Image: [Sta13].

11

Page 12: Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Intruders Intrusion Detection References

Intrusion Detection

False positives: authorised users detected as intruders.False negatives: intruders detected as legitimate users.We can reasonably well distinguish masqueraders through pasthistory.Misfeasors can be detected by defining what’s unauthoriseduse.Clandestine user is very difficult to detect automatically.

12

Page 13: Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Intruders Intrusion Detection References

Audit Records

Native audit records: log all (relevant) user activity usingsystem logs.Detection-specific audit records: filters out events interestingfor the IDS.Example: copying a file.

13

Page 14: Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Intruders Intrusion Detection References

Statistical Anomaly Detection

Threshold detection: defining thresholds independent of users.Profile based: use a profile for each user to detect changes inbehaviour.

14

Page 15: Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Intruders Intrusion Detection References

Rule-Based Intrusion Detection

Rule-based detection: defines rules for attack patterns, alsocalled signature detection.

15

Page 16: Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Intruders Intrusion Detection References

Distributed Intrusion Detection

Central Manager

LAN Monitor Host Host

Agentmodule

Router

WAN

Figure 11.2 Architecture for Distributed Intrusion Detection

Managermodule

Figure: Distributed Intrusion Detection System. Image: [Sta13].

16

Page 17: Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Intruders Intrusion Detection References

Honeypots

Internet

Externalfirewall

Honeypot

Honeypot

Honeypot

LAN switchor router

LAN switchor router

Figure 11.4 Example of Honeypot Deployment

Internalnetwork

Service network(Web, Mail, DNS, etc.)

2

1

3

Figure: An illustration of honeypots. Image: [Sta13].

17

Page 18: Intrusion Detection - Miunver.miun.se/courses/security/lectures/intrusion.pdf · Intruders Intrusion DetectionReferences Intrusion Detection DanielBosk Department of Information and

Intruders Intrusion Detection References

Referenser I

William Stallings. Network security essentials :applications and standards. 5th ed. International Edition.Pearson Education, 2013. ISBN: 978-0-273-79336-6.

18