Top Banner
Network security
22
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Intrusiond and detection

Network security

Page 2: Intrusiond and detection

IntrusIon An intrusion is a deliberate unauthorized attempt,

successful or not, to break into, access, manipulate, or misuse some valuable property and where the misuse may result into or render the property unreliable or unusable.

The person who is an intruder.

2

Page 3: Intrusiond and detection

types of IntrusIons:

Attempted break-ins, which are detected by a typical behavior profiles or violations of security constraints. An intrusion detection system for this type is called anomaly-based IDS.

3

Page 4: Intrusiond and detection

types of IntrusIon Masquerade attacks, which are detected by atypical behavior

profiles or violations of security constraints. These intrusions are also detected using anomaly-based IDS.

4

Page 5: Intrusiond and detection

types of IntrusIon Penetrations of the security control system, which are detected by

monitoring for specific patterns of activity.

Leakage, which is detected by atypical use of system resources.

5

Page 6: Intrusiond and detection

Denial. of service, which is detected by atypical use of system resources

Malicious use, which is detected by atypical behavior profiles, violations of security constraints, or use of special privileges

6

Page 7: Intrusiond and detection

IntrusIon DetectIon Intrusion detection is a technique of detecting unauthorized

access to a computer system or a computer network. An intrusion into a system is an attempt by an outsider to the

system to illegally gain access to the system. Intrusion prevention, on the other hand, is the art of preventing an unauthorized access of a system’s resources.

The two processes are related in a sense that while intrusion detection passively detects system intrusions, intrusion prevention actively filters network traffic to prevent intrusion

attempts.

7

Page 8: Intrusiond and detection

IntrusIon DetectIon systems

An intrusion detection system (IDS) is a system used to detect unauthorized intrusions into computer systems and networks. Intrusion detection as a technology is not new, it has been used for generations to defend valuable resources.

These are three models of intrusion detection mechanisms: anomaly-based detection, signature-based detection, and hybrid detection.

8

Page 9: Intrusiond and detection

types of IntrusIon DetectIon system

Host-based IDSs Get audit data from host audit trails. Detect attacks against a single host

Distributed IDSs Gather audit data from multiple host and possibly the

network that connects the hosts Detect attacks involving multiple hosts

Network-Based IDSs Use network traffic as the audit data source, relieving

the burden on the hosts that usually provide normal computing services

Detect attacks from network.

Page 10: Intrusiond and detection

IntrusIon DetectIon system types Intrusion detection systems (IDS) can be classified into different ways. The major

classifications are Active and passive IDS, Network Intrusion detection systems (NIDS) and host Intrusion detection systems (HIDS)

Network Intrusion Detection Systems (NIDS) usually consists of a network appliance (or sensor) with a Network Interface Card (NIC) operating in promiscuous mode and a separate management interface. The IDS is placed along a network segment or boundary and monitors all traffic on that segment.

A Host Intrusion Detection Systems (HIDS) and software applications (agents) installed on workstations which are to be monitored. The agents monitor the operating system and write data to log files and/or trigger alarms. A host Intrusion detection systems (HIDS) can only monitor the individual workstations on which the agents are installed and it cannot monitor the entire network. Host based IDS systems are used to monitor any intrusion attempts on critical servers.

Kizza - Guide to Computer Network Security 10

Page 11: Intrusiond and detection

IntrusIon DetectIon technIques

Misuse detection Catch the intrusions in terms of the characteristics

of known attacks or system vulnerabilities.

Anomaly detection Detect any action that significantly deviates from

the normal behavior.

Page 12: Intrusiond and detection

Anomaly Detection – Anomaly based systems are “learning” systems in a

sense that they work by continuously creating “norms” of activities. These norms are then later used to detect anomalies that might indicate an intrusion.

Anomaly detection compares observed activity against expected normal usage profiles “leaned”. The profiles may be developed for users, groups of users, applications, or system resource usage.

12

Page 13: Intrusiond and detection

Misuse Detection - The misuse detection concept assumes that each intrusive activity is

representable by a unique pattern or a signature so that slight variations of the same activity produce a new signature and therefore can also be detected.

Misuse detection systems, are therefore, commonly known as signature systems. They work by looking for a specific signature on a system. Identification engines perform well by monitoring these patterns of known misuse of system resources.

Hybrid Detection - Because of the difficulties with both the anomaly-based and signature-based

detections, a hybrid model is being developed. Much research is now focusing on this hybrid model.

13

Page 14: Intrusiond and detection

Misuse Detection vs. AnoMAly Detection

Advantage Disadvantage

Misuse Detection

Accurately and generate much fewer false alarm

Cannot detect novel or unknown attacks

Anomaly Detection

Is able to detect unknown attacks based on audit

High false-alarm and limited by training data.

Page 15: Intrusiond and detection

Response to systeM intRusion

A good intrusion detection system alert should produce a corresponding response.

A good response must consist of pre-planned defensive measures that include an incident response team and ways to collect IDS logs for future use and for evidence when needed.

15

Page 16: Intrusiond and detection

Incident Response Team An incident response team (IRT) is a primary and

centralized group of dedicated people charged with the responsibility of being the first contact team whenever an incidence occurs. An IRT must have the following responsibilities: keeping up-to-date with the latest threats and incidents, being the main point of contact for incident reporting, notifying others whenever an incident occurs, assessing the damage and impact of every incident, finding out how to avoid exploitation of the same vulnerability,

and recovering from the incident.

16

Page 17: Intrusiond and detection

Honey pots

o A honeypot is an intrusion detection technique used to study hacker movements and helping the system against later attacks usually made up of a virtual machine that sits on a network or single client.

o Honeypots do not solve a specific problem, instead they are a tool that contribute to your overall security architecture.

o The primary use of honeypots is to collect the information,this information is then used to better identify ,understand & protect against threats.

17

Page 18: Intrusiond and detection

DATA CONTROL

Internet

Honeywall

Honeypot

Honeypot

No Restrictions

Connections Limited Packet Scrubbed

Page 19: Intrusiond and detection

Types of honeypots

LOW-INTERACTION

HIGH-INTERACTION

19

Page 20: Intrusiond and detection

1)LOW-INTERACTION

o The main difference between the two is their complexity and interaction they allow an attacker. By emulating operating systems and other services, low-interaction honeypots do not give attackers much control. The main advantage of this is their simplicity that allow maintenance plus the low risk factor.

o Capture limited information.

20

Page 21: Intrusiond and detection

2)HIGH-INTERACTIONo High-interaction honeypots differ in that they involve real operating systems and applications. Unlike low-interaction, these honeypots work with real systems; nothing is emulated. The advantage of this is that by giving attackers real systems to work with, you can capture a wide range of information and learn new techniques being used.

o Captures extensive information.o High risk and hard to maintain.

21

Page 22: Intrusiond and detection

Kizza - Guide to Computer Network Security 22