Top Banner
Network Intrusion Detection System And Analysis BIKRANT GAUTAM SECURITY AND CRYPTOGRAPHIC PROTOCOL – 606 SCSU 2015
26
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network intrusion detection system and analysis

Network Intrusion Detection System And Analysis

BIKRANT GAUTAMSECURITY AND CRYPTOGRAPHIC PROTOCOL – 606

SCSU 2015

Page 2: Network intrusion detection system and analysis

Intrusion Detection System Overview

What is Intrusion?

Restricted Access to computer Infrastructure

What is intrusion detection System?

Mechanism to trace the intrusion

Why is it required?

Protect CIA triad

How does IDS work?

Page 3: Network intrusion detection system and analysis

Intrusion Detection System

• Two IDS in this model

• One external for monitoring external traffic

• One internal for monitoring internal traffic

Page 4: Network intrusion detection system and analysis

Types of IDS

HIDs examine specific host-based actions, such as what applications are being used, what files are being accessed and what information resides in the kernel logs.

NIDs analyze the flow of information between computers, i.e., network traffic. They essentially "sniff" the network for suspicious behavior.

Page 5: Network intrusion detection system and analysis

NIDS Introduction

Why NIDS?

Monitor network traffic

Alert the responsible personnel or the target

Apply preventive measures-(Network Intrusion Prevention System)

Page 6: Network intrusion detection system and analysis

NIDS FunctionalityHow it works?

Sniffing

collect and inspect incoming traffic

Protocol awareness

protocol reassembly and normalization

Alerting

Send email / log events / Sending SNMP

Page 7: Network intrusion detection system and analysis

Modes of Detection Signature Based

Old method

Compare data packets against known malicious sequence

Protocol Awareness

Compare the network packets against standard protocol

Behavioral Analysis

Recent Development

Learn pattern, alert when pattern changes

Page 8: Network intrusion detection system and analysis

Types of NIDS/NIPSs Commercial

Check Point IPS, CISO IPS, IBM Security NIPS

Roll on your own

Free to use for users, SNORT, BRO

Page 9: Network intrusion detection system and analysis

Output of NIDS/NIPS Depends upon the vendor

General evidences/output

Configuration: Configuration of devices being monitored

Alert Data: Alert through text files emails sms

Packet headers/flow Information: logged malicious packets headers

Content Data: Captured full data packets

Correlated Activates: Correlated event data

Page 10: Network intrusion detection system and analysis

NIDS EXAMPLE SNORT

The single most widely used IDS in the world.

Signature Based

Open Source

Large support community

Page 11: Network intrusion detection system and analysis

SNORT ARCHITECTURE

Trucia Victor / url / http://truica-victor.com/snort-architecture/

Page 12: Network intrusion detection system and analysis

SNORT CONFIGURATIONS

RULES

Rules written in a single line

Rules are created with known intrusion signatures

Stored in /etc/snort/rules

Native alerts are stored in /var/log/snort

Global values are stored at /etc/snort/snort.conf

Page 13: Network intrusion detection system and analysis

Header

Example rule header

log tcp 192.168.1.12 123 -> 192.168.1.19 27

Page 14: Network intrusion detection system and analysis

RULE BODY

Rule Body

Used to extract meta data about the events

rule options: msg, sid, rev, reference

Example:

Page 15: Network intrusion detection system and analysis

SNORT EXAMPLES Snort rule

alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:”ICMP PING”; icode:0; itype:8; classtype:misc-activity: sid:384; rev:5;)

Snort packet

IP 10.0.1.10 > 10.0.1.254: ICMP echo request, id 32335, seq 0, length 64

0x0000: 4500 0045 a023 ab00 87ef 0a00 abc8 01oe E . . T . . . . .@ . X . . . . .

0x0010: 3400 0145 02a3 acd0 84af 0000 dbc5 0101 .u . T . - &. . . . . . . . . . I

Snort Alert

[**] [1:384:5] ICMP PING [**] [Classification: Misc Activity] [Priority: 3] 04/13 -03:12:08.359790 10.0.1.10 -> 10.0.1.254 ICMP TTL:64 TOS: 0X0 ID:38125 IpLen:20 DmgLen:84 Type:8 Code:0 ID:32335 Seq:1 ECHO

Malicious Packet

Snort rule to capture malicious packet

Alert Fired

Page 16: Network intrusion detection system and analysis

Challenges with current NIDS SNORT/Signature based

More processing for packet logging

Requires high disk capacity to log information

Page 17: Network intrusion detection system and analysis

Conclusion NIDS/NIPS are the first step on against malicious activities

Investigators leverage evidence from NIDS to find the root of the problem

Field of further study and research

Page 18: Network intrusion detection system and analysis

Case Study

Page 19: Network intrusion detection system and analysis

Case Study Corresponding packet analysis

SNORT ALERT Corresponding Packet

Page 20: Network intrusion detection system and analysis

Case Study Further exploring the Packet content

Packet Content Analysis:

Page 21: Network intrusion detection system and analysis

Case Study

Analysis of HEX Values

Page 22: Network intrusion detection system and analysis

Case Study Further Action:

Page 23: Network intrusion detection system and analysis

Case Study Further analysis of Target IP (192.168.1.69)

Searching all the alerts related with this IP

Count of Malicious Alert for same IP

Alert Message

Page 24: Network intrusion detection system and analysis

Case Study Alert Message Analysis:

The alert

TCP windows scale option found with length > 14

Findings:

Page 25: Network intrusion detection system and analysis

Case Study Investigation Findings and Conclusion Further Steps

Page 26: Network intrusion detection system and analysis

Thank you