Intrusion Detection Systems (Ids) Introduction and Overview
Intrusion Detection Systems (Ids) Introduction and Overview
Intrusion Detection Systems (Ids) Introduction and Overview
• Very Likely
– Denial of services attack
– Computer worms and viruses
– Password cracking and access violation
• Likely
– Breaking into government computer and stealing
military secrets or encryption technology
– Power grid disruption
– Emergency system being compromised
– Other internet connected services disruption
Hacktivist or Cyber terrorists
• Unlikely
– Cutting off fiber-optic cables between major
hubs
– Bombing or physically attacking domain
name servers or switching centrals.
– Bombing of internet facilities to take down the
Internet
WHY DO I NEED AN IDS, I HAVE A FIREWALL?
• IDS are a dedicated assistant used to monitor the
rest of the security infrastructure
• Today’s security infrastructure are becoming
extremely complex, it includes firewalls, identification
and authentication systems, access control product,
virtual private networks, encryption products, virus
scanners, and more. All of these tools performs
functions essential to system security. Given their
role they are also prime target and being managed
by humans, as such they are prone to errors.
• Failure of one of the above component of your
security infrastructure jeopardized the system they
are supposed to protect
WHY DO I NEED AN IDS, I HAVE A FIREWALL?
• It's like security at the airport... You can put up all the fences
in the world and have strict access control, but the biggest
threat are all the PASSENGERS (packet) that you MUST let
through! That's why there are metal detectors to detect what
they may be hiding (packet content).
• You have to let them get to the planes (your application) via
the gate ( port 80) but without X-rays and metal detectors,
you can't be sure what they have under their coats.
• Firewalls are really good access control points, but they
aren't really good for or designed to prevent intrusions.
• That's why most security professionals back their firewalls
up with IDS, either behind the firewall or at the host.
WHAT CAN IDS REALISTICLY DO
– Monitor and analyse user and system activities
– Auditing of system and configuration
vulnerabilities
– Asses integrity of critical system and data files
– Recognition of pattern reflecting known attacks
– Statistical analysis for abnormal activities
– Data trail, tracing activities from point of entry up
to the point of exit
– Installation of decoy servers (honey pots)
– Installation of vendor patches (some IDS)
Intrusion Detection System
Activities
TYPE OF IDS MONITORING
• Host Based
Run on individual hosts or devices on the network
Alert the user of suspicious activity detected
• Statistical
– Based on time, frequency, lenght of session
– For example: cdupuis logs on at 0300 AM and has never
done so in the past, it will raise a flag
• Integrity Checker
– Based on hashing mechanism. Detects authorized and
unauthorized changes to files within your systems.
• Striking back
– Execute a script to collect information about attacker
– Send a 20 megs file back to anyone fingering
– Down side: Acknowledgement sent to the attacker
• Snort
– http://www.snort.org/
• SHADOW
– http://www.whitehats.ca
– ftp://ftp.whitehats.ca/pub/ids/shadow-slack/shadow.iso
IDS GOOD GUYS
• A few initiative is on the way to improve the
early detection, accuracy and terminology
amongst vendors of ID equipment and software
– Incident.org, ARIS, MyNetWatchMan
– CVE ( http://www.mitre.org/cve/
– IDMEF, Intrusion Detection Exchange Message
Format
http://www.ietf.org/html.charters/idwg-charter.html
- CIDF, Common Intrusion Detection Framework
QUESTIONS???