CS5 IDPSTools
CS5 IDPSTools
Cyber Security
Security Technology: Intrusion
Detection and Prevention Systems,
and Other Security Tools
Do not wait; the time will never be just right. Start where you stand and
work with whatever tools you may have at your command, and better
tools will be found as you go along.
NAPOLEON HILL (1883–1970) FOUNDER OF THE SCIENCE of SUCCESS
Learning Objectives
• Categories and models of intrusion detection and
prevention systems (IDPS)
• Detection approaches employed by IDPS
• Honeypots, honeynets, and padded cell systems
• Categories of scanning and analysis tools, and
describe the specific tools used within each category
2
Introduction
3
Intrusion Detection and Prevention
Systems (IDPS) (1)
• Intrusion occurs when an attacker attempts to gain
entry into or disrupt the normal operations of an IS
• Intrusion prevention consists of activities that deter an
intrusion.
• Intrusion detection consists of procedures and systems
that identify system intrusions.
• Intrusion reaction encompasses actions undertaken
when intrusion event is detected.
4
Intrusion Detection and Prevention
Systems (IDPS) (2)
• Intrusion correction: complete restoration of operations
to a normal state and seek to identify source and
method of intrusion
• Intrusion detection systems detect a violation of its
configuration and activate alarm.
• IDPSs enable administrators to configure systems to
notify them directly of trouble via e-mail or pagers.
• Can also be configured to notify an external security
service organization of a “break-in.”
5
Why Use an IDPS?
• Main purposes
– To identify and report an intrusion
– Can quickly contain attack and prevent/mitigate loss or
damage
– Detect and deal with preambles to attacks
• Data collection allows the organization to examine
what happened after an intrusion and why.
• Serves as a deterrent by increasing the fear of
detection
• Can help management with quality assurance and
continuous improvement
6
Types of IDPSs
7
8
NIDPS (1)
• Focused on protecting network information assets.
• Resides on a computer or an appliance connected to a
segment of an organization’s network; looks for indications
of attacks
• When examining packets, a NIDPS looks for attack patterns
within network traffic
• Installed at specific place in the network where it can
monitor traffic going into and out of a particular network
segment
9
NIDPS (2)
10
Advantages of NIDPS
11
Disadvantages of NIDPS
12
Host-based IDPS (HIDPS)
• Resides on a particular computer or server (host) and
monitors activity only on that system
• Benchmarks and monitors the status of key system files
and detects when intruder creates, modifies, or deletes
files
• Advantage over NIDPS: can access encrypted
information traveling over network and make decisions
about potential/actual attacks
• Most HIDPSs work on the principle of configuration or
change management.
13
Advantages of HIDPS
14
Disadvantages of HIDPS
15
Other Types
• Wireless NIDPS
– Monitors and analyzes wireless network traffic
– Issues associated with it include physical security, sensor range,
access point and wireless switch locations, wired network
connections, cost, AP and wireless switch locations.
• Network behavior analysis systems
– Identify problems related to the flow of traffic
– Types of events commonly detected include denial-of-service (DoS)
attacks, scanning, worms, unexpected application services, and
policy violations.
– Offer intrusion prevention capabilities that are passive, inline, and
both passive and inline
16
IDPS Detection Methods (1)
• Signature-based detection
– Examines network traffic in search of patterns that match
known signatures
– Widely used because many attacks have clear and distinct
signatures
– Problem with this approach is that new attack patterns
must continually be added to IDPS’s database of
signatures.
• Slow, methodical attack involving multiple events might
escape detection.
17
IDPS Detection Methods (2)
• Anomaly-based detection
– Anomaly-based detection (or behavior-based detection)
collects statistical summaries by observing traffic known
to be normal.
– When measured activity is outside baseline parameters
or clipping level, IDPS sends alert to administrator.
– IDPS can detect new types of attacks.
– Requires much more overhead and processing capacity
than signature-based detection
– May generate many false positives
18
IDPS Detection Methods (3)
19
IDPS Detection Methods (4)
20
IDPS Response Behavior
• IDPS response to external stimulation depends on the
configuration and function; many response options are
available.
• IDPS responses can be classified as active or passive.
– Active response: collecting additional information about the
intrusion, modifying the network environment, taking action against
the intrusion
– Passive response: setting off alarms or notifications, collecting
passive data through SNMP traps
• Many IDPSs can generate routine reports and other
detailed documents.
• Failsafe features protect IDPS from being circumvented.
21
IDPS Alert Types (1)
• True Positive
A legitimate attack which triggers an IDPS to produce an alarm.[2]
• False Positive
An event signaling an IDPS to produce an alarm when no attack
has taken place.[2]
• False Negative
When no alarm is raised when an attack has taken place.[2]
• True Negative
An event when no attack has taken place and no detection is
made.
22
IDPS Alert Types(2)
• A good portion of false-positives and false-negatives can be
attributed to lack of knowledge about the environment being
monitored
23
IDPS Alert Types(2)
• A good portion of false-positives and false-negatives can be
attributed to lack of knowledge about the environment being
monitored
24
Selecting IDPS Approaches and
Products
• Technical and policy considerations
– What is your systems environment?
– What are your security goals and objectives?
– What is your existing security policy?
• Organizational requirements and constraints
– What requirements are levied from outside the
organization?
– What are your organization’s resource constraints?
25
IDPSs product features and quality
26
Strengths of IDPSs (1)
27
Strengths of IDPSs (2)
28
Limitations of IDPSs (1)
29
Limitations of IDPSs (2)
30
Implementation of an IDPS
31
32
33
34
Deployment of an IDPS (1)
• IDPS deployment
– Great care must be taken when deciding where to locate
components.
– Planners must select deployment strategy that is based
on careful analysis of organization’s information security
requirements and causes minimal impact.
– NIDPS and HIDPS can be used in tandem to cover
individual systems that connect to an organization’s
network and networks themselves.
35
Deployment of an IDPS (2)
36
37
Deployment of an IDPS (3)
38
Comparison with firewall
39
Honeypots, Honeynets, and Padded
Cell Systems (1)
• Honeypots: decoy systems designed to lure potential
attackers away from critical systems
• Honeynets: several honeypots connected together on a
network segment
• Honeypots are designed to:
– Divert attacker from accessing critical systems
– Collect information about attacker’s activity
– Encourage attacker to stay on a system long enough for
administrators to document the event and perhaps
respond
40
Honeypots, Honeynets, and Padded
Cell Systems (2)
• Padded cell system: protected honeypot that cannot be
easily compromised
• In addition to attracting attackers with tempting data, a
padded cell operates in tandem with a traditional IDPS.
• When the IDPS detects attackers, padded cell system
seamlessly transfers them to a special simulated
environment where they can cause no harm—hence
the name padded cell.
41
Advantages of Honeypots, Honeynets,
and Padded Cell Systems
• Attackers can be diverted to targets they cannot
damage.
• Administrators have time to decide how to respond to
an attacker.
• Attackers’ actions can be easily and more extensively
monitored, and records can be used to refine threat
models and improve system protections.
• Honeypots may be effective at catching insiders who
are snooping around a network.
42
Disadvantages of Honeypots,
Honeynets, and Padded Cell Systems
• Legal implications of using such devices are not well
understood.
• Honeypots and padded cells have not yet been shown
to be generally useful security technologies.
• An expert attacker, once diverted into a decoy system,
may become angry and launch a more aggressive
attack against an organization’s systems.
• Administrators and security managers need a high
level of expertise to use these systems.
43
Trap-and-Trace Systems
• Use a combination of techniques to detect an intrusion
and trace it back to its source
• Trap usually consists of a honeypot or a padded cell and
alarm.
• Legal drawbacks to trap and trace
– Enticement: act of attracting attention to system by placing
tantalizing information in key locations
– Entrapment: act of luring an individual into committing a
crime to get a conviction
– Enticement is legal and ethical, entrapment is not.
44
Enticement and Entrapment
45
Active Intrusion Prevention
46
Scanning and Analysis Tools (1)
47
Scanning and Analysis Tools (2)
48
Port Scanners
49
50
Firewall Analysis Tools
• Several tools automate remote discovery of firewall rules
and assist the administrator/attacker in analyzing them.
• Administrators who feel wary of using the same tools that
attackers use should remember:
– User intent dictates how gathered information will be
used.
– To defend a computer or network well, administrators
must understand ways it can be attacked.
• A tool that can help close an open or poorly configured
firewall will help the network defender minimize risk from
attack.
51
Operating System Detection Tools
52
Vulnerability Scanners
53
Packet Sniffers
• Network tool that captures copies of packets from
network and analyzes them
• Can provide network administrator with valuable
information for diagnosing and resolving networking
issues
• In the wrong hands, a sniffer can be used to
eavesdrop on network traffic.
• To use packet sniffers legally, an administrator must be
on a network that the organization owns, be under
direct authorization of owners of the network, and have
knowledge and consent of the content’s creators.
54
Wireless Security Tools
55
Summary
• Intrusion detection system (IDPS) detects violation of its
configuration and activates alarm.
• Network-based IDPS (NIDPS) versus host-based IDPS
(HIDPS)
• Selecting IDPS products that best fit an organization’s
needs is challenging and complex.
• Honeypots are decoy systems; two variations are known
as honeynets and padded cell systems.
• Scanning and analysis tools are used to pinpoint
vulnerabilities in systems, holes in security components,
and unsecured aspects of a network.
56