Evading IDS, Firewalls, and Honeypots
Evading IDS, Firewalls, and Honeypots
IDS is crucial for maintaining network security and protecting sensitive data from cyber-attacks.
Signature-based detection: This method compares network traffic to a database of known attack
signatures. If a match is found, the IDS raises an alert.
Anomaly-based detection: This method establishes a baseline of normal network behaviour and
flags any significant deviations as potential threats. It uses statistical analysis or machine learning
techniques to identify anomalies.
Protocol Anomaly Detection: Here the models are built to explore anomalies in the way in which
vendors deploy the TCP/IP specification.
1. Monitoring: The IDS continuously monitors network traffic and system logs.
2. Analysis: It analyzes the collected data using signature-based or anomaly-
based techniques.
3. Detection: If suspicious activity is detected, the IDS generates an alert.
4. Alerting: Alerts can be sent to security administrators via email, SMS, or
other notification methods.
Some advanced IDS systems can also take automated actions, such as blocking malicious traffic or
isolating compromised systems.
Types of IDS:
1. Network-Based Intrusion Detection Systems: These systems typically consist of a black box
that is placed on the network in a promiscuous mode, listening for patterns indicative of an
intrusion. It detects malicious activity such as Denial-of-Service attacks, port scans, or even
attempts to crack into computers by monitoring network traffic.
2. Host-Based Intrusion Detection Systems: These systems usually include auditing for events
that occur on a specific host. These are not as common, due to the overhead they incur by
having to monitor each system event.
Types of IDS Alerts:
IDS vs IPS:
Response to Threats:
IDS: Detects and alerts about potential threats but does not take any action to block or
mitigate them.
IPS: Detects threats and actively blocks or mitigates them in real-time, preventing
malicious traffic from reaching its intended target.
Firewall:
Firewalls are hardware and/or software designed to prevent unauthorized access to or from
a private network.
They are placed at the junction or gateway between two networks, which is usually between
a private network and a public network such as the Internet.
Firewalls examine all messages entering or leaving the Intranet (or private network) and
block those that do not meet the specified security criteria.
Firewall Architecture:
Demilitarized Zone:
It is a network that serves as a buffer between the internal secure network and the insecure
network. It can be created using a firewall with three or more network interfaces, assigned with
specific roles such as the internal trusted network, the DMZ network, and the external un-trusted
network.
Types of Firewalls:
1. Hardware Firewalls: These are physical devices that sit between a network and its external
connections. They filter incoming and outgoing traffic based on predefined security rules.
Hardware firewalls provide robust protection for larger networks, offering features like NAT,
VPN support, and more, typically managed by IT professionals.
2. Software Firewalls: These are programs installed on individual devices to monitor and
control network traffic. They provide customizable protection for computers or servers,
blocking harmful traffic based on rules set by the user. Software firewalls are commonly used
for personal security on endpoints, offering flexibility and ease of use.
Honeypot:
1. What is a honeypot? A honeypot is a decoy system or network designed to attract
cyberattacks, mimicking real systems to deceive attackers. It acts as a trap, collecting data on
attack methods, providing insight into vulnerabilities, and luring malicious activity away from
actual targets, enhancing cybersecurity monitoring.
2. How it works? Honeypots work by simulating vulnerable systems, attracting attackers with
seemingly unprotected services. When an attacker interacts with the honeypot, it records
their actions, enabling security teams to analyse attack patterns and learn about new
threats. It can also isolate the attacker, preventing harm to real systems.
3. Advantages
Honeypots provide valuable insights into attack methods, helping organizations understand
evolving threats. They can divert attackers from critical systems, enhance threat detection,
and improve incident response strategies. By simulating vulnerabilities, they allow for
proactive security measures without compromising real assets.
4. Disadvantages
Honeypots can be resource-intensive, requiring maintenance and monitoring. If not properly
isolated, they risk becoming a launchpad for further attacks. Skilled attackers may recognize
honeypots and avoid them. Additionally, their presence can potentially attract unwanted
attention or increased targeting of an organization's infrastructure.
Intrusion Detection:
Intrusion Detection refers to the process of monitoring network or system activities for malicious
activities or security breaches. It involves identifying unauthorized access, misuse, or violations of
security policies. Intrusion detection systems (IDS) analyse traffic patterns, logs, and system
behaviour to detect potential threats and alert administrators for further investigation.
Uses:
Snort Rules:
1. Snort's rule engine allows custom rules to be established to meet the needs of the network
2. Snort rules help in differentiating between normal Internet activities and malicious activities
3. Snort rules must be contained on a single line; the Snort rule parser does not handle rules on
multiple lines
4. Snort rules come with two logical parts:
o Rule header: Identifies the rule's actions, such as alert, log, pass, activate, and
dynamic
o Rule options: Identifies the rule's alert messages
Insertion attacks involve adding malicious Evasion attacks aim to bypass or deceive
Definition data into the communication flow, targeting security systems, such as IDS, without
the IDS or security system. triggering alarms.
Involves inserting harmful payloads, like false Involves manipulating traffic to evade
Method traffic or malicious packets, into legitimate detection, often by using fragmentation
traffic. or encryption.
Session splicing involves breaking an attack Unicode evasion uses Unicode encoding to
Definition into smaller parts across multiple sessions obscure malicious payloads, making them
to bypass IDS detection. harder to detect by security systems.
Attackers fragment a single attack into Malicious payloads are encoded using
smaller pieces and send them across Unicode characters (e.g., UTF-8 or UTF-16)
Method
multiple sessions, often exploiting protocol to mask harmful content within legitimate-
weaknesses. looking data.
How It Works:
When an attacker sends fragmented packets, each fragment contains part of the
malicious payload.
In the case of overlapping fragments, the data from one fragment might overlap with the
data from the next, creating ambiguity.
This can trick security devices into not properly reconstructing the entire packet or
interpreting the payload incorrectly.
TTL attacks:
Time-to-Live (TTL) attacks exploit the TTL value in network packets, which determines how long a
packet can exist in a network before being discarded. Attackers manipulate TTL values to evade
detection, cause network congestion, or redirect traffic. TTL attacks can disrupt routing, perform
denial-of-service (DoS) attacks, or bypass security filters by masking the packet's origin.
Application-layer Attacks:
Applications accessing media files (audio, video and images) compress them to a smaller size for
maximizing the data transfer rate
The IDS cannot verify the signature of the compressed file format
This enables an attacker to exploit the vulnerabilities in compressed data
The IDS can recognize conditions favourable for attack, but alternative forms of attack are
also possible, for example, various integer values can be used to exploit integer overflow
vulnerabilities
This makes the detection of attack traffic extremely difficult at the IDS
Detecting Honeypots:
Honeypots are decoy systems or networks designed to attract cyber attackers and divert them from
valuable targets. They simulate vulnerabilities to gather intelligence about attack methods, tactics,
and tools.
Advantages:
Disadvantages:
Traffic analysis: Sophisticated attackers may analyze traffic patterns to spot anomalies
associated with honeypots.
Fingerprinting: Advanced techniques can detect the unique characteristics of honeypots
(e.g., operating system or software inconsistencies).
Behavior analysis: A lack of real users interacting with the system or abnormal interaction
patterns may reveal the presence of a honeypot.
Tools to detect:
1. Kippo_detect
2. Send-safe Honeypot Hunter