Chapter 8 Flashcards
intrusion detection
Class of intruders
- cyber criminals
- activists
- state-sponsored organizations
- others
cyber criminals
- member of organized crime group with goal of financial reward
activists
motivated by social/political reasons
1. hacktivists - skill level quite low
state sponsored organizations
group of hackers sponsored by state to conduct espionage /sabotage activities
(APT’s)
others
technical challenges motivation - discover new categories of buffer overflow vulnerabilities
skill level
- apprentice
- journeyman
- master
apprentice
minimal technical skills
criminal + activists
script-kiddies
journeyman
sufficient skills to modify + extend attack toolkits to use newly discovered /purchased vulnerabilities
may locate new vulnerabilities
all intruder classes
master
high-level skills - discover brand new categories of vulnerabilities
write new powerful attack toolkits
some employed by state
difficulty defending
Intrusion example
- remote root compromise
- web server defacement
- cracking passwords
- copying database containing credit card numbers
- view sensitive data without authorization
- running packet sniffer
- distributing pirated software
- using unsecured modem/access point to access internal network
- impersonating executive to get info
- using unattended workstation
Intruder behavior
- target acquisition + info gathering
- initial access
- privilege escalation
- info gathering
- maintaining access covering tracks
intrusion detection
hardware/software function gathers + analyzes info from various areas within computer/network to identify possible security intrusions
Intrusion detection system (IDS)
- Host-based - monitors characteristics of single host for suspicious activity
- Network-based - monitor network traffic + analyzes network protocols to identify suspicious behavior
- distributed / hybrid - combine info from number of sensors often both host + network in central analyzer that is able to better identify + respond
logical components of IDS
- sensor - collect data
- analyzers - determine if intrusion has occurred
- user interface - view output/control system behaviour
IDS requirement
- run continually
- be fault tolerant
- resist subversion
- impose minimal overhead on system
- configured according to system security policies
- adapt to changes in systems + users
- scale to monitor large number of systems
- provide graceful degradation of services
- allow dynamic reconfiguration