Chapter 8 Flashcards

intrusion detection

1
Q

Class of intruders

A
  1. cyber criminals
  2. activists
  3. state-sponsored organizations
  4. others
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

cyber criminals

A
  1. member of organized crime group with goal of financial reward
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

activists

A

motivated by social/political reasons
1. hacktivists - skill level quite low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

state sponsored organizations

A

group of hackers sponsored by state to conduct espionage /sabotage activities
(APT’s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

others

A

technical challenges motivation - discover new categories of buffer overflow vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

skill level

A
  1. apprentice
  2. journeyman
  3. master
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

apprentice

A

minimal technical skills
criminal + activists
script-kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

journeyman

A

sufficient skills to modify + extend attack toolkits to use newly discovered /purchased vulnerabilities
may locate new vulnerabilities
all intruder classes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

master

A

high-level skills - discover brand new categories of vulnerabilities
write new powerful attack toolkits
some employed by state
difficulty defending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Intrusion example

A
  1. remote root compromise
  2. web server defacement
  3. cracking passwords
  4. copying database containing credit card numbers
  5. view sensitive data without authorization
  6. running packet sniffer
  7. distributing pirated software
  8. using unsecured modem/access point to access internal network
  9. impersonating executive to get info
  10. using unattended workstation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intruder behavior

A
  1. target acquisition + info gathering
  2. initial access
  3. privilege escalation
  4. info gathering
  5. maintaining access covering tracks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

intrusion detection

A

hardware/software function gathers + analyzes info from various areas within computer/network to identify possible security intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Intrusion detection system (IDS)

A
  1. Host-based - monitors characteristics of single host for suspicious activity
  2. Network-based - monitor network traffic + analyzes network protocols to identify suspicious behavior
  3. distributed / hybrid - combine info from number of sensors often both host + network in central analyzer that is able to better identify + respond
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

logical components of IDS

A
  1. sensor - collect data
  2. analyzers - determine if intrusion has occurred
  3. user interface - view output/control system behaviour
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IDS requirement

A
  1. run continually
  2. be fault tolerant
  3. resist subversion
  4. impose minimal overhead on system
  5. configured according to system security policies
  6. adapt to changes in systems + users
  7. scale to monitor large number of systems
  8. provide graceful degradation of services
  9. allow dynamic reconfiguration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

analysis approach

A
  1. anomaly detection - collect data relating to behavior of legitimate users over period of time - analyze to determine if behavior = legitimate
  2. signature/heuristic detection - use set of known malicious data patterns /attack rules compared with current behavior - only identify known attacks
17
Q

Anomaly detection

A
  1. statistical - analysis of observed behavior using univariant /time-series model of observed metrics
  2. knowledge based - expert system that classifies behavior according to set of rules that model legitimate behavior
  3. Machine learning - automatically determine suitable classification model from training data using data mining techniques
18
Q

Signature/heuristic detection

A
  1. Signature - match large collection of known patterns of malicious data against data stored/in transit
    - need to be large enough to avoid false positives
  2. rule based/heuristics - involves use of rules for identifying known penetrations /would exploit known weaknesses
    SNORT - rule based NIDS
19
Q

HIDS

A

add specialized layer of security software to vulnerable /sensitive systems - either anomaly/signature
both internal + external

20
Q

data sources + sensors

A
  • intrusion - sensor collecting data
  • system call traces
  • audit records
  • file integrity checksums
  • registry access
21
Q

NIDS

A
  • monitor traffic at selected points in network
  • examine traffic packet by packet in real time
  • NIDS management functions sensor + management console sensors
  • sensor analyses traffic
22
Q

signature detection attacks

A
  1. application layer reconnaissance
  2. transport layer
  3. network layer
  4. unexpected application services
  5. policy violations
23
Q

anomaly detection attacks

A
  1. DOS
  2. scanning
  3. worms
24
Q

stateful protocol analysis

A

subset of anomaly detection that compares observed network traffic against predetermined universal vendor supplied profiles of benign protocol traffic - high resource use

25
Q

logging of alerts

A
  1. timestamp
  2. connection/session ID
  3. event/alert type
  4. rating
  5. network, transport, application layer protocols
  6. source + destination IP addresses
  7. source + destination TCP/UDP ports /ICMP types + codes
  8. number of bytes transmitted over connection
  9. decoded payload data
  10. state-related data
26
Q

IETF intrusion detection working group

A

define data formats + exchange procedures for sharing info of interest to intrusion detection + response systems + management systems that may need to interact with them

27
Q

IETF RFC

A
  1. Intrusion detection message exchange requirements - IDMEF (intrusion detection message exchange format)
  2. Intrusion detection message exchange format - describe data model to represent info exported by intrusion detection system
  3. Intrusion detection exchange protocol - IDXP application level protocol for exchanging data between intrusion detection entities
28
Q

honeypot classification

A
  1. low interaction - provide realistic initial interaction
  2. high interaction - real system , occupy attacker for extended period
29
Q
A