Intrusion Detection Flashcards

1
Q

Intrusion Detection

A

intrusion hostile, unwanted tresspass by users or software
insider that perform actions beyond those authorized

Security intrusion -> unauth act of bypassing the sec mechanisms of a system
Intrusion detection -> hw or sw function that gathers and analyzes information from avarious areas within a computer or a network to identify possible sec intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of intruders

A

cybercriminals -> financial reward
activitsts -> social/political causes. low skill level
state-sponsored organizations -> by gov conduct espionage or sabotage (Advanced Persistent Threats)
others -> reputation/peer-group esteem

Skill level
apprentice -> minimal tech skill uses attack toolkits
journeyman -> sufficient tech skills may locate new similar exploits
master -> high tech skill discover new categories and write attack toolkits

examples
defacing web server
guessing/cracking pwds
view sensitive data
running packet sniffers to capture user/pwds
using unattended, logged-in workstations w/o permission
doing social engineering (pose as executive call help desk reset email pwd and learn new pwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Defense in depth strategy

A

Encryption of sensitive information
Detailed audit trails
Strong authentication and authorization controls
Active management of OS
Application Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Behavior of Intruder

A
  • Target Acquisition and Information Gathering: identifies and characterizes the target systems using public available information, network exploration tools to map target resources
  • Initial Access: exploiting remote network vulnerability, installation of malware via socialeng or drive-by-download
  • Privilege Escalation: via local access vulnerability
  • Information Gathering or System Exploit: Access/modify information or resources on the system
  • Maintaining Access: backdoor or covert authentication credentials
  • Covering tracks: disables or edits audit logs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Intrusion Detection System

A

Sensors -> collecting data. Network packets, log files, system call traces.
Analyzers -> receives inputs from one/more sensors and determines if intrusion occurred.
UI

Types
Host-based -> single host
Network-based -> network traffic, network packets or devices
Distributed or hybrid -> combines information from a number of sensors

Insights
legitimate and illegitimate behavior overlap. patterns of legitimate use can be established by observing history and validation deviation. Identified by intelligent definition of the class of conditions.

Base-rate fallacy actual # of intrusions is low then false alarm rate will be high.

Requirements:
run continually w/o human supervision
fault tolerant
resist subversion, monitor itself
impose minimal overhead
configured by sec policies
adapt or scale to changes
graceful degradation
dynamic reconfiguration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Analysis approaches

A

Anomaly detection -> collect data of behavior of legitimate users over some time. (high level of alarm)

distinct times or continuous
statistical -> univariate, multivariate or time-series model
uni: each variable independent random variable
multi :correlation between metrics
time-series :order and time
low computational cost, but difficult selecting suitable metrics

knowledge based -> expert system classifies behavior
classify based on rules, FSM or description language. Robust and flexible but costly to develop

machine-learning -> classification model from the training data
data mining to develop model
requires significant time/computational power
Bayesian, markov models, NN, fuzzy set theory, genetic algs (inheritance, mutation, selection and recombination), clustering and outlier detection group into clusters based on some similarity or distance measure.
Strength:capture interdependencies
Disadvantage: only trained with legitimate behavior

Signature or Heuristic detection -> set of known malicious data patterns or attack rules compared with current behavior ( no 0 day attacks)

Match known patterns against data stored on a system or in transit
difficulty needs large enough signatures to minimize false alarm rate, or retrain for new malware

Rule-based:use of rules to analyze attack tools and scripts collected on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IDS Classification

A

Host-based IDS -> for sensitive layers (db, admin system)
it can detect both ext/int intrusions, anomaly based or sign heuristic approach

from: system call traces -> windows (complicated due to DLLs obscuring processes that use specific system calls)
audit -> accounting sw that collects info on user activity, intruders may try to manipulate it
file integrity checksums -> periodically scan crypto checksums of files
registry -> monitor access to registry

anomaly
mostly done in unix systems, based on system call traces, info on process activity to classify as normal/abnormal. Os hooks like BSM audit module.
HMM, ANN, SVM, Extreme learning machines to make classification.
Detect rate of 95-99% false positives less than 5%
windows difficulty due to DLLs but using traces of key DLL functions is similar to analyzing linux system call trace.

tripwire detects changes to files using a baseline but running processes are more difficult to track

signature-based
antiviruses use a db of file signatures or heuristic rules good for known malware but not for 0 day attacks

distributed -> heterogeneous data, integrity and confidentiality of data transmitted, centralized =bottleneck, decentralized=coordination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network based IDS

A

examines traffic packet by packet in ~real time to detect intrusions
perimeter, associated with firewall
analyze traffic patterns and traffic content
lost capacity due to cryptographic content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of NIDS

A

inline -> between internet and lan, traffic must go through
NIDS + LAN switch (or Firewall)
block and attack when detected, detection+prevention
wireless -> into Access Point (AP)

passive -> monitors copy of network traffic
more efficient does not do extra handling
no IP address (promiscuous mode)
wireless -> traffic monitor

Wireless IDS (WIDS) - vulnerable to DDoS, Session hijack or AP impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Deployment Strategies

A

after external firewall
- sees attack from outside that passed the firewall, finds problems with firewall policies, attacks might target web server or ftp,recognizes compromised internal servers

before external firewall (directly to internet)
documents number/types of attacks from internet
but higher burden

after internal servers and database networks
increases chance of spotting attacks
unauth activity by authorized users
can be tuned to specific protocols and attack types

after workstation networks
attacks targeting critical systems/resources
focusing of limited resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intrusion Detection Techniques

A

Statistical packet anomaly detection engine (SPADE) as in the snort system

===signature detection
app layer
Attack patterns like buffer overflows, password guessing and malware transmissions in protocols DHCP, DNS, Finger, FTP, HTTP, IMAP, IRC, NFS, POP, rlogin/rsh, RPC, SIP, SMB, SMTP, SNMP, telnet, TFTP, DB, IM or P2P
transport layer
analyze TCP/UDP -> unusual packet fragmentation, scans for vulnerable ports, TCP-specific attacks SYN floods
network layer
IPv4,6, ICMP IGMP -> spoofed addresses and illegal IP header values
unexpected app services
host running unauth application service
policy violations
inappropriate websites and forbidden app protocols

===anomaly detection
DDos -> significant increase in packet traffic or connection attempts
Scanning -> probe target network or system by sending different kinds of packets, atypical flow patterns (app -> banner grabbing, transport -> TCP/UDP port scanning, network -> ICMP scanning)
worms can be found by hosts that usually don’t communicate or don’t usually use certain ports.
P2P gossip to inform other machines of suspicion in the form of a probability that network is under attack, if threshold is passed alert is sent to central system

Summary -> collected from various sources and summarized
PEP -> policy enforcement point, correlate distributed information
DDI -> distributed detection and inference, alerts generated from gossips

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Intrusion Detection Exchange Format

A

RFC 4766 -> communication protocol
RFC 4765 -> data model
RFC 4767 -> app level protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Honeypots

A

Lure attacker away from critical systems
there is no legitimate use of system, if initiates outbound communication it was compromised

Low or high interaction honeypot

By Location
outside the external firewall -> tracking attemps to connect to unused IP addresses within the scope of the network, does not risk internal network and reduces burden
inside DMZ or inside network
admin must assure other systems in DMZ are secure, because behind firewall might need to lower sec in firewall or lose effectiveness of honeypot

also honeyfiles can entice attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly