P2L4 Intrusion Detection Flashcards
Defense in Depth
Need multiple layers of defense mechanisms. Prevent, Detect, Survive
Firewall
Prevention Mechanism
Intrusion Examples
- Remote root compromise
- Web Server Defacement
- Packet Sniffer
- Copying database containing CC numbers
etc
Intrusions Steps
- Target Acquisition & Info gathering
- Initial Access
- Privilege Escalation
- Info Gathering or system exploit
- Maintain access (backdoors etc)
- Cover tracks (remove evidence of attack or install root kit
Backdoor inserts backdoors into other programs during compilation
Compiler Backdoor
Backdoor can only be used by person who created it , even if discovered by others
Asymmetric Backdoor
Backdoor hard to detect because it modifies machine code
Object Code Backdoor
Primary Assumptions design of IDS
System activities are observable
Normal and intrusive activities have distinct evidence
Components of IDS
Algorithmic: - Features - capture intrusion evidence - Models - piece evidence together System Architecture: - Several components: data processor, knowledge base, decision engine, alarm generation, and responses
IDS modeling and analysis approaches
- Misuse detection (aka signature-based)
- Anomaly detection
IDS deployment approaches
- Host-based
- Network-based
IDS development and maintenance
- Hand-coding of “expert knowledge”
- Learning based on data
Anomaly Detection
- Collect data relating to behavior of legitimate users over a period of time. Build a model on this.
- Analyze current observed data to determine whether is legitimate (fits model)
- Statistical Approach
Misuse / Signature Detection
- Use set of known malicious data patterns relating to legitimate users over time
- Current behavior is analyzed to determine if it is legitimate.
*Can only detect known attacks/intrusions
Example: Virus scanner
-Knowledge Based Approach
Machine Learning Approaches
- Detects attacks similar to past attacks.
- Flexible and adaptable.
- Training data must normal, otherwise false alarms.
Types:
Bayesian Networks - Conditional probabilities (ex how likely this happens when this other thing happens)
Markov Models - Model of states (ex: real website names vs random botnet names)
Neural Network - Simulates how human brain operates.
Clustering - Group data into similar clusters to identify common characteristics