SlideShare a Scribd company logo
Intrusion Detection
CTO Forum
November 9, 2001
Tom Casey
Tcasey@pec.com
703.679.4900
2
Agenda
• Risks Associated with E-business
• Elements of an Intrusion Detection Strategy
• Misuse and Anomaly Detection
• Application, Host, and Network Based Tools
• Active and Passive Response
• Intrusion Detection System Architecture
• Technical and Legal Issues
• Commercial and Open Source ID systems
3
Reported Incidents Increasing
Number of Incidents Reported
0
5000
10000
15000
20000
25000
30000
35000
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
*2001
Years
NumberofIncidents
*Q1-Q3 2001Cert.org Statistics October 15, 2001
34,754
21,756
2,412
132
4
Risks Associated with E-business
• Defaced Websites
• Denial of Service/DDOS
• Theft of Company Proprietary Information
• Theft of Customer Information
• Downtime = Loss of Revenue
• Negative Press = Negative Public Image
• Internal and External Threats
5
History of Intrusion Detection
• Intrusion Detection (ID) defined:
– Process of monitoring computer networks and systems for
violations of security policy
• First ID System--manual “system audits”
• 1980, ID was born
– First document need for automated audit trail review to
support security goals
• Growth of Internet
6
The Importance of Intrusion Detection
• A perfectly secure system is a myth
– Firewalls and filtering routers aren’t enough to protect
electronic assets
• Effective audit information analysis required a tool
• An IDS is one of many components supporting a
robust security architecture-”Defense in Depth”
– Firewalls, VPN, Virus Protection, Vulnerability Assessments
etc.
• Protect valuable information resources from internal
and external threats
7
An IDS can accomplish the following
• Prevents and/or mitigates the damage resulting from
intrusion
• Identifies a precursor of more serious activity
• Identifies perpetrators
• Discovers new attack patterns
8
Elements of a Complete Intrusion
Detection Strategy
• Policy!
– Policy is living, constantly evolving
– ID configuration/design must support policy
• Intrusion Detection System (IDS) architecture
• Institutionalized Incident Response
– Responses map to policy
– Working with law enforcement
– CERTs
• Trained security personnel
• Awareness Programs - Support from Users
9
Time Line of an Attack
Probing:
•Port Sweeps
•Address sweeps
•Doorknob Ratting
Break-in:
•Operating System Bugs
•Sniffed Passwords
•Social Engineering
•Back Door
Malicious Actions:
•Steal Data or Programs
•Hop to other systems
•Install Back Door
•Setup Sniffer
•Steal CPU time
10
Misuse Detection
• Misuse, signature/pattern-matching
• Reliably detecting “known” use patterns
• Detects only known intrusions
• Difficult handling large volumes of data
• Does not handle uncertainty
11
Anomaly Detection
• Anomaly Detection
• Establish profile of “normal” user behavior
• Patterns of abnormality, rare, unusual behavior
• Accommodate adaptations to changes in user
behavior
• Statistical and Quantitative analysis
• Assumes users exhibit predictable, consistent
patterns of system usage
12
Anomaly Detection (con’t.)
User Normal Behavior Anomaly in User Behavior
System
Administrator
Secretary
Programmer
•Log in as root
•Edit user’s access permissions
•Run system configuration/
monitoring tools
•Logged in locally during company
working hours
•Uses office automation software
(word processing, etc)
•Reads and sends emails
•Logged in from early morning
to late night
•Uses software development
tools
•Browses Internet more often in
the evening then the daytime
•Becomes a programmer
•Accesses Software Development tools
•Accesses Software project sources
•Logs in from a remote host
•Assumes the role of a manager
•Logs in as a human resources manager
•Gains access to personnel database
13
Intrusion Detection Tools
• Application-based
– Collects information and detects intrusion at the application layer
– Placement: E-commerce Server, WebServer
• Host-based
– Agent software on host
– Monitors: event logs, critical system files, registry settings, etc
– Alerts management console, reacts actively and/or passively
depending upon policy
• Network-based
– Operates at the network level
– Detects DOS or dangerous payloads before the reach destination
– Dedicated host, two interfaces: Management and Stealth
14
Active Responses
• User driven
• Automatic Responses
• System takes action to block the progress of attack
– Closing holes, shutting down services, logging an intruder
– Block IP address(es)
• Collect more information (honey pots)
15
Passive Responses
• System logs and reports problem
• Alarms and notification
– visual, audible, email paper
• SNMP traps
• Archiving and reporting
16
IDS Architecture Recommendations
• Network based
– At Internet connection points
– Key internal network segments
– In the DMZ
– Just inside the Firewall (Intranet)
– Behind WAP server, WAN router, modem pool
• Host-based
– Servers containing critical data
– Domain servers
• Optimum Architecture: Combine misuse and
anomaly detection
17
Sample IDS Architecture
Firewall
Internet Router
Web
Server(S)
DMZ Services
Email
Relay
Border
Directory
Host IDS Agent
Domain
Controller
Personnel
Database
User
Workstations
User
Workstations
IDS Central
Management
Console
Network Sensor
Network Sensor
Network Sensor
User
WorkstationsStealth Mode
Customer
Database
Corporate Private Network
Web
Server(s)
File and
Print Server
18
Technical Issues
• Scalability
– Scaling over space as the network grows
• Management
– Network Management
– Sensor Controls
– Investigative Support
– Performance Loads
– User Interface
• Reliability
– Quality of analysis engines
– Response mechanisms
19
Technical Issues (con’t)
• Analysis
– Difficulties categorizing attacks/threats
– False positives/negatives (tuning anomaly detection
engines)
– Trend analysis, event correlation, data mining
• Interoperability
– Tools to collect information from: multiple abstraction layers,
hardware, software
– Audit trail standards
• Integration
– Intrusion detection in a Switched Environment
– Intrusion detection in a Crypto Environment
20
Legal Issues
• Legislation
– Computer fraud and abuse statutes
– Electronic Communications Privacy Act Sec 2510
• System logs are circumstantial evidence
– Requires proof of authenticity
– Testimony of responsible parties
– Expert to explain log file contents
– Maintaining redundant event log records
• Electronic Monitoring
– System admin monitoring vs. Law enforcement monitoring
• Cyber Forensics
21
Commercial and Open Source
• Leading Commercial Vendors
– Internet Security Systems (ISS): RealSecure
– NetworkICE: BlackICE
– Enterasys System: Dragon
– Cisco Secure Systems: IDS
– NFR: Network Intrusion Detection
• Open Source
– Snort.org
• Managed Security Providers (MSPs)
– Leverage the MSPs’ security expertise
– Ideal for Small/Mid-sized business
– Leverage MSP experience with other customers
– Focus your staff and resources on your core business activities
– 24X7X365 Monitoring and Notification
22
Current and Future Trends in IDS
• Protocol Scanners
• “Meta” Detection
– Interoperability
– Centralized Administration, Management, and Reporting
• IDS Appliances
– No general purpose OSes to configure and maintain
– No patches/Drivers to install
– Facilitates: accuracy, speed, and remote management
– 100 Gigabit Detection
23
References
• Internet Security Systems: www.iss.net
• Enterasys Networks: www.enterasys.com
• Cisco Systems: www.cisco.com
• Snort: www.snort.org
• NFR Security www.nfr.com
• CERT @ Carnegie Melon: www.cert.org
• Sans Institute: “The Twenty Most Critical
Internet Security Vulnerabilities”
http://www.sans.org/top20.htm
• Computer Security Institute: "2001 Computer Crime
and Security Survey"
http://www.gocsi.com/prelea/000321.html
Web-Enabling Government SM

More Related Content

PPTX
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
PDF
Cloud intrusion detection System
PDF
Security issue in Cloud computing
PPTX
The Top Cloud Security Issues
PDF
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
PPTX
Security on Cloud Computing
PPT
Cloud security
PDF
IRJET - IDS for Wifi Security
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud intrusion detection System
Security issue in Cloud computing
The Top Cloud Security Issues
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Security on Cloud Computing
Cloud security
IRJET - IDS for Wifi Security

What's hot (20)

DOCX
Nice network intrusion detection and countermeasure
PPTX
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
PDF
Cloud Security Introduction
PPTX
Cloud computing security
PPTX
User Behavior based Anomaly Detection for Cyber Network Security
PDF
Webinar - Reducing the Risk of a Cyber Attack on Utilities
PPTX
Cloud computing
PPTX
Software Security
PPTX
Cloud with Cyber Security
PDF
Cloud Security - Emerging Facets and Frontiers
PPTX
Security for cloud native workloads
PDF
Data security in cloud environment
DOCX
resume IT security
PPTX
Cloud security
PDF
DTS Solution - Wireless Security Protocols / PenTesting
PDF
G0314043
PDF
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
PPTX
CLOUD NATIVE SECURITY
PDF
Cloud Security - Made simple
PDF
DTS Solution - Software Defined Security v1.0
Nice network intrusion detection and countermeasure
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
Cloud Security Introduction
Cloud computing security
User Behavior based Anomaly Detection for Cyber Network Security
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Cloud computing
Software Security
Cloud with Cyber Security
Cloud Security - Emerging Facets and Frontiers
Security for cloud native workloads
Data security in cloud environment
resume IT security
Cloud security
DTS Solution - Wireless Security Protocols / PenTesting
G0314043
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
CLOUD NATIVE SECURITY
Cloud Security - Made simple
DTS Solution - Software Defined Security v1.0
Ad

Viewers also liked (20)

PPT
Intrusion detection system ppt
PPT
Data Mining and Intrusion Detection
PDF
Push to pull
PPT
1 pigmentation
PPT
Cc1 cancer derma
PPT
Social apps 3_1_2008
PDF
Tempus PROMIS Work Plan (September 2014)
PDF
How To: Mobile "Hello World" With Xamarin and Visual Studio 2013
PPT
Dc roundtablesmall webservices_2002
PPT
It outsourcing 2005
PPTX
PROMIS Tempus Project
PPT
Middleware 2002
PPTX
3 lesiones deportivas
PPT
10 basics of human genetics
PDF
Enterprise Mobility Management
DOC
Manisha Garg_Resume modified
PPTX
Autodesk inventor basic tools
PPTX
Slide obseravasi pendidikan
PPTX
observasi psikologi pendidikan MAN 2 Model Medan
Intrusion detection system ppt
Data Mining and Intrusion Detection
Push to pull
1 pigmentation
Cc1 cancer derma
Social apps 3_1_2008
Tempus PROMIS Work Plan (September 2014)
How To: Mobile "Hello World" With Xamarin and Visual Studio 2013
Dc roundtablesmall webservices_2002
It outsourcing 2005
PROMIS Tempus Project
Middleware 2002
3 lesiones deportivas
10 basics of human genetics
Enterprise Mobility Management
Manisha Garg_Resume modified
Autodesk inventor basic tools
Slide obseravasi pendidikan
observasi psikologi pendidikan MAN 2 Model Medan
Ad

Similar to Intrusion detection 2001 (20)

PPT
intrusion detection system (IDS)
PDF
Track 5 session 1 - st dev con 2016 - need for security for iot
PPTX
9 - Security
PDF
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
PDF
Security Monitoring Course - Ali Ahangari
PPTX
Intrusion detection
 
PPTX
Synopsis-Data_Leaks_Detection-046(2).pptx
PDF
SIEM enabled risk management , SOC and GRC v1.0
PDF
Chapter 15 incident handling
PPTX
Lecture 10 intruders
PDF
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
PPTX
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
PPTX
RuSIEM overview (english version)
PDF
CNIT 121: 2 IR Management Handbook
PPT
mjr-00-asia-Intrusrrrrrrrrrrrrion-long.ppt
PPT
Intrusiondetection systemscyberinfom.ppt
PPTX
IBM i Security: Identifying the Events That Matter Most
PDF
Preventing The Next Data Breach Through Log Management
PDF
PDF
Soc analyst course content
intrusion detection system (IDS)
Track 5 session 1 - st dev con 2016 - need for security for iot
9 - Security
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
Security Monitoring Course - Ali Ahangari
Intrusion detection
 
Synopsis-Data_Leaks_Detection-046(2).pptx
SIEM enabled risk management , SOC and GRC v1.0
Chapter 15 incident handling
Lecture 10 intruders
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
RuSIEM overview (english version)
CNIT 121: 2 IR Management Handbook
mjr-00-asia-Intrusrrrrrrrrrrrrion-long.ppt
Intrusiondetection systemscyberinfom.ppt
IBM i Security: Identifying the Events That Matter Most
Preventing The Next Data Breach Through Log Management
Soc analyst course content

More from eaiti (18)

PPT
Handheld device med_care_2001
PPT
Ctolinux 2001
PPT
J2ee 2000
PPT
Xp presentation 2003
PPT
Cto forum nirav_kapadia_2006_03_31_2006
PDF
Cloud mz cto_roundtable
PPT
Mobile 2000
PPT
Stateof cto career_2002
PPT
Dions globalsoa web2presentation1_2006
PPT
Thads globalsoa web2presentation2_2006
PPT
Ping solutions overview_111904
PPT
Washdc cto-0905-2003
PPT
Broadband tech 2005
PPTX
Quantum technology
PDF
BigData @ comScore
PDF
Hemispheres of Data
PDF
Using Hadoop
PDF
Greenplum: Driving the future of Data Warehousing and Analytics
Handheld device med_care_2001
Ctolinux 2001
J2ee 2000
Xp presentation 2003
Cto forum nirav_kapadia_2006_03_31_2006
Cloud mz cto_roundtable
Mobile 2000
Stateof cto career_2002
Dions globalsoa web2presentation1_2006
Thads globalsoa web2presentation2_2006
Ping solutions overview_111904
Washdc cto-0905-2003
Broadband tech 2005
Quantum technology
BigData @ comScore
Hemispheres of Data
Using Hadoop
Greenplum: Driving the future of Data Warehousing and Analytics

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Chapter 5: Probability Theory and Statistics
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Architecture types and enterprise applications.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Tartificialntelligence_presentation.pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
Programs and apps: productivity, graphics, security and other tools
Module 1.ppt Iot fundamentals and Architecture
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Hindi spoken digit analysis for native and non-native speakers
Developing a website for English-speaking practice to English as a foreign la...
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
cloud_computing_Infrastucture_as_cloud_p
Chapter 5: Probability Theory and Statistics
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Group 1 Presentation -Planning and Decision Making .pptx
NewMind AI Weekly Chronicles - August'25-Week II
Architecture types and enterprise applications.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
1 - Historical Antecedents, Social Consideration.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Getting Started with Data Integration: FME Form 101
Tartificialntelligence_presentation.pptx
DP Operators-handbook-extract for the Mautical Institute

Intrusion detection 2001

  • 1. Intrusion Detection CTO Forum November 9, 2001 Tom Casey Tcasey@pec.com 703.679.4900
  • 2. 2 Agenda • Risks Associated with E-business • Elements of an Intrusion Detection Strategy • Misuse and Anomaly Detection • Application, Host, and Network Based Tools • Active and Passive Response • Intrusion Detection System Architecture • Technical and Legal Issues • Commercial and Open Source ID systems
  • 3. 3 Reported Incidents Increasing Number of Incidents Reported 0 5000 10000 15000 20000 25000 30000 35000 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 *2001 Years NumberofIncidents *Q1-Q3 2001Cert.org Statistics October 15, 2001 34,754 21,756 2,412 132
  • 4. 4 Risks Associated with E-business • Defaced Websites • Denial of Service/DDOS • Theft of Company Proprietary Information • Theft of Customer Information • Downtime = Loss of Revenue • Negative Press = Negative Public Image • Internal and External Threats
  • 5. 5 History of Intrusion Detection • Intrusion Detection (ID) defined: – Process of monitoring computer networks and systems for violations of security policy • First ID System--manual “system audits” • 1980, ID was born – First document need for automated audit trail review to support security goals • Growth of Internet
  • 6. 6 The Importance of Intrusion Detection • A perfectly secure system is a myth – Firewalls and filtering routers aren’t enough to protect electronic assets • Effective audit information analysis required a tool • An IDS is one of many components supporting a robust security architecture-”Defense in Depth” – Firewalls, VPN, Virus Protection, Vulnerability Assessments etc. • Protect valuable information resources from internal and external threats
  • 7. 7 An IDS can accomplish the following • Prevents and/or mitigates the damage resulting from intrusion • Identifies a precursor of more serious activity • Identifies perpetrators • Discovers new attack patterns
  • 8. 8 Elements of a Complete Intrusion Detection Strategy • Policy! – Policy is living, constantly evolving – ID configuration/design must support policy • Intrusion Detection System (IDS) architecture • Institutionalized Incident Response – Responses map to policy – Working with law enforcement – CERTs • Trained security personnel • Awareness Programs - Support from Users
  • 9. 9 Time Line of an Attack Probing: •Port Sweeps •Address sweeps •Doorknob Ratting Break-in: •Operating System Bugs •Sniffed Passwords •Social Engineering •Back Door Malicious Actions: •Steal Data or Programs •Hop to other systems •Install Back Door •Setup Sniffer •Steal CPU time
  • 10. 10 Misuse Detection • Misuse, signature/pattern-matching • Reliably detecting “known” use patterns • Detects only known intrusions • Difficult handling large volumes of data • Does not handle uncertainty
  • 11. 11 Anomaly Detection • Anomaly Detection • Establish profile of “normal” user behavior • Patterns of abnormality, rare, unusual behavior • Accommodate adaptations to changes in user behavior • Statistical and Quantitative analysis • Assumes users exhibit predictable, consistent patterns of system usage
  • 12. 12 Anomaly Detection (con’t.) User Normal Behavior Anomaly in User Behavior System Administrator Secretary Programmer •Log in as root •Edit user’s access permissions •Run system configuration/ monitoring tools •Logged in locally during company working hours •Uses office automation software (word processing, etc) •Reads and sends emails •Logged in from early morning to late night •Uses software development tools •Browses Internet more often in the evening then the daytime •Becomes a programmer •Accesses Software Development tools •Accesses Software project sources •Logs in from a remote host •Assumes the role of a manager •Logs in as a human resources manager •Gains access to personnel database
  • 13. 13 Intrusion Detection Tools • Application-based – Collects information and detects intrusion at the application layer – Placement: E-commerce Server, WebServer • Host-based – Agent software on host – Monitors: event logs, critical system files, registry settings, etc – Alerts management console, reacts actively and/or passively depending upon policy • Network-based – Operates at the network level – Detects DOS or dangerous payloads before the reach destination – Dedicated host, two interfaces: Management and Stealth
  • 14. 14 Active Responses • User driven • Automatic Responses • System takes action to block the progress of attack – Closing holes, shutting down services, logging an intruder – Block IP address(es) • Collect more information (honey pots)
  • 15. 15 Passive Responses • System logs and reports problem • Alarms and notification – visual, audible, email paper • SNMP traps • Archiving and reporting
  • 16. 16 IDS Architecture Recommendations • Network based – At Internet connection points – Key internal network segments – In the DMZ – Just inside the Firewall (Intranet) – Behind WAP server, WAN router, modem pool • Host-based – Servers containing critical data – Domain servers • Optimum Architecture: Combine misuse and anomaly detection
  • 17. 17 Sample IDS Architecture Firewall Internet Router Web Server(S) DMZ Services Email Relay Border Directory Host IDS Agent Domain Controller Personnel Database User Workstations User Workstations IDS Central Management Console Network Sensor Network Sensor Network Sensor User WorkstationsStealth Mode Customer Database Corporate Private Network Web Server(s) File and Print Server
  • 18. 18 Technical Issues • Scalability – Scaling over space as the network grows • Management – Network Management – Sensor Controls – Investigative Support – Performance Loads – User Interface • Reliability – Quality of analysis engines – Response mechanisms
  • 19. 19 Technical Issues (con’t) • Analysis – Difficulties categorizing attacks/threats – False positives/negatives (tuning anomaly detection engines) – Trend analysis, event correlation, data mining • Interoperability – Tools to collect information from: multiple abstraction layers, hardware, software – Audit trail standards • Integration – Intrusion detection in a Switched Environment – Intrusion detection in a Crypto Environment
  • 20. 20 Legal Issues • Legislation – Computer fraud and abuse statutes – Electronic Communications Privacy Act Sec 2510 • System logs are circumstantial evidence – Requires proof of authenticity – Testimony of responsible parties – Expert to explain log file contents – Maintaining redundant event log records • Electronic Monitoring – System admin monitoring vs. Law enforcement monitoring • Cyber Forensics
  • 21. 21 Commercial and Open Source • Leading Commercial Vendors – Internet Security Systems (ISS): RealSecure – NetworkICE: BlackICE – Enterasys System: Dragon – Cisco Secure Systems: IDS – NFR: Network Intrusion Detection • Open Source – Snort.org • Managed Security Providers (MSPs) – Leverage the MSPs’ security expertise – Ideal for Small/Mid-sized business – Leverage MSP experience with other customers – Focus your staff and resources on your core business activities – 24X7X365 Monitoring and Notification
  • 22. 22 Current and Future Trends in IDS • Protocol Scanners • “Meta” Detection – Interoperability – Centralized Administration, Management, and Reporting • IDS Appliances – No general purpose OSes to configure and maintain – No patches/Drivers to install – Facilitates: accuracy, speed, and remote management – 100 Gigabit Detection
  • 23. 23 References • Internet Security Systems: www.iss.net • Enterasys Networks: www.enterasys.com • Cisco Systems: www.cisco.com • Snort: www.snort.org • NFR Security www.nfr.com • CERT @ Carnegie Melon: www.cert.org • Sans Institute: “The Twenty Most Critical Internet Security Vulnerabilities” http://www.sans.org/top20.htm • Computer Security Institute: "2001 Computer Crime and Security Survey" http://www.gocsi.com/prelea/000321.html