Network intrusion
detection/prevention systems
NIDS (detecton system)
• realtime attack detection
• passive (watchers) / active (measurement)
systems
• via analysis
– protocol analysis
– graph analysis
– anomaly detection
• analysis of direct network traffic
– complete / light
NIDS scheme
http://insecure.org/stf/secnet_ids/evasion-figure3.gif
Traffic analysis
• analyzing behaviour, not just packets
• difficulties
– NIDS can be run from different part of network
– bad packets
– reordering issues
• sensor placement
– inline
– passive
• spanning port
• network tap
• load balancer
http://csrc.nist.gov/publications/drafts/800-94-rev1/draft_sp800-94-rev1.pdf
http://csrc.nist.gov/publications/drafts/800-94-rev1/draft_sp800-94-rev1.pdf
Signature-based analysis
• pattern matching
• “patterns of malicious traffic”
• very elementary (basically grepping)
+ huge community for rule generation
+ great for low level analysis (rules are very specific)
+ not taking too much resources
- lower performance with big ruleset
- slight attack variation can beat the rule
Rule example
# alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (
msg:"OS-SOLARIS EXPLOIT sparc overflow attempt";
flow:to_server,established; content:"|90 1A C0 0F 90 02|
|08 92 02| |0F D0 23 BF F8|";
fast_pattern:only;
metadata:ruleset community, service dns;
classtype:attempted-admin;
sid:267; rev:13;
)
Protocol-based analysis
• reviewing network data
• strictly based on layer headers
• knowledge of expected values
+ better possibility for scalability
+ generic, able to catch zero-day exploits
- protocol headers preprocessor need resources
- rules can get extremely difficult to write/understand
- provide low information, admin has to investigate
Types of detected events
• transport layer attack
• network layer attack
• unexpected services (tunnel, backdoor etc.)
• policy violations (forbidden protocols, ports
etc.)
note: detection with accuracy
Types of attack
• evasion/insertion attacks
– bad IP headers
– bad IP options
– direct frame addressing
• IP packets fragmentation
– set up delay for dropping stored packets
• TCP layer problems
– sync between NIDS and end system
Prevention
• passive
– ending TCP stream
• inline
– inline firewalling
– throttling bandwith usage
– altering malicious content
• passive and inline
– running third party script
– reconfiguring other network devices
Toolset
• SNORT
– opensource
– windows / linux
– lots of plugins
• OSSIM (security information and event
management)
• Sguil (network security monitor)
SNORT
• started as sniffer in 1998
• sniffer, packet logger, and NIDS
• most used open-source NIDS right now
• loads of add-ons
• big and stable community (regular community
rule releases)
Firewall network with SNORT
SNORT add-ons
• DumbPig
– bad rule grammar detection
• OfficeCat
– search for vurneabilities in Microsoft Office docs
• SnoGE
– reporting tool parsing your logs and visualising them as
points at Google Maps
• Oinkmaster
– tool for creating and managing rules
• iBlock
– daemon grepping alert file and blocking offending hosts
http://www.snort.org/snort-downloads/additional-downloads
Q&A

More Related Content

PPTX
Network Intrusion Detection Systems #2
PDF
Group meeting: TaintPipe - Pipelined Symbolic Taint Analysis
PDF
1. Network Security Monitoring Rationale
PDF
Network Exploitation
PPTX
Computer networks and network security
PPTX
Introduction to cyber forensics
PDF
CNIT 121: 9 Network Evidence
PPTX
Slidecast - Workshop
Network Intrusion Detection Systems #2
Group meeting: TaintPipe - Pipelined Symbolic Taint Analysis
1. Network Security Monitoring Rationale
Network Exploitation
Computer networks and network security
Introduction to cyber forensics
CNIT 121: 9 Network Evidence
Slidecast - Workshop

Similar to Network Intrusion Detection Systems #1 (20)

PPTX
Intrusion Prevention System
DOC
06686259 20140405 205404
PDF
N44096972
PPT
ids.ppt
PPTX
Industrial Training - Network Intrusion Detection System Using Snort
PDF
Survey on Host and Network Based Intrusion Detection System
PDF
CNIT 152: 9 Network Evidence
PPTX
INTERNET SECURITY SYSTEM
PPT
Intrusion Detection System
PDF
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
PPTX
Understanding Intrusion Detection & Prevention Systems (1).pptx
PPTX
Intrusion detection system
ODP
Introduction To NIDS
PPTX
infoAssurance (1).pptx
PPSX
Linux for Cybersecurity CYB110 - Unit 8.ppsx
PDF
IDS (intrusion detection system)
PDF
A Study on Recent Trends and Developments in Intrusion Detection System
PPT
Intrusion detection and prevention
PPT
Intrusion Detection And Prevention
PPTX
Intrusion Detection System(IDS)
Intrusion Prevention System
06686259 20140405 205404
N44096972
ids.ppt
Industrial Training - Network Intrusion Detection System Using Snort
Survey on Host and Network Based Intrusion Detection System
CNIT 152: 9 Network Evidence
INTERNET SECURITY SYSTEM
Intrusion Detection System
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
Understanding Intrusion Detection & Prevention Systems (1).pptx
Intrusion detection system
Introduction To NIDS
infoAssurance (1).pptx
Linux for Cybersecurity CYB110 - Unit 8.ppsx
IDS (intrusion detection system)
A Study on Recent Trends and Developments in Intrusion Detection System
Intrusion detection and prevention
Intrusion Detection And Prevention
Intrusion Detection System(IDS)
Ad

Recently uploaded (20)

PDF
Zenith AI: Advanced Artificial Intelligence
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPT
What is a Computer? Input Devices /output devices
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Architecture types and enterprise applications.pdf
DOCX
search engine optimization ppt fir known well about this
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Five Habits of High-Impact Board Members
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
A review of recent deep learning applications in wood surface defect identifi...
Zenith AI: Advanced Artificial Intelligence
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
A novel scalable deep ensemble learning framework for big data classification...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Enhancing emotion recognition model for a student engagement use case through...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Final SEM Unit 1 for mit wpu at pune .pptx
What is a Computer? Input Devices /output devices
Assigned Numbers - 2025 - Bluetooth® Document
Univ-Connecticut-ChatGPT-Presentaion.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
Architecture types and enterprise applications.pdf
search engine optimization ppt fir known well about this
Hindi spoken digit analysis for native and non-native speakers
1 - Historical Antecedents, Social Consideration.pdf
Chapter 5: Probability Theory and Statistics
Five Habits of High-Impact Board Members
Module 1.ppt Iot fundamentals and Architecture
Web Crawler for Trend Tracking Gen Z Insights.pptx
A review of recent deep learning applications in wood surface defect identifi...
Ad

Network Intrusion Detection Systems #1

  • 2. NIDS (detecton system) • realtime attack detection • passive (watchers) / active (measurement) systems • via analysis – protocol analysis – graph analysis – anomaly detection • analysis of direct network traffic – complete / light
  • 4. Traffic analysis • analyzing behaviour, not just packets • difficulties – NIDS can be run from different part of network – bad packets – reordering issues • sensor placement – inline – passive • spanning port • network tap • load balancer
  • 7. Signature-based analysis • pattern matching • “patterns of malicious traffic” • very elementary (basically grepping) + huge community for rule generation + great for low level analysis (rules are very specific) + not taking too much resources - lower performance with big ruleset - slight attack variation can beat the rule
  • 8. Rule example # alert tcp $EXTERNAL_NET any -> $HOME_NET 53 ( msg:"OS-SOLARIS EXPLOIT sparc overflow attempt"; flow:to_server,established; content:"|90 1A C0 0F 90 02| |08 92 02| |0F D0 23 BF F8|"; fast_pattern:only; metadata:ruleset community, service dns; classtype:attempted-admin; sid:267; rev:13; )
  • 9. Protocol-based analysis • reviewing network data • strictly based on layer headers • knowledge of expected values + better possibility for scalability + generic, able to catch zero-day exploits - protocol headers preprocessor need resources - rules can get extremely difficult to write/understand - provide low information, admin has to investigate
  • 10. Types of detected events • transport layer attack • network layer attack • unexpected services (tunnel, backdoor etc.) • policy violations (forbidden protocols, ports etc.) note: detection with accuracy
  • 11. Types of attack • evasion/insertion attacks – bad IP headers – bad IP options – direct frame addressing • IP packets fragmentation – set up delay for dropping stored packets • TCP layer problems – sync between NIDS and end system
  • 12. Prevention • passive – ending TCP stream • inline – inline firewalling – throttling bandwith usage – altering malicious content • passive and inline – running third party script – reconfiguring other network devices
  • 13. Toolset • SNORT – opensource – windows / linux – lots of plugins • OSSIM (security information and event management) • Sguil (network security monitor)
  • 14. SNORT • started as sniffer in 1998 • sniffer, packet logger, and NIDS • most used open-source NIDS right now • loads of add-ons • big and stable community (regular community rule releases)
  • 16. SNORT add-ons • DumbPig – bad rule grammar detection • OfficeCat – search for vurneabilities in Microsoft Office docs • SnoGE – reporting tool parsing your logs and visualising them as points at Google Maps • Oinkmaster – tool for creating and managing rules • iBlock – daemon grepping alert file and blocking offending hosts http://www.snort.org/snort-downloads/additional-downloads
  • 17. Q&A