intruders types ,detection & prevention

26
Presented by: Tufail(130228)

Upload: central-university-of-kashmir

Post on 09-Jan-2017

519 views

Category:

Devices & Hardware


0 download

TRANSCRIPT

Page 1: intruders types ,detection & prevention

Presented by: Tufail(130228)

Page 2: intruders types ,detection & prevention

2Central University of kashmir

Page 3: intruders types ,detection & prevention

In early study of Intrusion Anderson identified three classes of Intruders:

Masqueraders: An individual who is not authorized to use the computer & who penetrates a systems access controls to exploit a legitimate user’s account.

Misfeasor: A legitimate user who accesses data programs or resources for which such access is not authorized , or who is authorized for such access but misuses his/her privileges.

Clandestine User: An individual who seizes supervisory control of the system & uses this control to evade auditing & access controls or to suppress audit actions.

3Central University of kashmir

Page 4: intruders types ,detection & prevention

Central University of kashmir 4

Page 5: intruders types ,detection & prevention

Intrusion detection: is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible intrusions (incidents).

Intrusion detection system (IDS): is software that automates the intrusion detection process. The primary responsibility of an IDS is to detect unwanted and malicious activities.

Intrusion prevention system (IPS): is software that has all the capabilities of an intrusion detection system and can also attempt to stop possible incidents.

Intrusion Detection & prevention System (IDPS): evaluates a suspected intrusion once it has taken place ,signals an alarm& makes attempts to stop it. It watches for activities specifically designed to be overlooked by Firewall’s filtering rules.

5Central University of kashmir

Page 6: intruders types ,detection & prevention

Unauthorized access to the resources Password crackingSpoofing e.g. DNS spoofingScanning ports & services Network packet listeningStealing informationUnauthorized network accessUses of IT resources for private purpose

Unauthorized alternation of resourcesFalsification of identity Information altering and deletionUnauthorized transmission and creation of dataConfiguration changes to systems and n/w services

6Central University of kashmir

Page 7: intruders types ,detection & prevention

Denial of ServiceFlooding

Ping floodMail flood

Compromising system Buffer overflowRemote system shutdown

Web application attack

“Most attacks are not a single attack but a series of individual events developed in coordinated manner”

7Central University of kashmir

Page 8: intruders types ,detection & prevention

Central University of kashmir 8

Page 9: intruders types ,detection & prevention

Central University of kashmir 9

Page 10: intruders types ,detection & prevention

10Central University of kashmir

Page 11: intruders types ,detection & prevention

Audit Data Preprocessor

Audit Records

Activity Data

Detection Models Detection Engine

Alarms

Decision Table

Decision EngineAction/Report

system activities are system activities are observableobservable

normal and intrusive normal and intrusive activities have distinct activities have distinct

evidenceevidence

Page 12: intruders types ,detection & prevention

These are three models of intrusion detection mechanisms:

• Anomaly detection (statistical based)• Misuse Detection (Signature-based) • Hybrid detection.

12Central University of kashmir

Page 13: intruders types ,detection & prevention

1)Misuse Detection: The misuse detection concept assumes that each intrusive activity is representable by a unique pattern or a signature so that slight variations of the same activity produce a new signature and therefore can also be detected.

They work by looking for a specific signature on a system.  Identification engines perform well by monitoring these patterns of known misuse of system resources.

Examples: A telnet attempt with a username of “root”, which is a violation of an

organization’s security policy An e-mail with a subject of “Free pictures!” and an attachment filename

of “freepics.exe”, which are characteristics of a known form of malware

13Central University of kashmir

Page 14: intruders types ,detection & prevention

2)Anomaly detection: monitors network traffic and compare it against an established baseline. The baseline will identify what is “normal” for that network- what sort of bandwidth is generally used, what protocols are used, what ports and devices generally connect to each other- and alert the administrator or user when traffic is detected which is anomalous, or significantly different, than the baseline. The issue is that it may raise a False Positive alarm for a legitimate use of bandwidth if the baselines are not intelligently configured.

14Central University of kashmir

Page 15: intruders types ,detection & prevention

True Positive: : Attack - AlertFalse Positive: : No attack - AlertFalse Negative: : Attack - No AlertTrue Negative: : No attack - No Alert

15Central University of kashmir

Page 16: intruders types ,detection & prevention

IDPS are classified based on their monitoring scope. They are:

1) network-based intrusion detection and2) host-based detections. Network-Based Intrusion Detection

Systems (NIDSs)/NDPSNIDSs have the whole network as the

monitoring scope. They monitor the traffic on the network to detect intrusions.  They are responsible for detecting anomalous, inappropriate, or other data that may be considered unauthorized and harmful occurring on a network.

16Central University of kashmir

Page 17: intruders types ,detection & prevention

17Central University of kashmir

Page 18: intruders types ,detection & prevention

misuse is not confirmed only to the “bad” outsiders but the problem is more rampart within organizations. To tackle this problem, security experts have turned to inspection of systems within an organization network. This local inspection of systems is called host-based intrusion detection systems (HIDS).

Host-based intrusion detection is the technique of detecting malicious activities on a single computer.

18Central University of kashmir

Page 19: intruders types ,detection & prevention

A HIDS, is therefore, deployed on a single target computer and it uses software that monitors operating system specific logs including system, event, and security logs on Windows systems and syslog in Unix environments to monitor sudden changes in these logs.

When a change is detected in any of these files, the HIDS compares the new log entry with its configured attack signatures to see if there is a match. If a match is detected then this signals the presence of an illegitimate activity.

19Central University of kashmir

Page 20: intruders types ,detection & prevention

20Central University of kashmir

Page 21: intruders types ,detection & prevention

A honeypot is a system designed to look like something that an intruder can hack. to deceive attackers and learn about their tools

and methods. Honeypots are also add-on/tools that are not strictly

sniffer-based intrusion detection systems like HIDS and NIDS. However, they are good deception systems that protect the network in much the same way as HIDS and NIDS.  

Since the goal for a honeypot is to deceive intruders and learn from them without compromising the security of the network, then it is important to find a strategic place for the honeypot. In the DMZ for those networks with DMZs or behind the network firewall if the private network does not have a DMZ.

21Central University of kashmir

Page 22: intruders types ,detection & prevention

22Central University of kashmir

Page 23: intruders types ,detection & prevention

A honey pot is a system that is deliberately named and configured so as to invite attackswift-terminal.bigbank.comwww-transact.site.comsource-r-us.company.comadmincenter.noc.company.net

23Central University of kashmir

Page 24: intruders types ,detection & prevention

24Central University of kashmir

Page 25: intruders types ,detection & prevention

25Central University of kashmir

Page 26: intruders types ,detection & prevention

26Central University of kashmir