DCIT 418 System and Network Security Module 2 : Detecting and Preventing System Intrusions Lecturer: Dr E.D. Ansong , Dept of Computer Sc. Contact Information: [email protected]
Learning Objectives By the end of this module, you should be able to: Provide an overview of what system intrusions are, including common methods used by attackers to gain unauthorized access to computer systems. Explain the role of intrusion detection systems in identifying and alerting to potential security breaches, including network-based and host-based IDS. . ED Ansong Dept of Computer Sc. Slide 2
Learning Objectives Describe how intrusion prevention systems go beyond detection to actively block or mitigate threats in real-time, enhancing overall network security. Discuss challenges associated with intrusion detection and prevention, such as false positives (incorrectly identifying benign activity as malicious) and false negatives (failing to detect actual intrusions).
Intrusion Terminology Intrusion: attack on information where malicious perpetrator tries to break into, disrupt system Intrusion detection: includes procedures and systems created and operated to detect system intrusions Intrusion reaction: covers actions organization takes upon detecting intrusion • Intrusion correction activities: restore normal operations I n t r u s i on pr eve n ti o n : acti ons t h a t t r y t o d ete r i n t r us i ons p r o acti v el y
Intrusion Detection System (IDS) An Intrusion Detection System (IDS) is a security tool designed to monitor network or system activities for malicious or suspicious behavior. It works by analyzing incoming and outgoing network traffic, as well as system logs, looking for patterns that indicate unauthorized access, misuse, or potential security threats.
Some IDS Terminologies Alert,Alarm : A notification generated by an IDS to indicate suspicious or potentially malicious activity detected on the network or system. False Negative: A false negative occurs when an IDS fails to detect actual malicious activity or an intrusion, incorrectly classifying it as benign or normal behavior. False Positive: occurs when an IDS incorrectly identifies legitimate activity as malicious or suspicious, generating unnecessary alerts or alarms
Some IDS Terminologies Cont’d Confidence Value: The confidence value represents the level of certainty or reliability assigned to an alert or detection event by the IDS. Alarm Filtering: Alarm filtering refers to the process of prioritizing and managing alerts generated by an IDS to reduce the volume of notifications and focus attention on the most critical security events.
Terminologies Cont’d Confidence Value: The confidence value represents the level of certainty or reliability assigned to an alert or detection event by the IDS. Alarm Filtering: Alarm filtering refers to the process of prioritizing and managing alerts generated by an IDS to reduce the volume of notifications and focus attention on the most critical security events.
Why Use an IDS Prevent problem behaviors by increasing the perceived risk of discovery and punishment Detect attacks and other security violations Detect and deal with preambles to attacks Document existing threat to an organization Act as quality control for security design & administration Provide useful information about intrusions that take place
Types of Intrusion Detection System (IDS) There are two main types of IDS Network-based IDS (NIDS): NIDS monitors network traffic in real-time, examining packets passing through the network. It can detect anomalies or known attack patterns by comparing network activity to a database of signatures or predefined rules Host-based IDS (HIDS): HIDS operates on individual host machines, monitoring activities such as file system changes, logins, and system calls. It compares these activities against known patterns of malicious behavior from normal activity.
Types of IDS Cont’d There is also Application-based Intrusion Detection Systems (IDS) Unlike network-based IDS, which focus on monitoring network traffic, application-based IDS operate at the application layer of the OSI (Open Systems Interconnection) model, analyzing activity within individual applications or services
Advantages of NIDS Advantages Organization can monitor large network with few devices Passive; deployment minimally disrupts operations • Less susceptible to attack; attackers may not detect them
Disadvantages of NIDS Disadvantages Can be overwhelmed by volume of network traffic Need to monitor all traffic Cannot analyze encrypted network packets Cannot determine if attack was successful Cannot detect some attacks (e.g., fragmented packets)
How NIDS works Figure 2.0 NIDS operation
Statistical anomaly-based (stat IDS) • Statistical anomaly-based IDS sample network activity, compare to “known normal” traffic IDS sounds alarm when activity is outside baseline parameters • Advantage: IDS can detect new types of attacks • Disadvantages: – Requires more overhead, compute power than signature-based IDSs – May generate many false positives
Advantages of HIDS Advantages Detect local events, attacks on host systems that NIDSs may not Can view encrypted traffic (as it has been decrypted on system) H I D S is una f f ec t ed by s w it ched network protocols Can detect inconsistencies in apps, programs by examining audit logs
Disadvantages of HIDS Disadvantages Harder to manage than NIDSs Vulnerable to attacks against host operating system, HIDS Cannot detect scans of multiple hosts, non-network devices H I D Ss po t en ti al t a r ge t s f or den i a l - of-service (DoS) attack May use lots of disk space Possible large compute
How HIDS works Figure 3.0 HIDS operation
IDS Deployment Overview NIST recommends four locations for NIDSs: Location 1: behind each external firewall, in the network DMZ Location 2: outside an external firewall Location 3: on major network backbones Location 4: on critical subnets
Deploying HIDS • Steps: – First: install HIDSs on most critical systems – Next: install HIDSs on all systems or until organization reaches tolerable degree of coverage
Measuring Effectiveness of IDS • IDSs are evaluated using two dominant metrics: – # of attacks detected in a known collection of probes – Network bandwidth at which IDSs fail Example: At 1 Gbits /sec, IDS detected 95% of directed attacks against it • Many vendors provide test suites for verification • Example test suites: – Record, retransmit real packet trace from virus/worm – Perform same for malformed packets (e.g., SYN flood) – Launch
Honeypots, Honeynets, and Padded Cell Systems • Honeypots: decoy systems designed to lure potential attackers away from critical systems • Design goals: – Divert attacker from accessing critical systems – Gather information about attacker’s activity – Encourage attacker to linger so admins can document event, respond
Honeypots, Honeynets, and Padded Cell Systems Honeynets: collection of honeypots connected in a subnet • Padded cell: honeypot protected in order to hinder compromise – Typically works in tandem with traditional IDS – When IDS detects attackers, it transfers them to “special environment” where they cannot cause harm (hence the name)
Scanning and Analysis Tools They are often used to collect information that attacker would need to launch successful attack Attack protocol: sequence of attacker’s steps to attack target system/network • Footprinting : determining what hostnames, IP addresses a target org. owns Fingerprinting: systematic survey of resources found in footprinting stage – Useful for discovering weaknesses in org.’s network or systems
Port Scanners Tools used by attackers, defenders to identify computers on network (plus other info.) • Can scan for certain computers, protocols, resources (or generic scans) • Example: nmap ( https://nmap.org/ )
Vulnerability Scanners Active vulnerability scanners scan networks for highly detailed information; initiate traffic to determine holes Passive vulnerability scanners listen in on network and determine vulnerable versions of both server and client software Passive vulnerability scanners have ability to find client-side vulnerabilities typically not found in active scanners
Packet Sniffers Network tool that collects copies of packets from network and analyzes them Can provide network administrator with valuable information for diagnosing and resolving networking issues In the wrong hands, a sniffer can be used to eavesdrop on network traffic To use packet sniffer legally, administrator must be on network that organization owns, be under direct authorization of owners of network and have consent of the content creators
Defense in Depth The Defense in Depth strategy employs layered security mechanisms to provide comprehensive protection against diverse threats. By implementing multiple layers of defense, organizations can mitigate risks and minimize the impact of potential security breaches.
Cryptography in Network Security Cryptography is a fundamental tool in network security, facilitating secure communication and data protection through encryption and decryption processes. Key concepts include: Symmetric Encryption: Utilizing a single shared key for both encryption and decryption.
Cryptography in Network Security Asymmetric Encryption: Employing a pair of keys (public and private) for encryption and decryption. Digital Signatures: Verifying the authenticity and integrity of digital messages.
Secure Network Protocols Secure protocols are essential for safeguarding data transmission over networks: SSL/TLS (Secure Sockets Layer/Transport Layer Security): Encrypts data exchanged between web servers and clients, ensuring confidentiality and integrity. IPsec (Internet Protocol Security): Provides secure communication at the IP layer, enabling VPNs and secure data transmission. SSH (Secure Shell): Facilitates secure remote access and command execution on network devices.
Access Control Devices A successful access control system includes number of components, depending on system’s needs for authentication and authorization Strong authentication requires at least two forms of authentication to authenticate the supplicant’s identity The technology to manage authentication based on what a supplicant knows is widely integrated into the networking and security software systems in use across the IT industry
Access Control Devices A successful access control system includes number of components, depending on system’s needs for authentication and authorization Strong authentication requires at least two forms of authentication to authenticate the supplicant’s identity The technology to manage authentication based on what a supplicant knows is widely integrated into the networking and security software systems in use across the IT industry
Access Control Devices Access control : authenticates, authorizes users Authentication : validate a person’s identity Authorization : specify what the person can do with computers, networks Recommended: use ≥ two types of auth. technology
Access Control Devices Four main ways to authenticate person : What a person knows (e.g., password); What a person has (e.g., Duo Mobile app code); Who a person is (e.g., fingerprint);
Effectiveness of Biometrics Biometric technologies evaluated on three basic criteria: False reject rate : T he False Reject Rate, also known as Type I error, measures the frequency at which a biometric system incorrectly rejects an authorized person.
Effectiveness of Biometrics False accept rate: The False Accept Rate, also known as Type II error, measures how often a biometric system incorrectly accepts an unauthorized person. Crossover error rate (CER) : The Crossover Error Rate is the point at which the False Reject Rate and the False Accept Rate are equal.
Acceptability of Biometrics
Summary Intrusion detection system (IDS) detects configuration violation and sounds alarm Network-based IDS (NIDS) vs. host-based IDS (HIDS) Complex selection of IDS products that fit an organization’s needs S ca nning a nd a n a ly s is tools a r e u se d to pinpoint vuln e r a biliti e s in s y s t e m s , hol e s in sec u r ity c ompon e nt s , a nd un sec u r e d as p ec ts n e two r k