Information Security, Network Security, Cache Poisoning
ahmohil78
11 views
91 slides
May 26, 2024
Slide 1 of 91
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
About This Presentation
All the concepts related to Internet security including tunling, cache poisioning
Size: 4.57 MB
Language: en
Added: May 26, 2024
Slides: 91 pages
Slide Content
Network Security II
Domain Name System
•The domain name system (DNS) is an application‐layer
protocol for mapping domain names to IP addresses
Vacation
Savings
DNS
http://208.77.188.166
My Example Blog Spot
http://www.example.com
My Example Blog Spot
Vacation Savings
www.example.com
208.77.188.166
DNS
•Domain names
–are arrange in hierarchy
–Read from right to left
–www.example.com has
•com is Top Level Domain (TLD)
•example.com is subdomain of com
•www.example.com is subdomain of example.com
•Domain names form a rooted tree
–Each node is a domain
–Children of each node is subdomain
•Root is empty domain name
–Children of root are TLD
3
4
Domain Name Registration
•Two primary domains in use today
–Generic TLD (.com, .net, .edu, .org)
–Country code TLD (.pk, .au, .de, .it)
•Domain name registrars
–Responsible for domain name registration
–Accredited by Internet Corporation for Assigned Names
and Number (ICANN)
•Responsible for allocation IP address space
–Web site owner contact domain name registrar to reserve
name on their behalf
•Registration process
–Simple
–Small fee and providing contact information
5
How DNS is organized
6
•Name server
•Authoritative name server
•Root name server
7
How DNS query works
DNS cache
•DNS is centralized service utilized by billion of
machine connected with Internet
•To reduce DNS traffic and resolve domain names
efficiently
–DNS cache is used that Allows both clients and lower level
DNS servers to keep DNS cache
•It is a table of recently received DNS record
–Name server uses this cache to resolve queries for domain
names it has answered recently
8
Cont.
•How DNS resolution works
–First designated server checks its cache, return the IP
address if a record is found
–If not, designated name server queries root name server
and resolve the domain name as discussed
–Designated name server return the result as it is returned
to client
9
DNS infinite loop
•.com name server reply indicate that authoritative name
server for example.com domain is ns1.example.com
•DNS responses received at other name servers are identify by
name not by IP
•So another DNS request is generated ns1.example.com
10
DNS attacks
•Pharming
–DNS request can be subverted so that an attacker could
control how DNS requests resolve
–Attacker could cause request for websites to resolve to
false IP addresses
•IP addresses of his own malicious server causes the victim to view
or download undesired content, malware
•Phishing
–Pharming resolve a domain name to a website that appear
to be identical to requested website
11
12
Other Pharming Attacks
•Email
–Attacker can redirect email intended for certain domain to
a malicious server
•Associate domain name used for OS system updates
with malicious IP address
–Causes victim to automatically download and execute
malicious code instead of needed software patch
13
DNS cache Poisoning
•Attacker attempts to trick a DNS server into cache a
false DNS record
•It causes all downstream clients issuing DNS request
to that server to resolve domains to attacker
supplied IP
14
DNS cache Poisoning ‐Scenario
•Eve launch DNS cache poisoning attack against ISP
DNS server
–She rapidly transmit DNS queries to this ISP DNS server,
•ISP DNS send queries to authoritative name server
–Eve send DNS response to her own query
•Eve spoofing source IP address as that of authoritative name server
and
•destination IP set to ISP DNS server
–ISP DNS server accept Eve’s forge response and cache DNS
entry
•Associating the domain that Eve requested with malicious IP
address that Eve provided in her forged response.
15
16
•First attacker sends a DNS request for domain he
wishes to poison.
•ISP DNS server checks its cache and queries root
name servers for domain
•Attacker sends a reply for his own request,
guessing the transaction ID.
•If successfully guesses random query ID chosen by
ISP DNS server, the response will be cache
•Any client of ISP DNS server issuing DNS request
for the poisoned domain will be redirected to
attacker’s IP
DNS cache poisoning
•Obstacles for attacker
–First Attacker must issue a response to her own query before
authoritative name server
•Easily overcome
–Second, each DNS request is given 16 bit query ID, if response
is not marked with same ID as in request, it will be ignored
•Previously DNS software simply use sequential no
•Now DNS software implements randomization of query ID
17
Birthday paradox
•The probability of two or more people in a group of
23 sharing same birthday is greater than 50%
•In a group of 23 people
–There are actually 22+21+. . . +1 = 253 pairs of birthday
–Only one matching pair is required for birthday paradox
18
19
DNS cache poisoning and birthday paradox
•An attacker issue a fake response will guess a
transaction ID equal to one of n different IDs with
probability
(ISP DNS sends n request for DNS look up)
= n/65536
16 bit transaction ID, 2^16 = 65536
•Hence, she would fail to match one with probability
= 1 –n/65536
•Attacker issuing n fake responses fail to guess a
transaction ID equal to one of n different IDs with
probability
= (1 –n/65636) ^ n
20
Cont.
•For n=213
= (1 –213/65636) ^ 213 = 0.4998
•By issuing at least 213 request and equal number of fake
response,
•Attacker would have 50% chance that one of her random
responses will match a real request
21
Subdomain DNS cache Poisoning
•Guessing attack is limited because of narrow time
frame
•DNS response is cached for time specified in TTL (sec)
•When name server caches a DNS response, it uses that
record rather then issuing a new query
•Hence, attacker can make as many guesses as he can
send in the
time b/w the initial request
(by attacker to ISP
DNA)
and valid reply from authoritative server
•On each failed attempt, the valid response
(by authoritative
server)
will be cached by server
–So attacker must wait for that response to expire before
trying again
–Responses may be cached for minutes, hours and days
22
Cont.
•Subdomain DNS cache poisoning: an attack
discovered in 2008
•It successfully perform DNS cache poisoning
•Attacker issue many DNS request for non existing
subdomains of target domain.
•Name server for target domain ignores these requests
•The attacker issues spoofed DNS responses
–Attacker response includes a response that resolves the
name server of that target domain e.g., example.com to a
malicious IP address
–Was successful against many DNS software package e.g., BIND
23
Client side DNS cache poisoning attacks
•Similar attack can be launched for target client
•Attacker construct a website containing html tag
•These tags issue request to non existing subdomain
of the domain that attacker wants to poison
•When attacker gets indication that victim has visit
that page, he send DNS replies to client
•On successful attack
the client will cache the
poisoned DNS entry
24
25
•Victimvisitamaliciouswebsite
•Victim view a page that contains many
images,
•Each image causing a separate DNS
requesttobemadetononexisting
subdomain of the domain that is to be
poisoned
•Malicious web server sends guessed
responsestoeachoftheserequest.
•On successful guess the client DNS
cacheispoisoned
Identifying risk of subdomain DNS cache
poisoning
•Major weakness in DNS protocol
–Relying on a 16 bit number as only mechanism for
verifying authenticity of DNS response
26
Some defenses
•Most DNS cache poisoning attacks target ISP DNS
server local DNS (LDNS) rather than authoritative
name servers
•Before 2008, LDSN are accessible to outside world
•Since 2008, LDNS servers are configure to accept
request from within their internal network
•This prevents all cache poisoning attempt originating
from outside of ISP
network
27
Cont.
•Source port randomization
–Randomize the port from which the DNS request originate
(and must be replied)
–This decreases likelihood of successfully accepting a false
DNS reply
28
DNSSEC
•It is set of security extension to DNS protocol
•It prevent attacks by digitally signing all DNS replies
using public key cryptography
•It make infeasible for attacker to spoof a DNS reply
and poison DNS cache
29
Cont.
•DNS request packet also indicate DNSSEC is
supported
•If server also support DNSSEC, then a Resource
Record Signature RRSIG, DNSKEY is returned along
with resolved query
–RRSIG: contains digital sig. (hash of return record is
encrypted by authoritative server with its private key
–DNSKEY: contains the authoritative server public key
•Client can verify the authenticity of return record
(response from server) by
–Decrypting digital Sig. using public key of authoritative
server and comparing that hash to locally computing hash
30
Cont.
•Trust on name server public key is required
–Otherwise attacker simply sign fake DNS response record
with his private key and send his public key as a DNSKEY
•To prevent DNSSEC employ chain of trust
•Each DNS Zone has a parent zone except root zone
•To validate particular zone public key
1. Client request designated signer (DS) record from zone’s
parent, which contains hash of child zone’s public key
2. In addition to DS, parent name server returns its own
DNSKEY record and another RRSIG (digital sig copy of DS)
•Signature verification by client
–Client uses parent name server DNSKEY to decrypt RRSIG (2)
–Compare this to DS received (1)
–Finally compare DS record to child name server’s DNSKEY
31
32
•book.example.com
returns a signed DNS
response along with its
publickey
•Example.com sends its
public key and signed DS
record validating the
public key of
book.example.com
•.com sends its public key
and a signed DS record
validating the public key
ofexample.com.
•The client can trust this
chain since it knows the
publickey
of.com
2. Firewall
33
•To protect private networks and individual machines from the dangers
of the greater Internet, a firewall can be employed to filter incoming or
outgoing traffic based on a predefined set of rules called firewall
policies
Firewall Policies
•Packets flowing through a firewall can have one of three
outcomes:
–Accepted: permitted through the firewall
–Dropped: not allowed through with no indication of failure
–Rejected: not allowed through, accompanied by an attempt
to inform the source that the packet was rejected
•Policies used by the firewall to handle packets
are based on
several properties of the packets being inspected, including the
protocol used, such as:
–TCP or UDP
–the source and destination IP addresses
–the source and destination ports
–the application‐level payload of the packet (e.g., whether it
contains a virus)
34
Blacklists and White Lists
•There are two fundamental approaches to creating firewall
policies (or rule sets) to effectively minimize vulnerability
•Blacklistapproach
–All packets are allowed through except those that fit the rules
defined specifically in a blacklist.
–This type of configuration is more flexible in ensuring that service
to the internal network is not disrupted by the firewall, but is naïve
from a security perspective in that it assumes the network
administrator can enumerate all of the properties of malicious
traffic.
•Whitelistapproach
–A safer approach to defining a firewall rule set is the default‐deny
policy, in which packets are dropped or rejected unless they are
specifically allowed by the firewall.
35
Firewall Types
•packet filters (stateless)
–If a packet matches the packet filter's set of rules, the
packet filter will drop or accept it
•"stateful" filters
–it maintains records of all connections passing through it
–it determine if a packet is either the start of a new
connection, a part of an existing connection.
•application layer
–Some times it is desirable to filter packets based upon
actual content rather than considering origin and
destination address
36
Stateless Firewalls
•A stateless firewall doesn’t maintain any remembered context
(or “state”) with respect to the packets it is processing.
•Instead, it treats each packet attempting to travel through it in
isolation without considering packets that it has processed
previously.
•packet filtering is based on source and destination address, port
and protocols.
–filter examines the header of each packet based on a specific set of
rules, and
–on that basis, decides to prevent it from passing (called DROP) or allow it
to pass (called ACCEPT).
37
Stateless Restrictions
•Stateless firewalls may have to be fairly restrictive in
order to prevent most attacks.
38
Trusted internal
network
SYN
Seq = y
Port=80
Allow outbound SYN packets, destination port=80
Drop inbound SYN packets,
Allow inbound SYN-ACK packets, source port=80
Client
Attacker (blocked)
Firewall
StatefullFirewalls
•Statefulfirewalls can tell when packets are part of
legitimate sessions originating within a trusted
network.
•Statefulfirewalls maintain tables containing
information on each active connection, including the
IP addresses, ports, and sequence numbers of
packets.
•Using these tables, statefulfirewalls can allow only
inbound TCP packets that are in response to
a
connection initiated from within the internal
network.
39
StatefullFirewall Example
•Allow only requested TCP connections:
40
Trusted internal
network
SYN
Seq = x
Port=80 SYN-ACK
Seq = y
Ack = x + 1
ACK
Seq = x + 1
Ack = y + 1
Allow outbound TCP sessions,
destination port=80
Client
SYN-ACK
Seq = y
Port=80
Attacker
(blocked)
Established TCP session:
(128.34.78.55, 76.120.54.101)
128.34.78.55
76.120.54.101
Firewall state table
Server
Firewall
3. Tunnels
•The contents of TCP packets are not normally
encrypted, so if someone is eavesdropping on a TCP
connection, he can often see the complete contents
of the payloads in this session.
•One way to prevent such eavesdropping without
changing the software performing the
communication is to use a tunneling protocol.
•
In such a protocol, the communication between a
client and server is automatically encrypted, so that
useful eavesdropping is infeasible.
41
Tunneling Prevents Eavesdropping
•Packets sent over the Internet are automatically encrypted.
42
Server
Client
Tunneling protocol
(does end-to-end encryption and decryption)
Payloads are encrypted here
TCP/IP TCP/IP
Untrusted
Internet
Secure Shell (SSH)
•A secure interactive command session:
1. Client connects to the server via a TCP session.
2. Client and server exchange information on
administrative details
such as supported encryption methods and their protocol version,
each choosing a set of protocols that the other supports.
3. Client and server initiate a secret‐key exchange to
establish a shared secret session key, which is used
to encrypt their communication (but not for
authentication).
This session key is used in conjunction with a chosen block cipher
(typically AES, 3DES) to encrypt all further communications.
43
Cont.
4. The server sends the client a list of acceptable forms of
authentication, which the client will try in sequence. The
most common mechanism is to use a password or the
following public‐key authentication method:
a) If public‐key authentication is the selected mechanism, the client
sends the server its public key.
b) The server then checks if this key is stored in its list of authorized
keys. If so, the server encrypts a challenge using the client’s public
key and sends it to the client.
c) The client decrypts
the challenge with its private key and responds to
the server, proving its identity.
5. Once authentication has been successfully completed, the
server lets the client access appropriate resources, such as a
command prompt.
44
IPSec
•Guarantee security for all applications
•IPSecdefines a set of protocols to provide
confidentiality and authenticity for IP packets
•Each protocol can operate in one of two modes,
transport mode or tunnel mode.
–Intransport mode, additional IPsec header information is
inserted before the data of the original packet, and only
the payload of the packet is encrypted or authenticated.
–In tunnel mode, a new packet is constructed with IPsec
header information, and the entire original packet,
including its header, is encapsulated as
the payload of the
new packet.
45
Using IPSec
•Two parties must first set up security association (SA)
–How secure communication are to be conducted between
two parties
–i.e. SAs contains
•encryption keys
•Algorithm to be used
•Other parameter related to communication
•SAs are unidirectional
–Separate SAs for inbound and outbound traffic
•Packets are verified or decrypted using security
parameter index (SPI) field store in IPSecheader
46
Virtual Private Networking (VPN)
•Virtual private networking (VPN) is a technology
that allows private networks to be safely extended
over long physical distances by making use of a
public network, such as the Internet, as a means of
transport.
•VPN provides guarantees of data confidentiality,
integrity, and authentication, despite the use of an
untrusted
network for transmission.
•There are two primary types of VPNs, remote access
VPN andsite‐to‐site VPN
47
Types of VPNs
•Remote access VPNs allow authorized clients to access a
private network that is referred to as an intranet.
–For example, an organization may wish to allow employees
access to the company network remotely but make it appear as
though they are local to their system and even the Internet
itself.
–To accomplish this, the organization sets up a VPN endpoint,
known as a network access server, or NAS.
Clients typically
install VPN client software on their machines, which handle
negotiating a connection to the NAS and facilitating
communication.
•Site‐to‐site VPN solutions are designed to provide a
secure bridge between two or more physically distant
networks.
–Before VPN, organizations wishing to safely bridge their private
networks purchased expensive leased lines to directly connect
their intranets with cabling.
–For this both site have separate VPN end points, each of which
communicates with other
48
Difference
Site to site VPNs •connects entire networks to each
other
•for example, connecting a branch
office network to a company
headquarters network
•hosts do not have VPN client
software; they send and receive
normal TCP/IP trafficthrough a VPN
gateway
•VPN gateway is responsible for
encapsulating and encrypting
outbound traffic, sending it through
a VPN
tunnel over the Internet, to a
peer VPN gateway at the target site.
•Upon receipt, the peer VPN
gateway strips the headers,
decrypts the content, and relays the
packet towards the target host
inside its private network.
Remote Access VPNs •connects individual hosts to private
networks
•for example, travelers and
teleworkers who need to access
their company's network
•every host must have VPN client
software
•VPN client software encapsulates
and encrypts that traffic before
sending it over the Internet to the
VPN gateway at the edge of the
target network.
•
Upon receipt, that VPN gateway
behaves as described for site‐to‐site
VPNs
49
50
4. Intrusion Detection Systems
•Intrusion
–Actions aimed at compromising the security of the target
(confidentiality, integrity, availability of
computing/networking resources)
•Intrusion detection
–The identification through intrusion signatures and report
of intrusion activities
•Intrusion prevention
–The process of both detecting intrusion activities and
managing automatic responsive actions throughout the
network
51
IDS Components
•The IDS manager compiles data from the IDS sensors to
determine if an intrusion has occurred.
•This determination is based on a set of site policies, which are
rules and conditions that define probable intrusions.
•If an IDS manager detects an intrusion, then it sounds an
alarm.
52
Untrusted
Internet
IDS Manager
IDS Sensor
router
routerrouter
IDS Sensor
Firewall
Intrusions
•An IDS is designed to detect a number of threats,
including the following:
–masquerader: an attacker who is falsely using the identity
and/or credentials of a legitimate user to gain access to a
computer system or network
–Misfeasor: a legitimate user who performs actions he is
not authorized to do
–Clan‐destine user: a user who tries to block or cover up
his
actions by deleting system logs
53
Cont.
•In addition, an IDS is designed to detect automated
attacks and threats, including the following:
–port scans: information gathering intended to determine
which ports on a host are open for TCP connections
–Denial‐of‐service attacks: network attacks meant to
overwhelm a host and shut out legitimate accesses
–Malware attacks: replicating malicious software attacks,
such as Trojan horses, computer worms, viruses, etc.
–ARP spoofing: an
attempt to redirect IP traffic
–DNS cache poisoning: a pharming attack directed at
changing a host’s DNS cache to create a falsified domain‐
name/IP‐address association
54
Intrusion Detection Techniques
•Network Intrusion detection system (NIDS)
–Deployed at perimeter of a network
–Detects malicious behaviors based on traffic patterns and
contents
–Deep packet inspection on incoming and outgoing traffic
•Apply set of attack signatures or heuristics to determine
whether traffic pattern indicates malicious behavior
•Database of attack signatures that must be updated
•Or rely on
statistical analysis to established a “baseline”
of performance on network. And signal an alert when
network traffic deviates from this baseline
55
Cont.
•Protocol‐based Intrusion Detection System(PIDS)
–Tailored towards detecting malicious behavior in specific
protocol
–Deployed on particular host
–E.g. web server might run PIDS to analyze incoming HTTP
traffic and drop request that may potentially malicious or
contains error
–PIDS may monitor application traffic between two hosts
•E.g. traffic b/w web server and database inspected for malformed
query
56
Cont.
•Host‐based Intrusion Detection System (HIDS)
–Resides on a single system
–monitors activity including system calls, interprocess
communication etc.
•Basically monitors audit logs and system logs to detect
masquerading and misfeasant users (who attempt unauthorized
actions) and clandestine user (who try to delete or modify system
monitoring)
–Uses heuristic rules or statistical analysis to detect when a
user is deviating from “normal” behavior, which could
indicate that this user is masquerading user
–Misfeasant users can be detect by system by defining rules
for authorized and unauthorized actions for each user
–Clandestine user can be detected by monitoring and
logging how changes are made in log files
57
Passive IDSs
•Logs malicious event and alert network administrator
for action
•They do not take any preemptive action
•Intrusion Prevention Systems IPS
–Works in conjunction with firewall and other network
devices to mitigate malicious activity
–E.gIPS detects patterns suggesting DoSattacks and
automatically update firewall rule set to drop all traffic
from malicious IP
–Open source most commonly used solution: Snort
58
An IDS attack
•To evade detection : launch a DoSattack on IDS itself
•An attacker may overwhelm IDS to a point that it
cannot log every event
59
4.1 Intrusion detection Events
•Intrusion detection is not an exact science
•Two types of error may occur
–False positive
•Alarm is sounded on activity which is not intrusion
–False negative
•Alarm is not sounded on activity which is an intrusion
–Problematic:
•False negative
–Annoying:
•False positive
•Ideal Condition
–True positive: alarm is sounded malicious activity
–True negative: alarm is not sounded on activity which is
not malicious
60
Possible Alarm Outcomes
•Alarms can be sounded (positive) or not (negative)
61
Intrusion Attack No Intrusion Attack
Alarm
Sounded
No
Alarm
Sounded
True Positive False Positive
True Negative False Negative
The Base‐Rate Fallacy
•Fallacyis an argument that uses poor, or invalid,
reasoning; "which appears to be correct but is not.
•Difficult to create an intrusion detection system with the
desirable properties
–a high true‐positive rate and
–a low false‐negative rate.
•If the no. of actual intrusions is small compared to the
amount of data being analyzed, then the effectiveness of
an intrusion detection system can be reduced.
•In particular, the effectiveness of some IDSs can be
misinterpreted due to a statistical error known as the
base‐rate fallacy.
•Such
error occurs when the probability of some
conditional event is assessed without considering the
“base rate” of that event.
62
Base‐Rate Fallacy‐Example
•Suppose an IDS is 99% accurate (true positive), having a
1% chance of false positives or false negatives.
•Suppose
–An intrusion detection system generates 1,000,100 log entries.
–Only 100 of the 1,000,100 entries correspond to actual
malicious events.
•Out of 100 malicious events, 99 will be detected as malicious,
which means we have 1 false negative.
•For 1,000,000 benign events, 10,000 will be mistakenly
identified as malicious. That is, we have 10,000 false
positives!
•Thus, there will be 10,099 alarms sounded, 10,000 of which
are false alarms. 99
are malicious events
63
Cont.
•Thus false positive rate need to be low, depending on
number of benign events
64
IDS data collection and Audit Records
•Input to IDS
–Stream of records that identified elementary actions for a
network or host
•Types of action present in such stream
–HTTP session attempt
–Each login attempt
–TCP session initiated for NIDS
–Read, write or execute performed on file for HIDS
–and etc.
•ISD sensor detect such actions create record and
report them to IDS manager or write them to audit
log
65
IDS Data
•In 1987 paper, Dorothy Denning identified several fields that
should be included in IDS event records:
–Subject: the initiator of an action on the target
–Object: the resource being targeted, such as a file,
command, device, or network protocol
–Action: the operation being performed by the subject
towards the object
–Exception‐condition: any error message or exception
condition that was raised by this action
–Resource‐usage: quantitative items that were expended by
the system performing or responding to this action
–Time‐stamp: a unique identifier for the moment in time
when this action was initiated
66
IDS Data ‐Examples
•If Alice write 104 Kilobyte of data to file dog.exe
[Alice, dog.exe, write, “no error”, 104KB,
20100304113451]
•If a client 128.72.201.120 attempts to initiate an
HTTP session with a server 201.33.42.108
[128.72.201.120, 201.33.42.108, HTTP, 0.02 CPU
sec, 20100304114022]
•However exact format would be determine by IDS
designer
67
4.2 & 4.3 Types of Intrusion Detection
Systems
•Rule‐Based Intrusion Detection
–IDS rules can be encoded as
–Signatures, which
•Rules identify the types of actions that match certain
known profiles for an intrusion attack, in such case the rule
would encode a signature for such an attack.
•If the IDS manager sees an event that matches the
signature for such a rule, it sounds an alarm
–Policies
•If such rules is triggered then by policy that user is
behaving in malicious way
•Examples
»Desktop computers may not be used a HTTTP server
68
Cont.
–HTTP server may not accept unencrypted telnet or FTP
sessions
–User should not read personal directory of other users
–User may not write files own by other users
–User may use licensed software
–User may use authorized VPN software to access their
desktop computers remotely
•Policy maker thought of rules become policy
•False positive rate is low
•Signature based require that IDS has sig for each kind
of attack
69
Statistical Intrusion Detection
•Steps
–Gather audit data about a user or host
–Determine baseline numerical values about certain action
that user or host performs
–Actions are group by object
•i.e. all action having same object field
–Actions are measure over time ranges, or percentage of
resource usage.
•That makes a profile for a user or host
–which is a statistical representation of the typical ways that
a user acts or a host is used;
–hence, it can be used to determine when a user or host is
acting in highly unusual, anomalous ways.
70
Cont.
–Using profile IDS manager can
•determine thresholds for anomalous behaviors and
•then sound an alarm any time a user or host deviates
significantly from the stored profile for that person or machine.
–Numerical values derived includes
–Count: number of occurrence of certain type of action in a
given time range
–Average: average number of occurrence of a certain type of
action in a given time range
–Percentage: Percent of resource that a certain type of action
takes over given time range
–Metering: Aggregate or
average of averages accumulated over a
relatively long period of time
–Time‐interval length: amount of time that passes b/w
instances of an action of a certain type
71
Cont.
–E.g.
•How many times a user uses a login program each day
•How often user initiate HTTP sessions
–Typical time interval b/w times when a user checks his or her
email account for new email •Such information is feed into AI machine learning system to
determine a profile for a user or host that IDS is monitoring
•Such IDS does not require prior knowledge of established
intrusion attack
•It analyze traffic pattern so difficult for attack to hide his
behavior
–E.g. Statistical IDS could learn
that a certain user do not user
his computer on Friday
–If a login attempt is made on her computer on Friday it
could indicate it intrusion
72
Cont.
•Weakness of statistical method
–A non malicious behavior can generate a significant
anomaly and leads to false positive
–E.g. if a user has upcoming deadline and suddenly decided
to use a certain program a large number of times then it
will trigger an alarm
•A stealthy attacker might go un notice
–Does not generate lot of traffic
–Encapsulate malicious content in benign network protocol
e.g. HTTP
–Such traffic is ignored as normal behavior
•Thus, most IDS in cooperate both rules based and
statistical methods
73
74
4.4. Port Scanning
•Determining
–which traffic is permitted through firewall
–which port on target machine are running services
•Tell which port is open
•A port determine a point of contact b/w the Internet
and application that is listening on that particular
port
75
TCP scans
•Simplest method
•Performing scan attempts to initiate a TCP
connection on each port on target machine
•Done using standard OS call for opening TCP
connection at specific port
•Open ports completes the connection while close or
blocked do not
76
SYN Scan
•Send only a SYN packet to victim at particular port
•If port is open it respond with SYN‐ACK packet
•If not no response issued
77
Idle scanning
•Attacker find a third party machine called zombie
•Attacker uses zombie weak TCP implementation to
perform port scanning of separate target without
leaving his evidence on target network
•Scenario
1. Attacker sends a SYN‐ACK tcppacket to zombie. Zombie
reply with RST packet with sequence no xas zombie does
not initiate the connection
2. Attacker sends a SYN packet to target with spoof source
IP address (zombie IP address)
•If port at target is open, it reply to zombie with SYN‐ACK packet
and Zombie reply with RST with increment sequence counter
3. Attacker send a SYN‐ACK packet to Zombie again, zombie
reply with a RST and sequence no
•If sequence no is increment then port is open at target otherwise
not
78
Idle scanning
1. Know the sequence
no of Zombie
2. Pretended to target
as if Zombie is
scanning
3. If port is open seq.
no in RST is
incremented
79
4.5. Honeypots
•Honeypot computer is a effective tool for following
reasons
•Intrusion detection
–Connection attempt would not come from legitimate users
–So any connection is identify as intrusion
–With each connection, IDS is update with the latest attack
signatures
•Evidence
–Appealing documents encourage intruder to remain and
leave evidence that may possibly leave to his identification
•Diversion
–It deviates intruder from legitimate machines
–Distracting intruder
80
81
5. Wireless Networking
•Challenges for wireless communication
•Packet sniffing
–Easier to perform
•Session hijacking
–Easier to perform, since computer with wireless NIC can
sniff packets and mimic a wireless access point
•Interloping
–Unauthorized user who is connecting to the Internet
through someone else wireless access point
•Legitimate user
Authenticating a legitimate user
82
83
5.2 Wired Equivalent Privacy
•It is incorporated in 802.11 standard to provide
confidentiality, integrity and access control
•WEP encryption
–Encrypt data frame using stream ciphers RC4
–C = M
EOR
M
–Seed is 256 bits
–Seed is obtained by concatenating Initialization vector with
WEP key
–For decryption, IV is transmitted together with cipher text
–IV is used only one time (however access point would not
check for and reject reuse IV)
•WEP integrity
–Uses CRC‐32 checksum, but its not cryptographically
secure
84
85
Cont.
•WEP authentication
–Two methods
•Open system
–No need for client to provides credentials
–Associate with access point immediately
–Then client can only send and receive information from the
access point using correct encryption key
–If key is wrong then access point ignore the client’s request
•Shared key
–Client need to prove the possession of correct key to access point
–Access point sends a plaintext challenge to client, who encrypt it
and send the cipher text to client
–If received cipher text decrypts correctly to the challenge then
client is allowed to associate with access point
86
Attacks on WEP
•Share key authentication:
–AP Æclient: Challenge in plaintext
–Client ÆAP: encrypted plaintext with IV
–Encryption is XOR with key stream
–Attacker:
•intercept both i.e. plaintext and cipher text with IV
•XOR plaintext with cipher text to recover the key stream
•Later can be used to authenticating the attacker
•Open system mode
–RC4 key stream: first few bytes of key stream are non
random
–50% probability to recover WEP key using 40,000 data
packets
87
Cont.
•ARP reinjection
–Attacker can authenticate and associate to AP
(Open system)
–Attacker captures a single ARP packet from another client
on the network Attacker can repeatedly transmit this
packet to AP, causing it to reply with a retransmission of
this ARP packet along with new IV.
–It allow attacker to quickly capture enough IVs to recover
WEP key
–On idle network
with infrequent connection capturing ARP
packet is difficult
–To speed up process, attacker sends a de‐authentication
packet to client, posing as AP
–Client would re‐authenticate and send ARP packet that can
be capture by attacker and retransmit it
88
Cont.
•Coffee latte attack:
–It could be used to attack client in coffee shops with
wireless access
–OS connects automatically with the previously connected
wireless network
–Attacker set up a honey pot or soft access point,
•a fake wireless access point with same SSID as AP (the client
is attempting to connect to)
–Client authentication but no AP authentication
•So victim is authenticated with honeypot AP
–To retrieve WEP key, attacker must have high no of
encrypted packets
–Attacker receive encrypted ARP request from client
89
WiFiProtected Access –WAP
•Authentication
–Pre‐shared key (PSK) : a share secret is established by
entering manually a key into AP and client. WAP personal
–RADUIS (or WAP enterprise ‐802.1x) ideal for large
network
–TTP is responsible for key generation and client
authentication
–Extensible Authentication Protocol EAP: a framework with
several authentication mechanisms
•Selected mechanism is invoked by AP and used to negotiate a
session key
•This session key is used in next stage
–802.1x also uses certificate and public key cryptography
90
Cont.
•Encryption
–Client and AP uses new session key for encryption
–Temporal Key Integrity Protocol (TKIP)
•Uses RC‐4
•Attempt to address the weakness of WEP’s RC‐4
implementation, i.e. concatenating IV with the key to
generate RC‐4 seed
•TKIP remedies: Increasing IV length to 48 bits and then uses
key mixing algorithm that combine IV with key in a
sophisticated way
•TKIP replace CRC‐
32 checksum with 64 bit MIC (message
integrity code) using algorithm MICHAEL
•MICHEAL is cryptographically insecure but attack against it
are much more difficult than attack on CRC
91