distributed ids the implementation of a distributed intrusion detection system over a medium scale...

23
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services. Darian Jenik - Network Management Queensland University of Technology

Upload: ginger-ferguson

Post on 27-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

Distributed IDS

• The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.

• Darian Jenik - Network Management

Queensland University of Technology

Page 2: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

What IDS is:

• IDS is a combination of methods for determining the presence and location of unauthorized activity on the computer network.

• IDS is the detection and reporting of security vulnerabilities.

• IDS is the logging and detection of internal users “misdemeanors” to protect liability

Page 3: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

What IDS is not:

• IDS in NOT security –• For security you need:

• Good security policy that is both documented and adhered to.

• Good security practice by system administrators.

• Hardened perimeter firewalls and “DMZ” firewalls.

• IDS is not a product.

• IDS is not a sensor.

Page 4: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

The scale of the problem

• Approximately 10000 hosts100 web servers300 “servers” of other type

• Students

• System Administrators

• IAS

Page 5: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

IDS should perform the following tasks

• Detect known violations to host integrity by passively watching network traffic.

• Respond to attempted violations by blocking external IP addresses.

• Respond to probes from outside by blocking external IP addresses.

• Find and report usage inconsistencies that indicate account/quota theft.

• Detect violations by monitoring information (web pages etc….)

• Help log and establish traffic/host usage patterns for future reference and comparison

Page 6: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

Detect known violations to host integrity by passively watching network traffic.

• Just one type of sensor?

• IDS sensors:• Gateways – Traditionally

• Put IDS sensors on hosts to look after specific services running on the hosts and detect port scans.

Page 7: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

Respond to attempted violations by blocking external IP addresses.

• Make sure the IDS is able to respond and send commands to firewalls and/or hosts.• IDS sends RST packets to both ends of the

connection.

• IDS is able to insert rules into border firewall.

Page 8: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

Respond to probes from outside by blocking external IP addresses.

• Attempts to open ports on servers that are not enabled. (Collate multiple servers to report to single location.)

• Make “flypaper” IP addresses that have never been used for anything that serve to pickup slow probes.

Page 9: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

Find and report usage inconsistencies that indicate account/quota theft.

• Determine that the accounts authorized at the locations (dial in/pc) are the same accounts using other services (mail/proxy/other logins).

• Failed attempts to login to services that are not successful.

• Accounts being used simultaneously at various locations.

Page 10: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

Detect violations by monitoring information. (web pages etc….)

• Graffiti, DNS spoofing, wares repositories.

• Ensure that the monitoring is external as well as internal.

• http://forced.attrition.org/mirror/attrition/

Page 11: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

Help log and establish traffic usage patterns for future reference and comparison.

• Central syslog collecting and analysis.

• Tripwire

• Nmap database

• Performance and Usage analysis.

Page 12: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

• Open Source

• Just about any platform(Including windows)

• Many plugins and external modules.

• Frequent rules updates.

Page 13: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

Snort Plugins

• Databases• mySQL

• Oracle

• Postgresql

• unixODBC

• Spade (Statistical Packet Anomaly Detection engine)

• FlexResp (Session response/closing)

• XML output

• TCP streams (stream single-byte reassembly)

Page 14: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

Snort Add-ons

• Acid(Analysis Console for Intrusion Detection) - PHP

• Guardian – IPCHAINS rules modifier.(Girr – remover)

• SnortSnarf - HTML

• Snortlog – syslog

• “Ruleset retreive” – automatic rules updater.

• Snorticus – central multi-sensor manager – shell

• LogSnorter – Syslog > snort SQL database information adder.

• + a few win32 bits and pieces.

Page 15: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

Acid + Snort

• Acid is a Cert project.

• Pretty simple PHP3 to mySQL

• Quite customizable.

• Simple GUI for casual browsing.

Page 16: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

• Main Console

Page 17: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

• Individual alerts

Page 18: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

• Securityfocus

• Whitehats

• CVE

Page 19: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

• Rule details

Page 20: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

• Incident details

Page 21: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

• Incident Details

Page 22: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

Questions ?

Page 23: Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services

URLS

• www.snort.org

• http://www.cert.org/kb/acid/• www.whitehats.com (Intrusion signatures data)

• www.securityfocus.com (Intrusion signatures data)

• http://cve.mitre.org/ (Intrusion signatures data)

• http://www.psionic.com/ (logcheck + hostsentry)