host intrusion prevention systems & beyond

16
Host Intrusion Prevention Systems & Beyond By Dilsad Sera SAHINTEPE

Upload: jarah

Post on 23-Feb-2016

67 views

Category:

Documents


0 download

DESCRIPTION

Host Intrusion Prevention Systems & Beyond. By Dilsad Sera SAHINTEPE. Outline. What is Intrusion Detection? What does IDS Detect? IDS types IDS Implementation HIDS Difference btw IDS & Firewall Passive/Reactive System Prevention System What is HIPS? IDS differ from HIPS - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Host Intrusion Prevention  Systems & Beyond

Host Intrusion Prevention Systems &

BeyondBy Dilsad Sera SAHINTEPE

Page 2: Host Intrusion Prevention  Systems & Beyond

OutlineWhat is Intrusion Detection?What does IDS Detect?

IDS typesIDS ImplementationHIDSDifference btw IDS & FirewallPassive/Reactive SystemPrevention System

What is HIPS?

IDS differ from HIPS Host Based & Network Based

Difference btw IDS & FirewallImportance of HIPS

Page 3: Host Intrusion Prevention  Systems & Beyond

What is Intrusion Detection ?

• It is a device or software application that monitors network or system activities for malicious activities or policy violation and produces reports to a management station.

Page 4: Host Intrusion Prevention  Systems & Beyond

What does IDS Detect?It is a system used to detect unauthorized intrusions into computer systems and network.Example: It detects attacks to FTP, Data driven attacks at the application layer such as SQL injection error could be used to crash an application.IDS ComponentsSensors – Generate security events such as log filesConsole – Monitors events, alerts and controls sensorsEngine – Analyzes the data using artificial intelligence to generate alerts from the events received *** 3 in 1 (sometimes all three are in one appliance)

Page 5: Host Intrusion Prevention  Systems & Beyond

Types of Intrusion Detection System

NDS – Network BasedIt is an independent platform which identifies intrusion by examining network traffic and monitors multiple hosts. It gains access to network traffic by connecting to a hub, network switch configured for port mirroring, or network tap. Example : Snort- KSU (Academic Freedom)

PIDS – Protocol Based Consists of a system or agent that would typically sit at the front end of a server, monitoring and analyzing the communication protocol between a connected device (a user/PC or system)

APIDS – Application Protocol Consists of a system or agent that would typically sit within a group of servers, monitoring and analyzing the communication on application specific protocols. For example; in a web server with database this would monitor the SQL protocol specific to the middleware/business-login as it transacts with the database.

HIDS – Host Based

Hybrid System

Page 6: Host Intrusion Prevention  Systems & Beyond

How IDS is implemented?

Page 7: Host Intrusion Prevention  Systems & Beyond

Host Based Intrusion Detection System

Consists of an agent on a host which identifies intrusions by analyzing system calls, application logs, file-system modifications (binaries, password files, capability/acl databases) and other host activities and state. An example of a HIDS is OSSEC

Page 8: Host Intrusion Prevention  Systems & Beyond

IDS vs. FirewallsBoth related to network security.Firewall looks outwardly for intrusions in order to stop them from happening.Firewalls limit access between network to prevent intrusion and do not signal an attack from inside the network.IDS evaluates a suspected intrusion once it has taken place and signals an alarm.IDS watches for attacks that’s originate from within a system.

Page 9: Host Intrusion Prevention  Systems & Beyond

Passive vs. Reactive Systems

In a passive system, the intrusion detection system (IDS) sensor detects a potential security breach, logs the information and signals an alert on the console and or owner.In a reactive system, also known as an Intrusion Prevention System (IPS), the IDS responds to the suspicious activity by resetting the connection or by reprogramming the firewall to block network traffic from the suspected malicious source. They both has signature based systems depends on activity on host or network.(skype)tcp $EXTERNAL_NET 1024: -> $HOME_NET 1024: (msg:"Skype client login -- reply from server"; flags:AP,SUFR12; flow:to_client,established; dsize:5; content:"|17 03 01 00|"; depth:4; sid:1000010; rev:2; )

Page 10: Host Intrusion Prevention  Systems & Beyond

Prevention SystemAn enemy can send packets that the IPS will see but the target computer will not. For example, the attacker could send packets whose Time to live fields have been crafted to reach the IPS but not the target computers it protects. This technique will result in an IPS with different state than the target.

An intrusion prevention system is a network security device that monitors network and/or system activities for malicious or unwanted behavior and can react, in real-time, to block or prevent those activities.

Page 11: Host Intrusion Prevention  Systems & Beyond

Host Intrusion Prevention System

Host-based intrusion prevention system (HIPS): an installed software package which monitors a single host for suspicious activity by analyzing events occurring within that host. They also have signature based system.

Page 12: Host Intrusion Prevention  Systems & Beyond

How IDS differ from IPS* IPSs are designed to sit inline with traffic flows and prevent attacks in real-time Deep packet inspection; In addition, most IPS solutions have the ability to look at (decode) layer 7 protocols like HTTP, FTP, and SMTPRBIPS(Rate) can identify abnormal rates for certain types of traffic (botnet-zombie-ddos)Ex : Connections per second, packets per connection Attacks are detected when thresholds are exceeded. The thresholds are dynamically adjusted based on time of day, day of the week etc., drawing on stored traffic statistics.

Page 13: Host Intrusion Prevention  Systems & Beyond

Host-based vs. Network IPS

• HIPS can handle encrypted and unencrypted traffic equally, because it can analyze the data after it has been decrypted on the host.

• NIPS does not use processor and memory on computer hosts but uses its own CPU and memory

• NIPS drawback AND benefit, depending on how you look at it

• NIPS is a single point of failure, which is considered a disadvantage; however, this property also makes it simpler to maintain.

• Use failover or load balancing to combat this NIPS disadvantage

Page 14: Host Intrusion Prevention  Systems & Beyond

Host-based vs. Network IPS - 2

• NIPS can detect events scattered over the network (e.g. low level event targeting many different hosts, like a worm) and can react

• With a HIPS, only the host’s data itself is available to take a decision

• It would take too much time to report it to a central decision making engine and report back to block.

Page 15: Host Intrusion Prevention  Systems & Beyond

Importance of HIPS• Well known security companies realized how important HIPS

and they all published their HIPS products.

Page 16: Host Intrusion Prevention  Systems & Beyond

Questions????