1 / 21

Intrusion Detection

Intrusion Detection. Harry R. Erwin, PhD School of Computing and Technology University of Sunderland. Resources. B. Schneier, 2000, Secrets and Lies, Wiley, ISBN: 0-471-25311-1—a good survey for managers. E. Amoroso, 1999, Intrusion Detection, Intrusion.net, ISBN: 0-9666700-7-8

hansel
Download Presentation

Intrusion Detection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Intrusion Detection Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

  2. Resources • B. Schneier, 2000, Secrets and Lies, Wiley, ISBN: 0-471-25311-1—a good survey for managers. • E. Amoroso, 1999, Intrusion Detection, Intrusion.net, ISBN: 0-9666700-7-8 • R. G. Bace, 2000, Intrusion Detection, Macmillan Technical Publishing, ISBN: 1-57870-185-6

  3. Intrusion Detection Systems (IDS) • These are network monitors—they watch your network looking for suspicious behavior • Often but not always based on audit trails • Provide reactive rather than proactive security • Should alert on successful and ongoing attacks • Need to be accurate in detecting attacks and in determining that an attack is not underway. • Also may provide diagnosis tools.

  4. The False Alarm Problem • Base rate fallacy—suppose you have a test that is 99% accurate. Is this good? Not necessarily! • Suppose the real attack rate is 1x10-6 per message or packet. This test will generate 10,000 false positives for every real attack it detects. • If network attacks are rare, a test has to be powerful to be useful.

  5. The Timely Notification Problem • You may want to be warned in time to do something, but… • What about slow attacks? When should the IDS become suspicious and tell you? • What about ambiguous evidence? Do you want to be warned about borderline cases?

  6. The Response Problem • What do you do if you do hear an alarm? Consider the problem with giving out general warnings of terrorist activity. • Options include: • Wait • Collect more information • Do something • Hope it goes away • You may be too busy fighting alligators to do anything intelligent about draining the swamp.

  7. Approaches to Building an IDS • Misuse detection • IDS knows what an attack looks like and looks for it. • “Network virus scanner” • Fast, easy to build, has a low false positive rate. • Misses a lot and is easy to fool. • Probably will get better over time.

  8. Approaches to Building an IDS (II) • Anomaly detection • Learns a statistical or neural network model of the network to figure out what is normal • Sounds an alarm for abnormal activity • Uses AI: • Bayesian statistics • Neural networks • Expert systems

  9. Problems with Anomaly Detection • Does the training data include an attack? Then hacking will be considered normal. 8( • New things happen on networks all the time. Successful retraining of an existing AI system to handle this is a hard problem, worth a PhD. 8( • How can it categorize attacks? That requires expert input. 8( • False positives are much higher. 8( • Attack indicators are brittle, so that hackers can sneak past them. 8(

  10. More Problems with Anomaly Detection • The dynamic update problem is unsolved. • You can train these systems successfully to handle static environments, but computer networks are dynamic. • If you try to retrain an existing system to deal with new events, it will usually forget its old training. You have to give it the old training data as well as the new. • One approach avoiding the use of old data is to give the old system random data and train the new version on the resulting outputs as well as the new data. • Good research area.

  11. Possible Approaches to Anomaly Detection • Bayesian statistics—like current spam filters. Relies on human training, and can adapt over time if the human controller continues to train it. • Neural networks—probably will not be as successful as the human trainer is less hands-on. Has to deal with the ‘catastrophic forgetting problem’, either by retaining training data or regenerating it. • Expert systems—a hybrid anomaly/misuse detection solution. Depends on how easily it can be trained. Multiple experts will differ. • Statistical decision theory—only if the cues used by the experts can be successfully identified.

  12. Inline versus Audit-Based IDS • Should the IDS detect attacks in real-time using a sniffer or use audit log processing? • Inline will have incomplete data. • Inline is also computationally expensive. • Audit log processing is after the fact. • Audit log formats vary quite a bit. • A combined approach is feasible, but costly.

  13. Audit Log Architecture Cues Profiles The System Being Monitored IDS Audit Log Data Audit Trail Alerts Reports After Amoroso

  14. Inline Architecture Cues Profiles The System Being Monitored IDS Sniffer Data Alerts Reports After Amoroso

  15. Host-Based versus Network-Based IDS • Network-based IDS is basically wire-tapping using a sniffer: • Stealthy • Operating-system independent • Host-based IDS uses audit logs • From workstations, servers, switches, routers, etc. • Product-specific.

  16. Make or Buy • Do your own monitoring or pay someone else? E.g., • Counterpane in America • Qinetiq in the UK • Trust issues particularly important here. • Inhouse expertise requirement.

  17. Honey Pots and Burglar Alarms • Burglar alarms are resources on the network that generate an alarm if accessed incorrectly. • Honey pots are burglar alarms dressed up to look attractive. May incorporate subnetworks and dummy computers. • Costly • Have to look real to the attackers • Legality important. Entrapment may be an issue, so intruders must be warned. • Read http://csrc.nist.gov/publications/secpubs/berferd.ps • See also http://www.strategypage.com/fyeo/howtomakewar/default.asp?target=HTIW.HTM

  18. Incident Handling Issues • Be prepared • Have procedures • Don’t panic • Call in the police? • Expectation management • Damage control • Dealing with witch hunts

  19. IDS Requirements • Must be: • Effective • Easy to use • Adaptable • Robust • Fast • Efficient • Safe

  20. Future IDS Needs • Should be: • Accommodating • Security enhancing • Scalable • Realistic • Hardened

  21. Conclusions • Intrusion Detection Systems are useful, but not a panacea. • In particular, they cannot substitute for good security practices. • They tell you if you have had a problem, but that can be too late.

More Related