[Intro. to Computer Security Course Note] Ch 8

Ch8. Intrusion Detection


Intruders

  • Cyber criminals
    • Organized crime group with a goal of financial reward
    • Activities: 竊取資料、勒索
    • Meet to trade tips in underground forums
  • Activists
    • Outsider attackers
      • Skill level is often low
    • Goals: promote and publicize their social or political causes
    • Activities: 各種攻擊
  • State-sponsored org.
    • Groups of hackers sponsored by gov. to conduct espionage(間諜) or sabotage(破壞) activities
    • Known as APTs
  • Others
    • Hackers with motivations other than the above

Three Skill Levels of Intruders

  • Apprentice
    • Known as “script-kiddies”
  • Journeyman
    • Be able to use new vulnerabilities; may be able to locate new ones
  • Master

Intruder Behavior

  • Target acquisition and info gathering
    • Identifying and characterizing the target systems using publicly information
    • Using network exploration tools to map target resources
  • Initial access
    • Exploiting a remote network vulnerability, guessing weak authentication credentials, or installing malware
  • Privilege escalation
  • Info gathering or system exploit
  • Maintaining access
    • Install backdoors
    • Enabling continued access after the initial attack
    • e.g.
      • Modifying or disabling anti-virus programs running on system
  • Covering tracks
    • Disabling or editing audit logs to remove evidence of attack activity

Intrusion detection

Intrusion Detection System (IDS)

  • Three logical components
    • Sensors - collect data
    • Analyzers - determine if intrusion has occurred
    • User interface
  • Host-based IDS (HIDS)
  • Network-based IDS (NIDS)
  • Distributed or hybrid IDS

Intrusion Detection: Basic Principles

  • Another line of defense against intrusions
    • Others: authentication, access control, and firewall
  • Based on the assumption: the behavior of the intruder differs from that of a legitimate user
  • Requirements

Analysis approaches

  • Anomaly detection
    • Collecting data
      • The behavior of legitimate users over a period of time
    • Analyzing current observed behavior with a high level of confidence
  • Signature / Heuristic detection
    • Using a set of known malicious data pattern (signatures) or attack rules (heuristics)
    • Can only identify known attacks

Anomaly detection: Categories

  • Statistical
    • Analysis of the observed behaviors / metrics
    • Using univariate, multivariate, or time series models
    • Pros: simplicity, low computation cost, lack of assumptions about behavior expected
    • Cons: difficulty in selecting suitable metrics, not all behaviors can be modeled
  • Knowledge based
    • Classifying the observed data using a set of rules
    • Rules are developed during the training phase, usually manual
    • Formal tools: finite-state machine or standard description language
    • Pros: robustness, flexibility
    • Cons: difficulty / time required to develop high quality knowledge rules
  • Machine learning
    • Pros: flexibility, adaptability, ability to capture interdependencies between factors
    • Cons: 時間、時間、時間

Signature / Heuristic detection

  • Signature approaches
    • Widely used in anti-virus products
  • Rule-based heuristic identification
    • Identifying known penetrations
    • Identifying suspicious behavior within the bounds of established patterns of usage
    • Specific to the machine and OS

Host-based intrusion detection

  • Main purpose: detect intrusions, log suspicious events, and send alerts
    • Can use either anomaly or signature and heuristic approaches
  • Primary benefits: can detect both external and internal intrusions

Data Sources and Sensors

  • System call traces
    • A record of the sequence of system calls by processes on a system
    • Work well for Unix and Linux systems, but problematic on Windows(就你問題最多)
    • 95-99% detection rates
  • Audit records
    • Most modern OSes have accounting software that collects info on user activity
    • Pros: no additional collection software is needed
    • Cons: may not contain the needed info or in a convenient form
    • 80% detection rates
  • File integrity checksums
    • Periodically scan critical files for changes
    • Cons: generate and protect the checksums, difficult to monitor changing files
  • Registry access
    • Used on Windows to monitor access to the registry

Anomaly HIDS

  • Gathering the system call traces using an OS hook, e.g., BSM (Basic Security Module) audit module
  • Using traces of key DDL function calls

Signature of Heuristic HIDS

  • Using database of
    • File signatures (patterns of data)
    • Heuristic rules (behavior)
  • Widely used in anti-virus software

Distributed HIDS

  • Major issues
    • Need to deal with different data sensors
    • Assure the integrity and confidentiality of the sensor data
    • Architecture
      • Centralized: bottleneck and single point of failure
      • Decentralized: coordination

Network-based intrusion detection

  • Difference between NIDS and HIDS
    • NIDS: 針對網路
    • HIDS: 針對 host 上面 user/software 的行為
  • Typically included in the perimeter security infrastructure of an org., located with the firewall
  • Including
    • A number of sensors to monitor packer traffic
    • One or more servers for management functions
    • One or more management consoles for the human interface

Two Types of Network Sensors

  • Inline sensors
    • Insert into a network segment
    • Combined with a firewall or a switch
    • Motivation: block an attack when one is detected
    • Pros: no additional separate hardware devices are needed
    • Cons: negative impact on network performance
  • Passive sensors
    • Monitoring a copy of network traffic (the actual traffic doesn’t pass through)
    • Pros: more efficient, doesn’t contribute to packet delay

NIDS Sensor Deployment

Distributed or hybrid intrusion detection

  • Due to two key problems confronting IDSs
    • These tools may not recognize new threats or modifications of existing threats
    • Difficult to update schemes rapidly enough to deal with threats

Honeypots

  • Decoy systems designed to
    • Lure a potential attacker away from critical systems
    • Collect info about the attacker’s activity
    • Encourage the attacker to stay on the system long enough for administrators to respond
  • Systems are filled with fabricated info that a legitimate user of the system wouldn’t access
  • Resources that have no production value
    • Incoming communication is most likely a probe, scan, or attack
    • Initiated outbound communication suggests that the system has probably been compromised

Honeypot Classifications

  • Low interaction honeypot
    • Emulating particular IT services or systems well enough to provide a realistic initial interaction, but does not execute a full version
    • Providing a less realistic target
    • Often sufficient for use as a component of a distributed IDS to warn of imminent attack
  • High interaction honeypot
    • A real system, with a full OS, services and applications, which are instrumented and deployed where they can be accessed by attackers
    • Is a more realistic target that may occupy an attacker for an extended period
    • However, it requires significantly more resources
    • If compromised, could be used to initiate attacks on other systems