Guide to Operating System Security Chapter 12 Security

  • Slides: 55
Download presentation
Guide to Operating System Security Chapter 12 Security through Monitoring and Auditing

Guide to Operating System Security Chapter 12 Security through Monitoring and Auditing

Objectives l l l Understand the relationship between baselining and hardening Explain intrusion-detection methods

Objectives l l l Understand the relationship between baselining and hardening Explain intrusion-detection methods Use audit trails and logs Monitor logged-on users Monitor a network Guide to Operating System Security 2

Baselining and Hardening l Baselines Measurement standards for hardware, software, and network operations u

Baselining and Hardening l Baselines Measurement standards for hardware, software, and network operations u Used to establish performance statistics under varying loads or circumstances u Guide to Operating System Security 3

Overview of Intrusion Detection l l Detects and reports possible network and computer system

Overview of Intrusion Detection l l Detects and reports possible network and computer system intrusions or attacks Main approaches Passive u Active u Network-based u Inspectors u Auditors u Decoys and honeypots u Guide to Operating System Security 4

Passive Intrusion Detection l l Detects and records intrusions; does not take action on

Passive Intrusion Detection l l Detects and records intrusions; does not take action on findings Effective as long as administrator checks logs u l Can create filters or traps Examples of monitored activities Login attempts u Changes to files u Port scans u Guide to Operating System Security 5

Third-Party Passive Intrusion-Detection Tools l l l l Klaxon Loginlog Lsof Network Flight Recorder

Third-Party Passive Intrusion-Detection Tools l l l l Klaxon Loginlog Lsof Network Flight Recorder Real. Secure Dragon Squire Pre. Cis Guide to Operating System Security 6

Active Intrusion Detection l l Detects an attack and sends alert to administrator or

Active Intrusion Detection l l Detects an attack and sends alert to administrator or takes action to block attack May use logs, monitoring, and recording devices Guide to Operating System Security 7

Third-Party Active Intrusion-Detection Tools l l l Entercept App. Shield Snort Secure. Host Storm.

Third-Party Active Intrusion-Detection Tools l l l Entercept App. Shield Snort Secure. Host Storm. Watch Guide to Operating System Security 8

Active Intrusion Detection Guide to Operating System Security 9

Active Intrusion Detection Guide to Operating System Security 9

Host-based Intrusion Detection l Software that monitors the computer on which it is loaded

Host-based Intrusion Detection l Software that monitors the computer on which it is loaded Logons u Files and folders u Applications u Network traffic u Changes to security u l Host wrappers and host-based agents Guide to Operating System Security 10

Host-based Intrusion Detection Guide to Operating System Security 11

Host-based Intrusion Detection Guide to Operating System Security 11

Network-based Intrusion Detection l l Monitors network traffic associated with a specific network segment

Network-based Intrusion Detection l l Monitors network traffic associated with a specific network segment Typically places NIC in promiscuous mode Guide to Operating System Security 12

Network-based Intrusion Detection Guide to Operating System Security 13

Network-based Intrusion Detection Guide to Operating System Security 13

Inspector l l l Examines captured data, logs, or other recorded information Determines if

Inspector l l l Examines captured data, logs, or other recorded information Determines if an intrusion is occurring or has occurred Administrator sets up inspection parameters, for example: u u u Files changed/created under suspicious circumstances Permissions unexpectedly changed Excessive use of computer’s resources Guide to Operating System Security 14

Auditor l Tracks full range of data and events – normal and suspicious, for

Auditor l Tracks full range of data and events – normal and suspicious, for example: Every time services are started and stopped u Hardware events or problems u Every logon attempt u Every time permissions are changed u Network connection events u l Records information to a log Guide to Operating System Security 15

Decoys and Honeypots l l l Fully operational computers that contain no information of

Decoys and Honeypots l l l Fully operational computers that contain no information of value Draw attackers away from critical targets Provide a means to identify and catch or block attackers before they harm other systems Guide to Operating System Security 16

Using Audit Trails and Logs l A form of passive intrusion detection used by

Using Audit Trails and Logs l A form of passive intrusion detection used by most operating systems: Windows 2000/XP/2003 u Red Hat Linux 9. x u Net. Ware 6. x u Mac OS X u Guide to Operating System Security 17

Viewing Logs in Windows 2000/XP/2003 (Continued) l l l Accessed through Event Viewer Event

Viewing Logs in Windows 2000/XP/2003 (Continued) l l l Accessed through Event Viewer Event logs can help identify a security problem Filter option can help quickly locate a problem Guide to Operating System Security 18

Viewing Logs in Windows 2000/XP/2003 (Continued) l Principal event logs System u Security u

Viewing Logs in Windows 2000/XP/2003 (Continued) l Principal event logs System u Security u Application u l Event logs for installed services Directory Service u DNS Service u File Replication u Guide to Operating System Security 19

Event Viewer in Windows Server 2003 Guide to Operating System Security 20

Event Viewer in Windows Server 2003 Guide to Operating System Security 20

Viewing an Event in Windows Server 2003 Guide to Operating System Security 21

Viewing an Event in Windows Server 2003 Guide to Operating System Security 21

Viewing Logs in Red Hat Linux 9. x (Continued) l l Offers a range

Viewing Logs in Red Hat Linux 9. x (Continued) l l Offers a range of default logs Log files Have four rotation levels u Managed through syslogd u Guide to Operating System Security 22

Viewing Logs in Red Hat Linux 9. x (Continued) l Two ways to view

Viewing Logs in Red Hat Linux 9. x (Continued) l Two ways to view default logs u Open Log. Viewer (Main Menu – System Tools – System Logs) • u Enables creation of a filter on the basis of a keyword (eg, failed, denied, rejected) Use Emacs or vi editors or use cat command in a terminal window Guide to Operating System Security 23

Red Hat Linux 9. x Default Logs (Continued) Log Name Location and Filename Description

Red Hat Linux 9. x Default Logs (Continued) Log Name Location and Filename Description Boot Log /var/log/boot. log. x Contains messages about processes and events that occur during bootup or shutdown Cron Log /var/log/cron. x Provides information about jobs that are scheduled to run or that have already run Kernel Startup /var/log/dmesg. x Log Shows startup messages sent from the kernel Mail Log /var/log/maillog. x Contains messages about mail server activities News Log /var/log/spooler. x Provides messages from the news server Guide to Operating System Security 24

Red Hat Linux 9. x Default Logs (Continued) Log Name Location and Filename Description

Red Hat Linux 9. x Default Logs (Continued) Log Name Location and Filename Description RPM /var/log/rpmpkgs. x Packages Log Shows list of software packages currently installed; updated each day through a job scheduled via cron command Security Log /var/log/secure. x Provides information about security events and processes System Log /var/log/messages. x Contains messages related to system activities Update Agent /var/log/up 2 date. x Log XFree 86 Log Shows updates that have been performed by the Update Agent /var/log/xfree 86. x. log Contains information about what is installed from XFree 86 Guide to Operating System Security 25

Viewing Logs in Red Hat Linux 9. x Guide to Operating System Security 26

Viewing Logs in Red Hat Linux 9. x Guide to Operating System Security 26

Viewing Logs in Net. Ware 6. x (Continued) Log Name Location & Filename Description

Viewing Logs in Net. Ware 6. x (Continued) Log Name Location & Filename Description Access Log SYS: NOVONYXSUITESPOT Contains information about ADMIN-SERVLOGSACCESS. TXT access services to the Net. Ware server Audit Log SYS: ETCAUDIT. LOG Contains an audit trial of user account activities Console Log SYS: ETCCONSOLE. LOG Traces activities performed at the server console Error Log SYS: NOVONYXSUITESPOT ADMIN-SERVLOGSERROR. TXT Contains error information recorded for the Net. Ware server Guide to Operating System Security 27

Viewing Logs in Net. Ware 6. x (Continued) Log Name Location & Filename Description

Viewing Logs in Net. Ware 6. x (Continued) Log Name Location & Filename Description Module Log SYS: ETCCWCONSOL. LOG Contains a listing of modules that have been loaded NFS Server SYS: ETCNFSSERV. LOG Log Provides information about NFS server services, including changes to a service and communications through TCP and UDP Schema SYS: ETCSCHINST. LOG Instructions Log Tracks schema events, including changes to the schema Guide to Operating System Security 28

Viewing Logs in Red Hat Linux 9. x Guide to Operating System Security 29

Viewing Logs in Red Hat Linux 9. x Guide to Operating System Security 29

Viewing Logs in Mac OS X (Continued) Log Name Location and Filename Description FTP

Viewing Logs in Mac OS X (Continued) Log Name Location and Filename Description FTP Service Log /var/log/ftp. log Contains information about FTP activity, including sessions, uploads, downloads, etc. Last. Login Log /var/log/lastlog Provides information about last login activities Directory Service Log /var/log/lookupd. log Provides log of lookupd (look up directory services) daemon, including requests relating to user accounts, printers, and Internet resources Mail. Service Log /var/log/mail. log Guide to Operating System Security Stores messages about e-mail activities 30

Viewing Logs in Mac OS X (Continued) Log Name Location and Filename Description Network

Viewing Logs in Mac OS X (Continued) Log Name Location and Filename Description Network Information Log /var/log/netinfo. log Tracks messages related to network activity Print Service Log /var/log/lpr. log Contains information about printing activities Security Log /var/log/secure. log Provides information about security events System Log /var/log/system. log Contains information about system events, including processes that are started or stopped, buffering activities, console messages, etc. Guide to Operating System Security 31

Viewing Logs in Mac OS X Guide to Operating System Security 32

Viewing Logs in Mac OS X Guide to Operating System Security 32

Reasons for Monitoring Logged-on Users l Assess how many users are typically logged on

Reasons for Monitoring Logged-on Users l Assess how many users are typically logged on at given points in time Baseline information u To determine when a shutdown would have the least impact u l Be aware of security or misuse problems Guide to Operating System Security 33

Monitoring Users in Windows 2000/XP/2003 l Use Computer Management tool to access Shared Folders

Monitoring Users in Windows 2000/XP/2003 l Use Computer Management tool to access Shared Folders u Shared Folder options • • • l Shares Sessions Open Files Use Task Manager (Windows XP and Windows Server 2003) Guide to Operating System Security 34

Monitoring Users in Windows XP Professional Guide to Operating System Security 35

Monitoring Users in Windows XP Professional Guide to Operating System Security 35

Monitoring Users in Windows 2000 Server Guide to Operating System Security 36

Monitoring Users in Windows 2000 Server Guide to Operating System Security 36

Monitoring Users in Windows XP Professional Guide to Operating System Security 37

Monitoring Users in Windows XP Professional Guide to Operating System Security 37

Monitoring Users in Red Hat Linux 9. x l Use the who command Guide

Monitoring Users in Red Hat Linux 9. x l Use the who command Guide to Operating System Security 38

who Command Options Option Description -a Displays all users -b Shows the time when

who Command Options Option Description -a Displays all users -b Shows the time when the system was last booted -i Shows the amount of time each user process has been idle -q Provides a quick list of logged-on users, and provides a user count -r Shows the run level -s Displays a short listing of usernames, line in use, and logon time -u Displays the long listing of usernames, line in use, logon time, and process number --help Displays help information about the who command -H Displays who information with column headers Guide to Operating System Security 39

Monitoring Users in Red Hat Linux 9. x Guide to Operating System Security 40

Monitoring Users in Red Hat Linux 9. x Guide to Operating System Security 40

Monitoring Users in Net. Ware 6. x l MONITOR u u l Connections Loaded

Monitoring Users in Net. Ware 6. x l MONITOR u u l Connections Loaded modules File open/lock Other server-monitoring functions Net. Ware Remote Manager u u View current connections View files opened by particular users Send messages to a particular user or all users Clear connections Guide to Operating System Security 41

Monitoring Users in Mac OS X l Use the who command in a terminal

Monitoring Users in Mac OS X l Use the who command in a terminal window u l Supports few options (primarily -H and -u) Process Viewer Guide to Operating System Security 42

Monitoring a Network l Network Monitor Network monitoring software with the most features u

Monitoring a Network l Network Monitor Network monitoring software with the most features u Comes with Windows 2000 Server and Windows Server 2003 u Guide to Operating System Security 43

Why Network Monitoring Is Important l l l Networks are dynamic Administrator must distinguish

Why Network Monitoring Is Important l l l Networks are dynamic Administrator must distinguish an attack from an equipment malfunction Establish and use benchmarks to help quickly identify and resolve problems Guide to Operating System Security 44

Using Microsoft Network Monitor l l Uses Network Monitor Driver to monitor network from

Using Microsoft Network Monitor l l Uses Network Monitor Driver to monitor network from server’s NIC (promiscuous mode) Sample activities that can be monitored Percent network utilization u Frames and bytes transported per second u Network station statistics u NIC statistics u Error data u Guide to Operating System Security 45

Network Monitor Driver l l Detects many forms of network traffic Captures packets and

Network Monitor Driver l l Detects many forms of network traffic Captures packets and frames for analysis and reporting by Network Monitor Guide to Operating System Security 46

Using Microsoft Network Monitor l l Start from Administrative Tools menu Four panes of

Using Microsoft Network Monitor l l Start from Administrative Tools menu Four panes of information Graph u Total Statistics u Session Statistics u Station Statistics u l View captured information Guide to Operating System Security 47

Using Microsoft Network Monitor Guide to Operating System Security 48

Using Microsoft Network Monitor Guide to Operating System Security 48

Network Monitor Panes Pane Information Provided in Pane Graph Provides bar graphs for %Network

Network Monitor Panes Pane Information Provided in Pane Graph Provides bar graphs for %Network Utilization, Frames Per Second, Bytes Per Second, Broadcasts Per Second, and Multicasts Per Second Total Statistics Provides total statistics about network activity that originates from or is sent to the computer (station) using Network Monitor; includes statistics for Network Statistics, Captured Statistics, Per Second Statistics, Network Card (MAC) Statistics, and Network Card (MAC) Error Statistics Session Statistics Provides statistics about traffic from other computers on the network: MAC (device) address of each computer's NIC and data about number of frames sent from and received by each computer Station Statistics Provides total statistics on all communicating network stations: Network (device) address of each communicating computer, Frames Sent, Frames Received, Bytes Sent, Bytes Received, Directed Frames Sent, Multicasts Sent, and Broadcasts Sent Guide to Operating System Security 49

Viewing Capture Summary Data Guide to Operating System Security 50

Viewing Capture Summary Data Guide to Operating System Security 50

Creating a Filter in Network Monitor l Two property types Service Access Point (SAP)

Creating a Filter in Network Monitor l Two property types Service Access Point (SAP) u Ethertype (ETYPE) u Guide to Operating System Security 51

Using Capture Trigger l Software performs a specific function when a predefined situation occurs

Using Capture Trigger l Software performs a specific function when a predefined situation occurs Guide to Operating System Security 52

Using Network Monitor to Set Baselines l From the Graph pane % Network Utilization

Using Network Monitor to Set Baselines l From the Graph pane % Network Utilization u Frames Per Second u Broadcasts Per Second u Multicasts Per Second u Guide to Operating System Security 53

Summary (Continued) l l Creating baselines to help quickly identify when an attack is

Summary (Continued) l l Creating baselines to help quickly identify when an attack is occurring Intrusion-detection methods Employed through an operating system u Third-party software u l Using auditing and logging tools to track intrusion events Guide to Operating System Security 54

Summary l Monitoring user activities GUI-based Computer Management tool in Windows 2000/XP/2003 u who

Summary l Monitoring user activities GUI-based Computer Management tool in Windows 2000/XP/2003 u who command in Red Hat Linux and Mac OS X u l Network monitoring with Microsoft Network Monitor Guide to Operating System Security 55