Intrusion Protection Mark Shtern Protection systems Firewalls Intrusion

  • Slides: 27
Download presentation
Intrusion Protection Mark Shtern

Intrusion Protection Mark Shtern

Protection systems • • Firewalls Intrusion detection and protection systems Honeypots System Auditing

Protection systems • • Firewalls Intrusion detection and protection systems Honeypots System Auditing

Firewall Types • Network – Packet filters – Proxy servers – State-full inspection –

Firewall Types • Network – Packet filters – Proxy servers – State-full inspection – Can be hardware-based or software-based • Application – Packet filters – State-full inspection

Packet filtering Firewalls • Permits or denies packets based on socket pairs • Packet

Packet filtering Firewalls • Permits or denies packets based on socket pairs • Packet filters operate at layer 4 of the OSI model • Defined packet filters are applied to examine traffic attempting to enter or attempting to exit an interface • Packet filters do not maintain state

Proxy Server Firewalls • Clients configured to use a proxy server package • The

Proxy Server Firewalls • Clients configured to use a proxy server package • The proxy server completes client requests on behalf of the requesting clients, if permitted

Proxy Server Types • Circuit-level proxy servers only understand the socket portion of a

Proxy Server Types • Circuit-level proxy servers only understand the socket portion of a request (IP address, port number, and protocol) • Application-level proxy servers also understand the internal commands for each type of application – for example, can recognize FTP commands for PUT, GET, MPUT, MGET, and so on

State-full Inspection Firewalls • Generally permits all outbound sessions initiated by internal clients (unless

State-full Inspection Firewalls • Generally permits all outbound sessions initiated by internal clients (unless an ACL imposes restrictions) – a state table entry is created for each allowed connection • Allows return traffic belonging to the same session • Generally denies all inbound sessions initiated by external clients (unless an ACL allows exceptions) – a state table entry is created for each allowed connection

State-full Inspection Firewalls • State table entries track: – source and destination IP addresses

State-full Inspection Firewalls • State table entries track: – source and destination IP addresses – source and destination port numbers – protocol – TCP sequence numbers and acknowledgment numbers – TCP session state • SYN Received, SYN-ACK Sent, Established

Examples of Firewall • Network – Firestarter – Windows Firewall • Application – Mod_evasive

Examples of Firewall • Network – Firestarter – Windows Firewall • Application – Mod_evasive – Mod_security_common

Intrusion Detection Systems • An IDS detects attempts at network intrusion – Host-based or

Intrusion Detection Systems • An IDS detects attempts at network intrusion – Host-based or network-based sensors collect data for local analysis or uploading to a centralized analysis engine – When intrusion is detected a log entry or alert can be generated

Detection methods • Signature analysis – discernable pattern of a previously seen attack –

Detection methods • Signature analysis – discernable pattern of a previously seen attack – network scans, port scans, malicious payloads • Statistical anomaly – unusual usage patterns – log on at unusual hours, uncharacteristically high usage of a protocol • Protocol anomaly – an undefined or non-standard use of a protocol – IP header Protocol field value greater than 137 – TCP header Urgent field set to non-zero value with URG flag set to zero

IDS types • Network-based – Monitors entire network – NIC operates in promiscuous mode

IDS types • Network-based – Monitors entire network – NIC operates in promiscuous mode – Complicated sniffers that check all packets against signatures • Host-based – Protects only the host system on which it resides – Network card operates in non-promiscuous mode

Intrusion Prevention Systems • An IDS receives a copy of network traffic for analysis

Intrusion Prevention Systems • An IDS receives a copy of network traffic for analysis and reporting – malicious packets reach their targets – analysis and reporting is after the fact • An IPS is a pass-through device inline with the traffic – detected malicious packets are dropped at the IPS and do not reach their intended targets

Snort Intrusion protection and prevention system Rules-based detection engine Network sniffer Snort runs on

Snort Intrusion protection and prevention system Rules-based detection engine Network sniffer Snort runs on various operating systems and hardware platforms, including many UNIX systems and Windows • Large default rule set (several thousand) • •

Snort Modes • Packet Sniffer Mode – In Packet Sniffer Mode Snort acts like

Snort Modes • Packet Sniffer Mode – In Packet Sniffer Mode Snort acts like tcpdump and is used for testing. – Type “snort –v” at command prompt to start snort in sniffer mode – Other switches • -d displays application layer -e displays data link layer • Packet Logger Mode – Same as Packet Sniffing Mode but it also logs the output. – Type “snort –dev –l /var/log/snort” where –l is switch for logging and /var/log/snort is directory to save output.

Snort Modes • Intrusion Detection Mode – In this mode snort applies signature rules

Snort Modes • Intrusion Detection Mode – In this mode snort applies signature rules on all captured packets – If packet matches rules, it is logged or an alert is generated

Writing Snort Rules • • • Figure out what is "bad" Capture traffic that

Writing Snort Rules • • • Figure out what is "bad" Capture traffic that includes the "bad" stuff Learn the protocol Figure out why the "bad stuff" is bad Write a rule Test the rule

Rule Format - basic rule • alert tcp 10. 1. 1. 1 any ->

Rule Format - basic rule • alert tcp 10. 1. 1. 1 any -> 10. 1. 1. 2 80 (msg: "foo"; content: "bar"; )

Rule Format • alert tcp 10. 1. 1. 1 any -> 10. 1. 1.

Rule Format • alert tcp 10. 1. 1. 1 any -> 10. 1. 1. 2 80 (msg: "foo"; content: "bar"; ) • Actions • alert log pass activate dynamic drop sdrop • Acceptable protocols: – TCP , UDP, ICMP, IP • Direction – ->, <> • Body – msg, content etc

Honeypot • A monitored decoy to lure attackers away from critical resources – simulates

Honeypot • A monitored decoy to lure attackers away from critical resources – simulates various OSs and application servers • A tool to analyze an attacker’s methods and other characteristics

Honeypot Modes • Research mode – collecting data on attacker motivations, attack trends, and

Honeypot Modes • Research mode – collecting data on attacker motivations, attack trends, and emerging threats • Production mode – to prevent, detect, and respond to attacks – impeding scans – diverting an attacker to the honeypot rather than critical files – capturing polymorphic code – acquiring attack signatures – providing attack information for analysis

Honeypot Software • Labrea • Honeyd

Honeypot Software • Labrea • Honeyd

Legal issues • An organization may be liable if its honeypot is used to

Legal issues • An organization may be liable if its honeypot is used to launch attacks against another network • Attacker might claim entrapment if apprehended through use of a honeypot – Never explicitly invite interaction with the honeypot

Auditing • Logs are the primary record keepers of system and network activity –

Auditing • Logs are the primary record keepers of system and network activity – Basis for fast recovery when service is modified illegally – Basis for tracking the break-in

System logs • Windows – Application, System and Security • Linux – Syslogs files

System logs • Windows – Application, System and Security • Linux – Syslogs files /var/logs/*

Problem in Managing Logs • • No periodical review The log files may be

Problem in Managing Logs • • No periodical review The log files may be modified by intrusion Log size constraint Failure to collect critical information

Audit tools • Syslog – log collection system • Audit – subsystem in Linux

Audit tools • Syslog – log collection system • Audit – subsystem in Linux kernel that generates audit record (auditctl, ausearch, aureport ) • Logwatch – log analysis system • Lire - log analyzer system