1 / 41

453 Network Security

453 Network Security. Section 6: Intruders and Viruses Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2006. Intruders. significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders: masquerader

bliss
Download Presentation

453 Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 453 Network Security Section 6: Intruders and Viruses Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2006

  2. Intruders • significant issue for networked systems is hostile or unwanted access either via network or local • can identify classes of intruders: • masquerader • misfeasor • clandestine user • varying levels of competence • clearly a growing publicized problem • may use compromised system to launch other attacks

  3. Intrusion Techniques • aim to increase privileges on system • basic attack methodology • target acquisition and information gathering • initial access • privilege escalation • covering tracks • key goal often is to acquire passwords • so then exercise access rights of owner

  4. Intrusion Detection (1) • inevitably will have security failures • so need also to detect intrusions so can • block if detected quickly • act as deterrent • collect info to improve security • assume intruder will behave differently to a legitimate user • but will have imperfect distinction between

  5. Intrusion Detection (1) • An IDS will monitor and identify attempted unauthorized system access or manupulation. • Most IDSs are software programs that are installed over the OS. • Network Sniffing IDSs are deployed as hardware devices for the performance. • IDSs range from the packet level screening to application level screening.

  6. Impersonation attempts Password cracking Protocol attacks Buffer overflows Installation of root kits Rogue commands Software vulnerability exploits Malicious code like viruses, worms and Trojans Illegal data manipulation Unauthorized file access Denial of service (DoS) attacks Events that can be Detected by an IDS

  7. Base-Rate Fallacy • practically an intrusion detection system needs to detect a substantial percentage of intrusions with few false alarms • if too few intrusions detected -> false security • if too many false alarms -> ignore / waste time • this is very hard to do • existing systems seem not to have a good record

  8. Types of IDS • Methods of detection • Statistical Anomaly Detectors (behavior based) • Signature based (knowledge-based or pattern matching) • Types of implementation • Host based (one detects anomalies on a specific host) • Network based (operates on network segments and analyzes the segment traffic)

  9. Distributed Intrusion Detection • traditional focus is on single systems • but typically have networked systems • more effective defense has these working together to detect intrusions • issues • dealing with varying audit record formats • integrity & confidentiality of networked data • centralized or decentralized architecture

  10. Network Based IDSs (1) • This resides on a discrete network segment and monitors the traffic on that segment. • This is a computer with a NIC set to promiscuous mode intercepting and analyzing the packets in real time. • The packets are identified to be of interest if they match a particular signature.

  11. Network Based IDSs (2) • Three primary types of signatures are • String signatures: String signatures look for a text string that indicates a possible attack. • Port signatures: Port signatures watch for connection attempts to well known, frequently attacked ports. • Header condition signatures: Header signatures watch for dangerous or illegal combinations in packet headers.

  12. Network Based IDSs (3) • These types of IDSs provide reliable real time information without consuming network or host resources. • This cannot detect an attack on the host if the intruder is logged onto the hosts terminal. • Even if its detected the detection is minimal since the packets cannot be analyzed.

  13. Host Based IDSs (1) • These are small computer programs called agents that reside on a host computer. • They monitor the OS detecting inappropriate activities, writing to log files and triggering alarms. • These can only detect activities on the hosts and not on the network segment on which the host resides. • The detection capability is limited to the completeness of the host logs.

  14. Host Based IDSs (2) • Host based IDSs have the following characteristics: • They monitor accesses and changes to critical system files and changes to user privileges. • They detect trusted insider attacks better than the network based IDSs • Capability of detecting attacks from the outside to a certain extent. • They can be configured to look at all network packets and connection attempts etc.

  15. Signature Based IDSs (1) • The signatures related to an attack have to be stored so that they can be referred too. • When the data from the host log or the network monitoring is picked up, they are compared with the attack signatures. • If there is a match, then a response is initiated. • These have a low rate based fallacy compared to behavior based IDSs.

  16. Signature Based IDSs (2) • One of the issues is that this cannot detect attacks that are spread over along period of time. • The reason is that these IDSs do not analyze a large history of data to determine an attack. • Another weakness is that only the signatures stored will be recognized. No new attack types will not be detected.

  17. Signature Based IDSs (3) • Another disadvantage is that these are resource intense. • Attacks are very focused. They are based on the OS and the platform, the application etc.

  18. Statistical Anomaly Detection (1) • This is a behavior based and dynamic detection. • The base is that if the user behaves abnormally then an alarm is triggered and a response sent. • A ‘’normal’’ user profile is needed. This is achieved by taking statistical samples. • With this kind of IDS new attacks can be detected since they will be considered to be an anomaly.

  19. Statistical Anomaly Detection (2) • Advantages • New situations can be detected. • This is not dependent on a specific operating system • They help detect abuse-of-privileges types of attacks that do not actually involve exploiting any security vulnerability • Disadvantages • It will not detect any attack that does not significantly change the OS characteristics. • Falsely detect a one time anomaly as an attack. • High false alarm rate. • Sometimes the behaviors of network users are not static to be analyzed using statistical methods. • The network may experience an attack at the same time the IDS is learning the behavior.

  20. Issues Related to Effective Use of IDSs (1) • From the point of view of the attacker he will be compelled to use better techniques to attack systems. • Will use encrypted means to transmit malicious material. • One needs to interoperate and correlate data across many networks if you need effective use of an IDS. • Increased network traffic is a problem.

  21. Issues Related to Effective Use of IDSs (2) • Risks inherent in taking inappropriate automated response actions. • Attacks on IDSs themselves. • Lack of objectives in evaluating the suitability of an IDS. • Most computer infrastructure is not designed to operate securely.

  22. Honeypots • This is a different manner in which intrusion detection can be done. • decoy systems to lure attackers • away from accessing critical systems • to collect information of their activities • to encourage attacker to stay on system so administrator can respond • are filled with fabricated information • instrumented to collect detailed information on attackers activities • may be single or multiple networked systems

  23. Honeypot Operations (1) • There are main uses of honeypots • Preventing attacks • Detecting attacks • Responding to attacks • Preventing attacks • Slowing or impeding scans initiated by worms or automated attacks by monitoring unused IP space and detecting scanning activities. • Consuming the attackers energy through interaction with a honeypot while the attack is detected, analyzed and handled. • Deterring an attack by a cracker who suspects a network employs honeypots and is concerned about getting caught

  24. Honeypot Operations (2) • Detecting attacks • The ability to capture new and unknown attacks. • The ability to capture polymorphic code. • They reduce the amount of data that has to be analyzed by capturing only attack information. • Responding to attacks • Honeypots can be taken offline to analyze and make a response.

  25. Viruses and Other Malicious Content • computer viruses have got a lot of publicity • one of a family of malicious software • effects usually obvious • have figured in news reports, fiction, movies (often exaggerated) • getting more attention than deserve • are a concern though

  26. Malicious Software

  27. Trapdoors • secret entry point into a program • allows those who know access bypassing usual security procedures • have been commonly used by developers • a threat when left in production programs allowing exploited by attackers • very hard to block in O/S • requires good s/w development & update

  28. Logic Bomb • one of oldest types of malicious software • code embedded in legitimate program • activated when specified conditions met • eg presence/absence of some file • particular date/time • particular user • when triggered typically damage system • modify/delete files/disks

  29. Trojan Horse • program with hidden side-effects • which is usually superficially attractive • eg game, s/w upgrade etc • when run performs some additional tasks • allows attacker to indirectly gain access they do not have directly • often used to propagate a virus/worm or install a backdoor • or simply to destroy data

  30. Zombie • program which secretly takes over another networked computer • then uses it to indirectly launch attacks • often used to launch distributed denial of service (DDoS) attacks • exploits known flaws in network systems

  31. Viruses • a piece of self-replicating code attached to some other code • cf biological virus • both propagates itself & carries a payload • carries code to make copies of itself • as well as code to perform some covert task

  32. Virus Operation • virus phases: • dormant – waiting on trigger event • propagation – replicating to programs/disks • triggering – by event to execute payload • execution – of payload • details usually machine/OS specific • exploiting features/weaknesses

  33. Virus Structure program V := {goto main; 1234567; subroutine infect-executable := {loop: file := get-random-executable-file; if (first-line-of-file = 1234567) then goto loop else prepend V to file; } subroutine do-damage := {whatever damage is to be done} subroutine trigger-pulled := {return true if some condition holds} main: main-program := {infect-executable; if trigger-pulled then do-damage; goto next;} next: }

  34. Types of Viruses • can classify on basis of how they attack • parasitic virus • memory-resident virus • boot sector virus • stealth • polymorphic virus • macro virus

  35. Macro Virus • macro code attached to some data file • interpreted by program using file • eg Word/Excel macros • esp. using auto command & command macros • code is now platform independent • is a major source of new viral infections • blurs distinction between data and program files making task of detection much harder • classic trade-off: "ease of use" vs "security"

  36. Email Virus • spread using email with attachment containing a macro virus • cf Melissa • triggered when user opens attachment • or worse even when mail viewed by using scripting features in mail agent • usually targeted at Microsoft Outlook mail agent & Word/Excel documents

  37. Worms • replicating but not infecting program • typically spreads over a network • cf Morris Internet Worm in 1988 • led to creation of CERTs • using users distributed privileges or by exploiting system vulnerabilities • widely used by hackers to create zombie PC's, subsequently used for further attacks, esp DoS • major issue is lack of security of permanently connected systems, esp PC's

  38. Worm Operation • worm phases like those of viruses: • dormant • propagation • search for other systems to infect • establish connection to target remote system • replicate self onto remote system • triggering • execution

  39. Virus Countermeasures • viral attacks exploit lack of integrity control on systems • to defend need to add such controls • typically by one or more of: • prevention - block virus infection mechanism • detection - of viruses in infected system • reaction - restoring system to clean state

  40. Anti-Virus Software • first-generation • scanner uses virus signature to identify virus • or change in length of programs • second-generation • uses heuristic rules to spot viral infection • or uses program checksums to spot changes • third-generation • memory-resident programs identify virus by actions • fourth-generation • packages with a variety of antivirus techniques • eg scanning & activity traps, access-controls

  41. Advanced Anti-Virus Techniques • generic decryption • use CPU simulator to check program signature & behavior before actually running it • digital immune system (IBM) • general purpose emulation & virus detection • any virus entering org is captured, analyzed, detection/shielding created for it, removed

More Related