290 likes | 432 Views
Passive Network Discovery Systems Martin Roesch. The Current State of Intrusion Detection. What is NIDS?. A network intrusion detection system monitors traffic in real time and alerts when suspicious activity is detected.
E N D
What is NIDS? A network intrusion detection system monitors traffic in real time and alerts when suspicious activity is detected
Access control (firewalling) is only part of the security solution, you need network monitoring technology (Defense in Depth) to secure your enterprise effectively Why is NIDS Important?
Complementary Security Measures • Network IDS complements and augments firewalls and other security infrastructure • Provides “assurance” in case firewall is bypassed or misconfigured • Protects against insider threats • Affords forensic analysis against changing environments and threat vectors
What’s Wrong with NIDS? • IDS is not working as well as hoped • Industry has been its own worst enemy for years, over-hyped and under delivered • What are intrusion detection systems really for? • Awareness - How is my network working? How is my security infrastructure working? • Analysis - When things go wrong, what happened and how can I prevent it from happening again? • Classic IDS does not protect networks, it allows people to understand how/if their protection is working and what happened when it fails
Problems With IDS Implementations • Implementational Issues • Some assembly required • IDSes traditionally require a great deal of tuning for the environment they’re monitoring • Most NIDS solutions are lacking a credible data management solution • Tuning is an ongoing process • “What do you mean you don’t know IP?!” • Proper training is required to get value from an IDS • Interpreting the output from an IDS requires a great deal of expertise • System policy management • Managing the distributed sensor detection configuration is a manual process
Problems With IDS Implementations • Conceptual Problems • Detection Failures • Ptacek & Newsham paper, classic guide on how to defeat IDS by taking advantage of ambiguities that IDS cannot resolve • Fundamental problem with the approach used by many (all?) IDSes • Data management • Once I’ve got my IDS tuned and my staff trained, I run into the next problem: data management • IDS generates huge amounts of information, this information must be managed • Data management is a very hard problem as well (on the order of difficulty with IDS in the first place) • Data coming from IDSes is subjective for a variety of reasons, users are left to add context
What you don’t know can kill you • Intrusion detection systems operate in a contextual vacuum • No knowledge of the network topology • No knowledge of the network’s assets • No knowledge regarding asset criticality • Effective prioritization is impossible without context • Priority is in the eye of the beholder • Automated response is extremely risky • 100% Effective detection is impossible without context • IDS must guess about network topology and composition, making assumptions frequently • Mistaken assumptions lead to false positives or false negatives • If the attacker has more information about the target than the NIDS, this can be leveraged
CodeRed Attack The Internet Linux Web Server CodeRed Attack!! ••• IDS The Contextual Vacuum: Priority • Example: The Linux web server cannot be vulnerable to CodeRed • There was a valid attack on the wire but it wasn’t critical or relevant in this context • This isn’t a false positive or false negative but it gets assigned a default priority (e.g. critical) for the event type instead of in context with the target that was attacked (to coin a term, “nontextuals”) • Thousands of these a day dilute the value of the of the data from IDS • Remember: usability of the information is the key to a useful IDS
With numerous possible interpretations: Accept both Accept neither I A M BE AD CO NTEN T! I A M B D CO NTEN T! Accept first Accept last I A M BE D CO NTEN T! I A M B AD CO NTEN T! 2. The IDS/IDP processes the packets applying a ‘general’ case that may differ dramatically from the target Contextual Vacuum: Lack of Host Context • Hosts (OS IP stacks) process packets differently Overlaps • Duplicates • Re-transmissions • Configuration options • If the attacker knows the OS being attacked and the NIDS doesn’t, evasion can result AD Incoming overlapping packets: I A M BE CO NTEN T! 1. A hacker introduces an intentional overlap in the packet stream
ANAT OMYS TACK TTL=3 TTL=2 ANAT OMYS TACK ANAT OMYS TACK ANAT OMYS TACK ANAT TACK OMYS Contextual Vacuum: Lack of Network Context • Session content can change downstream • TTL (Time-To-Live) expiration enable IDS/IDP evasion • MTU (Maximum Transfer Unit) policy variations enable IDS/IDP evasion • Knowledge of topology is critical for proper traffic analysis TTL=1 ••• IDS TTL=1 ••• ••• The Internet Router Router Firewall/IPS TTL=0 ••• ••• Router Target
How Can We Solve this Problem? • Context needs to be driven into network intrusion detection if it is going to get better • What elements of context are needed? • Network context • Topology • Host Context • Host OS • Host Services • Exposure Context • Vulnerability classes available against the network
Current Tools for Building Context • Active scanners • Intermittent picture of network profile • Laptops are frequently disconnected from the network • Many machines run more than one operating system • Compromised servers are easily hidden from active scanners • Limited scope • Not all protocols • Not all ports • Not all assets • Strong potential for service disruption • Consumption of network bandwidth • Conclusions are binary in accuracy, either 100% right or 100% wrong • Host-based technologies • Cannot detect the unknown host or service • Impose significant administrative burdens
The Ideal for Building Context • Passive network discovery systems (PNDS) are the only workable approach • All network participants are observed • All protocols • All ports • All assets • Information is persistent • Real-time • All of the time • Many techniques can be leveraged and combined • Packet analysis • Flow analysis • Protocol analysis • Confidence model • No disruption of network operations • Minimal ‘moving parts’
Vulnerability Analysis • VA by inference • Knowledge about the host and its profile is immediately associated with knowledge about vulnerabilities, exploits, and remediation processes • No packets are used to probe targets on the network, purely passive • Passive approach allows for constant vulnerability monitoring • Necessary to understand the exposure context • Confidence model is more appropriate to improving NIDS
Real-time Change Detection • New network assets (and vulnerabilities) • Laptops • Servers • Rogue devices • Wired • Wireless • Unauthorized users • New network services (and vulnerabilities) • Ports • Protocols • Services • Policy violations • Devices • Protocols • Operating systems • Services • Applications • Essential for understanding possible impact of attacks
IDS: With Context • Provide host and network context to the IDS • Target-based IDS! PNDS
Event->Vulnerability/Change Correlation • Prioritization based on potential impact • Events that correlate to nothing are not that interesting • Events correlating to vulnerabilities are more interesting • Events correlating to vulnerabilities and then affecting change are highly interesting • Tiered prioritization • Relevance • Vulnerability • Asset Sensitivity • Attack Effectiveness
Automated Tuning • Dynamic implementation of security policies • Protocols • Operating systems • Services • Applications • Protect the network instead of just trying to detect random attacks!
= Eliminate False Positives/Negatives Network Traffic (packets • Model traffic in the IDS/IPS in exactly the same way as the end host. Multi-Protocol Session Acquisition RNA Repository Host Profiles Process Method RNA Events … OS/Version n0 OS/Version n1 OS/Version IP Defragmentation OS/Version IP Defragmentation TCP State Machine (stream reassembly) TCP State Machine (stream reassembly) Network Hosts Protocol Decoding Rules-Based Inspection
Enable Contextual Response • IDP technologies have many alternatives for response • Alert only • Update policy (firewall, router, etc.) • Block Session • Block Traffic (in-line filtering) • Context allows target-specific response(s) Response Processing Module Target ? The Internet Alert Update Block Alert Update Alert Only Web Server Employee Database Commerce Server
The Concept of NID Needs to Evolve • Algorithms are not enough • False positive picture has not improved dramatically in the past 10 years • Protecting the packets/protocols is a broken model
PNDS Are the Right Answer • Vulnerability scanners still solve problems, they just don’t solve this one very well • We cannot expect to provide accurate intrusion detection in environments where attackers have better information about the targets than the defenders • PNDS address all the problems of context generation in a way that is appropriate for large, highly changeable environments • First commercial PNDS will be available in December (from Sourcefire)