140 likes | 296 Views
Intrusion Detection. Jordan Wiens 352 392 2061 numatrix@ufl.edu http://infosec.ufl.edu/ Senior Network Security Engineer. Introduction. UF Security Team Auditing Scanning Incident Response, Forensics IDS Evaluations Education Me. Purpose, related tech. Real-time alerting Forensics
E N D
Intrusion Detection • Jordan Wiens • 352 392 2061 • numatrix@ufl.edu • http://infosec.ufl.edu/ • Senior Network Security Engineer
Introduction • UF Security Team • Auditing • Scanning • Incident Response, Forensics • IDS • Evaluations • Education • Me
Purpose, related tech • Real-time alerting • Forensics • IDS vs. IPS • IDS vs. HIDS • IDS vs. NADS • IPS vs. Firewall
Timeline • 1987 – An Intrusion Detection Model • 1990 – A Network Security Monitor • 1994 – Netranger • 1997 – ISS • 1998 – Snort • 1999 – Dragon
Deployment • Copper • Hub • Switch w/ SPAN port or mirror mode • Fiber • Optical tap (passive, active) • Optical switch • Wireless • Management Network
Classic Techniques • Malformed packets • Pattern matching • Protocol decoders • Statistical analysis
Modern Techniques • Context Awareness • Inline Responses • OOB Responses • Extensibility, Integration, Open APIs • Anomaly Detection
Signatures • Signature writing methodology • False-positive, false-negative • Vulnerability versus exploit • Goals for forensics, detection, prevention • Examples • UPNP • Botnet detection • WMF
Detection Failures • Evasion • Fuzz until evade (AV bypass as well) • Obfuscate / encode • All layers • Fragroute • Metasploit • Forest, trees, etc. • Nessus, Metasploit • Inherent weaknesses
Counter Evasion • IP Normalization • Application proxy • IDS Normalization Modules • Count on laziness! • Less effective as we add on layers to traditional OSI (SOAP over HTTP, AJAX, etc).
Companies and Products • Open Source (Snort, Bro, Shadow) • Enterasys' Dragon • ISS Proventia • Juniper's Netscreen • Cisco • Stillsecure • Lucid • and more...
The background photo in this presentation is called “Look-Forward” by mmmzaaomi and is licensed under a by-nc-sa/2.0 Creative Commons license. It is available at:flickr.com/photos/mmmazzoni/110019759/ Likewise, this presentation itself is released under a by-nc-sa/2.0 Creative Commons License and is available at: infosec.ufl.edu/literature/ Ver 1.0 Questions?