240 likes | 431 Views
FORE SEC Academy Security Essentials (III ). Host-Based Intrusion Detection. Agenda. The need for host-based ID Host-based ID Methodology Unix host-based ID Tools Windows host-based ID Tools. Need for Host-based ID. Very fast networks Switched networks Encrypted networks
E N D
FORESEC AcademySecurity Essentials (III) Host-Based Intrusion Detection
Agenda • The need for host-based ID • Host-based ID Methodology • Unix host-based ID Tools • Windows host-based ID Tools
Need for Host-based ID • Very fast networks • Switched networks • Encrypted networks • Backdoors in local network • Insider on network • Network-based IDS may miss attack • Don't trust corporate security that much
Very Fast Networks • The current limits for network-based IDS boxes are about 80 MB/sec fully loaded • A 200 MHz Pentium bus would only partially increase this • Bandwidth at large sites will probably always exceed network detection and processing speed • HIDS does not face bandwith challenges, but does present deployment issues
Switched Networks • Network-based intrusion detection systems rely on promiscuous mode for their NICs;this is not possible with switched networks • Intrusion detection in the switch is the future direction, not really here yet • Spanning ports and network taps provide semi-effective options
Switched Network Diagram In a switched network, a virtual circuit is created between two peers across the switch fabric. Each port on the switch only supports the circuits to that host.
Spanning PortSwitched Networks Sensors can be placed on a spanning port, but can usually only monitor one VLAN at a time. This does not work very well in practice.
Encrypted Networks • NIDS sensors can't analyze what they can't read • The use of encryption for network traffic is growing • Encryption can be used by attackers to hide their traffic • Traffic must be read before/after the encryption process • NIDS and HIDS can work together to address these challenges
Host-based IntrusionDetection Methodology • Host-based systems monitor their network connections and file system status. For this to work, we have to acquire the aggregate logs of ALL critical systems at a minimum • Local processing/alerting may be done, but data is generally sent to a central location for parsing • When potential problems are found, alerts are raised
Host-based IntrusionDetection Methodology (2) A connects to B 3) Logserver records A-> B connection, checks ruleset, A -> B is OK, waits. 2) B logs connection and informs Logserver
Unix Host-basedIntrusion Detection • TCPWrappers • Port Sentry • Syslog • Swatch • Tripwire
TCPWrappers • Monitors and filters incoming TCP network service requests • Valuable logging tool • Where to get it - ftp://ftp.porcupine.org/pub/security/index.html - Currently included in most Unix / Linux distributions
Without TCPWrappers All incoming TCP requests serviced
With TCPWrappers All requests checked and logged
Host Deny ALL : ALL # Deny everything, add back with /etc/hosts.allow
Host Allow ALL: .nnnn.abc.org, 192.168.2, friend.somewhere.edu sshd: trustedhost.somewhere.org
Paranoid Mode • Default for TCPWrappers -Checks both forward and reverse DNS lookup -Both answers must match or connection is dropped -Adds a layer of security against spoofing
TCPWrappers Threat List • Outsider attack from network • Outsider attack from telephone • Insider attack from local network • Insider attack from local system • Attack from malicious code
Psionic Port Sentry(TCPWrappers with an attitude) • Runs on TCP and UDP • Stealth scan detection for Linux • SYN/half-open, FIN, NULL, X-MAS and oddball packet stealth scans • Port Sentry will react to a port scan attempt by blocking the host in real-time • Will remember hosts that connected previously
Psionic Port Sentry Log • Jul 3 11:30:20 shepherd portsentry[418]: attackalert: SYN/Normal scan from host:node10453.a2000.nl/24.132.4.83 to TCP port: 143 • Jul 3 11:30:20 shepherd portsentry[418]: attackalert: Host 24.132.4.83 has been blocked viawrappers with string: "ALL: 24.132.4.83“ • Jul 3 11:30:20 shepherd portsentry[418]:attackalert: Host 24.132.4.83 has been blocked viadropped route using command: "/sbin/route add –host24.132.4.83 gw 333.444.555.666"
Syslog • Unix system logger can be on a local system or other system • TCPWrappers logs to Syslog by default • Logs can offer valuable information, but they can also be compromised • Swatch or other tools can monitor syslog and raise alerts