510 likes | 674 Views
Who are we?. Jeff Nathanjeff@wwti.comContributing Snort DeveloperIDS Researcher. Brian Caswellbmc@snort.orgSnort Signature MaintainerCorporate IDS Team Leader. * Opinions expressed are our own and do not reflect any employer. What are we discussing?. No IDS is perfectDeployment conceptsS
E N D
1. Large scale IDS Network Intrusion Detection
Deployment, Data Mining, and Management on a large scale
2. Who are we? Jeff Nathan
jeff@wwti.com
Contributing Snort Developer
IDS Researcher Brian Caswell
bmc@snort.org
Snort Signature Maintainer
Corporate IDS Team Leader
3. What are we discussing? No IDS is perfect
Deployment concepts
Sensor management
Real-time IDS
Data Management
Data Mining
Data Fusion
Cost
4. No IDS is perfect Even ID systems have had problems
Snorts ICMP Payload printing issue
BlackICEs ICMP DoS/Kernel level overflow
Dragons SNMP decoding DoS
And we haven't started talking about
detecting attacks yet Snort was susceptible to DoS in sniffer mode due to an ICMP printing bug.
BlackICE suffered from an exploitable condition in its handling of ICMP which lead to an exploitable condition.
Dragon was susceptible to DoS due to a bug in SNMP decoding.
Of all the major IDS products, only snort received press after the DoS was discovered.Snort was susceptible to DoS in sniffer mode due to an ICMP printing bug.
BlackICE suffered from an exploitable condition in its handling of ICMP which lead to an exploitable condition.
Dragon was susceptible to DoS due to a bug in SNMP decoding.
Of all the major IDS products, only snort received press after the DoS was discovered.
5. ID Systems are still evolving Resolving the ambiguities of passive detection
Drawbacks of using a single detection mechanism
Inline technologies
Scalability is still not proven Did the end host accept the packet?
Virtually every IDS developer will tell you they use multiple ID technologies to prove their own technology and expand their coverage.
Inline technologies are new and unexplored in large environments where network availability is the prime directive
The scalability of existing systems into large environments has not been directly address by vendors.Did the end host accept the packet?
Virtually every IDS developer will tell you they use multiple ID technologies to prove their own technology and expand their coverage.
Inline technologies are new and unexplored in large environments where network availability is the prime directive
The scalability of existing systems into large environments has not been directly address by vendors.
6. No love between the children Vendors have unique detection capabilities
Some ID systems will not integrate with others at all
Correlating events between different systems is difficult Signature detection vs. pure protocol decoding (a semantic issue)
Proprietary management/alerting/logging mechanisms do not integrate well
Even with compatible output, correlation between systems is largely unavailable.Signature detection vs. pure protocol decoding (a semantic issue)
Proprietary management/alerting/logging mechanisms do not integrate well
Even with compatible output, correlation between systems is largely unavailable.
7. Wait, what about CVE? Does not cover everything an IDS looks at
porno-fantastico,GOL! Busca el lubrificante
CIEL Project
CVE Sub-Project for IDS mappings
Descriptions of detected attacks vary between vendors CVE Compatability helps, but it isnt a complete solution
CIEL = Common Intrusion Event List
Porno-fantastico, GOL! Busca el lubrificante = kickass porn, SCORE! Get the lotion! (snort classification for potential pornographic materials)
CVE Compatability helps, but it isnt a complete solution
CIEL = Common Intrusion Event List
Porno-fantastico, GOL! Busca el lubrificante = kickass porn, SCORE! Get the lotion! (snort classification for potential pornographic materials)
8. Pre-deployment discussion How many people will view the output?
What are their skill levels?
Where should we place our IDS?
How do I train my analysts? How many people that know IP forensics?
Were the people that designed your network sane?
If you dont have people trained in IP forensics, how DO you train them?How many people that know IP forensics?
Were the people that designed your network sane?
If you dont have people trained in IP forensics, how DO you train them?
9. Deployment mechanics IDS Technologies
Gigabit ID systems
http://www.cs.um.edu.mt/~ssrg/Wallace.htm
Considering multiple systems
Managing a large number of sensors
10. Mechanics - Taps Good
Ideal for monitoring critical pipes
Fail open
Nothing to manage
Nothing to configure Bad
Copper taps require high end switches
Requires more rack space
Cost Switches must capable of spanning to combine tap ports
Switches must capable of spanning to combine tap ports
11. Mechanics - Switches Good
Can be used inline
Provides some degree of buffering
Remotely managed
High end switches can aggregate multiple tapped segments together Bad
Fail Closed
Insufficient back plane bandwidth really hurts
Over subscription between mixed media and in overloaded switches
12. Mechanics - Spans Good
Copy Ethernet frames from one physical port to another
Can be used for both tap & switch-only deployments
Can be modified by switch configuration (instead of moving cables) Bad
Used for both tap & switch-only deployments
Computationally expensive to the switch
May deliver more data to a port than the media can handle
13. Mechanics - Load Balancing Good
Allow for practical deployment into high-speed networks
Easiest mechanism for deploying multiple sensors at the same location Bad
Tap vendors dont work with load balancer vendors
Little practical documentation for enterprise environments
Introduce a possible point of data mangling
Limited port density
Requires taps
expensive
17. Mechanics - Sensor Management Number of solutions, most are very expensive
Tivoli
NSH
Cfchange
Rsync
CVS
18. Mechanics Sensor management with rsync Good
Centrally managed
Remote sensors cant log in to the master Bad
Difficult to scale push
Each configuration requires a separate rsync directory Switches must capable of spanning to combine tap ports
Switches must capable of spanning to combine tap ports
19. Mechanics Sensor management with CVS Good
Centrally managed
Pull generally scales better than push
Multiple configurations managed together
Entire operating systems can be managed via CVS Bad
Difficult to manage
Abuses CVS
Management of OS adds much more complexity Switches must capable of spanning to combine tap ports
Switches must capable of spanning to combine tap ports
20. Real-time IDS doesnt scale On a typical SDSL line:
5 alerts per minute
300 alerts per hour
7200 alerts per day
On a typical T1:
50 alerts per minute
3000 alerts per hour
72000 alerts per day On a highly utilized DS3:
8 alerts per second
480 alerts per minute
28800 alerts per hour
691200 alerts per day
21. A non-scaleable approach If each alert takes 30 seconds to examine, you need 120 analysts that work around the clock
When will they eat?
When will they sleep?
When will they use the bathroom?
22. Stuck on the non-scaleable? Better stock up on Red Bull and catheters for your SOC
Look into purchasing stock in Red Bull GMBH
23. Data Management Data Format
IDMEF
Security MIBS
Syslog
Something that scales
24. Security MIBS Divides the alert space into different spaces:
IP Layer
Transport Layer
Protocol Layer
25. Security MIBS - Example TCP SYN flood attack:
tcpSYNFlood OBJECT Identifier ::= {iso 3.6.1.5.1.3.1.1}
Sub-objects for additional information
tcpSYNFlood.src OBJECT Identifier ::=
{iso 3.6.1.5.1.3.1.1.1}
tcpSYNFlood.dest OBJECT Identifier ::=
{iso 3.6.1.5.1.3.1.1.1.2}
26. Security MIBS good & bad Good
ASN1 is widely supported
Widely documented
SNMP is a standard Bad
ASN1 is difficult to implement
Difficult to read
SNMP is still immature
SNMP v3 implementations are rare Protos anyone?Protos anyone?
27. CIDF Common Intrusion Detection Framework Initial DARPA Research by Teresa Lunt and Stuart Staniford-Chen among others
S-Expressions
Actually use Generalized Intrusion Detection Objects (GIDO)
Encoded version of an S-expression
Work spurred on the Intrusion Detection Working Group (IDWG)
28. CIDF - Example (Delete
(Context
(HostName first.example.com)
(Time 16:40:32 Jun 14 1998)
)
(Initiator
(UserName joe)
)
(Source
(FileName /etc/passwd)
)
)
29. CIDF good & bad Good
Very extensible in S-expression form
Easily readable in S-expression form Bad
Work stopped in 99
Not actually implemented anywhere
Difficult to parse
Not as efficient as other reporting formats
30. IDMEF Intrusion Detection Message Exchange Format Primary usage
Sensor to console
Console to console
Actual Implementations
libidmef & Beep
snort-idmef
prelude
stat (www.cs.ucsb.edu/~rsg/STAT/) Unanswered questions:
Storage
Viewing Data
COTS implementations?
31. IDMEF - Example <IDMEF-Message version="0.3">
<Alert ident="abc123456789" impact="attempted-dos">
<Analyzer analyzerid="bc-sensor01">
<Node category="dns">
<name>sensor.bigcompany.com</name>
</Node>
</Analyzer>
<CreateTime ntpstamp="0x12345678.0x98765432">
2000-03-09T10:01:25.93464Z
</CreateTime>
<Source ident="a1a2" spoofed="yes">
<Node ident="a1a2-1">
<Address ident="a1a2-2
category="ipv4-addr">
<address>222.121.111.112</address>
32. IDMEF Example (continued) </Address>
</Node>
</Source>
<Target ident="b3b4">
<Node>
<Address ident="b3b4-1" category="ipv4-addr">
<address>123.234.231.121</address>
</Address>
</Node>
</Target>
<Target ident="c5c6">
<Node ident="c5c6-1" category="nisplus">
<name>lollipop</name>
</Node>
</Target>
33. IDMEF Example (still going) <Target ident="d7d8">
<Node ident="d7d8-1">
<location>Cabinet B10</location>
<name>Cisco.router.b10</name>
</Node>
</Target>
<Classification origin="cve">
<name>CVE-1999-128</name>
<url>http://www.cve.mitre.org/</url>
</Classification>
</Alert>
</IDMEF-Message>
34. Syslog Bastard stepchild of IDS alert delivery
Unreliable
No guarantee of delivery
ASCII only format
35. Syslog good & bad Good
Easy to parse
Human readable
Widely supported
Already deployed in your infrastructure Bad
Difficult to secure
Unreliable
No guarantee of delivery
36. Data Exchange A practical approach Requirements:
Portable
Small
Flexible
Handles the data you need
Readable by your end system
Compressible
Human readable Dragon uses MySQL
Sourcefire uses an embeded DB
ISS uses access (or MSSQL depending on the version)
SNP uses MSSQL
Dragon uses MySQL
Sourcefire uses an embeded DB
ISS uses access (or MSSQL depending on the version)
SNP uses MSSQL
37. Data Exchange - CSV How about CSV?
Natively supported by most of the ID systems
In the format we need for our data warehouse anyway
38. Data Storage Star Schema:
Single "fact table"
Multiple decode tables
Why should we use this schema?
Maximum flexibility
Low maintenance
Best performance for the most needed
information
40. Data Storage Good & Bad
41. Data Mining Association
Clustering
Deviation Analysis
Link or Tree abduction
Neural Abduction
Rule Abduction
Statistical Analysis
- Association
- Analysis of cause-and-effect and structure of relationships between
datasets.
- Clustering
- Segment data into subsets that share common properties
- Deviation Analysis
- Analyzes deviations from normal statistical behavior
- Link or Tree abduction
- discovers relationships between data sets and interesting
connecting pattern properties.
- Neural Abduction
- training artificial neural networks to match data,
extract node weights and structure (similar to abducted rule sets).
- Rule Abduction
- IF-THEN-ELSE rules that describe associations, structures and the
test rules.
- Statistical Analysis
- determine the likelihood of characteristics and associations in
selected data sets. - Association
- Analysis of cause-and-effect and structure of relationships between
datasets.
- Clustering
- Segment data into subsets that share common properties
- Deviation Analysis
- Analyzes deviations from normal statistical behavior
- Link or Tree abduction
- discovers relationships between data sets and interesting
connecting pattern properties.
- Neural Abduction
- training artificial neural networks to match data,
extract node weights and structure (similar to abducted rule sets).
- Rule Abduction
- IF-THEN-ELSE rules that describe associations, structures and the
test rules.
- Statistical Analysis
- determine the likelihood of characteristics and associations in
selected data sets.
42. Data Mining - Implementations Spade (Snort Preprocessor Plugin)
Deviation Analysis
Cyber wolf
Semi real-time rule abduction
43. Spade Good
Semi Real-time
Distributed Computation Bad
Limited scope
Only looks at TCP SYN packets
Anomalies happen
44. CyberWolf Semi Real-time Rule Abduction
User defined rules that create incident trouble tickets
Currently deployed at FEMA and AFRL
Example:
$A connects to $B on dstport 80
$A attacks $B with NIMDA
if ($B attacks * with NIMDA) { generate_incident();}
FEMA= Federal Emergency Management Agency (the shadow government agency)
AFRL = Air Force Research LabsFEMA= Federal Emergency Management Agency (the shadow government agency)
AFRL = Air Force Research Labs
45. Data Fusion Unified data view
Enterprise wide view
Plug & Play IDS
Vulnerability Correlation
46. Alert Fusion RealSecure HTTP_IE_BAT
Snort WEB-IIS .bat? access
Apache GET /args.bat?dir HTTP/1.0
If multiple alerts have generally the same time, with the same SRC, DST, SRCPORT, and DSTPORT, its probably the same thing
47. Ooh, Alert Fusion Good Provides integrity checking
Sensor $A caught this, sensor $B didnt. Why?
Vendor $A caught this, sensor $B didnt. Why?
Implemented by ARIS and Tivoli Risk Manager
Can anyone say CIEL?
48. Vulnerability Correlation 3:00PM - .ida buffer overflow attempt against IP
A previous vulnerability scan says may be vulnerable to .ida buffer overflow
foreach my $cve (%{$sigs{$event}}) {
if ($vulns{$dstip}{$cve} || $vulns{$srcip}{$cve}) {
$priority++;
}
}
Implemented by:
Enterasys provides addon for Nessus Correlation
ISS's SiteProtector Security Fusion Module
49. Wait, what about ip360? Get an alert? Scan to see if you are vulnerable
Not scalable
Scan your network, only look for things you are vulnerable to
Dont you want to know if you are being attacked, even if you are not vulnerable?
Scan your network, change priorities of alerts if you are vulnerable
Dont ignore data because your scanner told you so, but raise the priority if you need to
50. Cost IDS is expensive
Providing visibility into large networks requires a well implemented system (with lots of expensive hardware)
Post processing of alert data and data mining techniques require commercial databases
Large networks require many more sensors
It costs money to protect money
A poorly implemented solution adds little to the overall security
51. Conclusion Prioritization of alert data is critical
Effectively deploying IDS is complicated
Effectively deploying IDS on a large scale is much more complicated
Integrating multiple vendors products will remain difficult until CIEL takes hold and we (the users) push the vendors to add support
52. Concluding the Conclusion Effectively managing IDS output requires trained analysts
Dynamic reprioritization of alert data before its pasted to the alerting mechanism is important
Vendors need to investigate data mining mechanisms for post processing of alert information
Large scale deployments of various ID systems requires an incredible amount of work