SlideShare une entreprise Scribd logo
1  sur  24
Intrusion Detection
CTO Forum
November 9, 2001
Tom Casey
Tcasey@pec.com
703.679.4900
2
Agenda
• Risks Associated with E-business
• Elements of an Intrusion Detection Strategy
• Misuse and Anomaly Detection
• Application, Host, and Network Based Tools
• Active and Passive Response
• Intrusion Detection System Architecture
• Technical and Legal Issues
• Commercial and Open Source ID systems
3
Reported Incidents Increasing
Number of Incidents Reported
0
5000
10000
15000
20000
25000
30000
35000
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
*2001
Years
NumberofIncidents
*Q1-Q3 2001Cert.org Statistics October 15, 2001
34,754
21,756
2,412
132
4
Risks Associated with E-business
• Defaced Websites
• Denial of Service/DDOS
• Theft of Company Proprietary Information
• Theft of Customer Information
• Downtime = Loss of Revenue
• Negative Press = Negative Public Image
• Internal and External Threats
5
History of Intrusion Detection
• Intrusion Detection (ID) defined:
– Process of monitoring computer networks and systems for
violations of security policy
• First ID System--manual “system audits”
• 1980, ID was born
– First document need for automated audit trail review to
support security goals
• Growth of Internet
6
The Importance of Intrusion Detection
• A perfectly secure system is a myth
– Firewalls and filtering routers aren’t enough to protect
electronic assets
• Effective audit information analysis required a tool
• An IDS is one of many components supporting a
robust security architecture-”Defense in Depth”
– Firewalls, VPN, Virus Protection, Vulnerability Assessments
etc.
• Protect valuable information resources from internal
and external threats
7
An IDS can accomplish the following
• Prevents and/or mitigates the damage resulting from
intrusion
• Identifies a precursor of more serious activity
• Identifies perpetrators
• Discovers new attack patterns
8
Elements of a Complete Intrusion
Detection Strategy
• Policy!
– Policy is living, constantly evolving
– ID configuration/design must support policy
• Intrusion Detection System (IDS) architecture
• Institutionalized Incident Response
– Responses map to policy
– Working with law enforcement
– CERTs
• Trained security personnel
• Awareness Programs - Support from Users
9
Time Line of an Attack
Probing:
•Port Sweeps
•Address sweeps
•Doorknob Ratting
Break-in:
•Operating System Bugs
•Sniffed Passwords
•Social Engineering
•Back Door
Malicious Actions:
•Steal Data or Programs
•Hop to other systems
•Install Back Door
•Setup Sniffer
•Steal CPU time
10
Misuse Detection
• Misuse, signature/pattern-matching
• Reliably detecting “known” use patterns
• Detects only known intrusions
• Difficult handling large volumes of data
• Does not handle uncertainty
11
Anomaly Detection
• Anomaly Detection
• Establish profile of “normal” user behavior
• Patterns of abnormality, rare, unusual behavior
• Accommodate adaptations to changes in user
behavior
• Statistical and Quantitative analysis
• Assumes users exhibit predictable, consistent
patterns of system usage
12
Anomaly Detection (con’t.)
User Normal Behavior Anomaly in User Behavior
System
Administrator
Secretary
Programmer
•Log in as root
•Edit user’s access permissions
•Run system configuration/
monitoring tools
•Logged in locally during company
working hours
•Uses office automation software
(word processing, etc)
•Reads and sends emails
•Logged in from early morning
to late night
•Uses software development
tools
•Browses Internet more often in
the evening then the daytime
•Becomes a programmer
•Accesses Software Development tools
•Accesses Software project sources
•Logs in from a remote host
•Assumes the role of a manager
•Logs in as a human resources manager
•Gains access to personnel database
13
Intrusion Detection Tools
• Application-based
– Collects information and detects intrusion at the application layer
– Placement: E-commerce Server, WebServer
• Host-based
– Agent software on host
– Monitors: event logs, critical system files, registry settings, etc
– Alerts management console, reacts actively and/or passively
depending upon policy
• Network-based
– Operates at the network level
– Detects DOS or dangerous payloads before the reach destination
– Dedicated host, two interfaces: Management and Stealth
14
Active Responses
• User driven
• Automatic Responses
• System takes action to block the progress of attack
– Closing holes, shutting down services, logging an intruder
– Block IP address(es)
• Collect more information (honey pots)
15
Passive Responses
• System logs and reports problem
• Alarms and notification
– visual, audible, email paper
• SNMP traps
• Archiving and reporting
16
IDS Architecture Recommendations
• Network based
– At Internet connection points
– Key internal network segments
– In the DMZ
– Just inside the Firewall (Intranet)
– Behind WAP server, WAN router, modem pool
• Host-based
– Servers containing critical data
– Domain servers
• Optimum Architecture: Combine misuse and
anomaly detection
17
Sample IDS Architecture
Firewall
Internet Router
Web
Server(S)
DMZ Services
Email
Relay
Border
Directory
Host IDS Agent
Domain
Controller
Personnel
Database
User
Workstations
User
Workstations
IDS Central
Management
Console
Network Sensor
Network Sensor
Network Sensor
User
WorkstationsStealth Mode
Customer
Database
Corporate Private Network
Web
Server(s)
File and
Print Server
18
Technical Issues
• Scalability
– Scaling over space as the network grows
• Management
– Network Management
– Sensor Controls
– Investigative Support
– Performance Loads
– User Interface
• Reliability
– Quality of analysis engines
– Response mechanisms
19
Technical Issues (con’t)
• Analysis
– Difficulties categorizing attacks/threats
– False positives/negatives (tuning anomaly detection
engines)
– Trend analysis, event correlation, data mining
• Interoperability
– Tools to collect information from: multiple abstraction layers,
hardware, software
– Audit trail standards
• Integration
– Intrusion detection in a Switched Environment
– Intrusion detection in a Crypto Environment
20
Legal Issues
• Legislation
– Computer fraud and abuse statutes
– Electronic Communications Privacy Act Sec 2510
• System logs are circumstantial evidence
– Requires proof of authenticity
– Testimony of responsible parties
– Expert to explain log file contents
– Maintaining redundant event log records
• Electronic Monitoring
– System admin monitoring vs. Law enforcement monitoring
• Cyber Forensics
21
Commercial and Open Source
• Leading Commercial Vendors
– Internet Security Systems (ISS): RealSecure
– NetworkICE: BlackICE
– Enterasys System: Dragon
– Cisco Secure Systems: IDS
– NFR: Network Intrusion Detection
• Open Source
– Snort.org
• Managed Security Providers (MSPs)
– Leverage the MSPs’ security expertise
– Ideal for Small/Mid-sized business
– Leverage MSP experience with other customers
– Focus your staff and resources on your core business activities
– 24X7X365 Monitoring and Notification
22
Current and Future Trends in IDS
• Protocol Scanners
• “Meta” Detection
– Interoperability
– Centralized Administration, Management, and Reporting
• IDS Appliances
– No general purpose OSes to configure and maintain
– No patches/Drivers to install
– Facilitates: accuracy, speed, and remote management
– 100 Gigabit Detection
23
References
• Internet Security Systems: www.iss.net
• Enterasys Networks: www.enterasys.com
• Cisco Systems: www.cisco.com
• Snort: www.snort.org
• NFR Security www.nfr.com
• CERT @ Carnegie Melon: www.cert.org
• Sans Institute: “The Twenty Most Critical
Internet Security Vulnerabilities”
http://www.sans.org/top20.htm
• Computer Security Institute: "2001 Computer Crime
and Security Survey"
http://www.gocsi.com/prelea/000321.html
Web-Enabling Government SM

Contenu connexe

Tendances

Nice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasureNice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasureIEEEFINALYEARPROJECTS
 
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte - Digital Forensics and Incident Response (DFIR) Training SessionInfocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte - Digital Forensics and Incident Response (DFIR) Training SessionInfocyte
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security IntroductionGLC Networks
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securitygangal
 
User Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityUser Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityHappiest Minds Technologies
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWPICPE
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber SecurityNiki Upadhyay
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersGokul Alex
 
Security for cloud native workloads
Security for cloud native workloadsSecurity for cloud native workloads
Security for cloud native workloadsRuncy Oommen
 
Data security in cloud environment
Data security in cloud environmentData security in cloud environment
Data security in cloud environmentShivam Singh
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting Shah Sheikh
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET Journal
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simpleSameer Paradia
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0Shah Sheikh
 

Tendances (20)

Nice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasureNice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasure
 
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte - Digital Forensics and Incident Response (DFIR) Training SessionInfocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
User Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityUser Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network Security
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Software Security
Software SecuritySoftware Security
Software Security
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber Security
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
 
Security for cloud native workloads
Security for cloud native workloadsSecurity for cloud native workloads
Security for cloud native workloads
 
Data security in cloud environment
Data security in cloud environmentData security in cloud environment
Data security in cloud environment
 
resume IT security
resume IT securityresume IT security
resume IT security
 
Cloud security
Cloud securityCloud security
Cloud security
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
G0314043
G0314043G0314043
G0314043
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simple
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 

En vedette

Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection amiable_indian
 
Push to pull
Push to pullPush to pull
Push to pulleaiti
 
1 pigmentation
1 pigmentation1 pigmentation
1 pigmentationAhmed Amer
 
Cc1 cancer derma
Cc1 cancer dermaCc1 cancer derma
Cc1 cancer dermaAhmed Amer
 
Social apps 3_1_2008
Social apps 3_1_2008Social apps 3_1_2008
Social apps 3_1_2008eaiti
 
Tempus PROMIS Work Plan (September 2014)
Tempus PROMIS Work Plan (September 2014)Tempus PROMIS Work Plan (September 2014)
Tempus PROMIS Work Plan (September 2014)PROMISproject
 
How To: Mobile "Hello World" With Xamarin and Visual Studio 2013
How To: Mobile "Hello World" With Xamarin and Visual Studio 2013How To: Mobile "Hello World" With Xamarin and Visual Studio 2013
How To: Mobile "Hello World" With Xamarin and Visual Studio 2013IndyMobileNetDev
 
Dc roundtablesmall webservices_2002
Dc roundtablesmall webservices_2002Dc roundtablesmall webservices_2002
Dc roundtablesmall webservices_2002eaiti
 
It outsourcing 2005
It outsourcing 2005It outsourcing 2005
It outsourcing 2005eaiti
 
PROMIS Tempus Project
PROMIS Tempus ProjectPROMIS Tempus Project
PROMIS Tempus ProjectPROMISproject
 
Middleware 2002
Middleware 2002Middleware 2002
Middleware 2002eaiti
 
3 lesiones deportivas
3 lesiones deportivas3 lesiones deportivas
3 lesiones deportivasangelamaria99
 
10 basics of human genetics
10 basics of human genetics10 basics of human genetics
10 basics of human geneticsAhmed Amer
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Managementeaiti
 
Autodesk inventor basic tools
Autodesk inventor basic toolsAutodesk inventor basic tools
Autodesk inventor basic toolsAshutosh Gupta
 
Slide obseravasi pendidikan
Slide obseravasi pendidikanSlide obseravasi pendidikan
Slide obseravasi pendidikankikiregar
 
observasi psikologi pendidikan MAN 2 Model Medan
observasi psikologi pendidikan MAN 2 Model Medanobservasi psikologi pendidikan MAN 2 Model Medan
observasi psikologi pendidikan MAN 2 Model Medan251304
 

En vedette (20)

Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
 
Push to pull
Push to pullPush to pull
Push to pull
 
1 pigmentation
1 pigmentation1 pigmentation
1 pigmentation
 
Cc1 cancer derma
Cc1 cancer dermaCc1 cancer derma
Cc1 cancer derma
 
Social apps 3_1_2008
Social apps 3_1_2008Social apps 3_1_2008
Social apps 3_1_2008
 
Tempus PROMIS Work Plan (September 2014)
Tempus PROMIS Work Plan (September 2014)Tempus PROMIS Work Plan (September 2014)
Tempus PROMIS Work Plan (September 2014)
 
How To: Mobile "Hello World" With Xamarin and Visual Studio 2013
How To: Mobile "Hello World" With Xamarin and Visual Studio 2013How To: Mobile "Hello World" With Xamarin and Visual Studio 2013
How To: Mobile "Hello World" With Xamarin and Visual Studio 2013
 
Dc roundtablesmall webservices_2002
Dc roundtablesmall webservices_2002Dc roundtablesmall webservices_2002
Dc roundtablesmall webservices_2002
 
It outsourcing 2005
It outsourcing 2005It outsourcing 2005
It outsourcing 2005
 
PROMIS Tempus Project
PROMIS Tempus ProjectPROMIS Tempus Project
PROMIS Tempus Project
 
Middleware 2002
Middleware 2002Middleware 2002
Middleware 2002
 
3 lesiones deportivas
3 lesiones deportivas3 lesiones deportivas
3 lesiones deportivas
 
10 basics of human genetics
10 basics of human genetics10 basics of human genetics
10 basics of human genetics
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
 
Manisha Garg_Resume modified
Manisha Garg_Resume modifiedManisha Garg_Resume modified
Manisha Garg_Resume modified
 
Ford
FordFord
Ford
 
Autodesk inventor basic tools
Autodesk inventor basic toolsAutodesk inventor basic tools
Autodesk inventor basic tools
 
Slide obseravasi pendidikan
Slide obseravasi pendidikanSlide obseravasi pendidikan
Slide obseravasi pendidikan
 
observasi psikologi pendidikan MAN 2 Model Medan
observasi psikologi pendidikan MAN 2 Model Medanobservasi psikologi pendidikan MAN 2 Model Medan
observasi psikologi pendidikan MAN 2 Model Medan
 

Similaire à Intrusion detection 2001

intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)Aj Maurya
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iotST_World
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas IndonesiaIGN MANTRA
 
Security Monitoring Course - Ali Ahangari
Security Monitoring Course - Ali AhangariSecurity Monitoring Course - Ali Ahangari
Security Monitoring Course - Ali AhangariAli Ahangari
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0Rasmi Swain
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handlingnewbie2019
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraIGN MANTRA
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxAlfredObia1
 
RuSIEM overview (english version)
RuSIEM overview (english version)RuSIEM overview (english version)
RuSIEM overview (english version)Olesya Shelestova
 
CNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookCNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookSam Bowne
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostPrecisely
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3ShivamSharma909
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course contentShivamSharma909
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdfKIYALIBAN1
 

Similaire à Intrusion detection 2001 (20)

intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 
9 - Security
9 - Security9 - Security
9 - Security
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
 
Security Monitoring Course - Ali Ahangari
Security Monitoring Course - Ali AhangariSecurity Monitoring Course - Ali Ahangari
Security Monitoring Course - Ali Ahangari
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
 
RuSIEM overview (english version)
RuSIEM overview (english version)RuSIEM overview (english version)
RuSIEM overview (english version)
 
CNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookCNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management Handbook
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Wc4
Wc4Wc4
Wc4
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
CyberSecurity101.pdf
CyberSecurity101.pdfCyberSecurity101.pdf
CyberSecurity101.pdf
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 

Plus de eaiti

Handheld device med_care_2001
Handheld device med_care_2001Handheld device med_care_2001
Handheld device med_care_2001eaiti
 
Ctolinux 2001
Ctolinux 2001Ctolinux 2001
Ctolinux 2001eaiti
 
J2ee 2000
J2ee 2000J2ee 2000
J2ee 2000eaiti
 
Xp presentation 2003
Xp presentation 2003Xp presentation 2003
Xp presentation 2003eaiti
 
Cto forum nirav_kapadia_2006_03_31_2006
Cto forum nirav_kapadia_2006_03_31_2006Cto forum nirav_kapadia_2006_03_31_2006
Cto forum nirav_kapadia_2006_03_31_2006eaiti
 
Cloud mz cto_roundtable
Cloud mz cto_roundtableCloud mz cto_roundtable
Cloud mz cto_roundtableeaiti
 
Mobile 2000
Mobile 2000Mobile 2000
Mobile 2000eaiti
 
Stateof cto career_2002
Stateof cto career_2002Stateof cto career_2002
Stateof cto career_2002eaiti
 
Dions globalsoa web2presentation1_2006
Dions globalsoa web2presentation1_2006Dions globalsoa web2presentation1_2006
Dions globalsoa web2presentation1_2006eaiti
 
Thads globalsoa web2presentation2_2006
Thads globalsoa web2presentation2_2006Thads globalsoa web2presentation2_2006
Thads globalsoa web2presentation2_2006eaiti
 
Ping solutions overview_111904
Ping solutions overview_111904Ping solutions overview_111904
Ping solutions overview_111904eaiti
 
Washdc cto-0905-2003
Washdc cto-0905-2003Washdc cto-0905-2003
Washdc cto-0905-2003eaiti
 
Broadband tech 2005
Broadband tech 2005Broadband tech 2005
Broadband tech 2005eaiti
 
Quantum technology
Quantum technologyQuantum technology
Quantum technologyeaiti
 
BigData @ comScore
BigData @ comScoreBigData @ comScore
BigData @ comScoreeaiti
 
Hemispheres of Data
Hemispheres of DataHemispheres of Data
Hemispheres of Dataeaiti
 
Using Hadoop
Using HadoopUsing Hadoop
Using Hadoopeaiti
 
Greenplum: Driving the future of Data Warehousing and Analytics
Greenplum: Driving the future of Data Warehousing and AnalyticsGreenplum: Driving the future of Data Warehousing and Analytics
Greenplum: Driving the future of Data Warehousing and Analyticseaiti
 

Plus de eaiti (18)

Handheld device med_care_2001
Handheld device med_care_2001Handheld device med_care_2001
Handheld device med_care_2001
 
Ctolinux 2001
Ctolinux 2001Ctolinux 2001
Ctolinux 2001
 
J2ee 2000
J2ee 2000J2ee 2000
J2ee 2000
 
Xp presentation 2003
Xp presentation 2003Xp presentation 2003
Xp presentation 2003
 
Cto forum nirav_kapadia_2006_03_31_2006
Cto forum nirav_kapadia_2006_03_31_2006Cto forum nirav_kapadia_2006_03_31_2006
Cto forum nirav_kapadia_2006_03_31_2006
 
Cloud mz cto_roundtable
Cloud mz cto_roundtableCloud mz cto_roundtable
Cloud mz cto_roundtable
 
Mobile 2000
Mobile 2000Mobile 2000
Mobile 2000
 
Stateof cto career_2002
Stateof cto career_2002Stateof cto career_2002
Stateof cto career_2002
 
Dions globalsoa web2presentation1_2006
Dions globalsoa web2presentation1_2006Dions globalsoa web2presentation1_2006
Dions globalsoa web2presentation1_2006
 
Thads globalsoa web2presentation2_2006
Thads globalsoa web2presentation2_2006Thads globalsoa web2presentation2_2006
Thads globalsoa web2presentation2_2006
 
Ping solutions overview_111904
Ping solutions overview_111904Ping solutions overview_111904
Ping solutions overview_111904
 
Washdc cto-0905-2003
Washdc cto-0905-2003Washdc cto-0905-2003
Washdc cto-0905-2003
 
Broadband tech 2005
Broadband tech 2005Broadband tech 2005
Broadband tech 2005
 
Quantum technology
Quantum technologyQuantum technology
Quantum technology
 
BigData @ comScore
BigData @ comScoreBigData @ comScore
BigData @ comScore
 
Hemispheres of Data
Hemispheres of DataHemispheres of Data
Hemispheres of Data
 
Using Hadoop
Using HadoopUsing Hadoop
Using Hadoop
 
Greenplum: Driving the future of Data Warehousing and Analytics
Greenplum: Driving the future of Data Warehousing and AnalyticsGreenplum: Driving the future of Data Warehousing and Analytics
Greenplum: Driving the future of Data Warehousing and Analytics
 

Dernier

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 

Dernier (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 

Intrusion detection 2001

  • 1. Intrusion Detection CTO Forum November 9, 2001 Tom Casey Tcasey@pec.com 703.679.4900
  • 2. 2 Agenda • Risks Associated with E-business • Elements of an Intrusion Detection Strategy • Misuse and Anomaly Detection • Application, Host, and Network Based Tools • Active and Passive Response • Intrusion Detection System Architecture • Technical and Legal Issues • Commercial and Open Source ID systems
  • 3. 3 Reported Incidents Increasing Number of Incidents Reported 0 5000 10000 15000 20000 25000 30000 35000 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 *2001 Years NumberofIncidents *Q1-Q3 2001Cert.org Statistics October 15, 2001 34,754 21,756 2,412 132
  • 4. 4 Risks Associated with E-business • Defaced Websites • Denial of Service/DDOS • Theft of Company Proprietary Information • Theft of Customer Information • Downtime = Loss of Revenue • Negative Press = Negative Public Image • Internal and External Threats
  • 5. 5 History of Intrusion Detection • Intrusion Detection (ID) defined: – Process of monitoring computer networks and systems for violations of security policy • First ID System--manual “system audits” • 1980, ID was born – First document need for automated audit trail review to support security goals • Growth of Internet
  • 6. 6 The Importance of Intrusion Detection • A perfectly secure system is a myth – Firewalls and filtering routers aren’t enough to protect electronic assets • Effective audit information analysis required a tool • An IDS is one of many components supporting a robust security architecture-”Defense in Depth” – Firewalls, VPN, Virus Protection, Vulnerability Assessments etc. • Protect valuable information resources from internal and external threats
  • 7. 7 An IDS can accomplish the following • Prevents and/or mitigates the damage resulting from intrusion • Identifies a precursor of more serious activity • Identifies perpetrators • Discovers new attack patterns
  • 8. 8 Elements of a Complete Intrusion Detection Strategy • Policy! – Policy is living, constantly evolving – ID configuration/design must support policy • Intrusion Detection System (IDS) architecture • Institutionalized Incident Response – Responses map to policy – Working with law enforcement – CERTs • Trained security personnel • Awareness Programs - Support from Users
  • 9. 9 Time Line of an Attack Probing: •Port Sweeps •Address sweeps •Doorknob Ratting Break-in: •Operating System Bugs •Sniffed Passwords •Social Engineering •Back Door Malicious Actions: •Steal Data or Programs •Hop to other systems •Install Back Door •Setup Sniffer •Steal CPU time
  • 10. 10 Misuse Detection • Misuse, signature/pattern-matching • Reliably detecting “known” use patterns • Detects only known intrusions • Difficult handling large volumes of data • Does not handle uncertainty
  • 11. 11 Anomaly Detection • Anomaly Detection • Establish profile of “normal” user behavior • Patterns of abnormality, rare, unusual behavior • Accommodate adaptations to changes in user behavior • Statistical and Quantitative analysis • Assumes users exhibit predictable, consistent patterns of system usage
  • 12. 12 Anomaly Detection (con’t.) User Normal Behavior Anomaly in User Behavior System Administrator Secretary Programmer •Log in as root •Edit user’s access permissions •Run system configuration/ monitoring tools •Logged in locally during company working hours •Uses office automation software (word processing, etc) •Reads and sends emails •Logged in from early morning to late night •Uses software development tools •Browses Internet more often in the evening then the daytime •Becomes a programmer •Accesses Software Development tools •Accesses Software project sources •Logs in from a remote host •Assumes the role of a manager •Logs in as a human resources manager •Gains access to personnel database
  • 13. 13 Intrusion Detection Tools • Application-based – Collects information and detects intrusion at the application layer – Placement: E-commerce Server, WebServer • Host-based – Agent software on host – Monitors: event logs, critical system files, registry settings, etc – Alerts management console, reacts actively and/or passively depending upon policy • Network-based – Operates at the network level – Detects DOS or dangerous payloads before the reach destination – Dedicated host, two interfaces: Management and Stealth
  • 14. 14 Active Responses • User driven • Automatic Responses • System takes action to block the progress of attack – Closing holes, shutting down services, logging an intruder – Block IP address(es) • Collect more information (honey pots)
  • 15. 15 Passive Responses • System logs and reports problem • Alarms and notification – visual, audible, email paper • SNMP traps • Archiving and reporting
  • 16. 16 IDS Architecture Recommendations • Network based – At Internet connection points – Key internal network segments – In the DMZ – Just inside the Firewall (Intranet) – Behind WAP server, WAN router, modem pool • Host-based – Servers containing critical data – Domain servers • Optimum Architecture: Combine misuse and anomaly detection
  • 17. 17 Sample IDS Architecture Firewall Internet Router Web Server(S) DMZ Services Email Relay Border Directory Host IDS Agent Domain Controller Personnel Database User Workstations User Workstations IDS Central Management Console Network Sensor Network Sensor Network Sensor User WorkstationsStealth Mode Customer Database Corporate Private Network Web Server(s) File and Print Server
  • 18. 18 Technical Issues • Scalability – Scaling over space as the network grows • Management – Network Management – Sensor Controls – Investigative Support – Performance Loads – User Interface • Reliability – Quality of analysis engines – Response mechanisms
  • 19. 19 Technical Issues (con’t) • Analysis – Difficulties categorizing attacks/threats – False positives/negatives (tuning anomaly detection engines) – Trend analysis, event correlation, data mining • Interoperability – Tools to collect information from: multiple abstraction layers, hardware, software – Audit trail standards • Integration – Intrusion detection in a Switched Environment – Intrusion detection in a Crypto Environment
  • 20. 20 Legal Issues • Legislation – Computer fraud and abuse statutes – Electronic Communications Privacy Act Sec 2510 • System logs are circumstantial evidence – Requires proof of authenticity – Testimony of responsible parties – Expert to explain log file contents – Maintaining redundant event log records • Electronic Monitoring – System admin monitoring vs. Law enforcement monitoring • Cyber Forensics
  • 21. 21 Commercial and Open Source • Leading Commercial Vendors – Internet Security Systems (ISS): RealSecure – NetworkICE: BlackICE – Enterasys System: Dragon – Cisco Secure Systems: IDS – NFR: Network Intrusion Detection • Open Source – Snort.org • Managed Security Providers (MSPs) – Leverage the MSPs’ security expertise – Ideal for Small/Mid-sized business – Leverage MSP experience with other customers – Focus your staff and resources on your core business activities – 24X7X365 Monitoring and Notification
  • 22. 22 Current and Future Trends in IDS • Protocol Scanners • “Meta” Detection – Interoperability – Centralized Administration, Management, and Reporting • IDS Appliances – No general purpose OSes to configure and maintain – No patches/Drivers to install – Facilitates: accuracy, speed, and remote management – 100 Gigabit Detection
  • 23. 23 References • Internet Security Systems: www.iss.net • Enterasys Networks: www.enterasys.com • Cisco Systems: www.cisco.com • Snort: www.snort.org • NFR Security www.nfr.com • CERT @ Carnegie Melon: www.cert.org • Sans Institute: “The Twenty Most Critical Internet Security Vulnerabilities” http://www.sans.org/top20.htm • Computer Security Institute: "2001 Computer Crime and Security Survey" http://www.gocsi.com/prelea/000321.html

Notes de l'éditeur

  1.