Intrusion Detection Systems & Honeypots
Intrusion Detection Systems & Honeypots
Intrusion Detection Systems & Honeypots
& Honeypots
120000
100000
80000
60000
40000
20000
0
1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003
Attack Sophistication vs. Intruder Technical Knowledge
Intrusion Detection & Honeypots – Jimmy McGibney – INET/IGC 2004 Barcelona
CCPL CCSN SSI PBRIMS IPMS TAN MP/F External data flow
Planned systems
NOR
Network
LIDB PB Awards
OSMOP Sales Comp
PaSS
CPNI BRIS
EARS
E911 ATR
NRSS MAPS WTS
COIN TWIST
MTR
CCP Customizer CESAR IFS
DOMS
800
SORD
DCN DRS
ERMIS
AOG
APTOS Electronic TCMS
Custom TOR Service
Bonding MLT
800 DB PDR Manager TSA Tech PDP
LSD&C
ISCP NTAS
SOCS SCP
PB1 APTOS STP MTAS
SDDL-POF ATC SMS
LATIS PMIS
SDID
ORGIS CRAS NSDM
IRSS SORD
IS ASOS PBOD CIAS
Starwriter MI
Exch Plus BAIF CRMS ANS
GIR IP OPAS COSMOS
Network ALRU
AP /Loopview
PBITS
LMOS
CUR/CAR SOAC
NAA SPACE
DFG TESS
ISIS
PVI PREMIS WFA/C
CMTS
MP/F
CID/SAM LMOS AMOS IPMS FTDM
PBVS NSDB
SARTS Paging
LOC CNR
Mech Eng CMS
INPLANS (CCRS)
FLEXCOM
REACT
NI LFACS FIRST CSFT CSTAR TIRKS
2001 Predictor
LEIS
TMM CLONES PVS | PMI
WM DCOS-2000
LOMS
NetPilot EADAS
PICS NOR NDS-TIDE NOR DSC AT&T
TIRKS Separation AT&T
/DPCR SEAS
FEPS EDIIS
External penetrator
Intrusion Detection & Honeypots – Jimmy McGibney – INET/IGC 2004 Barcelona
hosts a service
Normally based on logs from:
OS – e.g. UNIX syslog, Windows Event Logs
Applications (web servers, mail servers, etc)
Advantages:
Good for insider attacks
Can detect unauthorised file modifications
Problem of scalability:
As # hosts grows, difficult to deploy and manage IDS on each
Network-based intrusion detection
Misuse Detection
Intrusion Detection & Honeypots – Jimmy McGibney – INET/IGC 2004 Barcelona
Anomaly Detection
Statistical tests used to determine abnormal activity
Model “normal” behaviour and observe deviations from this
Assumes attack behaviour differs from legitimate activity
Data collected on behaviour of legitimate users over time
Misuse vs. Anomaly Detection
Intrusion Detection & Honeypots – Jimmy McGibney – INET/IGC 2004 Barcelona
Expression matching
Intrusion Detection & Honeypots – Jimmy McGibney – INET/IGC 2004 Barcelona
Statistical models
Intrusion Detection & Honeypots – Jimmy McGibney – INET/IGC 2004 Barcelona
Thresholds
Mean and standard deviation
Markov process model defining state transition probabilities.
Alert raised if unlikely state transition occurs.
System call traces
Model sequences of system calls for normal application
usage & compare monitored sys call traces
Protocol verification
Check for unusual or illegal use of protocol
File checking using digest/checksum
IDS Effectiveness
alarms
low detection rate => ineffective
too many false alarms => tendency to ignore
Difficult to achieve this due to base rate fallacy
Example:
• 99.9% test accuracy [99.9% detection rate, 99.9% of normal usage yields negative]
• 1 in 100,000 of all events relate to intrusions
Then
Prob.(FalseAlarm) = Prob.(NotIntrusion | PositiveResult)
> 99% by Bayes’ Theorem
Interoperability
Data
Operator
Source
Activity
Notification
Event Alert
Sensor Analyser Manager Response
Security Policy
Administrator
Performance
Honeypots
Honeypots
Definition:
Intrusion Detection & Honeypots – Jimmy McGibney – INET/IGC 2004 Barcelona
Advantages
Intrusion Detection & Honeypots – Jimmy McGibney – INET/IGC 2004 Barcelona
Disadvantages
Limited field of view
Fingerprinting allows attackers to spot honeypots
May introduce risk
Deployment
Production Honeypot
Intrusion Detection & Honeypots – Jimmy McGibney – INET/IGC 2004 Barcelona
Low-interaction
Intrusion Detection & Honeypots – Jimmy McGibney – INET/IGC 2004 Barcelona
honeyd
Intrusion Detection & Honeypots – Jimmy McGibney – INET/IGC 2004 Barcelona
Wrapping up…
Some new IDS ideas & developments
http://www.cert.org/
IDS
Northcutt & Novak, Network Intrusion Detection, Que, ‘02
Spafford et al, Practical UNIX & Internet Security, O’Reilly, ‘03
Cox, Managing Security with Snort & IDS Tools, O’Reilly, ’04
http://www.ietf.org/html.charters/idwg-charter.html - IETF idwg
http://www.sans.org/resources/idfaq - SANS FAQ:
http://www.securityfocus.com/ids - articles, mailing lists, etc
Honeypots & Honeynets
Spitzner, Honeypots: Tracking Hackers, Addison-Wesley, ’03
Honeynet Project, Know Your Enemy: Revealing the Security Tools,
Tactics, and Motives of the Blackhat Community, Addison-Wesley, ‘01
http://www.tracking-hackers.com/misc/faq.html - Honeypot FAQ
http://www.honeynet.org/ - The Honeynet Project
Intrusion Detection & Honeypots – Jimmy McGibney – INET/IGC 2004 Barcelona
Questions:
Contact: jmcgibney@tssg.org
Thanks!