Computer Security Chapter 5
Computer Security Chapter 5
Intrusion Detection Systems Intrusion Detection Systems (IDS) have been marketed as the ultimate and final answer to network security. An IDS is software that runs on either individual workstations or on network devices to monitor and track network activity. Using an IDS, a network administrator can configure the system to respond just like a burglar alarm in your building. IDS systems can be configured to evaluate systems logs, look at suspicious network activity, and disconnect sessions that appear to violate security settings. Intrusion Detection Systems (IDS) are becoming integral parts of network monitoring. Intrusion Detection (ID) is the process of monitoring events in a system or network to determine if an intrusion is occurring. An intrusion is defined as any activity or action that attempts to undermine or compromise the confidentiality, integrity, or availability of resources. Firewalls, as you may recall, were designed to prevent access to resources by an attacker. Intrusion Detection Systems report and monitor these activities. The Intrusion Detection System has many different components and processes that work together to provide a real-time picture of your network traffic.
_________________________________________________________________________
_____________________________________________________________Chapter-5___________
Activity An activity is an element of a data source that is of interest to the operator. This could include a specific occurrence of a type of activity that is suspicious. An example of this might be a TCP connection request that occurs repeatedly from the same IP address. Administrator The administrator is the person responsible for setting the security policy for an organization. He is responsible for making decisions about the deployment and configuration of the IDS. The administrator should make decisions regarding alarm levels, historical logging, and session monitoring capabilities. He is also responsible for determining the appropriate responses to attacks and ensuring that those responses are carried out. Alert An alert is a message from the analyzer indicating that an event of interest has occurred. This alert would contain information about the activity, as well as specifics of the occurrence. An alert may be generated when an excessive amount of ICMP traffic is occurring or when repeated logon attempts are failing. A certain level of traffic is normal for a network. Alerts occur when activities of a certain type exceed a preset threshold. For instance, you would not want to generate an alert every time someone from outside your network pings a server using the PING program. However, if the pings seemed more frequent, or exceeded a predetermined threshold, you would want to generate an alert. Analyzer The analyzer is the component or process that analyzes the data collected by the sensor. The analyzer is looking for suspicious activity. Analyzers work by monitoring events and determining whether unusual activities are occurring, or they can use a rules-based process that is established when the IDS is configured. Data Source The data source is the raw information that the IDS uses to detect suspicious activity. The data source may include audit files, systems logs, or the network traffic as it occurs. Event An event is an occurrence in a data source that indicates that a suspicious activity has occurred. An event may generate an alert. Events are logged for future reference. Events will also typically trigger a notification that something unusual may be happening in the network. An IDS might begin logging events if the volume of inbound e-mail connections suddenly spikes. This event might be an indication that someone is probing your network. The event might trigger an 2 _________________________________________________________________________
_____________________________________________________________Chapter-5___________ alert if a deviation from normal network traffic patterns occurs or if an activity threshold has been crossed. Manager The manager is the component or process the operator uses to manage the IDS. The IDS console is a manager. Configuration changes in the IDS are made by communicating with the IDS manager. Notification Notification is the process or method by which the IDS manager makes the operator aware of an alert. This might include a graphic display highlighting the traffic or an e-mail sent to the administrative staff of the network. Operator The operator is the person primarily responsible for the IDS. Sensor A sensor is the IDS component that collects data from the data source and passes it to the analyzer for analysis. A sensor can be a device driver on a system, or it can be an actual black box that is connected to the network and reports to the IDS. The important thing to remember is that the sensor is a primary data collection point for the IDS.
Network-Based IDS
A Network-based IDS (N-IDS) approach to IDS attaches the system to a point in the network where it can monitor and report on all network traffic. This can be in front of or behind the firewall, as shown. Placing the N-IDS in front of the firewall provides monitoring of all network traffic going into the network. This approach allows a huge amount of data to be processed, and it allows you to see all of the traffic that is coming into the network. Putting the N-IDS behind the firewall only allows you to see the traffic that penetrates the firewall. Although this approach reduces the amount of data processed, it does not allow you to see all of the attacks that might be developing.
The N-IDS can be attached to a switch or a hub, or it can be attached to a tap. Figure illustrates a connection to the network using a hub. Many hubs and switches provide a monitoring port for troubleshooting and diagnostic purposes. This port may function in a manner similar to a tap. The advantage of the tap approach is that the IDS is the only device that will be using the tap.
_________________________________________________________________________
_____________________________________________________________Chapter-5___________
Host-Based IDS
A Host-based IDS (H-IDS) is designed to run as software on a host computer system. These systems typically run as a service or as a background process on the computer system. H-IDS systems will examine the machine logs, systems events, and applications interactions. H-IDS systems do not normally monitor incoming network traffic to the host. H-IDS systems are very popular on servers that use encrypted channels or channels to other servers. Figure illustrates an HIDS installed on a server. Notice that the H-IDS interact with the logon audit and kernel audit files. The kernel audit files are used for process and application interfaces.
Two major problems with H-IDS are not easily overcome. The first problem involves a compromise of the system. If the system is compromised, the log files that the IDS uses to report to may become corrupt or inaccurate. This may make fault determination difficult or the system unreliable. The second major problem with H-IDS is that it must be deployed on each system that needs it. This can create a headache for administrative and support staff. One of the major things that H-IDS provide is the potential to keep checksums on files. They can be used to inform system administrators that files have been altered by an attack. This makes recovery easier because determining where tampered has occurred is easier. 4 _________________________________________________________________________
_____________________________________________________________Chapter-5___________
Honey Pots
A honey pot is a computer that has been designated as a target for computer attacks. The purpose of a honey pot is to allow itself to succumb to an attack. During the process of "dying," the system can be used to gain information about how attacks develop and what methods were used to institute the attack. The benefit of a honey pot system is that it will draw attackers away from a higher value system or it will allow administrators to gain intelligence about an attack strategy. Honey pot systems are not normally secured or locked down. If they came straight out of the box with an operating system and applications software, they may be configured as is. Elaborate honey pot systems can contain information and software that might entice an attacker to probe deeper and take over the system. In fact, if not configured properly, a honey pot system can be used to launch attacks against other systems. There are several initiatives in the area of honey pot technology. One of the more interesting involves a project called honeynet. This organization has created a whole synthetic network that can be run on a single computer system and is attached to a network using a normal NIC card. The honey- net system looks like an entire corporate network, complete with applications and data, all of which are fake. A honeypot is a trap that attracts potential attackers. It is designed so as to do the following: Divert the attention of a potential of a potential intruder from critical systems. Collect information about the intruders actions. Provide encouragement to the intruder so as to stay on for some time, allowing the administrator to detect this and swiftly act on it. Do not allow legitimate users to know about or access them.
Password Management
Password Protection: The frontline of defense against intruders is the password system. Virtually all multi-user system requires that a user provide not only a name or identifier (ID) but also a password. The password serves to authenticate the ID of the individual logging on to the system. In turn, the ID provides security in the following way: The ID determines whether the user is authorized to gain access to a system. The ID determines the privileges accorded to the user. The ID is used in what is referred to s discretionary access control..
_________________________________________________________________________
_____________________________________________________________Chapter-5___________
In case of system failure you can recover faster. Inefficiencies in the system configurations are detected. Fewer system failures or delays. Efficiency, reliability, security and the optimized performance of your system.
6 _________________________________________________________________________
_____________________________________________________________Chapter-5___________
appropriate password
_____________________________________________________________Chapter-5___________ 6. An additional method of securing Linux systems is accomplished by adding TCP wrappers. TCP wrappers are a low-level logging package designed for UNIX systems. Wrappers provide additional detailed logging on activity using a specific protocol. Each protocol or port must have a wrapper installed for it. Wrappers are then used to record activities and deny access to the service or server.