Title: Intrusion Detection Systems II
1Intrusion Detection Systems (II)
2STAT/USTAT
- State transition analysis a rule-based intrusion
detection approach - USTAT for Unix real-time intrusion detection
- Misuse detection
- Modeling intrusion signature
- Initial state the state of the system prior to
execution of the attack - Compromised state the state of the system
resulting from the completion of the attack - Intermediate states and transitions attack steps
3An Example
user ln ltfilegt -ltany stringgt user -ltany
stringgt root
User Create File1
User Execute File1
S2
S3
S1
1. File Set 1 ! empty 2. Files are suid
privileged
1. access (user,euid) root
1. name(File1) 2. typeof(File1)
link 3. owner(link_to(File1)) ! user 4.
name(link_to(File1)) exists_in File Set 1
4A Sense of Self - Immunology Approach
- Prof. Forrest at University of New Mexico
- Anomaly detection
- Simple and short sequences of events to
distinguish self from not - Currently looking at system calls (strace)
- Apply to detection of lpr and sendmail
5Some Details
- Anomaly detection for Unix processes
- Short sequences of system calls as normal
profile (Forrest et al. UNM)
,open,read,mmap,mmap,open,getrlimit,mmap,close,
6Problems with Current IDSs
- Knowledge and signature-based
- We have the largest knowledge/signature base
- Ineffective against new attacks
- Individual attack-based
- Intrusion A detected Intrusion B detected
- No long-term proactive detection/prediction
- Statistical accuracy-based
- x detection rate and y false alarm rate
- Are the most damaging intrusions detected?
- Statically configured.
7Next Generation IDSs
- Adaptive
- Detect new intrusions
- Scenario-based
- Correlate (multiple sources of) audit data and
attack information - Cost-sensitive
- Model cost factors related to intrusion detection
- Dynamically configure IDS components for best
protection/cost performance
8Adaptive IDSs
ID Modeling Engine
IDS
anomaly detection
semiautomatic
IDS
IDS
9Semi-automatic Generation of ID Models
models
Learning
features
patterns
connection/ session records
Data mining
packets/ events (ASCII)
raw audit data
10High Speed Intrusion Detection System
11Problem Statement
- Implement intrusion detection system (IDS) as an
inherent and reliable network function - A high-speed, highly scalable, and high-fidelity
IDS architecture - Integration of network security, QoS, fault
tolerance and distributed collaboration
mechanisms on the network interface card - Make possible the deployment of a security policy
enforceable and secure - Defeat evasion and tempering
12Solution Approach
- Distributed network node IDS
- IDS on end-host to unambiguously monitor traffic,
share work load, and scale with network - IDS implemented on network processor to integrate
with other network functions and allow the host
to remain a productivity node - Layered and pipelined architecture
- Optimize performance to handle high-speed traffic
- Improve Bayesian detection rate
13Layered Architecture
Alerts
Policy script
Detection Engine
Event control
Event stream
Event Engine
Filtered packet stream
tcpdump filters
Libpcap
Packet stream
Network
14Implementation on Intel IXP
Alert messages
Strong Arm Matching Snort rules (OTNs)
Filtering, IP fragmentation reassembly, port-scan
Result Vectors
uEng
UDP/ICMP Packets
Ethernet Packets
uEng
uEng
uEng
TCP Packets
Matching Snort Rule Headers (RTNs)
TCP stream Reassembly
Telnet Decode, Http Decode
15FPGA Based Pattern Matching
- Pattern matching is slow in software, but fast in
hardware - FPGA compares a packet to all signatures
simultaneously - Current implementation using Virtex-1000
- Capacity 200 Snort rules (2200 chars)
- Performance exceeds that of high-end PC
Rule 1, Pattern 1
Match Vector returned to IXP after each packet
Input packets from IXP
H A C K E R
Match_R1_P1 0
W O R M
. . .
R1 0
Match_R1 0
W O R M
AND
Match_R1_P2 0
Rule 1, Pattern 2
R2 1
Match_R2 1
R O O T
W O R M
Rule 2, Pattern 1
W O R M
W O R M
Rn
16Implication of Results
- IDS can be implemented on network processor/card
- Integrated IDS on NIC is more tamper resistant
because it does not depend on the host operating
system - Integration of IDS and firewall functions on NIC
provides better basis for a security policy
deployment - Implementation of active response mechanisms
(traffic rate limiting, attack blocking ) - Design of an all-in-one network/security
processor for mobile devices