Report on Common Intrusion Detection Framework - PowerPoint PPT Presentation

1 / 23
About This Presentation
Title:

Report on Common Intrusion Detection Framework

Description:

(Target (HostName `somehost.someplace.net') ) (AttackSpecifics (Certainty `100') (Severity `100' ... Generate more audit data and crash the central IDS? Solution ... – PowerPoint PPT presentation

Number of Views:20
Avg rating:3.0/5.0
Slides: 24
Provided by: abc7214
Learn more at: http://cs.uccs.edu
Category:

less

Transcript and Presenter's Notes

Title: Report on Common Intrusion Detection Framework


1
Report on Common Intrusion Detection Framework
  • By
  • Ganesh Godavari

2
Outline of the talk
  • CIDF
  • GIDO
  • Negotiation protocol
  • scenarios

3
Goal
  • Goal of IDIAN
  • Develop a negotiation protocol that is dynamic
  • Allow distributed collection of heterogeneous ID
    components
  • Provide inter-operate ability to reach agreement
    on ID information processing capability

4
Motivation
  • Understand
  • Common Intrusion Detection Framework
  • Common Intrusion Specification Language (CISL)

5
Common Intrusion Detection Framework (CIDF)
  • CIDF architecture
  • Divides IDS into Components
  • Component consists of software code with
    configuration information
  • Components can be added/removed
  • Components interact in real time and exchange
    data using GIDO

6
Generalized Intrusion Detection Objects (GIDO)
  • GIDO consists of two components
  • Fixed Format header
  • CIDF version, timestamp, and length of body
  • Variable Length Body
  • data

7
GIDO body
Which process detected
Where the attack occurred
  • (ByMeansOf
  • (Attack
  • (Observer (ProcessName StackGuard') )
  • (Target (HostName somehost.someplace.net') )
  • (AttackSpecifics
  • (Certainty 100')
  • (Severity 100')
  • (AttackID 1' 0x4f') )
  • (Outcome (CIDFReturnCode 2') )
  • (When
  • (BeginTime 145736 24 Feb 1999')
  • (EndTime 145736 24 Feb 1999') ) )
  • (ByMeansOf
  • (Execute
  • (Process (ProcessName fingerd') )
  • (When
  • (BeginTime 145736 24 Feb 1999')
  • (EndTime 145736 24 Feb 1999') ) ) ) )

data
Where is the attack targeted at?
Semantic Identifier (SID)
StackGuard is a compiler that emits programs
hardened against "stack smashing" attacks.
8
  • SID is associated with each piece of data in the
    body
  • SID associated with data are called Atom SID
  • Atom SID cannot completely describe an event.
  • Verbs describe events
  • e.g. Attack SID
  • Verb SID has set of Role SIDs which provide
    additional information about the event.
  • e.g. Observer Role provides information about the
    observer of an event.

9
Example
  • V is a verb SID
  • R1 and R2 are role SIDs
  • A1 through A3 are Atom SIDs
  • S-expression
  • (V
  • (R1
  • (A1 data1) (A2 data2)
  • )
  • (R2
  • (A3 data3)
  • )
  • )

Tree Representation
10
CIDF components
  • Components
  • Event generators ("E-boxes")
  • Produce GIDOs
  • Event analyzers ("A-boxes")
  • Consume GIDOs
  • Conclusions are turned out as GIDOs
  • Event databases ("D-boxes")
  • store events for later retrieval
  • Response units ("R-boxes")
  • Consume GIDOs
  • Take action like kill process, reset connections

11
CIDF Component Interaction
12
Add/remove an IDS Component
  • New components need to notify others
  • Negotiation protocol
  • Publish the capabilities of new components
  • Ability to describe and disseminate the
    description to other components
  • Collection of components need to interact with
    each other
  • To determine which components provide specific
    set of capabilities that the others can utilize

13
Categorization of overload situations
  • Resources are limited
  • Demand driven overloads
  • IDS is asked to provide additional detection
    facilities
  • Fluctuation in the amount of data to be processed
  • Flooding !!
  • Supply driven overloads
  • Computer/network down!!
  • Compromised components unavailable
  • Number crunching jobs competing with IDS for jobs

14
Adapting to overload situations
  • Solution
  • Supply of resources/components is increased
  • Human assistance, killing processes/files
    competing for resources
  • Reduction in the demand
  • Modify the packet filtering rules to eliminate
    flooding the system from outside
  • Killing processes that generate massive floods of
    OS audit records
  • Adapt to ensure important jobs are met
  • Reduce the number and kinds of attacks detected,
    number of systems/network covered by IDS

15
New Attack Signatures and Responses
  • Install new signatures
  • computational cost
  • Cost
  • Determine if the capability exists in the IDS to
    respond to the attack signature
  • Cost of response i.e. degradation in performance,
    loss of functionality
  • E-box needs to specify the cost of sensor data
  • R-box needs to specify the cost executing
    requested actions
  • A-box needs to asses (stress) the cost of
    deploying a new attack signature

16
New producer
  • E-box can I supply the capabilities with in
    cost limits?
  • If true send acceptance message to A-box
  • If false
  • send rejection message to A-box
  • If the minimum cost is relatively close to the
    upper bound set by A-box. Send a counter proposal
    to A-box
  • The counter proposal can be accepted or rejected
    by A-box

17
New ConsumerEnhanced/diminished capability
  • New Consumer
  • R-box advertises its capabilities to existing
    A-Boxes
  • Enhanced/diminished capability
  • Upgraded/degraded E-box advertises to A-box.
  • A-box renegotiates its utilization of the
    capabilities of E-box

18
How does one know what are the existing
capabilities?
  • generate new proposals that contain more
    arbitrary lists of capabilities
  • For example, suppose that an R-box R announces a
    list of capabilities L0. An A-box A requests a
    list L1 that is a subset of L0. R comes back with
    a list L2 that is a subset of L1. Unsatisfied, A
    proposes an entirely new list M that is a subset
    of L0 but that may share only some capabilities
    with L1.

19
Scenario 1 a new capability
  • new host machine with detection component is
    added to LAN.
  • Network under connection laundering attack

20
solution
  • E-box supplies system-call audit trail
  • A-box might correlate all inbound TCP/IP
    connections with outbound connections.

21
Scenario 2 flooding IDS
  • Stolen company laptop with VPN Connection to the
    company that has detection component and is used
    to launch an attack.
  • Hacker generate lot of spurious audit data to
    deflect suspicion. Second host is also
    compromised. Generate more audit data and crash
    the central IDS?

22
Solution
  • Request the event generator to switch to a
    pre-negotiated fallback setting in which only
    critical audit data is sent.
  • Request that other event generators reduce their
    output so the analyzer can concentrate on the
    attack.

23
References
  • Intrusion Detection Inter-component Adaptive
    Negotiation
  • Richard Feiertag et al 2000 IEEE Computer
    Networks special issue on intrusion detection
  • A Common Intrusion Specification Language, CIDF
    working group document.
  • Communication in the Common Intrusion Detection
    Framework, CIDF working group document.
Write a Comment
User Comments (0)
About PowerShow.com