Wednesday 17 September 2014

IDS (Intrusion Detection System)

An intrusion detection system is a device or software which monitors network or system activities for malicious activities for policy violation and produces reports to the management system. It looking for signs of intrusion (unauthorized users) or misuse (authorized users overstepping their bounds).”
How It Works:
Intrusion Detection Systems (IDS) can operate on a variety of different levels. Host-Bases IDSs reside on a host machine and execute intrusion detection locally. Network-based Intrusion Detection Systems (NIDS) focus on network data flow. The key to successfully identifying and preventing intrusion lies within the various techniques. Using intrusion detection methods, you can collect and use information from known types of attacks and find out if someone is trying to attack your network or particular hosts. IDSs have a series of steps that all need to be completed before a system can be appropriately protected. These steps revolve around the data that is being processed on the system being monitored. Data is collected by monitoring activities in the hosts or network. The raw data is analyzed to classify activities as normal or suspicious. When a suspicious activity is considered sufficiently serious, a response is triggered.

Host-Based Intrusion Detection is accomplished by installing software on each individual local system. These software modules, or agents, work on the client system to perform intrusion detection. This can be accomplished using a variety of methods. One common method is to have the software agent monitor the system logs, and look for irregular patterns. An example of this is when an agent watches for unauthorized activities done by a user without adequate permissions. Essentially, the agent will keep a running log of the user’s actions. If the users actions raise a red flag (meaning that the actions of the user are suspicious), then the system administrator is able to backtrack the actions, and investigate why a particular user was using the system in that way. Another effective method for Host-Based IDSs is to watch for suspicious processes that are running. Sometimes a particular process name can mean trouble for system administrator, depending upon its purpose. Protecting the integrity of the system files is another high priority task for Host-Based IDSs. An IDS agent can take an inventory of system files, along with their permissions, and report any changes to the set. The same auditing tactic can be used to watch user accounts. An ID that witnesses a users permissions being changed, or unauthorized user being created can indicate problems for a systems administrator. All of these methods are classified as agent-based software, which makes up the largest category of Host-Based IDSs. The other major category is the host wrappers/personal firewalls. “Host wrappers or personal firewalls can be configured to look at all network packets, connection attempts, or login attempts to the monitored machine.”Examples of these are dial-in attempts, non-network related communication ports, or software other software on the host attempting to connect to the network.

“Network-based ID involves looking at the packets on the network as they pass by some sensor.” Packets are only of interest if they happen to match a particular signature. There are three main types of signatures:
· String signatures – Look for strings, or combinations of strings, that could potentially be an intrusion. Signatures containing sensitive file names may cause an alarm.
· Port signatures – Signatures that contain port numbers that are regularly attached (i.e. telnet (TCP port 23), FTP (TCP port 21/20), SUNRPC (TCP/UDP port 111), and IMAP (TCP port 143), or communications that are utilizing ports that are not used may be reason for suspicion.
· Header condition signatures – Signatures that contain illogical data or well known, dangerous content. “The most famous example is Winnuke , where a packet is destined for a NetBIOS port and the Urgent pointer, or Out Of Band pointer is set. This resulted in the "blue screen of death" for Windows systems.”
The key to making this intrusion detection system successful lies within the placement. Sensors need to be in a position that will expose the sensors to the flow of network packets.
Detection Technique:
All the Intrusion Detection Systems use one of two detection techniques:
(1) Signature based IDS
(2) Statistical anomaly based IDS.
(1)Signature Based IDS: Signature based IDS monitor packets in the Network and compares with pre-configured and pre-determined attack patterns known as signatures.
(2) Statistical anomaly based IDS: A statistical anomaly-based IDS determines the normal network activity like what sort of bandwidth is generally used, what protocols are used, what ports and devices generally connect to each other- and alert the administrator or user when traffic is detected which is anomalous.

The Need for Intrusion Detection Systems :

A computer intrusion can be damaging in a variety of ways, depending on the intent of the intrusion. If the intrusion amounts to a nuisance, then resources have to be expended to alleviate the problem. This requires the system administrator to divert their attention away from business, and to focus on the annoyance. Even if an intrusion isn’t malicious, i.e. not damaging or theft related, the intrusion could bog down the network, causing a loss of productivity among the employees. Intrusions that are aimed at theft are particularly damaging to a company in terms of competition. Companies go to great lengths to protect their Intellectual Property, since it can be such a large source of income and market share. If this information falls into the wrong hands, i.e. the competition, then the company can suffer greatly due to lost revenue. Malicious damages may come about by a hacker who intends to hurt a company by destroying data. This is the most damaging type of an attack because it has a snowball effect. Not only does a company lose many records, customer information, business contacts, etc., but they also take a huge hit in the productivity area. Until all the information is restored, much of the staff cannot work efficiently. A company may also lose customers due to the fact that the company has the target of a computer hacking. Customers tend to get very nervous when they think that their personal data has the potential to fall into the wrongs hands.
IDPS (Intrusion Detection & prevention system):
Intrusion detection & prevention system (IDPS) is also known as the Intrusion prevention system (IPS). An IPS is the extension of intrusion detection system .Both IDS & IPS used for network monitoring which monitors network and/or system activities for malicious activity. The main function of the intrusion prevention system is to identify malicious activities, log information about this activity, attempt to block it and report it. The intrusion prevention system are sending an alarm, dropping the malicious packet, resetting the connection and/ or blocking the traffic from offending IP address. An IPS can also correct Cyclic Redundancy Check (CRC) errors, unfragment packet streams, prevent TCP sequencing issues, and clean up unwanted transport and network layer options.
(1) Host based intrusion prevention system: HIPS is a program designed for security over host based systems where intrusion and infections are deal with at the individual workstation level to provide a more effective level of security.
(2) Network -based Intrusion prevention system: The network – based intrusion prevention system is a program that performs packet sniffing and analyzes network traffic to identify and stop suspicious activity. Most of the network based IPS products use a combination of attack signatures and analysis of network and application protocol.
(3) Wireless- intrusion prevention system: A wireless-intrusion prevention system is a network device which monitors the radio spectrum for the presence of unauthorized access points and can automatically countermeasures.
(4) Network behavior analysis: In network behavior analysis it monitors the network traffic and block the unusual action by signature detection , packet inspection and real time blocking.
Detection Technique
(1)Signature Based IDS: Signature based IDS monitors packets in the Network and compares with pre-configured and pre-determined attack patterns known as signatures.
(2) Statistical anomaly based IDS: A statistical anomaly-based IDS determines the normal network activity like what sort of bandwidth is generally used, what protocols are used, what ports and devices generally connect to each other- and alert the administrator or user when traffic is detected which is anomalous.
(3) Stateful Protocol Analysis Detection: This method identifies deviations of protocol states by comparing observed events with “predetermined profiles of generally accepted definitions of benign activity.

Prevention Techniques: Cross-site request forgery (CSRF)

1. The best defense against CSRF attacks is unpredictable tokens, a piece of data that the server can use to validate the request, and wh...