230 likes | 376 Views
Distributed IDS. The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services. Darian Jenik - Network Management Queensland University of Technology. What IDS is:.
E N D
Distributed IDS • The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services. • Darian Jenik - Network Management Queensland University of Technology
What IDS is: • IDS is a combination of methods for determining the presence and location of unauthorized activity on the computer network. • IDS is the detection and reporting of security vulnerabilities. • IDS is the logging and detection of internal users “misdemeanors” to protect liability
What IDS is not: • IDS in NOT security – • For security you need: • Good security policy that is both documented and adhered to. • Good security practice by system administrators. • Hardened perimeter firewalls and “DMZ” firewalls. • IDS is not a product. • IDS is not a sensor.
The scale of the problem • Approximately 10000 hosts 100 web servers 300 “servers” of other type • Students • System Administrators • IAS
IDS should perform the following tasks • Detect known violations to host integrity by passively watching network traffic. • Respond to attempted violations by blocking external IP addresses. • Respond to probes from outside by blocking external IP addresses. • Find and report usage inconsistencies that indicate account/quota theft. • Detect violations by monitoring information (web pages etc….) • Help log and establish traffic/host usage patterns for future reference and comparison
Detect known violations to host integrity by passively watching network traffic. • Just one type of sensor? • IDS sensors: • Gateways – Traditionally • Put IDS sensors on hosts to look after specific services running on the hosts and detect port scans.
Respond to attempted violations by blocking external IP addresses. • Make sure the IDS is able to respond and send commands to firewalls and/or hosts. • IDS sends RST packets to both ends of the connection. • IDS is able to insert rules into border firewall.
Respond to probes from outside by blocking external IP addresses. • Attempts to open ports on servers that are not enabled. (Collate multiple servers to report to single location.) • Make “flypaper” IP addresses that have never been used for anything that serve to pickup slow probes.
Find and report usage inconsistencies that indicate account/quota theft. • Determine that the accounts authorized at the locations (dial in/pc) are the same accounts using other services (mail/proxy/other logins). • Failed attempts to login to services that are not successful. • Accounts being used simultaneously at various locations.
Detect violations by monitoring information. (web pages etc….) • Graffiti, DNS spoofing, wares repositories. • Ensure that the monitoring is external as well as internal. • http://forced.attrition.org/mirror/attrition/
Help log and establish traffic usage patterns for future reference and comparison. • Central syslog collecting and analysis. • Tripwire • Nmap database • Performance and Usage analysis.
Open Source • Just about any platform(Including windows) • Many plugins and external modules. • Frequent rules updates.
Snort Plugins • Databases • mySQL • Oracle • Postgresql • unixODBC • Spade (Statistical Packet Anomaly Detection engine) • FlexResp (Session response/closing) • XML output • TCP streams (stream single-byte reassembly)
Snort Add-ons • Acid(Analysis Console for Intrusion Detection) - PHP • Guardian – IPCHAINS rules modifier.(Girr – remover) • SnortSnarf - HTML • Snortlog – syslog • “Ruleset retreive” – automatic rules updater. • Snorticus – central multi-sensor manager – shell • LogSnorter – Syslog > snort SQL database information adder. • + a few win32 bits and pieces.
Acid + Snort • Acid is a Cert project. • Pretty simple PHP3 to mySQL • Quite customizable. • Simple GUI for casual browsing.
Securityfocus • Whitehats • CVE
URLS • www.snort.org • http://www.cert.org/kb/acid/ • www.whitehats.com(Intrusion signatures data) • www.securityfocus.com(Intrusion signatures data) • http://cve.mitre.org/(Intrusion signatures data) • http://www.psionic.com/(logcheck + hostsentry)