36
1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

  • View
    219

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

1

Cyberdefense Technologies

Firewalls

Intrusion detection

And beyond

Page 2: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

2

Defensive Strategy

• Deceive the attacker

• Frustrate the attacker

• Resist the attacker

• Recognize and Respond to the attacker

Page 3: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

3

Security Desires

• Logging of successful connections, rejected packets and suspected attacks

• Immunity to Denial of Service attacks

• Protection against information gathering probes

Page 4: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

4

Defenses against DOS

• The best defense against DDos attacks is to prevent initial system compromises

• However, even vigilant hosts can become targets because of lesser prepared, less security aware hosts

• It is difficult to specifically defend against becoming the ultimate target of a DDos attack but protection against being used as a daemon or master system is more easily attainable

Page 5: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

5

Ingress Filtering

• Ingress filtering manages the flow of traffic as it enters a network under your administrative control

• Servers are typically the only machines that need to accept inbound connections from the public Internet

• Ingress filtering can be performed at the border to prohibit externally initiated inbound connections to non-authorized services

Page 6: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

6

Egress Filtering

• Egress filtering manages the flow of traffic as it leaves a network under your administrative control

• Egress filtering from sources like university campuses can make a difference

• Egress filtering alone does not provide a complete solution to the problem

Page 7: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

7

Firewalls

• Defensive “middle ground” between public and protected network

• The demands from a firewall can differ significantly

• An internal network, where a balance has to be found between what can come in and out, a website publicly accessible or a virtual Private Network pose very different problems

Page 8: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

8

Firewalls are for policy control

• They permit a site’s administrator to set a policy on external access

• Just as file permissions enforce an internal security policy, a firewall can enforce an external security policy

Page 9: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

9

Firewall Technologies

• Network Address Translation (NAT)

• Most use packet filtering rules to determine packet access

• Some use “stateful inspection” to manage connections

• Some application proxy support– A few allow custom proxy creation *BONUS*

Page 10: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

10

Static Packet Filtering

• Uses information in Packet headers:– Destination IP address– Source IP subnet – Destination service Port

• Information compared with Access Control List (ACL)

• Flag (TCP): stop Anything with SYN=1, but port scanners can choose to have ACK=1,FIN=1, all other flags set to 0…– Flag Not an option with UDP

Page 11: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

11

Example Attack

Internet router is blocking tcp/udp ports 135-139

Firewall allows only outbound http (80) and smtp (25) traffic

Hacker’s Objective: Gain control of internal NT server from Internet

Page 12: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

12

Dynamic Packet Filtering (Stateful Inspection)

• Acts on the same principle as Static Packet Filtering, but maintains a connection or “state” table in order to monitor communication session

• Less easy to abuse• Filtering hard to configure to full

satisfaction and reduces router’s performance

Page 13: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

13

Problems with Firewalls

• Conventional firewalls rely on the notions of restricted topology and control entry points to function– Everyone on one side of the firewall is to be trusted– Anyone on the other side is potentially an enemy

• “extranets” can allow outsiders to reach the “inside” of the firewall

• Some machines need more access to the outside than do others

• End-to-end encryption: firewalls generally do not have the necessary keys to inspect traffic

• Log review, software currency, … (high maintenance)

Page 14: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

14

Distributed Firewalls

• In such a scheme, policy is still centrally defined; enforcement, however, takes place on each endpoint

• Helps control trust issues

Page 15: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

15

Distributed Firewalls

Page 16: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

16

Distributed Client/Server

Page 17: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

17

What are Honeypots?

• Honeypots are one of the methods used in intrusion detection

• Setup a "decoy" system – Non-hardened operating system – Appears to have several vulnerabilities– Similar configuration to production– Fake content

• Deceive intruder for alert and study

Page 18: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

18

Page 19: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

19

Attracting Blackhats

• What do you do to attract blackhats to your Honeypot?

– Absolutely nothing, that is the scary part. You have to sit back and wait.

– The blackhat community is extremely aggressive, you would be surprised at what they will find.

Page 20: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

20

Honeypot as attack host

• Once compromised, can't the bad guys use one of your honeypots to attack someone else?

• That risk exists !

• use several layers of access control devices that limit and control what type of outbound connections are allowed, and how many

Page 21: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

21

The Honeynet project

• Distributed team of security experts

• Hardware to capture and analyze intruder activity

• Evolving honeypot technology and attack analysis

Page 22: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

22

What’s wrong with honeypots?

• The insurance model will not allow you to take unnecessary risks without a substantial increase in premium

• Risk management says that honey pots increase risk for demonstrably invalid reasons

• You can learn more by using better instrumentation

• Transient effectiveness

Page 23: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

23

Transient Effectiveness

• The threat reality is that most attackers are morons and will attack with DoS if denied real access

• Honey pots must be kept up to date but in general aren’t

• Honey pots must act like the host operating system

• Fix current problems rather than generating new ones

Page 24: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

24

Too many hosts to secure

• Virtually all operating systems and network devices are insecure out of the box– This must change

• Operating systems maintained by normal users must be set to take care of themselves by default

• Growth of the net will be the single largest factor as to why there are so many vulnerable systems

• It is unrealistic to assume that the net will ever be safe

Page 25: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

25

Where does IDS fit?

• IDS are useful as an additional layer of defense, no more

• IDS are not helpful when advanced attackers are attacking you with new attacks

• Two major types today: network IDS (snort) and host IDS (AIDE, log watcher, etc)

• Missing IDS type: application IDS• High false alarm rates (wasted admin time)

Page 26: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

26

IDS and Policy

• Security Policy is the first step (defining what is acceptable and what is being defended)

• Notification – Who, how fast?

• Response Coordination

Page 27: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

27

NMAP

Jane dida portsweep!

Page 28: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

28

IDS Implementation Map

FilteringRouter

(Perimeter Logs)

Firewall(Perimeter

Logs)

Generic Server(Host-Based ID)

(Snort 2.0)

Network IDS(Snort)

Internet

Honeypot(Deception System)

Statistical IDS (Snort)

Page 29: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

29

Detection Engine

• Rules form “signatures”• Modular detection elements are combined to

form these signatures• Wide range of detection capabilities

– Stealth scans, OS fingerprinting, buffer overflows, back doors, CGI exploits, etc.

• Rules system is very flexible, and creation of new rules is relatively simple

Page 30: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

30

Learning More

• www.snort.org– Writing Snort Rules

• www.snort.org/snort_rules.html

– FAQ, USAGE file, README file, man page

– Snort mailing lists

• Books– Intrusion Detection: An Analysts Handbook by Northcutt

– Intrusion Signatures and Analysis by Northcutt

– The Practical Intrusion Detection Handbook by Paul Proctor

Page 31: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

31

But What Slips Through?

• Signatures based on traffic model– Attacks stay with same source IP set

• Signature assume fixed characteristics– Packets involving attack stay with similar

content

• Signature assume obvious distinction from legitimate traffic– What is legitimate is never malicious

Page 32: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

32

How do We Catch the Slips?

• Non-signature based collection– Short-term (hours, max) packet collection, rotating ->

libpcap

– Medium-term (weeks, max) headers+content summary -> expanded flow

– Long-term (years) headers+sizes -> flow

• Privacy concerns• Efficiency concerns• Sampling concerns

Page 33: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

33

What can You Do with Just Flows?

• Indicative, not probative• Time-series, with departures

– DDoS ramp-up– Scanning: worms/virus

• Threashold violations– Spam vs. email– Streaming media vs. web browsing

• Locality violations– Malware beaconing– Worms/virus– Spyware

Page 34: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

34

Automated Response

• Ongoing work• Local indicators fused to alert• Firewalls/IDS exchange intrusion

information– IODEF standard

• Dynamically alter firewall rules • Dynamically alter routing tables to

reconfigure network

Page 35: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

35

Layered Architecture

Page 36: 1 Cyberdefense Technologies Firewalls Intrusion detection And beyond

36

Layered Defenses

Frustrate

Deceive

Recognize

Respond

Goal 1

Goal 2

Goal 3

Goal 4Goal 5

Source: Shawn Butler, Security Attribute Evaluation Method

Goal 6

Goal 7

Goal 8