25
DISTRIBUTED INTRUSION DETECTION SYSTEM Mohammad Hossein Salehi and Kiumars Talaee Computer Engineering Department, Mazandaran University of Science and Technology, Distributes Systems Class Seminar Supervisor: Hadi Salimi [email protected] , [email protected]

DISTRIBUTED INTRUSION DETECTION SYSTEM Mohammad Hossein Salehi and Kiumars Talaee Computer Engineering Department, Mazandaran University of Science and

Embed Size (px)

Citation preview

DISTRIBUTED INTRUSION DETECTION SYSTEM

Mohammad Hossein Salehi and Kiumars Talaee

Computer Engineering Department,

Mazandaran University of Science and Technology,

Distributes Systems Class Seminar

Supervisor: Hadi Salimi

[email protected] , [email protected]

Introduction to DIDS

DIDS

Why DIDS?

Grow of Web Based Technology and Network

Distributed Attacks Critical Information on Web Identification Availability

DIDS

The Working of IDS

Sniff Network Traffic Event Sensor Intrusion Detection

Signature base Anomaly base

Alert Generator Hardware IDS

High Secure Expensive

Software IDS Work Easily Cheaper

DIDS

The Division of IDS

Information Source Based Strategist Analysis Based Time Event Based Structure Based The kinds of Response to Intrusion

DIDS

The Information Source Based IDS

Audit trails Network Packets Application logs Wireless Sensor Traffic Sensor Alerts Therefore We Have three Kind of Division

HIDS NIDS DIDS (Agent based IDS)

DIDS

The Information Source Based IDS

Therefore We Have three Kind of Division : HIDS NIDS DIDS (Agent based IDS)

DIDS

Client Based or HIDS

Just secure The Host Increase the IDS Performance with

Decrease The roles Have lower traffic than NIDS and DIDS Working on Application Layer And can’t

detection many of attacks on lower layer

DIDS

Network Based or NIDS

Collecting and Analyzed in Network Traffic Source Information

Have a Two Segment Monitor Agent

Maybe Have a Management Console Have a Problem in upper than 100 Mbps The Scope Dependency on local Segments This have good Performance on DoS Attacks If Network Traffic have a Encryption can not

work

DIDS

Agent Based or DIDS

Collecting and Analyzed in NIDS and HIDS Have a Several NIDS or HIDS or Hybrid of

these with one Central Management Station Each IDS Sending Report to Central

Management Station Central Management Station Analyzed the

Reports and Generate the Alert for Security Officer

Central Management Station Update the Role Database

In this system both collection and Analyzed the data have a Distributed Structure

DIDS

The Picture of DIDSDIDS

Strategist Analysis Based

Anomaly Based Detection or Statistical based

Signature based Detection

DIDS

Time Event Based

Real time Detection Response to the Attacks in Real time

Offline Detection First Monitor and store the data and then

Analyzed and generate the Alerts

DIDS

Stracture Based Division

Centralized architecture Single Monitored System

Distributed Architecture Multiple Monitored Systems

DIDS

Response Based Division

Active Response Passive Response

DIDS

Distributed Intrusion Detection System

Intrusion Detection System with Distributed Planning Easily can work on fast Network Traffic In Distributed Systems we have little single point of failure

DIDS with Distributed Sensors : ASAX (Mouinji et al., 1995) NSTAT (Kemmerer, 1997) DIDS (Snapp etal., 1999) NetSTAT (Vigna and Kemmerer, 1999)

DIDS with Distributed Sensors and Level Architecture: EMERALD (Porras and Neumann, 1997) GRIDS (Stanford _ Chen et al ., 1996) AAFID (spafford and Zamboi, 2000) CIDF (Stanford _ Chen et al ., 1998) MADAM ID (Ning et al., 2002)

DIDS

Distributed Intrusion Detection System

A Hierarchical Architecture of Distributed Intrusion Detection System with free communication between layers

DIDS

Distributed Intrusion Detection System

DIDS Projects with Autonomous Agents AAFID (Autonomous Agent for Intrusion

Detection) in Purdu University IDA (Intrusion Detection Agent System) Japan IT

Agency JAM (Java Agent for Meta learning) in Columbia

University

DIDS

Mobile Agent in IDS

Overcoming Network Latency Reducing Network Load Autonomous and Asynchronous Execution Dynamic Adaption Platform Independence Protocol Encapsulation

DIDS

Two Usual Attack in Network

DDoS or Distributed Denial of Service Probing

DIDS

DIDS Problems

Increase the Analyze Speed Security in Sending Management Packets Expensive Traffic Monitoring Rate

DIDS

References

[1] Ilija Basicevic, Miroslav Popovic, Vladimir Kovacevic ,"The Use of Distributed Network-Based IDS Systems in Detection of Evasion Attacks",IEEE Advanced Industrial Conference on elecommunications, AICT 2005, Lisbon, Portugal, July 17-20, 2005

[2] Ashok Kumar Tummala, Parimal Patel, "Distributed IDS using Reconfigurable Hardware," ipdps, pp.426, 2007 IEEE International Parallel and Distributed Processing Symposium, 2007

[3] Kabiri, Peyman; Ghorbani, Ali, “A Rule-Based Temporal Alert Correlation System”, International Journal of Network Security, Vol. 5, No.1, pp. 66-72, July 2007

[4] Ajith Abraham, Ravi Jain, Johnson Thomas and Sang Yong Han, “D-SCIDS: Distributed SoftComputing intrusion detection system”, Journal of Network and Computer Applications 30, PP 81–98, 2007

[5] Michael P. Brennan , “Author Retains Full Rights AD Using Snort For a Distributed Intrusion Detection System”, Version 1.3, SANS Institute , 29.01.2002

DIDS

References

[6] Andrew Baker, Andrew R. Baker, Brian Caswell, Jay Beale, Joel Esler, “Snort IDS and IPS Toolkit”, Syngress Media Inc Publishing, 2007

[7] Ronald L. Krutz, “Securing SCADA Systems”, Wiley Publishing, December 2005

[8] D. Gavrilis, E. Dermatas, “Real-Time Detection of Distributed Denial of Service Attack Using RBF Network and Statistical Feature”, International Journal of Computer Network, Vol 48, pp 235-245, 2005.

[9] Paul Innella and Oba McMillan, “An Introduction to Intrusion Detection Systems”, Tetrad Digital Integrity,. LLC, 2001

[10] A Mouinji, B L Charlier, D Zampunieris, N Habra, “Distributed Audit Trail Analysis”, Proceedings of the ISOC 95 Symposium on Network and Distributed System Security”,

pp. 102-112, 1995

[11] R A Kemmerer, “NSTAT: a Model-based Real-time Network Intrusion Detection System”, Technical Report TRCS97-18, Reliable Software Group, Department of

Computer Science, University of California at Santa Barbara, 1997

DIDS

References

[12] S R Snapp, J Bretano, G V Diaz, T L Goan, L T Heberlain, C Ho , K N Levitt, B Mukherjee, S E Smaha, T Grance, D M Teal, D Mansur, “DIDS (Distributed Intrusion Detection System) – motivation architecture and an early prototype”, Proceedings 14th National

Computer Security Conference, Washington DC, October, pp. 167-176, 1999

[13] G Vigna, R A Kemmerer, “NetSTAT: A network-based intrusion detection system”, Journal Computer Security, Vol. 7, No, 1, pp. 37-71, 1999

[14] P A Porras, P G Neumann, “EMERALD: event monitoring enabling response to anomalous live disturbances”, Proceedings 20th National Information Security Conference,

NIST 1997

[15] S Staniford-Chen, S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, K Levitt, C Wee, R Yipi, D Z Erkle, “GriDS – a large scale intrusion detection system for large networks”, Proceedings 19th National Information Security Conference, Vol. 1, pp. 361-370, 1996

[16] E H Spafford, D Zamboni, “Intrusion detection using autonomous agents”, Computer Networks, 34, pp. 547-570, 2000

DIDS

References

[17] ) S Staniford-Chen, S, B Tung, and D Schnackenberg, “The Common Intrusion Detection

Framework (CIDF)”. Proc. Information Survivability Workshop, Orlando FL, October 1998

[18] R Feiertag, S Rho, L Benzingher, S Wu, T Redmond, C Zhang, K Levitt, D Peticolas, M Heckman, S Staniford, J McAlerney, “Intrusion Detection Inter-Component Adaptive

Negotiation”. Computer Networks, Vol. 34, pp. 605-621, 2000

[19] W Lee, R A Nimbalker, K K Yee, S B Patil, P H Desai, P P Tran, S J Stolfo, “A data mining and CIDF based approach for detecting novel and distributed intrusions”, Proc. 3rd

International Workshop on Recent Advances in Intrusion Detection, 2000

[20] P Ning, S Jajodia, X S Wang, “Design and implementation of a decentralized prototype system for detecting distributed attacks”, Computer Communications, Vol. 25, pp. 1374-

1391, 2002

[21] Ajith Abraham, Johnson Thomas, “Distributed Intrusion Detection Systems: A Computational Intelligence Approach”, ABBASS H.A. AND ESSAM D. (EDS.), IDEA GROUP INC. PUBLISHERS, USA , Vol. 5, pp. 105-135, 2005

]22 ” افزار] نرم معرفي فریدونیان، اصفهان، “ Snortمسعود صنعتی دانشگاه آپــا، تخصصی آزمایشگاه ،2009]23 “ ي”ييييي يييي ييي ييييي ي يي دانشگاه] ييييي ييييي آپــا، تخصصی آزمایشگاه ، نفوذ تشخيص آاللهحميدي،سيدهمارالضيايي،معرفيسيستمهاي

مشهد، 2009فردوسي

DIDS