14
PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS

PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS

Embed Size (px)

Citation preview

Page 1: PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS

PROCESS OF CONDUCTING A DOS/IDS

INCIDENT ANALYSIS

Page 2: PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS

• As computer systems and the Internet have grown in size, complexity and usage the these systems has also grown.

• This has lead to a demand for automated systems for detecting malicious activity.

• This has lead to the development of a range of Intrusion Detection Systems

Page 3: PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS

Intrusion Detection System

• A Intrusion detection system is generally considered to be any system designed to detect attempts compromise the integrity, confidentiality or availability.

• A Network Intrusion Detection System (NIDS) aims to detect attempted compromises by monitoring network traffic.

• A host based IDS (HIDS) monitors a single system for signs of compromise.

Page 4: PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS

• A distributed denial of service attack is malicous dos attack involving more than one source.

• DDOS attacks usually involve a large number of compromised systems attacking a single target.

DISTRIBUTED DENIAL OF SERVICE

Page 5: PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS

TYPES OF ATTACKS

• Buffer Overflow Attacks

• SYN Attacks

• Teardrop Attacks

• Smurf Attacks

• Viruses

• Infrastructure Attacks

Page 6: PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS

SYMPTOMS OF DOS ATTACK

• Slow Network Performance.

• A website is unavailable

• Inability to access anything outside LAN.

• Increase in the number of SPAM e-mails.

Page 7: PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS

SECURITY ANALYSIS

• Preparation

• Detection and Analysis

• Containment, Eradication and Recovery

• Post Incident Recovery

• Documentation

Page 8: PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS

PREPARATION• Form Incident Response Team.• Main Contact Information.• On-call Roster,• Incident Report Mechanism.• Incident operations center.• Evidence Secure Storage.• Spare Computers/Servers• Removable Media.• Digital forensic Kit• Spare Printers• Network Diagrams• Network Baselines

Page 9: PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS

MONITOR NETWORK FOR SIGNS OF INCIDENT

• Reconnaissance activity• Network Scanning• Remote Logon attempts• Increase in volume of traffic• Log suspicious traffic• Consolidate reports for analysis.

Page 10: PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS

CONTAINMENT, ERADICATION AND RECOVERY

• Identify the type of attack.• Block the Attack.• Blocked Access from Source IP Address.

• RECOVERY• Update firewall• Update all users passwords• Reinstalled Software

Page 11: PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS

POST INCIDENT ACTIVITY

• Summary of Incident• What can we do better• What was good• Evidence Handling• Evidence Retention• Subjective Overall Assessment

Page 12: PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS

POST INCIDENT DOCUMENTATION

• Create after actions report.• Incident handling checklist• Update Knowledge Base

Page 13: PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS

WHAT CAN EMPLOYEES DO?

• Email and Attachments• Password Policies• Scan all files• Use Antivirus• Physical Security

Page 14: PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS

REFERENCES• Allen, J. Christie, A. William, F. McHugh, J. Pickel, J. Stoner, E. (2000) State

of the Practice of Intrusion Detection Technologies. Carnegie Mellon Software Engineering Institute.

• Richard P. Lippmann, Robert K. Cunningham, David J. Fried, Issac Graf, Kris R. Kendall, Seth E. Webster, Marc A. Zissman(1999). Results of the DARPA 1998 Offline Intrusion Detection Evaluation, slides presented at RAID 1999 Conference, September 7-9, 1999, West Lafayette, Indiana.

• Haines, J, W. Lippmann, R, P. Fried, R, P. Korba, J. & Das, K. (1999) The 1999 DARPA Off-Line Intrusion Detection Evaluation.

• Haines, J, W. Lippmann, R, P. Fried, R, P. Zissman, M, A. Tran, E. & Bosswell , S, B. (1999) DARPA Intrusion Detection Evaluation: Design and Procedures. Lincoln Laboratory, Massachusetts Institute of Technology.