Intrusion Detection Systems
Intrusion Detection Systems
Event Engine
tcpdump filters Filtered packet stream
libpcap
Packet stream
Network
Firewall Versus Network IDS
■ Firewall
◆ Active filtering
◆ Fail-close
■ Network IDS
◆ Passive monitoring
◆ Fail-open
IDS
FW
Requirements of Network IDS
■ High-speed, large volume monitoring
◆ No packet filter drops
■ Real-time notification
■ Mechanism separate from policy
■ Extensible
■ Broad detection coverage
■ Economy in resource usage
■ Resilience to stress
■ Resilience to attacks upon the IDS itself!
Eluding Network IDS
■ What the IDS sees may not be what the
end system gets.
◆ Insertion and evasion attacks.
✦ IDS needs to perform full reassembly of packets.
◆ But there are still ambiguities in protocols and
operating systems:
✦ E.G. TTL, fragments.
✦ Need to “normalize” the packets.
Insertion Attack
K A T X T A C K
A T T A C
A T T A C K A T T C K
Activity Data
Information
provided by a
system
concerning its
inner workings
and behavior
System
Vulnerability
Analysis Port-
scanning, etc.
activities
BSM
Operating System
Events
Host-based Information Sources
■ Must be real-time
■ System sources
◆ Commands of Operating Systems don’t offer a structural way of
collecting and storing the audit information
■ Accounting: Shared resources
◆ Untrustworthy for security purposes
◆ Syslog
■ C2 security audit
◆ Reliable
◆ Trusted Computing Base (TCB)
Network-based information sources
■ Simple Network Management Protocol (SNMP)
Management Information Base (MIB)
◆ A repository of information
■ Network packets
◆ Detection of network-specific attacks
◆ Can analyze the payload of the packet
■ Router NetFlow records
◆ Can speed up and create log
Evaluation of IDS
■ Accuracy
◆ Detection rate & false alarm
■ Performance
■ Completeness
◆ To predict new attacks
■ Fault tolerance
■ Timeliness
Key Performance Metrics
■ Algorithm
◆ Alarm: A; Intrusion: I
◆ Detection (true alarm) rate: P(A|I)
✦ False negative rate P(¬A|I)
◆ False alarm rate: P(A|¬I)
✦ True negative rate P(¬A|¬I)
◆ Bayesian detection rate: P(I|A)
■ Architecture
◆ Scalable
◆ Resilient to attacks
Bayesian Detection Rate
P( I ) P( A | I )
P( I | A) =
P( I ) P( A | I ) + P(¬I ) P( A | ¬I )
■ Base-rate fallacy
◆ Even if false alarm rate P(A|¬I) is very low, Bayesian
detection rate P(I|A) is still low if base-rate P(I) is
low
◆ E.g. if P(A|I) = 1, P(A|¬I) = 10-5, P(I) = 2×10-5, P(I|A)
= 66%
■ Implications to IDS
◆ Design algorithms to reduce false alarm rate
◆ Deploy IDS to appropriate point/layer with
sufficiently high base rate
Problems with (Commercial) IDS
Common Intrusion-Detection
Framework (CIDF): Coordinate
different IDS projects.
Paradigm Shift
BEHAVIOR-BASED COMPUTER SECURITY
IN IDS
Signature-Based Defense Strategy Behavior-Based
Machine
Human Expertise Data Analysis Expertise
Distributed
Fragmented Coverage Cooperative
Enclave Command
Installation Installation
Enclave
Installation