0% found this document useful (0 votes)
53 views39 pages

Understanding Intruders in Cybersecurity

Uploaded by

santhoshi2908
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views39 pages

Understanding Intruders in Cybersecurity

Uploaded by

santhoshi2908
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd

Intruders

Intruders Definition
Intrusion Detection
HIDS
NIDS
Intruders
 significant issue for networked systems is hostile
or unwanted access
 either via network or local
 can identify classes of intruders:

Masquerader (outsider)

Misfeasor (insider)

clandestine user (seizes control, evades auditing and
access controls)
 varying levels of competence (benign to serious)
Intruders
 clearly a growing publicized problem

from “Wily Hacker” in 1986/87

to clearly escalating CERT (computer
emergency response team) stats
 range

benign: explore, still costs resources

serious: access/modify data, disrupt system
 led to the development of CERTs
 intruder techniques & behavior patterns
constantly shifting, have common features
Examples of Intrusion
 remote root compromise
 web server defacement
 guessing / cracking passwords
 copying viewing sensitive data / databases
 running a packet sniffer
 distributing pirated software
 using an unsecured modem to access net
 impersonating a user to reset password
 using an unattended workstation
Hackers
 motivated by thrill of access and status

Look for targets/ opportunity then share with others

status is determined by level of competence
 benign intruders might be tolerable

do consume resources and may slow performance

can’t know in advance whether benign or malign
 IDS / IPS / VPNs can help counter
 awareness led to establishment of CERTs

collect / disseminate vulnerability info / responses
Hacker Behavior Example
1. select target using IP lookup tools
2. map network for accessible services
3. identify potentially vulnerable services
4. brute force (guess) passwords
5. install remote administration tool
6. wait for admin to log on and capture
password
7. use password to access remainder of
network
Criminal Enterprise
 organized groups of hackers now a threat

corporation / government / loosely affiliated gangs

typically young

often target credit cards on e-commerce server
 criminal hackers usually have specific targets
 once penetrated act quickly and get out
 IDS / IPS help but less effective
 sensitive data needs strong protection
Criminal Enterprise Behavior
1. act quickly and precisely to make their
activities harder to detect
2. exploit perimeter via vulnerable ports
3. use trojan horses (hidden software) to
leave back doors for re-entry
4. use sniffers to capture passwords
5. do not stick around until noticed
6. make few or no mistakes.
Insider Attacks
 among most difficult to detect and prevent
 employees have access & systems knowledge
 may be motivated by revenge / entitlement

when employment terminated

taking customer data when move to competitor
 IDS / IPS may help but also need:

least privilege, monitor logs, strong authentication,
termination process to block access & mirror data
Insider Behavior Example
1. create network accounts for themselves and
their friends
2. access accounts and applications they wouldn't
normally use for their daily jobs
3. e-mail former and prospective employers
4. conduct furtive instant-messaging chats
5. perform large downloads and file copying
6. access the network during off hours.
Intrusion Techniques
 aim to gain access and/or increase
privileges on a system
 often use system / software vulnerabilities
 key goal often is to acquire passwords

so then exercise access rights of owner
 basic attack methodology

target acquisition and information gathering

initial access

privilege escalation

covering tracks
Intrusion detection
Password Guessing
 one of the most common attacks
 attacker knows a login (from email/web page etc)
 then attempts to guess password for it

defaults, short passwords, common word searches

user info (variations on names, birthday, phone,
common words/interests)

exhaustively searching all possible passwords
 check by login or against stolen password file
 success depends on password chosen by user
 surveys show many users choose poorly
Password Capture
 another attack involves password capture

watching over shoulder as password is entered

using a trojan horse program to collect

monitoring an insecure network login
• eg. telnet, FTP, web, email

extracting recorded info after successful login (web
history/cache, last number dialed etc)
 using valid login/password can impersonate user
 users need to be educated to use suitable
precautions/countermeasures
Intrusion Detection
 inevitably will have security failures
 so need also to detect intrusions so can

block if detected quickly

collect info to improve security
 assume intruder will behave differently to a
legitimate user

but will have imperfect distinction between
Intrusion Detection
Approaches to Intrusion
Detection
 statistical anomaly detection

attempts to define normal/expected behavior

threshold

profile based
 rule-based detection

attempts to define proper behavior

anomaly

penetration identification
Audit Records
 fundamental tool for intrusion detection
 native audit records

part of all common multi-user O/S

already present for use

may not have info wanted in desired form
 detection-specific audit records

created specifically to collect wanted info

at cost of additional overhead on system
Statistical Anomaly Detection
 threshold detection

count occurrences of specific event over time

if exceed reasonable value assume intrusion

alone is a crude & ineffective detector
 profile based

characterize past behavior of users

detect significant deviations from this

profile usually multi-parameter
Audit Record Analysis
 foundation of statistical approaches
 analyze records to get metrics over time

counter, gauge, interval timer, resource use
 use various tests on these to determine if
current behavior is acceptable

mean & standard deviation, multivariate,
markov process, time series, operational
 key advantage is no prior knowledge used
Rule-Based Intrusion
Detection
 observe events on system & apply rules to
decide if activity is suspicious or not
 rule-based anomaly detection

analyze historical audit records to identify
usage patterns & auto-generate rules for them

then observe current behavior & match
against rules to see if conforms

like statistical anomaly detection does not
require prior knowledge of security flaws
Rule-Based Intrusion
Detection
 rule-based penetration identification

uses expert systems technology

with rules identifying known penetration,
weakness patterns, or suspicious behavior

compare audit records or states against rules

rules usually machine & O/S specific

rules are generated by experts who interview
& codify knowledge of security admins

quality depends on how well this is done
Honeypots
 decoy systems to lure attackers

away from accessing critical systems

to collect information of their activities

to encourage attacker to stay on system so
administrator can respond
 are filled with fabricated information
 instrumented to collect detailed
information on attackers activities
 single or multiple networked systems
 cf IETF Intrusion Detection WG standards

You might also like