Network Securrity Unit 1 Notes
Network Securrity Unit 1 Notes
NIC stands on first place. Without this device, networking cannot be done.
This is also known as network adapter card, Ethernet Card and LAN card
A NIC converts parallel data stream into serial data stream and vice versa
serial data stream is get converted in parallel data stream.
Types of NICs
Its job is to regenerate the signal over the same network before the signal
becomes too weak or corrupted so as to extend the length to which the signal can
be transmitted over the same network.
An important point to be noted about repeaters is that they do not amplify the
signal.
When the signal becomes weak, they copy the signal bit by bit and regenerate it at
the original strength. It is a 2 port device.
HUB
HUB operated at Physical Layer is used to connect multiple computers in a single
workgroup LAN network. Typically HUBs are available with 4,8,12,24,48 ports.
Ethernet HUB :- In this type of HUB all ports have RJ-45 connectors.
Combo HUB :- In this type of HUB ports have several different types of
connectors such RJ-45, BNC, and AUI.
For Example a HUB which has four ports. Ports share everything. One port
received data signal from its connected device. It will make three copies of data
signal from HUB and give one copy to each port. Receiver port doesn’t need a
Without segmentation all these nodes will share same collision domain that
will bring down overall network performance.
Bridge has per port collision domain which means if a port faces collision,
other ports will not effect from this collision.
Basic function of Bridge are following :-
•Break a large network in smaller segments.
•Join different media types such as UTP with fiber optic.
•Join different network architectures such as Ethernet with Token Ring.
Local Bridge :- This bridge connects two LAN segments directly. In Ethernet
Implementation it is known as Transparent bridge. In Token Ring network it is
called Source-Routed bridge
Remote Bridge :-
This bridge connects with another
bridge over the WAN link.
Wireless Bridge :- This bridge connects with another bridge without wiring
between them.
In OSI Layer model Bridge works at physical layer and data link layer.
•In bridge forward decision are made through the software which slow down
overall performance of network
•Bridges use age old technology which is not capable to fulfill the requirement of
modern networks effectively
Just like Hub and Bridge, switch is also used to connect multiple computers
together in a LAN segment.
All valid frames are processed and forwarded to their destination MAC address.
Switches support three methods of switching
In this method Switch only read first six bytes from frame after the preamble.
These six bytes are the destination address of frame.
This is a hybrid version of Store and Forward method and Cut and Through
method.
It takes goodies from both methods and makes a perfect method for switching.
It checks first 64 bytes of frame for error. It processes only those frames that
have first 64bytes valid.
Any frame less than 64 bytes is known as runt. Runt is an invalid frame type.
Router is a layer three device operates at Network Layer which forwards data
packet from one logical network segment to another.
Router forwards packets on the bases of their destination address. For this router
keeps record of the path that packets can use as they move across the network.
To connect two different media types such as UTP and fiber optical.
To connect two different network architectures such as token ring and Ethernet.
To connect LAN network with Telco company’s office (Known as DTE device).
Gateway –
A gateway, as the name suggests, is a passage to connect two networks together
that may work upon different networking models.
They basically work as the messenger agents that take data from one system,
interpret it, and transfer it to another system.
Gateways are also called protocol converters and can operate at any network
layer. Gateways are generally more complex than switch or router.
Brouter –
and devices
communication devices
Logical
Establish/manage connection
End-to-end control & error checking
(ensure complete data transfer): TCP
The layers in the TCP/IP protocol suite do not exactly match those in the OSI
model. The original TCP/IP protocol suite was defined as having four layers:
host-to-network, internet, transport, and application. However, when TCP/IP is
compared to OSI, we can say that the TCP/IP protocol suite is made of five
layers: physical, data link, network, transport, and application.
TCP/IP and OSI model
Different Types of Network Layer
Attacks
• Attacks on Different Layers
– IP Attacks
– ICMP Attacks
– Routing Attacks
– TCP Attacks
– Application Layer Attacks
Security Flaws in IP
• The IP addresses are filled in by the originating host
– Address spoofing
• Using source address for authentication
– r-utilities (rlogin, rsh, rhosts etc..)
Internet
Attacking System
Broadcast
Enabled
Network
Victim System
Types of Attacks
Active attacks: An Active attack attempts to alter
system resources or effect their operations. Active
attack involve some modification of the data stream
or creation of false statement. Types of active
attacks are as following:
1. Masquerade
2. Modification of messages
3. Repudiation
4. Replay
5. Denial of Service
• Masquerade –
Masquerade attack takes place when
one entity pretends to be different entity.
A Masquerade attack involves one of the
other form of active attacks.
• Modification of messages –
It means that some portion of a message
is altered or that message is delayed or
reordered to produce an unauthorised
effect. For example, a message meaning
“Allow JOHN to read confidential file X” is
modified as
“Allow Smith to read confidential file X”.
• Repudiation –
This attack is done by either sender or
receiver. The sender or receiver can deny
later that he/she has send or receive a
message.
For example, customer ask his Bank “To
transfer an amount to someone” and later
on the sender(customer) deny that he
had made such a request. This is
repudiation.
• Replay –
It involves the passive capture of a
message and its subsequent the
transmission to produce an authorized
effect.
• Denial of Service –
It prevents normal use of communication
facilities. This attack may have a specific
target. For example, an entity may suppress
all messages directed to a particular
destination. Another form of service denial is
the disruption of an entire network wither by
disabling the network or by overloading it by
messages so as to degrade performance.
• Passive attacks: A Passive attack attempts
to learn or make use of information from the
system but does not affect system resources.
Passive Attacks are in the nature of
eavesdropping on or monitoring of
transmission. The goal of the opponent is to
obtain information is being transmitted. Types
of Passive attacks are as following:
1. The release of message content
2. Traffic analysis
• The release of message content –
Telephonic conversation, an electronic
mail message or a transferred file may
contain sensitive or confidential
information. We would like to prevent an
opponent from learning the contents of
these transmissions
• Traffic analysis –
Suppose that we had a way of masking
(encryption) of information, so that the attacker
even if captured the message could not extract
any information from the message.
The opponent could determine the location and
identity of communicating host and could
observe the frequency and length of messages
being exchanged. This information might be
useful in guessing the nature of the
communication that was taking place.
Types of network layer attacks
Eavesdropping
Data Modification
• After an attacker has read your data, the next logical step is to alter it. An attacker can
modify the data in the packet without the knowledge of the sender or receiver.
• Even if you do not require confidentiality for all communications, you do not want any
of your messages to be modified in transit. For example, if you are exchanging
purchase requisitions, you do not want the items, amounts, or billing information to be
modified.
Identity Spoofing (IP Address Spoofing)
• Most networks and operating systems use the IP address of a computer to identify a
valid entity. In certain cases, it is possible for an IP address to be falsely assumed
identity spoofing. An attacker might also use special programs to construct IP packets
that appear to originate from valid addresses inside the corporate intranet.
• After gaining access to the network with a valid IP address, the attacker can modify,
reroute, or delete your data.
Password-Based Attacks
• password-based access control. user name ,password.
• Older applications do not always protect identity information as it is passed
through the network for validation.
• Eavesdropper gain access to the network by posing as a valid user.
• When an attacker finds a valid user account, the attacker has the same rights as the real user..
• After gaining access to your network with a valid account, an attacker can do any of the
following:
– Obtain lists of valid user and computer names and network information.
– Modify server and network configurations, including access controls and routing tables.
– Modify, reroute, or delete your data.
Compromised-Key Attack
• A key is a secret code or number necessary to interpret secured information.
Although obtaining a key is a difficult and resource-intensive process for an attacker, it
is possible. After an attacker obtains a key, that key is referred to as a compromised
key.
• An attacker uses the compromised key to gain access to a secured communication
without the sender or receiver being aware of the attack. With the compromised key,
the attacker can decrypt or modify data, and try to use the compromised key to
compute additional keys, which might allow the attacker access to other secured
communications.
Man-in-the-Middle Attack
• occurs when someone between you and the person with whom you are
communicating is actively monitoring, capturing, and controlling your
communication transparently. For example, the attacker can re-route a data
exchange.
• When computers are communicating at low levels of the network layer, the computers might
not be able to determine with whom they are exchanging data.
• Man-in-the-middle attacks are like someone assuming your identity in order to read
your message. The person on the other end might believe it is you because the
attacker might be actively replying as you to keep the exchange going and gain
more information.
Sniffer Attack/ Packet Sniffer
• A sniffer is an application or device that can read, monitor, and capture network
data exchanges and read network packets. If the packets are not encrypted, a
sniffer provides a full view of the data inside the packet. Even encapsulated
(tunneled) packets can be broken open and read unless they are encrypted and the
attacker does not have access to the key.
• Using a sniffer, an attacker can do any of the following:
• Analyze your network and gain information to eventually cause your network to
crash or to become corrupted.
• Read your communications.
Phishing
• The fraudulent practice of sending emails purporting to be from reputable companies
in order to induce individuals to reveal personal information, such as passwords and
credit card numbers.
DNS spoofing
• Also referred to as DNS cache poisoning, is a form of computer security hacking in
which corrupt Domain Name System data is introduced into the DNS resolver’s
cache, causing the name server to return an incorrect IP address.
Denial-of-Service Attack
• The first attacker attacks a different victim to cover up the real attack
• The Attacker usually spoofed source address to hide origin
• Harder to deal with
Distributed DoS
• The handlers are usually very high volume servers
– Easy to hide the attack packets
• The agents are usually home users with DSL/Cable
– Already infected and the agent installed
• Very difficult to track down the attacker
• How to differentiate between DDoS and Flash Crowd?
– Flash Crowd Many clients using a service legitimately
• Slashdot Effect
• Victoria Secret Webcast
– Generally the flash crowd disappears when the network is flooded
– Sources in flash crowd are clustered
Attacke
r
Handle Handle
r r
Agen Agen Agen Agen Agen
t t t t t
Victim
Firewall
Firewall
• A firewall is a device that filters traffic between a “protected” or inside network and a
“less trustworthy” or outside network.
• A firewall is basically an executable code run on a dedicated computer.
• As all traffic should pass through the firewall, it is not a point of bottleneck for
system performance and hence non-firewall functions are not performed on that
machine running the firewall.
• Also, since non-firewall code does not exist in the computer, it is hard for an
attacker to make use of any vulnerability to compromise the firewall.
Internal Network
Firewall
Interne
t
Firewalls
• Design idea:
– Firewalls implement a security policy that is specifically designed to address what
bad things that should not happen in a “protected environment”
– Security policies that dictate what to allow: Standard security practices dictate a
“default-deny” ruleset for firewalls, implying that the only network connections
allowed are the ones that have been explicitly stated to be allowed.
– Security policies that dictate what not to allow: Users and business community who
lack such a detailed understanding to explicitly state what should be allowed in
prefer a “default-allow” ruleset, in which all traffic is allowed unless it has been
specifically blocked.
– Even though this configuration is relatively more prone to inadvertent network
connections and system compromise, it is more commonly used because of
mere lack of knowledge and new applications that come into existence.
Firewalls
• Not all firewalls need to have the same capability.
• One cannot compare the “goodness” of two firewalls based on the security policies
they are configured with.
– The key factor that drives the selection of a security policy for a firewall is the
threats that an installation (network) needs to avoid happening.
• Packet Filters
• A packet filtering firewall controls access to packets on the basis of packet address
(source or destination) or specific transport protocol type (such as HTTP, Telnet,
etc)
– Egress filtering: Packets would be sent out (or not to be sent out) only to specific
networks and/ or belonging to specific transport layer protocols.
– Ingress filtering: Packets belonging to (not belonging to) only certain source networks
and/ or specific transport layer protocols could be let in.
• A common strategy to avoid IP spoofing attacks is to have the packet filter
configured not to let in packets having a source address that corresponds to the
internal network.
– In other words, the attacker has spoofed the source IP address to be the IP address of a
machine belonging to the network being protected by the firewall.
• The code for packet filters will become lengthy as we want to block traffic belonging
to specific networks, IP addresses and transport layer protocols.
Attacks Prevented using
Packet Filter Firewalls
• In addition to IP spoofing
attacks, packet filter firewalls
could also be configured to Application
avoid source routing and tiny End-to-End Transport End-to-End
fragmentation attacks. Connection Connection
• Source routing attacks: where Network
source specifies the route that a
packet should take to bypass Link Layer
security measures, should
discard all source routed Physical Layer
packets
• Tiny fragment attacks: intruder
uses the IP fragmentation option Layers supported by Packet Filter
to create extremely small and Stateful Firewalls
fragments and force the TCP
header information into fewer
separate fragments to
circumvent filtering rules Source (adapted from): Figure 22.1(b) from
needing full header info; can William Stallings – Cryptography and Network
enforce minimum fragment size Security, 5th Edition
to include full header.
Packet Filters
Remote
HTTP Network 1
(Blocked)
Remote
Network 2
Packets filtered from Telnet (Accepted)
Specific networks/ protocols
100.50.25.x
Dual-homed
Forwarded
Proxy Firewall
Request
Application
Proxy Proxy Internet
Protocol
Server Analysis Client
Reply
Real
Server
Forwarded Internal
Reply Network Note: The proxy services
Request running on such firewalls
are preferred to be independent
Real of each other to avoid any
Client vulnerability.
Application Proxy
Inside Outside
Connection Application Application Connection
Transport Transport
Source (adapted from): Figure 22.1(d) from William Stallings – Cryptography and Network
Security, 5th Edition
Application Proxy Firewall
• Each application proxy in the firewall requires two components: a proxy server and a
proxy client.
• All communication between internal users and the Internet passes through the proxy
server rather than allowing users to directly communicate with servers on the Internet.
• An internal user (client) sends a request to connect to an external service. The request
goes through the Application Proxy Firewall that runs a proxy server for that particular
service being requested.
• The proxy server evaluates the request and decides to permit or deny the request based
on a set of rules that are managed for the individual network service.
• Proxy servers allow only those packets that comply with the services of the application
protocol.
• Proxy servers are also useful to collect audit records of session information
• If the proxy server approves the request, it forwards that request to the proxy client.
• The proxy client then contacts the real server on behalf of the real client and proceeds
to relay requests from the proxy server to the real server and to relay responses from
the real server to the proxy server.
• The proxy server relays requests and responses between the proxy client and the real
client.
• Note: The above discussion assumes the client is in the internal network and the server
is in the external network. The same discussion applies for the other scenario too:
– The real client (from the outside network) contacts the proxy server, the proxy server
evaluates the request and forwards to the proxy client, the proxy client contacts the real
server (running in the internal network).
– The proxy client forwards the response from the real server to the proxy server, which
forwards the response to the real client (in the outside network).
Examples of using Proxy Firewall
• Scenario 1: A company wants to allow dial-in access by its employees, without exposing
its company resources to login attacks from remote non-employees. Suppose the
internal network has a mixture of operating system types, none of which support strong
authentication through a challenge-response system.
• Solution:
• The requirement could be handled by a specifically written proxy that requires
strong authentication such as a challenge-response, in addition to a valid username
and corresponding password.
• The proxy validates the challenge-response itself, and then pass on only the
username and password in a form required by the internal host’s operating system.
• Scenario 2: A company wants to set up an online price list so that outsiders can see the
products and prices offered. It wants to be sure that (a) no outsider can change the
prices or product list and (b) outsiders can access only the price list and not any of the
more sensitive files stored inside.
• Solution:
• The requirement could be handled by a specifically written proxy that monitors the
file transfer protocol data to ensure that only the price list file was accessed, and
that the file could be only read, not modified.
• Note: A proxy firewall can also function more as a guard, monitoring the amount and
quality of data exchanged.
–It could keep track of the amount of data exchanged per user from the internal network and deny
access if exceeded a pre-defined limit.
–A proxy firewall could also run a virus scanner to scan all the incoming files and if required
outgoing files too.
Proxy Servers
• A Proxy Server is a server (a computer system or an application program)
that acts as intermediary for requests from clients seeking resources and/or
service from other servers.
• The proxy server typically evaluates the request according to its filtering
rules (say by IP address or port number) and acts based on this evaluation.
• A proxy server has a large variety of potential purposes, including:
– To keep machines behind it anonymous (mainly for security)
– To speed up access to resources (using caching) – Web proxy servers
– To apply access policy to network services or content (to block visiting
undesired sites) – proxy firewall
– To log/ audit usage – proxy firewall
– To scan transmitted content for malware before delivery – content-filtering
web proxy
• Deploying a proxy solution within a network environment is typically done
either by requiring all client systems to configure their browsers to use the
proxy or by deploying an intercepting proxy that actively intercepts all
requests without requiring client-side configuration.
• A proxy server that passes requests and replies unmodified is usually
referred to as a gateway or also sometimes, tunneling proxy.
Reverse Proxy Servers
• A reverse proxy server is an Internet-facing proxy used as a front-end to
control and protect access to a server/servers on a private network, as
well as to perform tasks such as load-balancing, authentication and etc.
• A reverse proxy server appears to the Internet clients as an ordinary
server. Internally, it could merely forward the client requests to the
original internal servers for handling. The response would be returned
as if it came directly from the proxy server.
• There are several advantages in using reverse proxy servers:
– Encryption/ SSL acceleration: A reverse proxy server could accelerate the
communication sessions by serving as a single “SSL proxy” to provide SSL
encryption for an arbitrary number of hosts; removing the need for a
separate SSL Server Certificate for each host.
– Load balancing: The reverse proxy server can dynamically distribute the
load to several web servers.
– Security: The reverse proxy server could be an additional layer of defense
and can protect against some operating system and web server specific
attacks.
Personal Firewalls
• Motivation: Home users, individual workers, and small businesses use cable
modems or DSL connections with unlimited, always-on access.
• These people need a firewall, but a separate firewall computer to protect a single
workstation can seem too complex and expensive.
• A static machine is a vulnerable target for the attack community and adding a
personal firewall can save it more secure compared to machines that are not
behind such a firewall.
Examples for Personal Firewalls
• Windows Firewall
• With Windows Service Pack 2,
Microsoft enabled the Windows
Firewall (previously called Internet
Connection Firewall) by default.
• With the introduction of the Vista
Operating System, Microsoft
modified Windows Firewall to
make it more capable and
configurable to allow more
granular control of network traffic
and behavior analysis of
applications and services.
– For example, if MS Outlook client
suddenly attempts to connect to a
remote web server, Windows
Firewall can detect this as a
deviation from normal behavior
and block the unwanted traffic. Source: Figure 13.17 from Conklin and White –
Principles of Computer Security, 2nd Edition
Examples for Personal Firewalls
• UNIX-based (Software) Firewalls
• TCP Wrappers: limits inbound network connections based on port
number, domain, or IP address and is managed with two text files called
hosts.allow and hosts.deny.
– For example, if an inbound connection request is coming from a trusted IP
address (listed in hosts.allow) and destined for a port to which it is allowed to
connect, then the connection is allowed.
• IPchains – is a rule-based software firewall that has three configurable
“chains” (set of rules) used for handling network traffic: input chain (for
incoming traffic to the local system); output chain (for traffic leaving the
local system) and forward chain (for traffic received by the local system;
but, not destined for the local system).
– Each packet passes all three chains for processing.
• IPtables – uses the same three chains for policy rules and traffic handling
as IPchains; but, each packet is processed only at the appropriate chain.
This allows for more granular control of network traffic and enhances
performance.
Comparison of Firewall Types
What Firewalls Can and Cannot Block
• Firewalls cannot alone secure an environment.
• A firewall protects only the perimeter of its environment against attacks from
outsiders who want to execute code or access data on the machines in the
protected environment.
• Firewalls cannot protect from internal threats (through disgruntled employees).
• Firewalls cannot protect against malware imported via laptop, PDA, or portable
storage device infected outside the network, then attached and used internally.
• Firewalls can be held responsible for any security breach in if they are the only
means to control the entire network perimeter.
– If a host in the inside network has a connection to the outside network through a modem,
the whole of the inside network is exposed to the outside network through the modem
and the host. A firewall cannot be responsible for any attack
• Firewalls cannot protect data after they have left them.
• A firewall is often a single point of failure for a network.
– A more layered approach like a screening router, followed by a proxy firewall, followed by
a personal firewall may be more helpful.
• Firewalls must be frequently configured and updated to take into account the
changes in the internal and external environment and based on the review of the
firewall activity reports that may indicate intrusion attempts.
• The machine hosting the firewall code will not have any other software like an
editor, compiler, etc. in order to reduce the chances of an attack.
Demilitarized Zone (DMZ) Networks
• A DMZ network (also called perimeter network) is a subnet that
contains an organization’s services that are exposed to a larger
untrusted network (like the Internet).
• In other words, the DMZ comprises of hosts that provide services to
users outside the internal LANs, such as e-mail, web, DNS servers.
• Because of the higher chances of these hosts being compromised,
they are placed into their own sub-network in order to protect the rest
of the network if an intruder were to succeed in attacking them.
• Thus, a DMZ network adds an additional layer of security to an
organization’s LAN – an external attacker only has access to the
hosts in the DMZ and not to any other internal networks.
• Hosts in the DMZ provide services to both the internal and external
networks – an external (“front-end”) firewall monitors the traffic
between the DMZ network and the external Internet; while, an internal
(“back-end”) firewall monitors the traffic between the DMZ hosts and
the internal network clients.
DMZ Networks
Front-end
Firewall
Internal Protected Network
I LAN
Switch
LAN
Switch Back-end DMZ
Firewall Network
Distributed
Firewalls
For example, you can have one IP ACL inbound on an interface and another IP ACL
outbound on an interface, but you cannot have two inbound IP ACLs on the same interface
How ACLs Work
Inbound (as the traffic comes into an interface) Outbound (before the traffic exits an interface)
Alerts and Audits
Alerts are enabled by default and automatically display on the console line of the router
If alerts have been disabled using the ip inspect alert-off command, the no form
of that command, as seen above, is required to re-enable alerts.
show ip inspect Parameters
debug ip inspect Parameters
Intrusion Detection System
FIREWALL VS IDS
• Firewall cannot detect security breaches associated with
traffic that does not pass through it. Only IDS is aware of
traffic in the internal network
• Not all access to the Internet occurs through the firewall.
• Firewall does not inspect the content of the permitted traffic
• Firewall is more likely to be attacked more often than IDS
• IDS is capable of monitoring messages from other pieces
of security infrastructure
• Firewalls allow traffic only to legitimate hosts and services
• Traffic to the legitimate hosts/services can have attacks
• CodeReds on IIS
• Solution? - Intrusion Detection Systems
Comparing IDS and IPS
Advantages Disadvantages
Advantages Disadvantages
network
▪ Can use stream normalization
▪ Must have a well thought-out
techniques
security policy
▪ Some impact on network (latency,
jitter)
Intruders
• unknown/unwanted trespass
– from benign to serious
• user trespass
– unauthorized logon, privilege abuse
• software trespass
– virus, worm, or trojan horse
Examples of Intrusion
• Remote root compromise
• Web server defacement(attack on a website that
changes the visual appearance of the site or a
webpage.)
• Guessing / cracking passwords
• Copying viewing sensitive data / databases
• Running a packet sniffer
• Distributing pirated software
• Using an unsecured modem to access net
• Impersonating a user to reset password
• Using an unattended workstation.
Intrusion Detection
A security service that monitors and analyzes system
events for the purpose of finding, and providing real-
time or near real-time warning of attempts to access
system resources in an unauthorized manner.
IDS Requirement
– Run continually
– Be fault tolerant
– Resist subversion
– Impose a minimal overhead on system
– Configured according to system security policies
– Adapt to changes in systems and users
– Scale to monitor large numbers of systems
– Provide graceful degradation of service
– Allow dynamic reconfiguration
IDPS Types and Options
Drawback
First, a security specialist is required to design effective policies.
Second, defined policies should be consistent and in a logically correct state throughout
the system to avoid any adverse circumstances.
Policies are interrelated through their associated conditions, and, therefore, there may
exist inter or intrapolicy conflicts as an incoming event may trigger more than one rule
either within a policy or between two policies.
Moreover, these policies are usually implemented sequentially, and improper ordering
can cause a feedback loop or deadlock situation.
However, ontology-based systems can be used to simplify the policy specification and
management tasks.
Honeypot
• A honeypot is a trap to detect, deflect or in some manner counteract attempts at
unauthorized use of information systems. –
• A honeypot is usually a computer, and sometimes data or an unused IP address
space that appears to be part of a network but which is actually isolated,
unprotected and monitored, and which seems to contain information or a resource
that would be of value to attackers.
• Honeypots have no production value and hence should not see any legitimate
traffic or activity. Whatever they capture can be surmised as malicious or
unauthorized.
• A honeynet is a network of honeypots. A honeynet is used for monitoring a larger
and/or more diverse network in which one honeypot may not be sufficient.
• A honeypot/ honeynet is more of a preventative approach of detecting potential
attackers existing in the Internet who may target the organization network in the
near future.
• Honeypots could be used to fake as open relays to attract spam emails and
determine the source e-mail address and destination e-mail addresses used by the
spammers.
– An open relay is an e-mail server that allows anyone on the Internet to send email
through it.
– Once they find an open relay, spammers keep sending the span email to the open relay
and expect it to spread the spam.
• Note that no ordinary e-mail will come to a honeypot. All it receives could be
categorized as spam.
Approaches to Identifying
Malicious Traffic Advantages Disadvantages
• Easy configuration • No detection of unknown signatures
Source: Figure 13.7 from Conklin and White – Principles of Computer Security, 2nd Edition
NIDS: Advantages and Disadvantages
• Advantages of a NIDS
• Less Overhead: With a few well-placed NIDSs, one can monitor the
entire network traffic going in and out of the organization. Also,
upgrading and maintaining a fewer number of NIDSs is usually much
cheaper than upgrading and maintaining hundreds of host-based IDSs.
• Big Picture: The collection of the few NIDSs can have visibility into all
the network traffic and can correlate attacks (whether they are
widespread or concentrated, unorganized or focused) among multiple
systems.
• Disadvantages of a NIDS
• A NIDS is ineffective when traffic is encrypted.
• A NIDS cannot see traffic that does not cross it – If a NIDS is placed
only in the perimeter, chances are that it could miss traffic traversing
the internal network.
• A NIDS must be able to handle high volumes of traffic (even 1-Gbps is
common nowadays) with the availability of networks with larger
bandwidth.
• A NIDS does not know about activities on the hosts themselves.
Active vs. Passive NIDS
Passive NIDS:
• A passive NIDS simply watches the traffic, analyzes it and generates
alarms.
• It does not interact with the traffic itself in any way, and it does not
modify the defensive posture of the system to react to the traffic.
Active NIDS:
• An active NIDS contains all the same components and capabilities of
the passive NIDS with one critical addition – the active NIDS can react
to the traffic it is analyzing.
• The reactions of an active NIDS could range from something simple,
such as sending a TCP reset message to interrupt a potential attack
and disconnect a session, to something complex, such as dynamically
modifying firewall rules to reject all traffic from specific source IP
addresses for the next few hours or days.
• Active NIDS are also referred to as Intrusion Prevention Systems
(IPSs). When configured with the private keys of the servers in the
internal network, IPSs would be able to decrypt the SSH connection
establishment messages between a client and server and extract the
session keys that would be used during the complete session. This
gives an added advantage for the IDS/IPS to handle encrypted traffic.
Host-based IDS (HIDS)
• A host-based IDS (HIDS) examines log files, audit trails (both
generated by the local operating system), and network traffic coming
into or leaving a specific host.
– On UNIX systems, the examined logs are those created by syslog,
kernel logs and error logs; On Windows systems, the examined logs are
the event logs – Application, System and Security.
• Critical files are those that are vital to the system’s operation or
overall functionality. They may be program (or binary) files, files
containing user accounts and passwords, or even scripts to start or
stop system processes.
• Any unexpected modifications (for e.g., could be detected using
checksum) to the critical files could mean the system has been
compromised or modified by an attacker. By monitoring these critical
files, the HIDS can warn users of potentially malicious activity.
• Within the log files, the HIDS is looking for certain activities that
typify hostile actions or misuse, such as the following:
– Logins at odd hours, Login authentication failures, Additions of new user
accounts, Modification or access of critical system files, Modification or
removal of binary files (executables), Privilege escalation
Host-based IDS (HIDS)
• HIDSs can operate in real-time,
looking for activity as it occurs, Logical
or in batch mode, looking for Layout of a
activity on a periodic basis. HIDS
• HIDS will use up some of the
local system resources (like
memory and CPU cycles) to
operate.
• The Analysis Engine of a HIDS
could also use a decision tree to
expedite pattern matching.
Root
Process
Signature Detection
Change Detection
State Detection
Signature Detection
• It detects the patterns or signatures in a particular
program that may be malware.
• When malware is suspected, it is verified against the
database of known bad code fragments.
• ADVANTAGE
Users and administrators can perform a simple
precautionary measure keeping signature files up to
date and periodically scanning for viruses.
• DISADVANTAGE
The signature files may be quite large, which
makes scanning slow
Change Detection
• Finding files that have been changed is
called change detection.
• A file that changes unexpectedly may be due
to a virus infection.
• Advantages:
If a file has been infected, a change can be
detected. An unknown malware, one not
previously identified (zero-day), can be detected
through change detection.
State Detection
• State detection aims to detect unusual/
anomalous behavior.
• It relies on an expert system that determines if a
state change is anomalous.
• These state changes includes malicious behavior;
by extension, anomaly detection is the ability to
identify potentially malicious activity.
• To determine what is normal and what is unusual
and to be able to distinguish between the two.