Tech 2
Tech 2
Techniques
Teresa F. Lunt
Discussion Layout
Introduction
What is Intrusion Detection?
External penetrators
parameters
Difficult to detect normal users who abuse their privileges
How does Intrusion Detection
work?
How does Intrusion Detection Work?
Access controls
penetration
No protection from privilege abuse
Auditing
This talk will focus on the first two types of audit interpretation
Approaches to interpreting audit
data for security analysis
Determining user norms
Using expert systems
Model-based reasoning
The IDES resolver
Other approaches
User norms-IDES
IDES (Intrusion Detection Expert System)-used for auditing and
interpreting data
This was developed by SRI
This has a score function that counts the number of times each
category occurs
User norms-IDES
Disadvantages to establishing normal user behavior:
Depends greatly on the consistency of the user
communities
Difficulty in scaling
detect a correspondence
Model-based reasoning
This type of Intrusion Detection relies on the fact that there are
usually known procedures to breach system security
Known password attacks
specific attack
Attacks which contain sets of instructions that are not
completed
Drawbacks:
Can only detect known attacks
detection
The IDES resolver
This will combine statistical and expert system components
Can make more complex deductions about suspicious behavior
Reduce the number of false positive rates
Be able to detect with more accuracy the gravity of a situation
Correlate audit data with other available data
Information about changes in user status (new users, user
locations…)
Information about files, directories, devices,
authorizations…
Other approaches
Define acceptable, as opposed to suspicious, behavior
Use trap doors (bait malicious users)
Bogus passwords
“tripwire” files
http://www.sdl.sri.com/intrusion/index.html
1993
According to SRI: