/
Building Survivable Systems based on Intrusion Detection an Building Survivable Systems based on Intrusion Detection an

Building Survivable Systems based on Intrusion Detection an - PowerPoint Presentation

sherrill-nordquist
sherrill-nordquist . @sherrill-nordquist
Follow
392 views
Uploaded On 2016-05-16

Building Survivable Systems based on Intrusion Detection an - PPT Presentation

Paper by T Bowen Presented by Tiyseer Al Homaiyd 1 Introduction Intrusions show observable events that deviate from the norm Survivable system usually focus on detecting intrusions rather than preventing or containing damage ID: 321907

detection system based network system detection network based attack intrusion language event calls events packets reaction host attacks damage

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Building Survivable Systems based on Int..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Building Survivable Systems based on Intrusion Detection and Damage Containment

Paper by: T. BowenPresented by: Tiyseer Al Homaiyd

1Slide2

Introduction:

Intrusions: show observable events that deviate from the norm.Survivable system usually focus on detecting intrusions rather than preventing or containing damage. New approach that combines early attack detection with automated reaction for damage prevention and containment.

based on specifying security-relev

a

nt behaviors using patterns over sequences of observable events. EX: a process’s system calls and their arguments, and the contents of network packets. Intercepting actual events at runtime and comparing them to specifications can detect attacksoperations associated with the deviant events can be modified to stop the attack.Because this approach is based on security-relevant behaviors instead of attack signatures protect against unknown attacks.

2Slide3

Introducing BMSL

Event based intrusion detection  developing specific language called “behavioral monitoring specification language” (BMSL)Enables concise specifications of event based security-relevant properties.

These properties can capture either normal behavior of programs and systems, or misuse behaviors associated with known exploitations.

Compile BMSL specifications into efficient detection engines  possibility of increasing real-time intrusion detection with real-time intrusion reaction.

Experimenting BMSL in :Incoming network packets as events.Based on packet contents

system calls requested by executing processes as events.

Based on both system calls and the values of system call arguments.

3Slide4

Language Goals

Supporting multiple event types like system calls and network packets.Robustness and type-saftey: to reduce specification errors and their damage. Simplicity to control language.

Simple but expressive pattern language.

Efficient monitoring.

Simple but expressive pattern language. Specifying responses (Automatic reactions) By associating each security property with the reaction to be taken when the property is violated.4Slide5

Architecture of Intrusion detection/response

system An interceptor provides efficient interception of raw events. Interceptors deliver raw event streams to a runtime environment with each stream.

The runtime environments:

D

emultiplex the event steams into the event streams for individual detection engines  implement the actual intrusion detection and reaction specifications.Provide easy functions for detection engines and isolate the detection engines from the details of specific interface & data format. A single detection engine monitors each defended process & another detection engine monitors all of the network traffic of one or more hosts.

5Slide6

Reactions to Detected intrusions

The network packet detection engine can alter, drop or spontaneously generate packets.

Event modification capabilities will differ for different runtime systems.

Prototype:

Interposition capabilities  system callsPassive interception capability network packets. Using interposition  different reactions

terminate intruder access to the victim host.

Waste the intruder’s resources by allowing intruder access  placing compromised processes on an isolated environment so that they don’t cause damage to the victim.

6Slide7

Interactions among multiple rules

If there is a reaction conflict :Define a notation of conflict among operations contained in the reaction components of rules. Use assignment to variables or invocation of support functions provided by the runtime system.

Having a condition that there must not exist 2 patterns with conflicting operations such that for same sequence of system calls, they can match ate the same point.

7Slide8

Using Specification for Isolation

When we detect an attack on a host that is delivered via network packets  drop those packets.When we detect an attack on a process  switch to a new specification that contain BMSL rules to isolate the process

Return faked return value, specifically for system calls that can damage the system.

Log the activity for later analysis

Reduce limits on resources that the rogue process can consume.Restrict access to files. In network operations: Operations are slowed down using sleep()

The CPU and resource usage on the attacked system are minimized.

The intruder will likely perceive slow system and congested network.

8Slide9

Global Isolation Via active Networking

Host based approach can detect the attack, but cannot react in a useful manner like in denial-of-service (DOS) attackthe

host can

detect that

it is swamped by meaningless requests, and may even know the (spoofed) source IP address from which the requests originate, but cannot do anything to preserve itself under the attack. (Hosts can always respond to the attack by shutting down the attack services, but this reaction

is not

useful, since it accomplishes the aims of the attacker

.) a more useful

reaction: the host informs

the nearest active network element of the attack and

requests

that active network elements work together to

(find

and

isolate the source of the attack.)

Protect the host and eliminate the attack track traffic (unnecessary traffic)

9Slide10

Results

The current research into active network technology for defense is illustrative, but insufficient. Progress toward truly powerful active network based defenses requires

further maturity of the technology, which

is currently

in prototype form.The attacks are identified using rules but the rules can be more complicated when training and debugging the system. Scores assigned to our system by Lincoln Labs

Significantly better detection rates over the baseline system

 reducing false positive rates

10Slide11

Results

Results by IDS: it shows the attacks that were missed by the system too.11Slide12

Main Results

BMSL: expressive, easy-to-use and robust language for capturing behaviors of processes and hosts as patterns over sequences of events such as system calls and network packets. Protection against Known and Unknown attacks: by enforcing security-relevant properties, we protect against known and unknown attacks. Enforcement of normal behaviors and isolation of misbehaving programs.

Follow pattern matching to detect deviation from normal behavior.

12Slide13

Related work (Host based Detection)

a state-transition diagram based approach is used to capture signatures of

intrusions.

Their

language is more expressive than this one in some ways like in (e.g., ability to capture occurrence of two concurrent sequences of actions), and less expressive in (e.g., ability to capture atomic sequences or the occurrence of one event immediately following another). most intrusion signatures expressed

on these papers can

be easily captured in our language as

well“Computer Immunology, Comm.” by Forrest was the first paper that focused on program behavior instead of user behavior. Now results got improved using a neural network based approach (deals with system calls)

Different approach is taken for intrusion detection using data mining. Some papers use statistical and expert system based techniques. They use pattern matching techniques. The technique on this

papser

focused on speed and reduction of false positives. Problem is that unknown attacks may go undetected.

The anomaly detection systems are typically better at detecting unknown attacks, but they are not good in false positive rates.

Some papers focus on defining a special purpose language for intrusion detection.

13