Network Security IDS
Network Security IDS
Upon completion of this chapter, you will be able to perform the following tasks:
1. Intrusion Detection
Intrusion detection has been defined as the ability to detect misuse, abuse, and unauthorized
access to networked resources. The network can be made up of network devices such as routers,
printers, firewalls, and servers.
a) Reconnaissance attack
Performing reconnaissance
Performing reconnaissance involves the use of common commands or utilities available in all
operating systems. For example, using the nslookup and whois utilities, the attacker can easily
determine the IP address space assigned to a given corporation or entity.
b) Access attack
Access is an all-encompassing term that refers to unauthorized data manipulation, system access,
or privileged escalation.
Unauthorized data retrieval is simply reading, writing, copying, or moving files that are not
intended to be accessible to the intruder. Sometimes this is as easy as finding shared folders in
Windows or NFS exported directories in UNIX systems with read or read and write access to
everyone. The intruder will have no problems getting to the files and, more often than not, the
accessible information is highly confidential and completely unprotected from prying eyes,
especially if the attacker is an internal user.
System access is the ability for an unauthorized intruder to gain access to a device for which the
intruder does not have an account or password. Entering or accessing systems to which one does
not have access usually involves running a hack, script, or tool that exploits a known
vulnerability of the system or application being attacked.
Another form of access attacks involves privilege escalation. Privilege escalation occurs when
users obtain privileges or rights to objects that were not assigned by administrators. Objects can
be files, commands, or other components on a network device.
The intent is to gain access to information or execute procedures for which they are not
authorized at their current levels of access.
In many cases this involves gaining administrative privileges to systems or devices to install
sniffers, create backdoor accounts, or delete log files.
In some cases intruders want to gain access without necessarily wanting to steal information—
especially when the motive is intellectual challenge, curiosity, or ignorance.
Application security holes have been around since the first piece of software was written.
These holes are usually a result of unanticipated behavior of software code or
unexpected inputs. An example of this is a program that breaks out into a root shell when
receiving an out-of-band input.
Finally Trojan horses are used to gain unauthorized access by tricking a legitimate user
to run Trojan programs that install or open back doors for attackers to secretly break in.
Then the attackers, circumventing in many cases any authentication procedures, enter
through the back door.
Common Denial of Service (DoS) (or resource overload) attacks include: ping floods (smurf), TCP
SYN floods (neptune), and packet storms (UDP bomb and fraggle). Unsolicited Commercial E-mail
(UCE), often referred to as SPAM, attempts to overload mail servers.
Source: Feleke M. HaileMariam (Dr. ̶ Eng.) Page 5
Unity University
2. Difference between true and false, and positive and negative alarms.
False Alarms
The ability for an intrusion detection product to accurately detect an attack or a policy violation
and generate an alarm is critical to its functionality. The two forms of false alarms are false
positives and false negatives.
A false positive is a situation in which normal traffic or a benign action causes the signature to
fire. Consider the following scenario: a signature exists that generates alarms if any network
devices’ enable password is entered incorrectly. A network administrator attempts to log in to a
Cisco router but mistakenly enters the wrong password. The IDS cannot distinguish between a
rogue user and the network administrator, and generates an alarm.
A false negative is a situation in which a signature is not fired when offending traffic is detected.
Offending traffic can be as simple as someone sending confidential documents outside of the
corporate network to an attack against corporate web servers. False negatives should be
considered software bugs and reported in accordance to the software license agreement.
True Alarms
Like false alarms, there are two forms of true alarms. A true positive is a situation in which a
signature is fired properly when offending traffic is detected and an alarm is generated. For
example, Cisco IDS Sensors have signatures that detect Unicode attacks against Microsoft IIS
web servers. If a Unicode attack is launched against Microsoft IIS web servers, the Sensors
detect the attack and generate an alarm.
A true negative is a situation in which a signature is not fired when non-offending traffic is
captured and analyzed. In other words, the Sensor does not fire an alarm when it captures and
analyzes ‘normal’ network traffic.
Intrusion detection analysis is performed on the protocol specified in the data stream.
Examines the protocol to determine the validity of the packet
Checks the content of the payload (pattern matching)
Responsive
Reactive IDSs can respond to an attack.
– Terminate session (TCP resets)
– Block offending traffic (ACL)
– Create session log files (IP logging)
– Restrict access to protected resources
Intrusion detection technology is traditionally considered a passive monitoring tool. Earlier IDS
simply monitored the network for suspicious activity or parsed system log files. Today’s
intrusion detection system (IDS) offers much more reactive responses and preventive measures
when an intrusion or malicious activity is detected. The common reactive responses are as
follows:
Terminate the session—The IDS sends TCP packets with the reset bit set to both the
source address of the attack and destination address of the target.
Blocking offending traffic—The IDS communicates with the network device and applies
an access control list entry specifying that the source address of the attack be denied.
Create session log files—The IDS creates a session log file capturing the data transmitted
from the source address of the attack.
Restrict access to protected resources —The IDS prevents the attacker from accessing
system resources outside the allowed realm or domain specified.
NIDS Features
Sensors are connected to network segments. A single Sensor can monitor many hosts.
Growth of a network is easily protected. New hosts and devices can be added to the
network without additional Sensors.
The Sensors are network appliances tuned for intrusion detection analysis.
– The operating system is “hardened.”
– The hardware is dedicated to intrusion detection analysis.
NIDS Sensors are typically tuned for intrusion detection analysis. The underlying operating
system is “stripped” of unnecessary network services and essential services are secured.
The hardware chosen provides the maximum intrusion detection analysis possible for various
networks. The hardware includes the following:
Network interface card (NIC)—NIDS must be able to connect into any network. Common NIDS
NICs include Ethernet, Fast Ethernet, GigEthernet, Token Ring, and FDDI.
Memory—Intrusion detection analysis is memory intensive. Memory directly impacts the ability
of a NIDS to efficiently and accurately detect an attack.
The figure below illustrates a typical NIDS deployment. Sensors are deployed at network entry
points that protect critical network segments. The network segments have both internal and
Source: Feleke M. HaileMariam (Dr. ̶ Eng.) Page 11
Unity University
external corporate resources. The Sensors report to a central management and monitoring
server located inside the corporate firewall.
The hacker community is aware of the various IDS technologies used and has identified ways to
evade intrusion detection. Attempting to elude intrusion detection is accomplished using
intrusion detection evasive techniques. The following are common intrusion detection evasive
techniques:
Flooding
Fragmentation
Encryption
Obfuscation
a) Flooding
Intrusion detection systems rely on their ability to capture packets off the wire and analyze them
as quickly as possible. This requires the IDS has adequate memory capacity and processor speed.
By flooding the network with noise traffic and causing the IDS to capture unnecessary packets,
the attacker can launch an attack that can go undetected. If the attack is detected, the IDS
resources may be exhausted causing a delayed response and thus is unable to respond in a timely
manner. In the figure, the attacker is sending large amounts of traffic as signified by the larger
pipe. Meanwhile, the actual attack is being sent to the target host, as represented by the thin pipe
that reaches the target host.
b) Fragmentation
Networks are connected via various media types such as Ethernet, FDDI, Token Ring, and ATM.
Each of these technologies specifies the allowed maximum transmission unit (MTU). The MTU
value is different for each technology. Consequently, fragmentation of these transmission units
(packets, cells) is allowed to accommodate for differing MTU sizes.
Fragmentation adds a level of complexity that IDS must address. The IDS now must keep track
of the fragmented packets and perform reassembly. Reassembly is highly processor-intensive
and requires sufficient memory.
In the figure, the attacker is splitting malicious packets into smaller packets that are transmitted
to the target host in an attempt to elude intrusion detection and have the target host reassemble
the packets.
c) Encryption
NIDSs monitor the network and capture the packets as they traverse the network. NIDS relies on
the data being transmitted in clear-text. When packets are encrypted, the NIDS captures the
data but is unable to decrypt the data and cannot perform meaningful intrusion detection
analysis.
This type of evasive technique assumes the attacker has already established a secure session with
the target network or host. Some examples of secure sessions that can be used are as follows:
Secure Socket Layer (SSL) connection to a secure web site
Secure Shell (SSH) connection to a SSH server
Site-to-Site VPN tunnel
Client-to-LAN VPN tunnel
Summary
Review questions
Q: What type of IDS should I choose?
A: The type of IDS you choose to employ on your network will depend on what type of network
you have and what types of applications you are running.
Host-based IDSs can effectively monitor one specific computer, but not the entire network.
Network-based IDSs can monitor the entire network from a high-level view, but may miss
some type of attacks. Application-based IDSs are specific to one application, such as a
database application, and will monitor attacks only on that application.
Q:You have installed an Active IDS system onto your network. When an attack occurs and is
detected by your new IDS, what might you expect it to do? (Choose all that apply)
a) Inform the attacker that his or her actions may be monitored as part of the network AUP.
b) Disable a service or services.
c) Terminate the connection after a predefined amount of time.
d) Shut down a server or servers.
Q: You have an IDS system running only on one computer in your network. What type of IDS
system is this?
a) Active
b) Host
c) Network
d) Anomaly
Q: After analyzing a suspected attack, you incorrectly determine that an attack has occurred,
when in fact one has not occurred.What is this called?
a) False positive
b) False negative
c) Honeypot
d) Signature based IDS
Q: Which of the following are a benefit of removing unused or unneeded services and protocols?
a) More machine resource availability
b) More network throughput
c) Less need for administration
d) More security
Q: Which is the most important reason for the removal of unused, unnecessary, or unneeded
protocols, services, and applications?
a) Increased security
b) Increased performance
c) Less need for administration
d) Less machine resource use
Q: The act of attempting to appear to be someone you’re not in order to gain access to a system is
known as which of the following?
a) Spoofing
b) DDoS
c) Replay
Source: Feleke M. HaileMariam (Dr. ̶ Eng.) Page 16
Unity University
d) Sniffing
Q: Which of the following is the best way to protect your organization from revealing sensitive
information through dumpster diving?
a) Establish a policy requiring employees to change passwords every 30 to 60 days.
b) Teach employees the value of not disclosing restricted information over the telephone to
unknown parties.
c) Add a new firewall to the network.
d) Shred all sensitive documentation.
Note: DoS attacks can be launched by creating a SYN flood. A SYN flood sends thousands of SYN
(synchronization) packets to a victim computer, which then sends the SYN/ACK (acknowledgement)
back, and patiently waits for a response that never comes. While the server waits on thousands of
replies, the resources are consumed in such a way as to render the machine useless.
Note: Buffer overflows are a type of software exploit that are often used by attackers to run code on
victim machines. Examples would be xterms or root shells.
Q: Sending multiple packets with which of the following TCP flags set can launch a common DoS
attack?
a) ACK
Note: SYN flags are set on synchronization packets that are sent in overwhelming numbers to a
server, to consume its resources and render it useless to legitimate clients that attempt to connect to
it. This type of attack is known as a SYN flood.
Note: IP spoofing is defined as pretending to be a host that you are not, in order to exploit a trust
mechanism on a network and gain access to a system.
Q: Which of the following can be classified as denial of service attacks? (Select all that apply.)
a) Unplugging the main router for a network
b) Using zombies to send a SYN flood to a host
c) Using a buffer overflow to crash a Web server
d) Capturing packets from an unprotected network link
Q: Packet sniffing will help with which of the following? (Select all that apply.)
a) Capturing e-mail to gain classified information
b) Launching a DDoS attack with zombie machines
c) Grabbing passwords sent in the clear
d) Developing a firewall deployment strategy
Note: Packet sniffing allows attackers to see all traffic on a network. With this ability, attackers can
easily view e-mail and passwords sent in the clear.
Note: Brute force attacks try every possible character combination in order to find the correct
password.
Q: Which of the following is the most common reason that an attacker would place a back door in a
system?
a) To spread viruses
b) To provide an interactive login without authentication or logging
c) To remove critical system files
d) To run a peer-to-peer file-sharing server
Q: You are implementing a firewall for a small company that wishes to establish an Internet
presence. The company wants to use its dedicated Internet connection to allow employees to access
the Internet as well as host a Web server. What is the best type of firewall to use in this situation?
a) A packet filtering firewall
b) A stateful inspection firewall
c) An application layer gateway
d) No firewall is necessary
Note: A packet-filtering firewall will fill the needs of the company, cost the least, and perform the
fastest without adding unnecessary processing overhead that would slow down traffic.
Q: A company has contracted you to audit their security practices in day-to-day IT operations. You
are working with the team responsible for configuring the company’s routers and notice that the
technician is using a normal Telnet session to log in to all of the routers he is working with. What
recommendation would you make in your report?
a) Telnet is an unsafe method of communicating with the company’s routers and the
technician should use the router’s Web interface instead.
b) Telnet is an unsafe method of communicating with the company’s routers and the
technician should use the router’s SSH interface instead.
c) Telnet is an unsafe method of communicating with the company’s routers and the
technician should use the router’s console port instead.
d) Telnet is a safe method of communicating with the company’s routers and you have no
recommendation.
Q: To allow its employees remote access to the corporate network, a company has implemented a
hardware VPN solution. Why is this considered a secure remote access solution?
a) Because only the company’s employees will know the address to connect to in order to use
the VPN.
Q: Some new servers are being installed on your company’s network and you have been asked to
work with the installer to ensure that they are as secure as possible from hack attempts. What is the
most important step you should take to ensure that the servers’ OSs are secure?
a) Make sure that the installer is certified.
b) Make sure that the latest OS service pack is installed.
c) Make sure that the latest OS service pack and all security patches are installed.
d) Make sure that the servers have locks on the hot-swap drive chassis.
Q: You have been asked to implement a secure network infrastructure for a farm of servers. Your
company has asked you to use the most secure cable available for this. Why would you choose fiber?
a) Fiber has shielding so that it cannot be cut through.
b) Fiber is impervious to EMI and is therefore more secure.
c) Fiber uses light rather than electricity for communications, making it less likely to be
hacked into remotely.
d) Fiber is unable to be easily tapped into.
Q: What should you do to data stored on a hard drive in order to make it as secure as possible if the
drive is removed from your site?
a) Encrypt it
b) Compress it
c) Archive it
d) Make sure that a password is required to log into all computers at your site
Q: Your company has had a problem in the past with virus infections occurring on the corporate
network. These problems have been traced to users bringing in infected stick-memory and infecting
their office computers. What is the best solution to this problem?
a) Send an e-mail to all of the users telling them not to use infected disks.