Chapter 2: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Chapter 2: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Chapter 2: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Identify and describe the categories and operating models of intrusion detection and
prevention systems
Define and describe honeypots, honeynets, and padded cell systems
List and define the major categories of scanning and analysis tools, and describe the specific
tools used within each of these categories
Explain the various methods of access control, including the use of biometric access
mechanisms
INTRODUCTION
The protection of an organization’s information assets relies at least as much on people as on
technical controls, but technical solutions, guided by policy and properly implemented, are an essential
component of an information security program.
This chapter builds on that discussion by describing additional and more advanced technologies—
intrusion detection and prevention systems, honeypots, honeynets, padded cell systems, scanning
and analysis tools, and access controls—that organizations can use to enhance the security of their
information assets.
In order to understand IDPS operational behavior, you must first become familiar with some IDPS
terminology.
Alert or alarm: An indication that a system has just been attacked or is under attack. IDPS alerts
and alarms take the form of audible signals, e-mail messages, pager notifications, or pop-up
windows.
Evasion: The process by which attackers change the format and/or timing of their activities to
avoid being detected by the IDPS.
False attack stimulus: An event that triggers an alarm when no actual attack is in progress.
Scenarios that test the configuration of IDPSs may use false attack stimuli to determine if the IDPSs
can distinguish between these stimuli and real attacks.
Types of IDPS
Typical flow data particularly relevant to intrusion detection and prevention includes:
- Most NBA sensors can be deployed in passive mode only, using the same connection
methods
The types of events most commonly detected by NBA sensors include the following:
NBA sensors offer various intrusion prevention capabilities, including the following
(grouped by sensor type):
- Passive only
- Ending the current TCP session. A passive NBA sensor can attempt to end an
existing TCP session by sending TCP reset packets to both endpoints.
- Inline only
Performing inline firewalling. Most inline NBA sensors offer firewall
capabilities that can be used to drop or reject suspicious network
activity.
- Both passive and inline
Reconfiguring other network security devices. Many NBA sensors can
instruct network security devices such as firewalls and routers to
reconfigure themselves to block certain types of activity or route it
elsewhere, such as a quarantine virtual local area network (VLAN).
Running a third-party program or script. Some NBA sensors can run an
administrator-specified script or program when certain malicious activity
is detected
Host-Based IDPS (HIDPS)
- resides on a particular computer or server, known as the host, and monitors activity only on
that system.
- also known as system integrity verifiers because they benchmark and monitor the status of
key system files and detect when an intruder creates, modifies, or deletes monitored files.
- An HIDPS has an advantage over an NIDPS in that it can access encrypted information
traveling over the network and use it to make decisions about potential or actual attacks.
- An HIDPS is also capable of monitoring system configuration databases, such as Windows
registries, in addition to stored configuration files like .ini, .cfg, and .dat files.
- Most HIDPSs work on the principle of
configuration or change
management, which means that they
record the sizes, locations, and other
attributes of system files.
IDPSs use a variety of detection methods to monitor and evaluate network traffic. Three methods dominate: the
signature-based approach, the statistical-anomaly approach, and the stateful packet inspection approach.
Signature-Based IDPS
- The statistical anomaly-based IDPS (stat IDPS) or behavior-based IDPS collects statistical summaries
by observing traffic that is known to be normal.
- This normal period of evaluation establishes a performance baseline. Once the baseline is established,
the stat IDPS periodically samples network activity and, using statistical methods, compares the
sampled network activity to this baseline.
- The advantage of the statistical anomaly-based approach is that the IDPS can detect new types of
attacks, since it looks for abnormal activity of any type.
- a process of comparing predetermined profiles of generally accepted definitions of benign activity for
each protocol state against observed events to identify deviations
- relies on vendor-developed universal profiles that specify how particular protocols should and should not
be used
- can also examine authentication sessions for suspicious activity as well as for attacks that incorporate
“unexpected sequences of commands, such as issuing the same command repeatedly or issuing a
command without first issuing a command upon which it is dependent, as well as ‘reasonableness’ for
commands such as minimum and maximum lengths for arguments.”
Limitations of Intrusion Detection and Prevention Systems Intrusion detection systems cannot perform
the following functions:
1. Compensating for weak or missing security mechanisms in the protection infrastructure, such as
firewalls, identification and authentication systems, link encryption systems, access control
mechanisms, and virus detection and eradication software
2. Instantaneously detecting, reporting, and responding to an attack when there is a heavy network or
processing load
3. Detecting newly published attacks or variants of existing attacks
4. Effectively responding to attacks launched by sophisticated attackers
5. Automatically investigating attacks without human intervention
6. Resisting all attacks that are intended to defeat or circumvent them
7. Compensating for problems with the fidelity of information sources
8. Dealing effectively with switched networks
Honeypots are decoy systems designed to lure potential attackers away from critical systems. In
the industry, they are also known as decoys, lures, and fly-traps.
When a collection of honeypots connects several honeypot systems on a subnet, it may be called a
honeynet.
In sum, honeypots are designed to do the following:
o Divert an attacker from critical systems
o Collect information about the attacker’s activity
o Encourage the attacker to stay on the system long enough for administrators to document
the event and, perhaps, respond
Honeypots are instrumented with sensitive monitors and event loggers that detect attempts to
access the system and collect information about the potential attacker’s activities.
A screenshot from a simple IDPS that specializes in honeypot techniques, called Deception
Toolkit
A padded cell is a honeypot that has been protected so that that it cannot be easily compromised—
in other words, a hardened honeypot.
The advantages and disadvantages of using the honeypot or padded cell approach are summarized below:
Advantages:
Disadvantages:
The legal implications of using such devices are not well understood.
Honeypots and padded cells have not yet been shown to be generally useful security technologies.
An expert attacker, once diverted into a decoy system, may become angry and launch a more
aggressive attack against an organization’s systems.
Administrators and security managers need a high level of expertise to use these systems
TRAP-AND-TRACE
Trap-and-trace applications, which are an extension of the attractant technologies discussed in the
previous section, are growing in popularity.
The trap usually consists of a honeypot or padded cell and an alarm.
The trace feature is an extension to the honeypot or padded cell approach.
Enticement is the act of attracting attention to a system by placing tantalizing information in key
locations.
Entrapment is the act of luring an individual into committing a crime to get a conviction.
Enticement is legal and ethical, whereas entrapment is not.
Wasp Trap Syndrome – In this syndrome, a concerned homeowner installs a wasp trap in his back
yard to trap the few insects he sees flying about.
Scanning
Scanning tools are, as mentioned earlier, typically used as part of an attack protocol to collect
information that an attacker would need to launch a successful attack.
The attack protocol is a series of steps or processes used by an attacker, in a logical sequence, to
launch an attack against a target system or network.
Footprinting is the organized research of the Internet addresses owned or controlled by a target
organization.
To assist in the footprint intelligence collection process, you can use an enhanced WEB SCANNER
that, among other things, can scan entire Web sites for valuable pieces of information, such as
server names and e-mail addresses
One such scanner is called Sam Spade, the details of which can be found in the program’s help
file.
Sam Spade can also do a host of other scans and probes, such as sending multiple ICMP
information requests (pings), attempting to retrieve multiple and cross-zoned DNS queries, and
performing network analysis queries (known, from the commonly used UNIX command for
performing the analysis, as traceroutes)
For Linux or BSD systems, there is a tool called “wget” that allows a remote individual to “mirror”
entire Web sites. With this tool, attackers can copy an entire Web site and then go through the
source HTML, JavaScript, and Web-based forms at their leisure, collecting and collating all of the
data from the source code that will be useful to them for their attack.
PORT SCANNERS
Port scanning utilities, or port scanners, are tools used by both attackers and defenders to identify
(or fingerprint) the computers that are active on a network, as well as the ports and services active
on those computers, the functions and roles the machines are fulfilling, and other useful
information.
A port is a network channel or connection point in a data communications system
Idle scanning (which is run with the -I switch) will allow the Nmap user to bounce your scan across
a firewall by using one of the idle DMZ hosts as the initiator of the scan.
Among all possible biometrics, only three human characteristics are usually considered truly unique. They
are as follows:
Fingerprints
Retina of the eye (blood vessel pattern)
Minutiae are unique points of reference that are digitized and stored in an encrypted format when the
user’s system access credentials are created.
Signature and voice recognition technologies are also considered to be biometric access controls
measures.
EFFECTIVENESS OF BIOMETRICS
1. The false reject rate, which is the percentage of supplicants who are in fact authorized users but
are denied access. This failure is known as a Type I error.
2. The false accept rate, which is the percentage of supplicants who are unauthorized users but are
granted access. This failure is known as a Type II error, and is unacceptable to security
professionals.
3. The crossover error rate (CER), which is the level at which the number of false rejections equals
the false acceptances. This is possibly the most common and important overall measure of the
accuracy of a biometric system. CERs are used to compare various biometrics and may vary by
manufacturer.
ACTIVITIES
Activity 1
1. What common security system is an IDPS most like? In what ways are these systems similar?
2. How does a false positive alarm differ from a false negative one? From a security perspective,
which is least desirable?
Activity 2. Research
1. Use the Internet to find vendors of thumbprint and iris scanning tools. Which of these tools is
more economical? Which of these is least intrusive?