[Network security 3] Basic Intrusion Detection Technology

Source: Internet
Author: User
Tags knowledge base

1. The existence and development inevitability of IDS (Intrusion Detection System) (1) complexity of network security itself, and passive defense methods are not powerful. (2) related firewalls: devices with network boundaries can be attacked by themselves, and some attacks are poorly protected. Not all threats come from outside the firewall. (3) Easy intrusion: Intrusion tutorials can be seen everywhere; various tools are at your fingertips; 2. Intrusion Detection ● definition: by using a computer NetworkOr computer SystemTo collect and perform AnalysisIt is a security technology that detects violations of security policies and signs of attacks on networks or systems. ● Origin: (1) 1980, James P. anderson's "computer security threat monitoring and surveillance" first elaborated on the concept of intrusion detection, and proposed the classification of computer system threats; the idea of using audit tracking data to monitor intrusion activities is put forward. This report is widely recognized as the launch of intrusion detection. (2) from 1984 to 1986, Dorothy Denning of Georgia University and Peter norann of sri/CSL developed Real-timeIntrusion Detection System Model-- IDES (Intrusion Detection Expert System) (3) in 1990, L. T. heberlein of the University of California, Davis, and others developed the NSM (Network Security Monitor)-the system's first DirectSet Network FlowAs a source of audit data, the development history of monitoring heterogeneous hosts-intrusion detection systems without converting audit data into a uniform format has opened a new page. The two camps are formally formed: Network-basedIDS and Host-BasedIDS (4) after January 1, 1988 DistributedThe Research of the intrusion detection system (dids) integrates host-based and network-based detection methods. Dids is a milestone in the history of Distributed Intrusion Detection Systems. (5) from the 1990s s to the present, the development of Intrusion Detection Systems has been booming and IntelligentAnd DistributedSignificant progress has been made in both directions. 3. Basic Structure of IDS ● event generator: responsible for collecting raw data and collecting the collected raw data ConversionIs EventTo provide this event to other parts of the system. The collected information includes system or network log files, network traffic, abnormal changes in System directories and files, and abnormal behavior during program execution. Note: Intrusion Detection relies heavily on information collection. ReliabilityAnd Correctness. ● Event Analyzer: Receive Event information, Analyze it, JudgmentIs it IntrusionBehavior or ExceptionPhenomenon, and finally convert the judgment result Alarm information. There are three analysis methods (Key Points)(1) pattern matching: match the collected information KnownNetwork Intrusion and system misuse DatabaseTo find behaviors that violate the Security Policy (2) Statistical Analysis: first System Object(Such as users, files, directories, and devices) to create a statistical description, Measure the measurement attributes of normal use.(Such as the number of visits, the number of failed operations, and the delay); measure the attribute Average ValueAnd DeviationWill be used to compare with network and system behavior, any When the observed value is out of the normal range, it is deemed that an intrusion has occurred.. (3) Integrity Analysis (often used Post-event analysis): Main Check whether a file or object has been changed. ● Event Database: stores various intermediate and final data. ● Response Unit: responds to alerts. (Strong response: disconnection, changing file attributes, etc.; simple alarm) 4. key Parameter of intrusion detection performance (1) false positive: the actual harmless event is detected as an attack event by IDs. (2) False negative: an attack event is not detected by IDS or is considered harmless by analysts. 5. Classification of intrusion detection (1) classification by analysis method/detection principle ● Anomaly Detection: Based on Statistical AnalysisPrinciple. First, summarize the features that normal operations should have ( User Profile), Trying to describe it in a quantitative way, It is considered as an intrusion when user activities deviate significantly from normal behaviors.. Premise: intrusion is a subset of abnormal activities. Indicator: low false negative rate and high false positive rate. Profile: a collection of behavior parameters and their thresholds, used to describe the range of normal behavior. Features: the efficiency of the exception detection system depends on the completeness of the user profile and the frequency of monitoring. It does not need to be defined for each type of intrusion behavior, so it can effectively detect unknown intrusion; the system can adjust and optimize user behavior changes. However, with the accuracy of the detection model, exception detection consumes more system resources. ● Misuse Detection: Based on Pattern MatchingPrinciple. Collection Abnormal operationBehavior characteristics, establish relevant Feature LibraryWhen the monitored user or system behavior is consistent with the records in the database MatchThe system considers this behavior as an intrusion. Premise: all intrusion behaviors have the characteristics that can be detected. Indicator: low false positives and high false negatives. Attack feature database: When the monitored user or system behavior matches the records in the database, the system considers this behavior as an intrusion. Feature: pattern matching is used. misuse can significantly reduce the false positive rate, but the false negative rate increases. Minor changes in attack features make misuse detection powerless.(2) Data Source classification ● host-based (HIDS ): BasisIs where the system runs Host, Protected TargetIt is also where the system runs Host. Centralized view; easy to customize; more well-protected; not sensitive to network traffic; ● network-based (NIDS): the data obtained by the system is Packets transmitted over the networkWhich protects Normal network operation. Fast detection speed; good concealment; wider field of view; fewer monitors; less resources ● hybrid (3) According to the architecture: centralized; distributed (4) according to the working method: offline detection; online Detection 6. basic terms ● alert: When an intrusion is occurring or attempted, IDs will send an alert message to the system administrator ● signatures (features): Attack features are the core of IDs, it triggers IDs when an event occurs. If the feature information is too short, IDS is often triggered, leading to false positives or false positives. If the feature information is too long, the operation speed of IDS is affected. ● Promiscuous: if the network interface is in the hybrid mode, you can "see" all network traffic in the network segment, regardless of its source or destination. This is a necessary Intrusion Detection Technology for network IDS (exception detection technology; misuse/misuse detection technology; intrusion deception technology; Intrusion Response technology) 7. exception Detection Technology ● probability statistics anomaly detection principle: each profile stores records the current behavior of the subject and TimingCombine the current contour with the historical contour to form Statistical Contour(Updated), compares the current profile with the Statistical Profile to determine abnormal behavior. Advantage: Mature probability statistics theory can be applied. Disadvantages: ① due Complexity of user behaviorIt is very difficult to accurately match the historical behavior of a user, which may cause system false positives and false negatives. ② Definition Intrusion thresholdIt is difficult. If the threshold is high, the false positive rate increases. If the threshold is low, the false negative rate increases. ● Neural network exception detection principle: prediction of the next event Error RateTo some extent, it reflects the abnormal degree of user behavior. Advantages: ① better expresses the nonlinear relationship between variables and can better process the original data Random featuresThat is, no statistical assumptions need to be made for the data, and automatic learning and updating can be performed. ② good anti-interference ability disadvantages: difficult to determine the network topology structure and the weight of each element 8. misuse/Misuse Detection Technology (Principles and advantages and disadvantages of abuse detection methods in expert systems, status conversion analysis) ● principle of Misuse Detection in Expert Systems: the knowledge of security experts is expressed as the rules of the if-then structure (if part: the conditions required by the intrusion; then part: the corresponding measures taken after the intrusion is discovered ). Expert Knowledge BaseAnd then use the inference algorithm to detect intrusions. Note: The main problem to be solved is to process the sequence data and knowledge base. Maintenance(Only known vulnerabilities can be detected) ● state switch analysis abuse detection principle: the intrusion process is considered as Behavior sequence, This behavior sequence causes the system Initial statusTransfer in Intrusion status. During analysis, the initial and intruded status of the system must be determined for each intrusion method, and the conversion conditions that lead to state conversion (Operations/feature events that must be performed when the system enters the intrusion State). Then, the state conversion chart is used to represent each State and feature event. Disadvantages: Not good at analyzing overly complex events, nor detecting and System statusIndependent intrusion 9. definition, characteristics, and design objectives of intrusion deception technology; honeypot technology ● definition: Use unique features Attract attackersAt the same time, attackers can analyze various attack behaviors and find effective countermeasures. ● Features: attackers attempt Key systemsTemptation. Yes Active Defense Technology. ● Design objective: Various threatsTo find the new Attack tools, determining attack modes, and studying the attacker's attack motives. ● Honeypot Technology (honeypot ): Listened, AttackedOr already Intruded. Note: Honeypot Not a Security SolutionIt is only a tool, and its role can be played only when the honeypot is under attack. 10. Intrusion Response Technology (forms and means of active response and passive response) ● active response: after detecting intrusion, the intrusion detection system can BlockAttack, affecting and changing the attack process. Form: user-driven; basic means of automatic execution of the system itself: ① counterattack against intruders (harsh mode; mild mode; between severe and moderate) ② correct system environment ③ collect additional information ● passive response: the intrusion detection system simply ReportAnd RecordProblems detected. Form: only provide information to the user and rely on the user to respond to the next action. Basic Methods: ① alarm and notification ② SNMP (Simple Network Management Protocol), used in combination with network management tools. 11. Intrusion Detection System Structure (Host Intrusion Detection, network intrusion detection, and distributed intrusion detection features, advantages and disadvantages) ● Host Intrusion Detection (HIDS) features: Host or server systemTo detect and respond to intrusions. Main advantages: high cost performance; more delicate; low false positive rate; suitable for encryption and exchange environments; not sensitive to network traffic; Determine whether the attack is successful. Limitations: ① It depends on the inherent log and monitoring capabilities of the host, and the host audit information has weaknesses: it is vulnerable to attacks and intruders can try to escape the audit; ② The operation of IDS affects the host performance more or less. ③ HIDS can only detect the actions and logs executed by specific users and applications of the host. The types of attacks that can be detected are restricted.; ④ It is costly to fully deploy HIDS. ● Network intrusion detection (NIDS)

Project HIDS NIDS
False alarm Less Quantity
Underreporting Related to technical level Related to data processing capabilities (inevitable)
System deployment and maintenance Independent from network topology Related to network topology
Detection rules Small Large
Detection features Event and Signal Analysis Feature code analysis
Security Policy Basic Security Policy (Point Policy) Operation Security Policy (Line Policy)
Security restrictions All events that arrive at the host Non-encrypted and non-confidential information during transmission
Security risks Violation Attack methods or techniques
Features: The use of work in a hybrid mode NicCome Real-time MonitoringCommunication Services on the entire network segment. Main advantages: Good concealment; real-time detection and response; difficult for attackers to transfer evidence; no impact on the business system; ability to detect unsuccessful attack attempts. limitations: ① only detects communication that is directly connected to the network segment, and cannot detect network packets in different network segments; ② the detection range is limited in the switched Ethernet environment; ③ it is difficult to implement complex attack detection that requires a large amount of computing and analysis time; ④ it is difficult to process encrypted sessions ● Distributed Intrusion Detection (dids) generally, it is composed of multiple components that work collaboratively. These components are distributed in various parts of the network to complete relevant functions, RespectivelyProceed Data collection, Data Analysis. Pass Central control componentCollects, analyzes, and responds to intrusions. -- This document is summarized by heki.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.