Intrusion Detection Flashcards

1
Q

What are the classes of intruders?

A

Cyber criminals: Are either individuals or members of an organized crime group with a goal of financial reward. To achieve this, their activities may include identity theft, theft of financial credentials, corporate espionage, data theft, or data ransoming.

Activists: Are either individuals working as insiders, or members of a larger group of outsider attackers, who are motivated by social or political causes.

State-sponsored organizations: Are groups of hackers sponsored by governments to conduct espionage or sabotage activities. They are also known as Advanced Persistent Threats (APTs), due to the covert nature and persistence over extended periods involved with many attacks in this class.

Others: Are hackers with motivations other than those listed above, including classic hackers or crackers who are motivated by technical challenge or by peer-group esteem and reputation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the range of skill levels of intruders?

A

Apprentice: Hackers with minimal technical skill who primarily use existing attack toolkits.

Journeyman: Hackers with sufficient technical skills to modify and extend attack toolkits to use newly discovered, or purchased, vulnerabilities; or to focus on different target groups.

Master: Hackers with high-level technical skills capable of discovering brand new categories of vulnerabilities, or writing new powerful attack toolkits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List 3 types of intrusions:

A

NIST SP 800-61 (Computer Security Incident Handling Guide, August 2012) lists the following examples of intrusion:

Performing a remote root compromise of an e-mail server

Defacing a Web server

Guessing and cracking passwords

Copying a database containing credit card numbers

Viewing sensitive data, including payroll records and medical information, without authorization

Running a packet sniffer on a workstation to capture usernames and passwords

Using a permission error on an anonymous FTP server to distribute pirated software and music files

Dialing into an unsecured modem and gaining internal network access

Posing as an executive, calling the help desk, resetting the executive’s e-mail password, and learning the new password

Using an unattended, logged-in workstation without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List the components commonly seen in intrusions:

A

Target Acquisition and Information Gathering: Where the attacker identifies and characterizes the target systems using publicly available information, both technical and non technical, and the use of network exploration tools to map target resources.

Initial Access: The initial access to a target system, typically by exploiting a remote network vulnerability as we will discuss in Chapters 10 and 11, by guessing weak authentication credentials used in a remote service as we discussed in Chapter 3, or via the installation of malware on the system using some form of social engineering or drive-by-download attack as we discussed in Chapter 6.

Privilege Escalation: Actions taken on the system, typically via a local access vulnerability as we will discuss in Chapters 10 and 11, to increase the privileges available to the attacker to enable their desired goals on the target system.

Information Gathering or System Exploit: Actions by the attacker to access or modify information or resources on the system, or to navigate to another target system.

Maintaining Access: Actions such as the installation of backdoors or other malicious software as we discussed in Chapter 6, or through the addition of covert authentication credentials or other configuration changes to the system, to enable continued access by the attacker after the initial attack.

Covering Tracks: Where the attacker disables or edits audit logs such as we will discuss in Chapter 18, to remove evidence of attack activity, and uses rootkits and other measures to hide covertly installed files or code as we discussed in Chapter 6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What the logial components of intrusion detection?

A

Sensors: Sensors are responsible for collecting data. The input for a sensor may be any part of a system that could contain evidence of an intrusion.
ex) network packets, log files, system call traces

Analyzers: Analyzers receive input from one or more sensors or from other analyzers. The analyzer is responsible for determining if an intrusion has occurred.

User interface: The user interface to an IDS enables a user to view output from the system or control the behavior of the system. In some systems, the user interface may equate to a manager, director, or console component.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name the IDS classifications

A

Host-based IDS (HIDS): Monitors the characteristics of a single host and the events occurring within that host, such as process identifiers and the system calls they make, for evidence of suspicious activity.

Network-based IDS (NIDS): Monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity.

Distributed or hybrid IDS: Combines information from a number of sensors, often both host and network-based, in a central analyzer that is able to better identify and respond to intrusion activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List 3 Requirements for an IDS:

A

Run continually with minimal human supervision.

Be fault tolerant in the sense that it must be able to recover from system crashes and reinitializations.

Resist subversion. The IDS must be able to monitor itself and detect if it has been modified by an attacker.

Impose a minimal overhead on the system where it is running.

Be able to be configured according to the security policies of the system that is being monitored.

Be able to adapt to changes in system and user behavior over time.

Be able to scale to monitor a large number of hosts.

Provide graceful degradation of service in the sense that if some components of the IDS stop working for any reason, the rest of them should be affected as little as possible.

Allow dynamic reconfiguration; that is, the ability to reconfigure the IDS without having to restart it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List two approaches to how IDS detects intrusions:

A

Anomaly detection: Involves the collection of data relating to the behavior of legitimate users over a period of time.

Signature or Heuristic detection: Uses a set of known malicious data patterns (signatures) or attack rules (heuristics) that are compared with current behavior to decide if it is that of an intruder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the three approaches to anomaly detection:

A

Statistical: Analysis of the observed behavior using univariate, multivariate, or time-series models of observed metrics.

Knowledge based: Approaches use an expert system that classifies observed behavior according to a set of rules that model legitimate behavior.

Machine-learning: Approaches automatically determine a suitable classification model from the training data using data mining techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name some ML approaches to anomaly detection:

A

Bayesian networks: Encode probabilistic relationships among observed metrics.

Markov models: Develop a model with sets of states, some possibly hidden, interconnected by transition probabilities.

Neural networks: Simulate human brain operation with neurons and synapse between them, that classify observed data.

Fuzzy logic: Uses fuzzy set theory where reasoning is approximate, and can accommodate uncertainty.

Genetic algorithms: Uses techniques inspired by evolutionary biology, including inheritance, mutation, selection and recombination, to develop classification rules.

Clustering and outlier detection: Group the observed data into clusters based on some similarity or distance measure, and then identify subsequent data as either belonging to a cluster or as an outlier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between signature and rule-based approaches for intrusion detection?

A

Signature approaches match a large collection of known patterns of malicious data against data stored on a system or in transit over a network.

Rule-based heuristic identification involves the use of rules for identifying known penetrations or penetrations that would exploit known weaknesses. Rules can also be defined that identify suspicious behavior, even when the behavior is within the bounds of established patterns of usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name some data sources for HIDS:

A

System call traces
Audit logs
File integrity checksums
Registry accesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the typical features of a distributed intrusion detection

A

Host agent module: An audit collection module operating as a background process on a monitored system. Its purpose is to collect data on security-related events on the host and transmit these to the central manager.

LAN monitor agent module: Operates in the same fashion as a host agent module except that it analyzes LAN traffic and reports the results to the central manager.

Central manager module: Receives reports from LAN monitor and host agents and processes and correlates these reports to detect intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Network-Based Instrusion Detection?

A

A network-based IDS (NIDS) monitors traffic at selected points on a network or interconnected set of networks. The NIDS examines the traffic packet by packet in real time, or close to real time, to attempt to detect intrusion patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some types of network sensors?

A

A. An inline sensor is inserted into a network segment so the traffic that it is monitoring must pass through the sensor.

B. More commonly, passive sensors are used. A passive sensor monitors a copy of network traffic; the actual traffic does not pass through the device. From the point of view of traffic flow, the passive sensor is more efficient than the inline sensor, because it does not add an extra handling step that contributes to packet delay.

C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What types of attacks are suitable for anomaly detections?

A

Denial-of-service (DoS) attacks: Such attacks involve either significantly increased packet traffic or significantly increase connection attempts, in an attempt to overwhelm the target system.

Scanning: A scanning attack occurs when an attacker probes a target network or system by sending different kinds of packets. Using the responses received from the target, the attacker can learn many of the system’s characteristics and vulnerabilities.

Worms: Worms4 spreading among hosts can be detected in more than one way. Some worms propagate quickly and use large amounts of bandwidth.

17
Q

What types of attacks are suitable for signature detection?

A

Application layer reconnaissance and attacks: Most NIDS technologies analyze several dozen application protocols. Commonly analyzed ones include Dynamic Host Configuration Protocol (DHCP), DNS, Finger, FTP, HTTP, Internet Message Access Protocol (IMAP), Internet Relay Chat (IRC), Network File System (NFS), Post Office Protocol (POP), rlogin/rsh, Remote Procedure Call (RPC), Session Initiation Protocol (SIP), Server Message Block (SMB), SMTP, SNMP, Telnet, and Trivial File Transfer Protocol (TFTP), as well as database protocols, instant messaging applications, and peer-to-peer file sharing software.

Transport layer reconnaissance and attacks: NIDSs analyze TCP and UDP traffic and perhaps other transport layer protocols.

Network layer reconnaissance and attacks: NIDSs typically analyze IPv4, IPv6, ICMP, and IGMP at this level. Examples of attacks are spoofed IP addresses and illegal IP header values.

Unexpected application services: The NIDS attempts to determine if the activity on a transport connection is consistent with the expected application protocol. An example is a host running an unauthorized application service.

Policy violations: Examples include use of inappropriate websites and use of forbidden application protocols.

18
Q

What are the elements of the intrusion detection message exchange?

A

Data source: The raw data that an IDS uses to detect unauthorized or undesired activity. Common data sources include network packets, operating system audit logs, application audit logs, and system-generated checksum data.

Sensor: Collects data from the data source. The sensor forwards events to the analyzer.

Analyzer: The ID component or process that analyzes the data collected by the sensor for signs of unauthorized or undesired activity or for events that might be of interest to the security administrator. In many existing IDSs, the sensor and the analyzer are part of the same component.

Administrator: The human with overall responsibility for setting the security policy of the organization, and, thus, for decisions about deploying and configuring the IDS.

Manager: The ID component or process from which the operator manages the various components of the ID system. Management functions typically include sensor configuration, analyzer configuration, event notification management, data consolidation, and reporting.

Operator: The human that is the primary user of the IDS manager. The operator often monitors the output of the IDS and initiates or recommends further action.

19
Q

What are honeypots? What are their classifications?

A

Honeypots are decoy systems that are designed to lure a potential attacker away from critical systems. Honeypots are designed to:

Divert an attacker from accessing critical systems.

Collect information about the attacker’s activity.

Encourage the attacker to stay on the system long enough for administrators to respond.

Classifications:
Honeypots are typically classified as being either low or high interaction.

Low interaction honeypot: Consists of a software package that emulates particular IT services or systems well enough to provide a realistic initial interaction, but does not execute a full version of those services or systems.

High interaction honeypot: Is a real system, with a full operating system, services and applications, which are instrumented and deployed where they can be accessed by attackers

20
Q

List the possible locations of a honeypot:

A

A. outside the external firewall (location 1) is useful for tracking attempts to connect to unused IP addresses within the scope of the network.

B. The network of externally available services, such as Web and mail, often called the DMZ (demilitarized zone), is another candidate for locating a honeypot (location 2)

C. A fully internal honeypot (location 3) has several advantages. Its most important advantage is that it can catch internal attacks.

D.