a lone wolf no more: supporting network intrusion detection with real-time intelligence shane singh...

19
A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

Upload: dinah-fisher

Post on 14-Jan-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

A Lone Wolf No More:

Supporting Network Intrusion Detection with Real-Time

IntelligenceShane Singh | COMPSCI 726

Page 2: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

Introduction

• Looking to expand the ability of current basic Intrusion Detection Systems (IDS) to be able to process real-time complex attack intelligence into their current operation.

Page 3: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

Intrusion Detection System (IDS)

• “Device or software application that monitors network or system traffic for malicious activities or policy violations”

Page 4: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

The Identified Issue

• Current IDS’ are unable to integrate external information into their processing

• Current approach is to convert to rule language

• “…it severely limits the attainable benefits…”

• Ensuring that by using real-time intelligence the IDS can handle realistic workloads

Page 5: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

The Proposed Solution

• Development of an Input Framework with integration to a current open-source IDS.

• Using federated sources to provide valid, consistent attack intelligence

• Real-world scenario deployment and monitoring to test suitability

Page 6: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

The Intelligence State

• “Externally provided context that, when correlated with traffic on the wire, can significantly increase the systems detection capabilities.”

Page 7: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

Framework Design

Page 8: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

Implementation and Integration

• Using the open-source Bro IDS

• Bro fits well with capabilities of Input Framework

• Bro turns streams of packets into “policy neutral” network events

Page 9: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

Framework with Bro

Page 10: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

Using Federated Blacklists

• The authors use the SES feed from REN-ISAC and the JC3 feed from DOE.

• Confidence in accuracy and quality of intelligence important

• Choice of private sources over public sources

• Integration with Input Framework

Page 11: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

Real World Testing

• Tested on a trace of traffic from UC Berkeley network

• Utilised psuedo-realtime mode running on trace file

• Analysed performance on:

• Realistic Workloads

• Sustainable Load

• Latency

• Created Benchmark Reader

Page 12: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

Summary

• Input Framework created and deployed on existing open-source IDS - Bro

• Adding another state to IDS – intelligence

• Real-world testing to determine suitability in network

Page 13: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

Criticisms

• Firewall Impact

• Testing overall detection effectiveness

• Choice of IDS – Bro

• Access to blacklists used

• Network traffic tested quite limited

Page 14: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

Firewall Impact

• The authors make no reference to how a firewall will impact traffic monitoring in their tests

• Testing was only done on trace from one particular network

• Firewalls affect the type of traffic allowed/disallowed

Page 15: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

Overall effectiveness

• In the paper, there isn’t a comparison done between a network using Real-Time Intelligence with an IDS and one without any intelligence

Page 16: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

Using Bro

• The choice of Bro isn’t very clearly explained

• No comparison between other IDS’s and to why/why not Bro was selected

Page 17: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

Access to Federated Blacklists

• SES feed updated once per day

• JC3 feed downloaded manually from a secure server when updates released

• Difficult to access

• Vetting period not accounted for with “real-time”

Page 18: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

Limitations of tested traffic

• Only captured of actual network traffic flow

• 5 minute capture – likelihood of attack in this period

• “…Such a volume is much more than a single Bro instance can handle”

Page 19: A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence Shane Singh | COMPSCI 726

Questions?