An Approach To Automate a Process of Detecting Unauthorised Accesses

16
An Approach To Automate a Process An Approach To Automate a Process of of Detecting Unauthorised Accesses Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński T. Ostwald, M. Stroiński http://www.man.poznan.pl http://www.man.poznan.pl [email protected] [email protected] Poznań Supercomputing and Networking Center Poznań Supercomputing and Networking Center POZNAŃ SUPERCOMPUTING AND NETWORKING CENTER

description

POZNAŃ SUPERCOMPUTING AND NETWORKING CENTER. An Approach To Automate a Process of Detecting Unauthorised Accesses. M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński http://www.man.poznan.pl [email protected]. Poznań Supercomputing and Networking Center. - PowerPoint PPT Presentation

Transcript of An Approach To Automate a Process of Detecting Unauthorised Accesses

Page 1: An Approach To Automate a Process of  Detecting Unauthorised Accesses

An Approach To Automate a Process of An Approach To Automate a Process of Detecting Unauthorised AccessesDetecting Unauthorised Accesses

M. Chmielewski, A. Gowdiak, N. Meyer, M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. StroińskiT. Ostwald, M. Stroiński

http://www.man.poznan.plhttp://www.man.poznan.pl [email protected]@man.poznan.pl

Poznań Supercomputing and Networking CenterPoznań Supercomputing and Networking Center

POZNAŃ SUPERCOMPUTING AND NETWORKING CENTER

Page 2: An Approach To Automate a Process of  Detecting Unauthorised Accesses

The need for a new security tool in open network environments

• The value of information processed and stored in computer networks is growing rapidly

• Classical approaches of the information security seem to be useless, especially in open network environments

• System security is often reached along with a loss of its functionality

• The threats to the information security have its sources in software errors

• There is insufficient support from software and hardware vendors in the security area

POZNAŃ SUPERCOMPUTING AND NETWORKING CENTER

Page 3: An Approach To Automate a Process of  Detecting Unauthorised Accesses

Intrusion Detection Systems (IDS) - definition

The main purpose of such a system is to detect in real time, all kinds of inappropriate user activity such as attempts to breach system integrity or gain unauthorized access to information.

Because the intrusion detection process is a complex task, its automation seems to be necessary.

POZNAŃ SUPERCOMPUTING AND NETWORKING CENTER

Page 4: An Approach To Automate a Process of  Detecting Unauthorised Accesses

Most of currently employed IDS systems:

Intrusion Detection Systems - state of the art

• Detect only known attack scenarios• Try to detect basic anomalies in user and system activity• Use unreliable information source (network)• Offline use of reliable information source (audit log)• Are passive monitors and detectors but no active

protectorsAs for now there are no hybrid Intrusion Detection Systems on the market

ready to be put into practice and providing complex security

POZNAŃ SUPERCOMPUTING AND NETWORKING CENTER

Page 5: An Approach To Automate a Process of  Detecting Unauthorised Accesses

Extension to the intrusion detection model:

Security Maintaining System as a new approach to open network environment security

• New IDS system functionality• Hybrid approach to detection process (anomaly and misuse)• Reliable information source (operating system kernel)

• On-line monitoring of system and user activities• Active protection of the system

• Global implementation of the security policy in a distributed environment

POZNAŃ SUPERCOMPUTING AND NETWORKING CENTER

Page 6: An Approach To Automate a Process of  Detecting Unauthorised Accesses

SERVICES

RESOURCES COMPUTATIONS

VISUALISATION

IDS Server:Data analysisUnauthorised accessand attack detection

IDS Client:Systems monitoringResources protection

IDS Client:Systems monitoringResources protection

IDS Client:Users and systemsmonitoring

IDS Client:Users and systems monitoringAccess policy control

Metropolitan Area Network

INTERNET

POZNAŃ SUPERCOMPUTING AND NETWORKING CENTER

Application of the IDS system in an open network environment

Page 7: An Approach To Automate a Process of  Detecting Unauthorised Accesses

POZNAŃ SUPERCOMPUTING AND NETWORKING CENTER

A useful and effective tool for security maintenance in network environments, where other standard security methods (e.g. network isolation, access restrictions) cannot be used.

An approach to automate a process of detecting unauthorised accesses in open network environments.

VALIS

Page 8: An Approach To Automate a Process of  Detecting Unauthorised Accesses

The VALIS system is designed as a modular architecture:

VALIS design

• Flexible to suite the demanded level of security• Scalable • Provides additional functionality

The VALIS system is designed to operate in a distributed environment:

• Easily adaptable to the operating environment• Partially distributed analysis• Capability to monitor and protect all systems

POZNAŃ SUPERCOMPUTING AND NETWORKING CENTER

Page 9: An Approach To Automate a Process of  Detecting Unauthorised Accesses

POZNAŃ SUPERCOMPUTING AND NETWORKING CENTER

Information Collecting Module runs on each of the protected systems and collects information about their states and user activity

Communication Module exchanges data between protected systems and security management stations

Analysis and Decision Module a basic analysis takes place on each protected system and its extended version on the security management station

VALIS - Main Modules

Page 10: An Approach To Automate a Process of  Detecting Unauthorised Accesses

POZNAŃ SUPERCOMPUTING AND NETWORKING CENTER

Archive Module is responsible for storing all important information about the system and user activities in a safe way, which makes it possible to track all changes in the system according to their needs

Response Module performs specific actions in a protected system as a response of the decisions made by the analysis module

VALIS - Main Modules cont.

Page 11: An Approach To Automate a Process of  Detecting Unauthorised Accesses

VALIS system architecture

POZNAŃ SUPERCOMPUTING AND NETWORKING CENTER

Page 12: An Approach To Automate a Process of  Detecting Unauthorised Accesses

Analysis and decision modules

ESM (Expert System Module) is the main analysis module of the VALIS system. Its purpose is to analyze the information provided by other modules running on client and server systems.

Rules make a core part of the decision mechanism and can express:

• Management and coordination between all modules• Global system security policy• Detection process support

• System attacks detection• Processing of the information obtained from other analysis

modules

Such an architecture allows the use of parallel, different analysis modules

POZNAŃ SUPERCOMPUTING AND NETWORKING CENTER

Page 13: An Approach To Automate a Process of  Detecting Unauthorised Accesses

Information Collecting modules

• ReliabilityFull view of protected systems state and its users’ activities

• SecurityShould not imply any danger to the system and should resist any user manipulation attempt

• EfficiencyShould not have big influence on systems performance and do not disturb legal users’ activities

• FlexibilityShould provide information about system in the proper format ready for further processing

Information about system state and users activities are retrieved directly from the operating system kernel

POZNAŃ SUPERCOMPUTING AND NETWORKING CENTER

Page 14: An Approach To Automate a Process of  Detecting Unauthorised Accesses

Inter-Modules Communication Layer

The main task of IMCL is to provide efficient interface between all modules of the VALIS system. The communication protocol has to fulfil the following assumptions:

• Flexibility (it can be easily adopted to any network environment)

• Trustworthy (it should be reliable and provide high level of security)

• Independence (it should be independent of network and operating system)

POZNAŃ SUPERCOMPUTING AND NETWORKING CENTER

Page 15: An Approach To Automate a Process of  Detecting Unauthorised Accesses

CELL #1

IDS Client

IDS Client

IDS Server

CELL #2

IDS ServerIDS Server

IDS Client

IDS ClientIDS Client IDS Client

IDS ClientIDS Client

IDS Client

IDS Client

VALIS - sample architecture

POZNAŃ SUPERCOMPUTING AND NETWORKING CENTER

Page 16: An Approach To Automate a Process of  Detecting Unauthorised Accesses

Summary

There is a need for security maintaining systems that are not only detecting intrusion attempts but also actively protect against them.

The main features of the VALIS system architecture:• Modular architecture• High level of flexibility• Hybrid approach to detection process (anomaly and

misuse)• New functionality along with quality

POZNAŃ SUPERCOMPUTING AND NETWORKING CENTER