1 of 95

20CS17 – INFORMATION SECURITY

LAKIREDDY BALI REDDY COLLEGE OF ENGINEERING

(AUTONOMOUS)

Accredited by NAAC & NBA (Under Tier - I) ISO 9001:2015 Certified Institution

Approved by AICTE, New Delhi. and Affiliated to JNTUK, Kakinada

L.B. REDDY NAGAR, MYLAVARAM, KRISHNA DIST., A.P.-521 230.

DEPARTMENT OF INFORMATION TECHNOLOGY

INTRUDERS

Program & Semester: B.Tech & VI SEM

Section: IT-A

Academic Year: 2024 - 25

By

Mr. M. Vijay Kumar

Sr Assistant Professor

Dept.of IT, LBRCE

2 of 95

Intruders

  • significant issue for networked systems is hostile or unwanted access
  • either via network or local
  • can identify classes of intruders:
    • Masquerader
    • Misfeasor
    • clandestine user
  • varying levels of competence

3 of 95

Intruders

4 of 95

.

5 of 95

Intrusion Techniques

  • aim to gain access and/or increase privileges on a system
  • basic attack methodology
    • target acquisition and information gathering
    • initial access
    • privilege escalation
    • covering tracks
  • key goal often is to acquire passwords
  • so then exercise access rights of owner

6 of 95

Password Guessing

  • one of the most common attacks
  • attacker knows a login (from email/web page etc)
  • then attempts to guess password for it
    • defaults, short passwords, common word searches
    • user info (variations on names, birthday, phone, common words/interests)
    • exhaustively searching all possible passwords
  • check by login or against stolen password file
  • success depends on password chosen by user
  • surveys show many users choose poorly

7 of 95

Password Capture

  • another attack involves password capture
    • watching over shoulder as password is entered
    • using a trojan horse program to collect
    • monitoring an insecure network login
      • eg. telnet, FTP, web, email
    • extracting recorded info after successful login (web history/cache, last number dialed etc)
  • using valid login/password can impersonate user
  • users need to be educated to use suitable precautions/countermeasures

8 of 95

Intrusion Detection

  • inevitably will have security failures
  • so need also to detect intrusions so can
    • block if detected quickly
    • act as deterrent
    • collect info to improve security
  • assume intruder will behave differently to a legitimate user
    • but will have imperfect distinction between

9 of 95

Approaches to Intrusion Detection

  • statistical anomaly detection
    • threshold
    • profile based
  • rule-based detection
    • anomaly
    • penetration identification

10 of 95

Audit Records

  • fundamental tool for intrusion detection
  • native audit records
    • part of all common multi-user O/S
    • already present for use
    • may not have info wanted in desired form
  • detection-specific audit records
    • created specifically to collect wanted info
    • at cost of additional overhead on system

11 of 95

Statistical Anomaly Detection

  • threshold detection
    • count occurrences of specific event over time
    • if exceed reasonable value assume intrusion
    • alone is a crude & ineffective detector
  • profile based
    • characterize past behavior of users
    • detect significant deviations from this
    • profile usually multi-parameter

12 of 95

Audit Record Analysis

  • foundation of statistical approaches
  • analyze records to get metrics over time
    • counter, gauge, interval timer, resource use
  • use various tests on these to determine if current behavior is acceptable
    • mean & standard deviation, multivariate, markov process, time series, operational
  • key advantage is no prior knowledge used

13 of 95

Rule-Based Intrusion Detection

  • observe events on system & apply rules to decide if activity is suspicious or not
  • rule-based anomaly detection
    • analyze historical audit records to identify usage patterns & auto-generate rules for them
    • then observe current behavior & match against rules to see if conforms
    • like statistical anomaly detection does not require prior knowledge of security flaws

14 of 95

Rule-Based Intrusion Detection

  • rule-based penetration identification
    • uses expert systems technology
    • with rules identifying known penetration, weakness patterns, or suspicious behavior
    • compare audit records or states against rules
    • rules usually machine & O/S specific
    • rules are generated by experts who interview & codify knowledge of security admins
    • quality depends on how well this is done

15 of 95

Base-Rate Fallacy

  • practically an intrusion detection system needs to detect a substantial percentage of intrusions with few false alarms
    • if too few intrusions detected -> false security
    • if too many false alarms -> ignore / waste time
  • this is very hard to do
  • existing systems seem not to have a good record

16 of 95

Distributed Intrusion Detection

  • traditional focus is on single systems
  • but typically, have networked systems
  • more effective defense has these working together to detect intrusions
  • issues
    • dealing with varying audit record formats
    • integrity & confidentiality of networked data
    • centralized or decentralized architecture

17 of 95

Distributed Intrusion Detection - Architecture

18 of 95

Distributed Intrusion Detection – Agent Implementation

19 of 95

.

20 of 95

Honeypots

  • decoy systems to lure attackers
    • away from accessing critical systems
    • to collect information of their activities
    • to encourage attacker to stay on system so administrator can respond
  • are filled with fabricated information
  • instrumented to collect detailed information on attackers activities
  • single or multiple networked systems

21 of 95

Password Management

  • front-line defense against intruders
  • users supply both:
    • login – determines privileges of that user
    • password – to identify them
  • passwords often stored encrypted
    • Unix uses multiple DES (variant with salt)
    • more recent systems use crypto hash function
  • should protect password file on system

22 of 95

Password Studies

  • Purdue 1992 - many short passwords
  • Klein 1990 - many guessable passwords
  • conclusion is that users choose poor passwords too often
  • need some approach to counter this

23 of 95

Managing Passwords - Education

  • can use policies and good user education
  • educate on importance of good passwords
  • give guidelines for good passwords
    • minimum length (>6)
    • require a mix of upper & lower case letters, numbers, punctuation
    • not dictionary words
  • but likely to be ignored by many users

24 of 95

Managing Passwords - Computer Generated

  • let computer create passwords
  • if random likely not memorisable, so will be written down (sticky label syndrome)
  • even pronounceable not remembered
  • have history of poor user acceptance
  • FIPS PUB 181 one of best generators
    • has both description & sample code
    • generates words from concatenating random pronounceable syllables

25 of 95

Managing Passwords - Reactive Checking

  • reactively run password guessing tools
    • note that good dictionaries exist for almost any language/interest group
  • cracked passwords are disabled
  • but is resource intensive
  • bad passwords are vulnerable till found

26 of 95

Managing Passwords - Proactive Checking

  • most promising approach to improving password security
  • allow users to select own password
  • but have system verify it is acceptable
    • simple rule enforcement (see earlier slide)
    • compare against dictionary of bad passwords
    • use algorithmic (markov model or bloom filter) to detect poor choices

27 of 95

Summary

  • have considered:
    • problem of intrusion
    • intrusion detection (statistical & rule-based)
    • password management

28 of 95

Viruses and Other Malicious Content

  • computer viruses have got a lot of publicity
  • one of a family of malicious software
  • effects usually obvious
  • have figured in news reports, fiction, movies (often exaggerated)
  • getting more attention than deserve
  • are a concern though

29 of 95

Malicious Software

30 of 95

Backdoor or Trapdoor

  • secret entry point into a program
  • allows those who know access bypassing usual security procedures
  • have been commonly used by developers
  • a threat when left in production programs allowing exploited by attackers
  • very hard to block in O/S
  • requires good s/w development & update

31 of 95

Logic Bomb

  • one of oldest types of malicious software
  • code embedded in legitimate program
  • activated when specified conditions met
    • eg presence/absence of some file
    • particular date/time
    • particular user
  • when triggered typically damage system
    • modify/delete files/disks, halt machine, etc

32 of 95

Trojan Horse

  • program with hidden side-effects
  • which is usually superficially attractive
    • eg game, s/w upgrade etc
  • when run performs some additional tasks
    • allows attacker to indirectly gain access they do not have directly
  • often used to propagate a virus/worm or install a backdoor
  • or simply to destroy data

33 of 95

Zombie

  • program which secretly takes over another networked computer
  • then uses it to indirectly launch attacks
  • often used to launch distributed denial of service (DDoS) attacks
  • exploits known flaws in network systems

34 of 95

Viruses

  • a piece of self-replicating code attached to some other code
    • cf biological virus
  • both propagates itself & carries a payload
    • carries code to make copies of itself
    • as well as code to perform some covert task

35 of 95

Virus Operation

  • virus phases:
    • dormant – waiting on trigger event
    • propagation – replicating to programs/disks
    • triggering – by event to execute payload
    • execution – of payload
  • details usually machine/OS specific
    • exploiting features/weaknesses

36 of 95

Virus Structure

program V :=

{goto main;

1234567;

subroutine infect-executable := {loop:

file := get-random-executable-file;

if (first-line-of-file = 1234567) then goto loop

else prepend V to file; }

subroutine do-damage := {whatever damage is to be done}

subroutine trigger-pulled := {return true if condition holds}

main: main-program := {infect-executable;

if trigger-pulled then do-damage;

goto next;}

next:

}

37 of 95

Types of Viruses

  • can classify on basis of how they attack
  • parasitic virus
  • memory-resident virus
  • boot sector virus
  • stealth
  • polymorphic virus
  • metamorphic virus

38 of 95

Macro Virus

  • macro code attached to some data file
  • interpreted by program using file
    • eg Word/Excel macros
    • esp. using auto command & command macros
  • code is now platform independent
  • is a major source of new viral infections
  • blur distinction between data and program files
  • classic trade-off: "ease of use" vs "security”
  • have improving security in Word etc
  • are no longer dominant virus threat

39 of 95

Email Virus

  • spread using email with attachment containing a macro virus
    • cf Melissa
  • triggered when user opens attachment
  • or worse even when mail viewed by using scripting features in mail agent
  • hence propagate very quickly
  • usually targeted at Microsoft Outlook mail agent & Word/Excel documents
  • need better O/S & application security

40 of 95

Worms

  • replicating but not infecting program
  • typically spreads over a network
    • cf Morris Internet Worm in 1988
    • led to creation of CERTs
  • using users distributed privileges or by exploiting system vulnerabilities
  • widely used by hackers to create zombie PC's, subsequently used for further attacks, esp DoS
  • major issue is lack of security of permanently connected systems, esp PC's

41 of 95

Worm Operation

  • worm phases like those of viruses:
    • dormant
    • propagation
      • search for other systems to infect
      • establish connection to target remote system
      • replicate self onto remote system
    • triggering
    • execution

42 of 95

Morris Worm

  • best known classic worm
  • released by Robert Morris in 1988
  • targeted Unix systems
  • using several propagation techniques
    • simple password cracking of local pw file
    • exploit bug in finger daemon
    • exploit debug trapdoor in sendmail daemon
  • if any attack succeeds then replicated self

43 of 95

Recent Worm Attacks

  • new spate of attacks from mid-2001
  • Code Red - used MS IIS bug
    • probes random IPs for systems running IIS
    • had trigger time for denial-of-service attack
    • 2nd wave infected 360000 servers in 14 hours
  • Code Red 2 - installed backdoor
  • Nimda - multiple infection mechanisms
  • SQL Slammer - attacked MS SQL server
  • Sobig.f - attacked open proxy servers
  • Mydoom - mass email worm + backdoor

44 of 95

Worm Techology

  • multiplatform
  • multiexploit
  • ultrafast spreading
  • polymorphic
  • metamorphic
  • transport vehicles
  • zero-day exploit

45 of 95

Virus Countermeasures

  • best countermeasure is prevention
  • but in general not possible
  • hence need to do one or more of:
    • detection - of viruses in infected system
    • identification - of specific infecting virus
    • removeal - restoring system to clean state

46 of 95

Anti-Virus Software

  • first-generation
    • scanner uses virus signature to identify virus
    • or change in length of programs
  • second-generation
    • uses heuristic rules to spot viral infection
    • or uses crypto hash of program to spot changes
  • third-generation
    • memory-resident programs identify virus by actions
  • fourth-generation
    • packages with a variety of antivirus techniques
    • eg scanning & activity traps, access-controls
  • arms race continues

47 of 95

Advanced Anti-Virus Techniques

  • generic decryption
    • use CPU simulator to check program signature & behavior before actually running it
  • digital immune system (IBM)
    • general purpose emulation & virus detection
    • any virus entering org is captured, analyzed, detection/shielding created for it, removed

48 of 95

Digital Immune System

49 of 95

Behavior-Blocking Software

  • integrated with host O/S
  • monitors program behavior in real-time
    • eg file access, disk format, executable mods, system settings changes, network access
  • for possibly malicious actions
    • if detected can block, terminate, or seek ok
  • has advantage over scanners
  • but malicious code runs before detection

50 of 95

Distributed Denial of Service Attacks (DDoS)

  • Distributed Denial of Service (DDoS) attacks form a significant security threat
  • making networked systems unavailable
  • by flooding with useless traffic
  • using large numbers of “zombies”
  • growing sophistication of attacks
  • defense technologies struggling to cope

51 of 95

Distributed Denial of Service Attacks (DDoS)

52 of 95

Contructing the DDoS Attack Network

  • must infect large number of zombies
  • needs:
  • software to implement the DDoS attack
  • an unpatched vulnerability on many systems
  • scanning strategy to find vulnerable systems
    • random, hit-list, topological, local subnet

53 of 95

DDoS Countermeasures

  • three broad lines of defense:
    1. attack prevention & preemption (before)
    2. attack detection & filtering (during)
    3. attack source traceback & ident (after)
  • huge range of attack possibilities
  • hence evolving countermeasures

54 of 95

Summary

  • have considered:
    • various malicious programs
    • trapdoor, logic bomb, trojan horse, zombie
    • viruses
    • worms
    • countermeasures
    • distributed denial of service attacks

55 of 95

Firewalls

The function of a strong position is to make the forces holding it practically unassailable

On War, Carl Von Clausewitz

56 of 95

Introduction

  • seen evolution of information systems
  • now everyone want to be on the Internet
  • and to interconnect networks
  • has persistent security concerns
    • can’t easily secure every system in org
  • typically use a Firewall
  • to provide perimeter defence
  • as part of comprehensive security strategy

57 of 95

What is a Firewall?

  • a choke point of control and monitoring
  • interconnects networks with differing trust
  • imposes restrictions on network services
    • only authorized traffic is allowed
  • auditing and controlling access
    • can implement alarms for abnormal behavior
  • provide NAT & usage monitoring
  • implement VPNs using IPSec
  • must be immune to penetration

58 of 95

Firewall Limitations

  • cannot protect from attacks bypassing it
    • eg sneaker net, utility modems, trusted organisations, trusted services (eg SSL/SSH)
  • cannot protect against internal threats
    • eg disgruntled or colluding employees
  • cannot protect against transfer of all virus infected programs or files
    • because of huge range of O/S & file types

59 of 95

Firewalls – Packet Filters

  • simplest, fastest firewall component
  • foundation of any firewall system
  • examine each IP packet (no context) and permit or deny according to rules
  • hence restrict access to services (ports)
  • possible default policies
    • that not expressly permitted is prohibited
    • that not expressly prohibited is permitted

60 of 95

Firewalls – Packet Filters

61 of 95

Firewalls – Packet Filters

62 of 95

Attacks on Packet Filters

  • IP address spoofing
    • fake source address to be trusted
    • add filters on router to block
  • source routing attacks
    • attacker sets a route other than default
    • block source routed packets
  • tiny fragment attacks
    • split header info over several tiny packets
    • either discard or reassemble before check

63 of 95

Firewalls – Stateful Packet Filters

  • traditional packet filters do not examine higher layer context
    • ie matching return packets with outgoing flow
  • stateful packet filters address this need
  • they examine each IP packet in context
    • keep track of client-server sessions
    • check each packet validly belongs to one
  • hence are better able to detect bogus packets out of context

64 of 95

Firewalls - Application Level Gateway (or Proxy)

  • have application specific gateway / proxy
  • has full access to protocol
    • user requests service from proxy
    • proxy validates request as legal
    • then actions request and returns result to user
    • can log / audit traffic at application level
  • need separate proxies for each service
    • some services naturally support proxying
    • others are more problematic

65 of 95

Firewalls - Application Level Gateway (or Proxy)

66 of 95

Firewalls - Circuit Level Gateway

  • relays two TCP connections
  • imposes security by limiting which such connections are allowed
  • once created usually relays traffic without examining contents
  • typically used when trust internal users by allowing general outbound connections
  • SOCKS is commonly used

67 of 95

Firewalls - Circuit Level Gateway

68 of 95

Bastion Host

  • highly secure host system
  • runs circuit / application level gateways
  • or provides externally accessible services
  • potentially exposed to "hostile" elements
  • hence is secured to withstand this
    • hardened O/S, essential services, extra auth
    • proxies small, secure, independent, non-privileged
  • may support 2 or more net connections
  • may be trusted to enforce policy of trusted separation between these net connections

69 of 95

Firewall Configurations

70 of 95

Firewall Configurations

71 of 95

Firewall Configurations

72 of 95

Access Control

  • given system has identified a user
  • determine what resources they can access
  • general model is that of access matrix with
    • subject - active entity (user, process)
    • object - passive entity (file or resource)
    • access right – way object can be accessed
  • can decompose by
    • columns as access control lists
    • rows as capability tickets

73 of 95

Access Control Matrix

74 of 95

Trusted Computer Systems

  • information security is increasingly important
  • have varying degrees of sensitivity of information
    • cf military info classifications: confidential, secret etc
  • subjects (people or programs) have varying rights of access to objects (information)
  • known as multilevel security
    • subjects have maximum & current security level
    • objects have a fixed security level classification
  • want to consider ways of increasing confidence in systems to enforce these rights

75 of 95

Bell LaPadula (BLP) Model

  • one of the most famous security models
  • implemented as mandatory policies on system
  • has two key policies:
  • no read up (simple security property)
    • a subject can only read/write an object if the current security level of the subject dominates (>=) the classification of the object
  • no write down (*-property)
    • a subject can only append/write to an object if the current security level of the subject is dominated by (<=) the classification of the object

76 of 95

Reference Monitor

77 of 95

Evaluated Computer Systems

  • governments can evaluate IT systems
  • against a range of standards:
    • TCSEC, IPSEC and now Common Criteria
  • define a number of “levels” of evaluation with increasingly stringent checking
  • have published lists of evaluated products
    • though aimed at government/defense use
    • can be useful in industry also

78 of 95

Common Criteria

  • international initiative specifying security requirements & defining evaluation criteria
  • incorporates earlier standards
    • eg CSEC, ITSEC, CTCPEC (Canadian), Federal (US)
  • specifies standards for
    • evaluation criteria
    • methodology for application of criteria
    • administrative procedures for evaluation, certification and accreditation schemes

79 of 95

Common Criteria

  • defines set of security requirements
  • have a Target Of Evaluation (TOE)
  • requirements fall in two categories
    • functional
    • assurance
  • both organised in classes of families & components

80 of 95

Common Criteria Requirements

  • Functional Requirements
    • security audit, crypto support, communications, user data protection, identification & authentication, security management, privacy, protection of trusted security functions, resource utilization, TOE access, trusted path
  • Assurance Requirements
    • configuration management, delivery & operation, development, guidance documents, life cycle support, tests, vulnerability assessment, assurance maintenance

81 of 95

Common Criteria

82 of 95

Common Criteria

83 of 95

Summary

  • have considered:
    • firewalls
    • types of firewalls
    • configurations
    • access control
    • trusted systems
    • common criteria

84 of 95

Introduction to Database Security Issues

  • Types of Security
    • Legal and ethical issues
    • Policy issues
    • System-related issues
    • The need to identify multiple security levels 

84

85 of 95

Three Basic Concepts

  • Authentication: a mechanism that determines whether a user is who he or she claims to be
  • Authorization: the granting of a right or privilege, which enables a subject to legitimately have access to a system or a systems objects
  • Access Control: a security mechanism (of a DBMS) for restricting access to a system’s objects (the database) as a whole

85

85

86 of 95

Introduction to Database Security Issue(2)

  • Threats
    • Any situation or event, whether intentional or unintentional, that will adversely affect a system and consequently an organization
    • Threats to:
      • Computer systems
      • Databases

86

87 of 95

Threats to Computer Systems

87

88 of 95

Scope of Data Security Needs

88

  • Must protect databases & the servers on which they reside
  • Must administer & protect the rights of internal database users
  • Must guarantee the confidentiality of ecommerce customers as they access the database
  • With the Internet continually growing, the threat to data traveling over the network increases exponentially

89 of 95

Introduction to Database Security Issues (3)

  • Threats to databases
    • Loss of integrity
    • Loss of availability
    • Loss of confidentiality

  • To protect databases against these types of threats four kinds of countermeasures can be implemented:
    • Access control
    • Inference control
    • Flow control
    • Encryption

89

90 of 95

Introduction to Database Security Issues (4)

  • A DBMS typically includes a database security and authorization subsystem that is responsible for ensuring the security portions of a database against unauthorized access.

  • Two types of database security mechanisms:
    • Discretionary security mechanisms
    • Mandatory security mechanisms

90

91 of 95

Introduction to Database Security Issues 5)

  • The security mechanism of a DBMS must include provisions for restricting access to the database as a whole
    • This function is called access control and is handled by creating user accounts and passwords to control login process by the DBMS.

91

92 of 95

Introduction to Database Security Issues (6)

  • The security problem associated with databases is that of controlling the access to a statistical database, which is used to provide statistical information or summaries of values based on various criteria.

    • The countermeasures to statistical database security problem is called inference control measures.

92

93 of 95

Introduction to Database Security Issues (7)

  • Another security is that of flow control, which prevents information from flowing in such a way that it reaches unauthorized users.

  • Channels that are pathways for information to flow implicitly in ways that violate the security policy of an organization are called covert channels.

93

94 of 95

Introduction to Database Security Issues (8)

  • A final security issue is data encryption, which is used to protect sensitive data (such as credit card numbers) that is being transmitted via some type communication network.
  • The data is encoded using some encoding algorithm.
    • An unauthorized user who access encoded data will have difficulty deciphering it, but authorized users are given decoding or decrypting algorithms (or keys) to decipher data.

94

95 of 95

��Database Authorization

Authorization

  • Authorization is a privilege provided by the Database Administer. Users of the database can only view the contents they are authorized to view. The rest of the database is out of bounds to them.
  • The different permissions for authorizations available are:
  • Primary Permission -  This is granted to users publicly and directly.
  • Secondary Permission -  This is granted to groups and automatically awarded to a user if he is a member of the group.
  • Public Permission -  This is publicly granted to all the users.
  • Context sensitive permission -  This is related to sensitive content and only granted to a select users.
  • The categories of authorization that can be given to users are:
  • System Administrator -  This is the highest administrative authorization for a user. Users with this authorization can also execute some database administrator commands such as restore or upgrade a database.
  • System Control -  This is the highest control authorization for a user. This allows maintenance operations on the database but not direct access to data.
  • System Maintenance -  This is the lower level of system control authority. It also allows users to maintain the database but within a database manager instance.
  • System Monitor -  Using this authority, the user can monitor the database and take snapshots of it.