SlideShare uma empresa Scribd logo
1 de 29
Baixar para ler offline
www.rti.com


                  System Monitoring and
              Network Intrusion Detection
                     using DDS and CEP
                Gerardo Pardo-Castellote, Ph.D. (RTI)
                             Joe Schlesselman (RTI)




                      OMG RTESS Workshop
              Washington DC, July 14-16, 2008
                                                        1
Background

    This presentation describes the results and
    architecture of a DoD-funded research effort to
    develop a common normalized information picture
    combining data from System Monitoring Tools
    and Intrusion Detection Systems.


    The purpose of this work is to increase the speed
    and effectiveness of the technologies used to
    detect & counter network attacks.

2
Project Partners


     RTI (Prime)   DDS

     Coral8   CEP

     SL       Visualization

     Promia   IDS Hardware

     ObjectSecurity Security Manager

3
Outline

      The problem of [Distributed] System Monitoring
      – System Monitoring
      – Intrusion Detection


      Available Technologies
      – Ganglia, Nagios
      – Snort, Nessus, Saint

      Practical solution using DDS and CEP


4
System Monitoring & Network Intrusion
     Middleware Technologies, such as DDS help build large
     distributed systems 100s or 1000s or computers with an
     order of magnitude more processes
      – Functionally the system may be correct
      – … but it may still fail operationally…

     These large systems require monitoring. We focus on
     two aspects:
      –   Network Intrusion Detection
      –   System Monitoring
      –   Information Sharing/Normalization
      –   Information Processing

     The integration of these technologies illustrates the
     essence of the open integration problem we are trying to
     address.
5
100’s of Available Tools
                                                    See: http://sectools.org/
    Tool Categories:
        Network Intrusion Detection Systems
         –   Snort
         –   OSSEC NDIS
        Vulnerability Scanners
         –   Nessus, Nmap
         –   Saint, GFI LanGuard
        Sniffers
         –   Wireshark, Kismet,
         –   Netcat, Metasplot, hping,
        OS fingerprinting, Service identification
         –   Nmap, P0f
        System Monitoring
         –   Ganglia
        Knowledge Repositories
         –   IDS Rules
         –   Vulnerability Databases (CVE)
        Analysis, Detection, Decision Making
         –   General purpose (e.g. CEP)
         –   Specialized (e.g. Snort rules)
        Monitoring, Visualization/HMI Tools
         –   HP OpenView
         –   SL RTView, Promia Asset Viewer

6
The tool Integration problem
      Many open source and COTS tools
      – Complementary functionality
      – Overlapping functionality

      Each tool must combine:
      – Sensors, Rules, Alerts/Notifications, Visualization…

      “Each Tool and Isolated Island”
      –   Rules/knowledge bound to the tool/sensor
      –   Must learn specifics of each sensor
      –   Can’t easily multiple sensors in a rule
      –   Limited to what each sensor offers

      The Result: Cost, Complexity, Limited Power:
      – Cannot aggregate, correlate, extend

7
Each tool an isolated island

                Sensor1    Detection   Visualization1
                           Engine1

                            Rules1



                Sensor2    Detection   Visualization2
                           Engine2

                            Rules2



                Sensor3    Detection   Visualization3
                           Engine3

                            Rules3
8
A better approach!

                                                                    Visualization
          Snort                                                  (3D Asset Viewer)

                nmap
                                                             Visualization
                    ossec

                       nessus                             Archive
 normalized
                            Ganglia                                           normalized
sensor data
                                                     Network                  alarm/event
     inputs
                                SAINT               Management                    outputs


                   Shared Information Bus / Normalized Information Picture


          Custom
                              IDS Detection      General Analysis            Custom
              Classified         Engine              Engine                   Code

9        new sensors            COTS UTM              custom CEP         new processors
A better approach with Standards & COTS

     COTS System Sensors COTS IDS Sensors       Custom Sensors
          (Ganglia)          (Snort)
                                            Host Sensor          Host Sensor




     COTS Vulnerability Sensors
     (Nmap, Nessus, Saint)                                                     Send
                                                                              updated    Vulnerability Signature
                                                                             signature
                                     COTS Middleware                                           Database
                                                                         `

                                  (DDS Global Data Space)
     Custom/Classified
       IDS Sensors



                                                COTS                                       COTS
                                                Event                                      Recording/
                                                Processing                                 Auditing

10                 COTS HMI/ Dashboards                      Email
Infrastructure Technology Selection

       DDS was selected because it provides a
       Standard API and Network Protocol able to
       handle large volumes of real-time information
       and prioritize it by setting QoS policies.

       CEP was selected because it provides a familiar
       (SQL-like), powerful and extensible language
       able to process large amounts of streaming
       data, aggregate the information, correlate it, and
       uncover interesting events and threats.


11
Focus:
     Network Intrusion & System Monitoring
       Network Intrusion Detection System (IDS)
        – Sensor: Monitor “raw” network packets
        – Process
               Dissect packets, Identify conversations, Look inside
               Look for: known attack patterns, scans, unusual activity
        – Output: Generate Alarms, Filter/drop packets
        – Example: Snort, OSSEC
       System Monitor
        – Sensor: Host sensors, look at CPU, memory, file system, network, …
        – Process: Detect unusual loads or changes
        – Output: Status, Alarms
        – Example: Ganglia
       System and Service Identification
        – Sensors: Host sensors, Network packet capture
        – Output: List of hosts, OS fingerprints, List of open services
        – Examples: nmap, P0f

12
IDS: Snort Overview
      Open source software (Linux, Windows)
       – Commercial support available
      Can operate as:
       – Sniffer / packet logger,
       – Inline Mode: Intrusion Prevention System (IPS)
              Interfaces with IP tables to drop/reject packets/connections and log the
              alert
              Can also modify bytes in the packets
       – Network intrusion detection system (NDIS)
              Uses lib PCAP to monitor traffic & generate alerts
              Can also operate from a saved PCAP file
              Can match src/dst and do deep packet inspection
              Can produce references to know attack databases (e.g. NIST’s CVE)
      Simple rule language for NDIS
       – Customizable/extensible by end user
       – Active community-based rules database
13
Snort deployment



     Internet

                          Detect intrusion
         Detect all       events that get
     intrusion events   thought the firewall




14
Snort Implementation

     Outputs alerts
     To files, database,
     Socket, …


     Applies rules
     Detects “intrusion”
     events



     Analyzes,
     modifies and takes
     actions like: Alert,
     Log, Drop, Reject.




15
Snort rules

     <action> <proto> <src> <direction> <dst> (<options>)

     action   protocol     source           destination

     alert tcp any any -> 10.10.100.0/24 111 
          (content:“|00 01 86 a5|”; msg:”mountd access”;)

              keyword                                  keyword

          The rule matches if all elements match: protocol, src, destination, …
          content, etc.
           – <direction> can be “->” or “<>”
           – “content:” used for deep-packet inspection. There is a mini language:
                   Can specify offsets and depth,
                   Can relate to other matches in same packet
                   Can use PERL regular expressions
            – Can also do matches in the packet (IP/TCP,UDP) headers
          If a rule matches the action is taken:
            – Alert, log, pass,
16        Rules are applied in sequence
Snort Actions
        alert – generate alert and log packet
        log - log packet
        pass – ignore packet
        activate – alert and turn on dynamic rule
        dynamic – inactive rule until activated then log

     Inline-mode only:
          drop – drop packet and log
          sdrop – drop packet without logging
          reject – drop packet, log, and send reset/ICMP port unreachable to sender

     Custom actions can also be used to bind to specific output plugins:
     Ruletype dds_alert {
        type alert
        output dds_write: domain=36 topic=“SnortAlert”
     }


17
Normalized IDS Alert information
                                      struct SensorDetails {
                                         string name;
                                         string version;
                                         long agentId;
     struct NormalizedAlert {            long type;
        SensorDetails sensor;            NodeInfo node;
        NodeInfo source;              };
        NodeInfo target;              struct NodeInfo {
        ProtocolInfo protocolInfo;       NetworkAddr networkAddr;
        Timestamp alarmTimestamp;        unsigned short port;
        string alertMsg;                 PhysicalAddress phylAddr;
        short priority;                  string hostName;
        sequence<ExtraValue> extra;   };
     };                               struct ProtocolInfo {
                                              string type;
                                              UdpInfo udpInfo;
                                              TcpInfo tcpInfo;
                                              IpInfo ipInfo;
                                              IcmpInfo icmpInfo;
                                              EthernetInfo ethInfo;
18                                    };
System Monitoring: Ganglia Overview

      Open source software (Linux, Windows)
       – Originally developed at UC berkeley
      Distributed Monitoring system for Clusters/Grids
       – Has scaled to clusters with 2000 nodes
      Many built-in metrics
       – CPU, Network, IO, Memory, Disk
       – Can be extended with user-defined metrics




19
Ganglia Deployment (data collection)
         Host-based (gmond daemon on each host)
          – monitor changes in host state
          – announce relevant changes
          – listen to the state of other ganglia nodes
          – answer requests for an XML description of the cluster state.
         Outputs:
          – Metrics to multicast UDP
                 Sent at configured period
                 … or when value changes beyond configurable threshold
          – Responses to requests received via TCP


                                   multicast

     GMOND     GMOND        GMOND                         GMOND          GMOND   GMOND

                                               GMETRIC

                                                 APP
20      (standard metrics)             (custom metrics)
Ganglia Implementation & Deployment

                                                          Apache                                HMI
                                                         Web Server


                       RR
                    Database
                                     GMETAD
                                                        TCP
                                          Poll

     Cluster 1
                                                                                        RR
                  GMOND                                             GMETAD           Database
                               mu
                                 ltic




                                                                P
                                                                      Poll




                                                              TC
                                    sta




     GMOND                                  Cluster 2         GMOND
                                                                             Cluster 3          GMOND
                           GMOND

                 GMETRIC

                  APP
21
Normalized System Monitoring Information

                                       struct ClusterInfo {
                                          string name;
                                          Timestamp localtime;
                                          string owner;
                                          string latlong;
                                          string url;
                                       };
     struct NormalizedSysMon {
        SensorDetails sensorDetails;   struct StandardMetrics{
        ClusterInfo clusterInfo;           DoubleMetric disk_total;
        StandardMetrics stdMetrics;        LongMetric cpu_speed;
     };                                    LongMetric swap_total;
                                           StringMetric os_name;
                                           FloatMetric cpu_user;
                                           FloatMetric cpu_system;
                                           FloatMetric bytes_out;
                                           FloatMetric pckts_in;
                                           …
                                       };
22
CEP Overview

       Capabilities:
       • Filtering
       • Pattern Detection
       • Aggregation, transformation
       • Time-Correlation
       … Across multiple streams



       Real-Time                       Composite
       Data Feeds                       Events

             ...                           Alerts
                       CEP Engine
                                           Actions


                          Event
23
                         Storage
CEP – Example 1

     activity: ftp request



                             DDS Topic
         tool: Snort
                                                                         RTView
                                                     DDS
                                                    Topic
                                         CEP CEP
                                                                         RTI
      activity: disk free                                              Recorder


                                                        Rule:
                             DDS Topic        If free disk < 10% and
        tool: Ganglia                               ftp request
                                               Then send DDS topic 
                                                        alert

24
CEP – Example 2

      activity: ssh



                       DDS Topic
       tool: Snort
                                                                 RTView
                                              DDS
                                             Topic
                                   CEP CEP
                                                                 RTI
     event: CPU load                                           Recorder


                                                Rule:
                       DDS Topic         If CPU > 50% and
      tool: Ganglia                          ssh request
                                        Then send DDS topic 
                                                alert

25
Potential

      Information normalization would allow rules to be written
      independent of sensors
      Use of CEP would
      – allow rules to apply across sensors
      – enable much more sophisticated rules that mix historical data,
          time-windows, causality, etc.
      Use of DDS would
      –   enable prioritization and other QoS
      –   provide unified API to access all data with highest performance
      –   allow segmentation and parallelization of processing
      –   enable easy visualization using general purpose tools
      –   Provide many out of the box services: recording, durability…
          across all sensors with no additional work

26
Status: RTI Prototype Demo CONOPS v0.1

                   Shapes Traffic
                                                          Promia Raven UTM                    Shapes Traffic
                   Generic Traffic                                                                                         SL RTView
         Windows                                                                              Generic Traffic
                                                                CEP via                                         Windows
                                                                Coral8 Engine
                   Shapes Traffic
                                                                                                                          RTI Developer
                                                                                              Shapes Traffic
                   Generic Traffic                                   Processors                                           Platform Tools
         Solaris                                                                                                          (Analyzer, Wireshark)
                                                                                              Generic Traffic
                                                                                                                Solaris
                   Shapes Traffic

                   Generic Traffic
                                                           RTI DDS                            Shapes Traffic

                                                                                              Generic Traffic
          Linux                                                                                                           RTC Database
                        Producers                                                                                Linux    (SQL, Archive)
                                                                   Ganglia
                                                                   Nmap                                      Consumers
                                                                   Snort
                                                                   Nessus
                        Rogue DDS
                                                                   SAINT
                                                      Linux       OpenPMF
                        Naughtiness
                                                                         Sensors


     Shapes traffic = UDP/IPv4 DDS traffic created by RTI DDS Shapes demo application
     Generic Traffic = legitimate and illegitimate random TCP/IPv4 network traffic
     Legitimate = valid, well-formed packets of various protocols created using network traffic stimulator
     Illegitimate = invalid, non-well-formed but not malicious packets of various protocols
27   Rogue = packets that violate one or more security policies, whether or not malicious
Future objectives

       Integrate additional sensors of each class &
       refine the Normalized data format

       Gather IDS data in real scenarios

       Develop more sophisticated CEP rules based
       on IDS data

       Develop CONOPS v 1.0


28
Questions




       Gerardo Pardo-Castellote, Ph.D.
       gerardo.pardo@rti.com

www.rti.com                              29

Mais conteúdo relacionado

Mais procurados

Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsVi Tính Hoàng Nam
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemSweta Sharma
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemDevil's Cafe
 
Ceh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webserversCeh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webserversVi Tính Hoàng Nam
 
Ceh v5 module 00 student introduction
Ceh v5 module 00  student introductionCeh v5 module 00  student introduction
Ceh v5 module 00 student introductionVi Tính Hoàng Nam
 
Ceh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksCeh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksVi Tính Hoàng Nam
 
Ce hv6 module 52 hacking rss and atom
Ce hv6 module 52 hacking rss and atomCe hv6 module 52 hacking rss and atom
Ce hv6 module 52 hacking rss and atomVi Tính Hoàng Nam
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)david rom
 
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...Disha Bedi
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersVi Tính Hoàng Nam
 

Mais procurados (20)

Ceh v5 module 04 enumeration
Ceh v5 module 04 enumerationCeh v5 module 04 enumeration
Ceh v5 module 04 enumeration
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
 
File000175
File000175File000175
File000175
 
Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffersCeh v5 module 07 sniffers
Ceh v5 module 07 sniffers
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Ceh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webserversCeh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webservers
 
Ceh v5 module 18 linux hacking
Ceh v5 module 18 linux hackingCeh v5 module 18 linux hacking
Ceh v5 module 18 linux hacking
 
Ceh v5 module 14 sql injection
Ceh v5 module 14 sql injectionCeh v5 module 14 sql injection
Ceh v5 module 14 sql injection
 
Ceh v5 module 00 student introduction
Ceh v5 module 00  student introductionCeh v5 module 00  student introduction
Ceh v5 module 00 student introduction
 
Ceh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksCeh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networks
 
Ceh v5 module 02 footprinting
Ceh v5 module 02 footprintingCeh v5 module 02 footprinting
Ceh v5 module 02 footprinting
 
Ce hv6 module 52 hacking rss and atom
Ce hv6 module 52 hacking rss and atomCe hv6 module 52 hacking rss and atom
Ce hv6 module 52 hacking rss and atom
 
File000138
File000138File000138
File000138
 
File000139
File000139File000139
File000139
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
 
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
 
Ceh v5 module 03 scanning
Ceh v5 module 03 scanningCeh v5 module 03 scanning
Ceh v5 module 03 scanning
 
File000143
File000143File000143
File000143
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computers
 

Semelhante a System monitoring and network intrusion using DDS and CEP

Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1whitehat 'People'
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniLoay Elbasyouni
 
Bro Policy Assignment
Bro Policy AssignmentBro Policy Assignment
Bro Policy AssignmentTara Hardin
 
Snort
SnortSnort
Snortnazzf
 
Introduction To NIDS
Introduction To NIDSIntroduction To NIDS
Introduction To NIDSMichael Boman
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N NessusUtkarsh Verma
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortDisha Bedi
 
Defcon 23 - Chris Sistrunk - nsm 101 for ics
Defcon 23 -  Chris Sistrunk - nsm 101 for ics Defcon 23 -  Chris Sistrunk - nsm 101 for ics
Defcon 23 - Chris Sistrunk - nsm 101 for ics Felipe Prado
 
Cyber security2012 hybrid-hardware-software
Cyber security2012 hybrid-hardware-softwareCyber security2012 hybrid-hardware-software
Cyber security2012 hybrid-hardware-softwaretelesoft_tech
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876Momita Sharma
 
Relate: Architecture, Systems and Tools for Relative Positioning
Relate: Architecture, Systems and Tools for Relative PositioningRelate: Architecture, Systems and Tools for Relative Positioning
Relate: Architecture, Systems and Tools for Relative PositioningTill Riedel
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection amiable_indian
 
IDS_WK_Arsalan.pptx
IDS_WK_Arsalan.pptxIDS_WK_Arsalan.pptx
IDS_WK_Arsalan.pptxaskaripayalo
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contestnkrafacyberclub
 
An analysis of Network Intrusion Detection System using SNORT
An analysis of Network Intrusion Detection System using SNORTAn analysis of Network Intrusion Detection System using SNORT
An analysis of Network Intrusion Detection System using SNORTijsrd.com
 
Intrusion detection using data mining
Intrusion detection using data miningIntrusion detection using data mining
Intrusion detection using data miningbalbeerrawat
 
INSECS: Intelligent networks security system
INSECS: Intelligent networks security systemINSECS: Intelligent networks security system
INSECS: Intelligent networks security systemNadun Rajasinghe
 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion DetectionWei-Yu Chen
 

Semelhante a System monitoring and network intrusion using DDS and CEP (20)

Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
Snort IDS/IPS Basics
Snort IDS/IPS BasicsSnort IDS/IPS Basics
Snort IDS/IPS Basics
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
Bro Policy Assignment
Bro Policy AssignmentBro Policy Assignment
Bro Policy Assignment
 
Snort
SnortSnort
Snort
 
Introduction To NIDS
Introduction To NIDSIntroduction To NIDS
Introduction To NIDS
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
Defcon 23 - Chris Sistrunk - nsm 101 for ics
Defcon 23 -  Chris Sistrunk - nsm 101 for ics Defcon 23 -  Chris Sistrunk - nsm 101 for ics
Defcon 23 - Chris Sistrunk - nsm 101 for ics
 
Cyber security2012 hybrid-hardware-software
Cyber security2012 hybrid-hardware-softwareCyber security2012 hybrid-hardware-software
Cyber security2012 hybrid-hardware-software
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Relate: Architecture, Systems and Tools for Relative Positioning
Relate: Architecture, Systems and Tools for Relative PositioningRelate: Architecture, Systems and Tools for Relative Positioning
Relate: Architecture, Systems and Tools for Relative Positioning
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
 
IDS_WK_Arsalan.pptx
IDS_WK_Arsalan.pptxIDS_WK_Arsalan.pptx
IDS_WK_Arsalan.pptx
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
 
An analysis of Network Intrusion Detection System using SNORT
An analysis of Network Intrusion Detection System using SNORTAn analysis of Network Intrusion Detection System using SNORT
An analysis of Network Intrusion Detection System using SNORT
 
Intrusion detection using data mining
Intrusion detection using data miningIntrusion detection using data mining
Intrusion detection using data mining
 
INSECS: Intelligent networks security system
INSECS: Intelligent networks security systemINSECS: Intelligent networks security system
INSECS: Intelligent networks security system
 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
 

Mais de Gerardo Pardo-Castellote

DDS, the US Navy, and the Need for Distributed Software
DDS, the US Navy,  and the Need for Distributed SoftwareDDS, the US Navy,  and the Need for Distributed Software
DDS, the US Navy, and the Need for Distributed SoftwareGerardo Pardo-Castellote
 
Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Gerardo Pardo-Castellote
 
A Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial AutomationA Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial AutomationGerardo Pardo-Castellote
 
DDS-Security Interoperability Demo - March 2018
DDS-Security Interoperability Demo - March 2018DDS-Security Interoperability Demo - March 2018
DDS-Security Interoperability Demo - March 2018Gerardo Pardo-Castellote
 
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkApplying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkGerardo Pardo-Castellote
 
Deep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway SpecificationDeep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway SpecificationGerardo Pardo-Castellote
 
DDS for eXtremely Resource Constrained Environments 1.0 Beta
DDS for eXtremely Resource Constrained Environments 1.0 BetaDDS for eXtremely Resource Constrained Environments 1.0 Beta
DDS for eXtremely Resource Constrained Environments 1.0 BetaGerardo Pardo-Castellote
 
DDS-Security Interoperability Demo - December 2017
DDS-Security Interoperability Demo - December 2017DDS-Security Interoperability Demo - December 2017
DDS-Security Interoperability Demo - December 2017Gerardo Pardo-Castellote
 
DDS-Security Interoperability Demo - September 2017
DDS-Security Interoperability Demo - September 2017DDS-Security Interoperability Demo - September 2017
DDS-Security Interoperability Demo - September 2017Gerardo Pardo-Castellote
 
Extensible Types for DDS (DDS-XTYPES) version 1.2
Extensible Types for DDS (DDS-XTYPES) version 1.2Extensible Types for DDS (DDS-XTYPES) version 1.2
Extensible Types for DDS (DDS-XTYPES) version 1.2Gerardo Pardo-Castellote
 
Interface Definition Language (IDL) version 4.2
Interface Definition Language (IDL) version 4.2 Interface Definition Language (IDL) version 4.2
Interface Definition Language (IDL) version 4.2 Gerardo Pardo-Castellote
 
DDS for eXtremely Resource Constrained Environments
DDS for eXtremely Resource Constrained EnvironmentsDDS for eXtremely Resource Constrained Environments
DDS for eXtremely Resource Constrained EnvironmentsGerardo Pardo-Castellote
 
DDS-XRCE - Revised Submission Presentation (September 2017)
DDS-XRCE - Revised Submission Presentation (September 2017)DDS-XRCE - Revised Submission Presentation (September 2017)
DDS-XRCE - Revised Submission Presentation (September 2017)Gerardo Pardo-Castellote
 
DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)Gerardo Pardo-Castellote
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)Gerardo Pardo-Castellote
 

Mais de Gerardo Pardo-Castellote (20)

DDS, the US Navy, and the Need for Distributed Software
DDS, the US Navy,  and the Need for Distributed SoftwareDDS, the US Navy,  and the Need for Distributed Software
DDS, the US Navy, and the Need for Distributed Software
 
Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.
 
DDS-TSN OMG Request for Proposals (RFP)
DDS-TSN OMG Request for Proposals (RFP)DDS-TSN OMG Request for Proposals (RFP)
DDS-TSN OMG Request for Proposals (RFP)
 
A Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial AutomationA Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial Automation
 
Overview of the DDS-XRCE specification
Overview of the DDS-XRCE specificationOverview of the DDS-XRCE specification
Overview of the DDS-XRCE specification
 
DDS-Security Interoperability Demo - March 2018
DDS-Security Interoperability Demo - March 2018DDS-Security Interoperability Demo - March 2018
DDS-Security Interoperability Demo - March 2018
 
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkApplying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
 
Deep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway SpecificationDeep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway Specification
 
OPC UA/DDS Gateway version 1.0 Beta
OPC UA/DDS Gateway version 1.0 BetaOPC UA/DDS Gateway version 1.0 Beta
OPC UA/DDS Gateway version 1.0 Beta
 
DDS for eXtremely Resource Constrained Environments 1.0 Beta
DDS for eXtremely Resource Constrained Environments 1.0 BetaDDS for eXtremely Resource Constrained Environments 1.0 Beta
DDS for eXtremely Resource Constrained Environments 1.0 Beta
 
DDS-Security Interoperability Demo - December 2017
DDS-Security Interoperability Demo - December 2017DDS-Security Interoperability Demo - December 2017
DDS-Security Interoperability Demo - December 2017
 
DDS-Security Interoperability Demo - September 2017
DDS-Security Interoperability Demo - September 2017DDS-Security Interoperability Demo - September 2017
DDS-Security Interoperability Demo - September 2017
 
Extensible Types for DDS (DDS-XTYPES) version 1.2
Extensible Types for DDS (DDS-XTYPES) version 1.2Extensible Types for DDS (DDS-XTYPES) version 1.2
Extensible Types for DDS (DDS-XTYPES) version 1.2
 
DDS-Security version 1.1
DDS-Security version 1.1DDS-Security version 1.1
DDS-Security version 1.1
 
Interface Definition Language (IDL) version 4.2
Interface Definition Language (IDL) version 4.2 Interface Definition Language (IDL) version 4.2
Interface Definition Language (IDL) version 4.2
 
DDS Security Specification version 1.0
DDS Security Specification version 1.0DDS Security Specification version 1.0
DDS Security Specification version 1.0
 
DDS for eXtremely Resource Constrained Environments
DDS for eXtremely Resource Constrained EnvironmentsDDS for eXtremely Resource Constrained Environments
DDS for eXtremely Resource Constrained Environments
 
DDS-XRCE - Revised Submission Presentation (September 2017)
DDS-XRCE - Revised Submission Presentation (September 2017)DDS-XRCE - Revised Submission Presentation (September 2017)
DDS-XRCE - Revised Submission Presentation (September 2017)
 
DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

System monitoring and network intrusion using DDS and CEP

  • 1. www.rti.com System Monitoring and Network Intrusion Detection using DDS and CEP Gerardo Pardo-Castellote, Ph.D. (RTI) Joe Schlesselman (RTI) OMG RTESS Workshop Washington DC, July 14-16, 2008 1
  • 2. Background This presentation describes the results and architecture of a DoD-funded research effort to develop a common normalized information picture combining data from System Monitoring Tools and Intrusion Detection Systems. The purpose of this work is to increase the speed and effectiveness of the technologies used to detect & counter network attacks. 2
  • 3. Project Partners RTI (Prime) DDS Coral8 CEP SL Visualization Promia IDS Hardware ObjectSecurity Security Manager 3
  • 4. Outline The problem of [Distributed] System Monitoring – System Monitoring – Intrusion Detection Available Technologies – Ganglia, Nagios – Snort, Nessus, Saint Practical solution using DDS and CEP 4
  • 5. System Monitoring & Network Intrusion Middleware Technologies, such as DDS help build large distributed systems 100s or 1000s or computers with an order of magnitude more processes – Functionally the system may be correct – … but it may still fail operationally… These large systems require monitoring. We focus on two aspects: – Network Intrusion Detection – System Monitoring – Information Sharing/Normalization – Information Processing The integration of these technologies illustrates the essence of the open integration problem we are trying to address. 5
  • 6. 100’s of Available Tools See: http://sectools.org/ Tool Categories: Network Intrusion Detection Systems – Snort – OSSEC NDIS Vulnerability Scanners – Nessus, Nmap – Saint, GFI LanGuard Sniffers – Wireshark, Kismet, – Netcat, Metasplot, hping, OS fingerprinting, Service identification – Nmap, P0f System Monitoring – Ganglia Knowledge Repositories – IDS Rules – Vulnerability Databases (CVE) Analysis, Detection, Decision Making – General purpose (e.g. CEP) – Specialized (e.g. Snort rules) Monitoring, Visualization/HMI Tools – HP OpenView – SL RTView, Promia Asset Viewer 6
  • 7. The tool Integration problem Many open source and COTS tools – Complementary functionality – Overlapping functionality Each tool must combine: – Sensors, Rules, Alerts/Notifications, Visualization… “Each Tool and Isolated Island” – Rules/knowledge bound to the tool/sensor – Must learn specifics of each sensor – Can’t easily multiple sensors in a rule – Limited to what each sensor offers The Result: Cost, Complexity, Limited Power: – Cannot aggregate, correlate, extend 7
  • 8. Each tool an isolated island Sensor1 Detection Visualization1 Engine1 Rules1 Sensor2 Detection Visualization2 Engine2 Rules2 Sensor3 Detection Visualization3 Engine3 Rules3 8
  • 9. A better approach! Visualization Snort (3D Asset Viewer) nmap Visualization ossec nessus Archive normalized Ganglia normalized sensor data Network alarm/event inputs SAINT Management outputs Shared Information Bus / Normalized Information Picture Custom IDS Detection General Analysis Custom Classified Engine Engine Code 9 new sensors COTS UTM custom CEP new processors
  • 10. A better approach with Standards & COTS COTS System Sensors COTS IDS Sensors Custom Sensors (Ganglia) (Snort) Host Sensor Host Sensor COTS Vulnerability Sensors (Nmap, Nessus, Saint) Send updated Vulnerability Signature signature COTS Middleware Database ` (DDS Global Data Space) Custom/Classified IDS Sensors COTS COTS Event Recording/ Processing Auditing 10 COTS HMI/ Dashboards Email
  • 11. Infrastructure Technology Selection DDS was selected because it provides a Standard API and Network Protocol able to handle large volumes of real-time information and prioritize it by setting QoS policies. CEP was selected because it provides a familiar (SQL-like), powerful and extensible language able to process large amounts of streaming data, aggregate the information, correlate it, and uncover interesting events and threats. 11
  • 12. Focus: Network Intrusion & System Monitoring Network Intrusion Detection System (IDS) – Sensor: Monitor “raw” network packets – Process Dissect packets, Identify conversations, Look inside Look for: known attack patterns, scans, unusual activity – Output: Generate Alarms, Filter/drop packets – Example: Snort, OSSEC System Monitor – Sensor: Host sensors, look at CPU, memory, file system, network, … – Process: Detect unusual loads or changes – Output: Status, Alarms – Example: Ganglia System and Service Identification – Sensors: Host sensors, Network packet capture – Output: List of hosts, OS fingerprints, List of open services – Examples: nmap, P0f 12
  • 13. IDS: Snort Overview Open source software (Linux, Windows) – Commercial support available Can operate as: – Sniffer / packet logger, – Inline Mode: Intrusion Prevention System (IPS) Interfaces with IP tables to drop/reject packets/connections and log the alert Can also modify bytes in the packets – Network intrusion detection system (NDIS) Uses lib PCAP to monitor traffic & generate alerts Can also operate from a saved PCAP file Can match src/dst and do deep packet inspection Can produce references to know attack databases (e.g. NIST’s CVE) Simple rule language for NDIS – Customizable/extensible by end user – Active community-based rules database 13
  • 14. Snort deployment Internet Detect intrusion Detect all events that get intrusion events thought the firewall 14
  • 15. Snort Implementation Outputs alerts To files, database, Socket, … Applies rules Detects “intrusion” events Analyzes, modifies and takes actions like: Alert, Log, Drop, Reject. 15
  • 16. Snort rules <action> <proto> <src> <direction> <dst> (<options>) action protocol source destination alert tcp any any -> 10.10.100.0/24 111 (content:“|00 01 86 a5|”; msg:”mountd access”;) keyword keyword The rule matches if all elements match: protocol, src, destination, … content, etc. – <direction> can be “->” or “<>” – “content:” used for deep-packet inspection. There is a mini language: Can specify offsets and depth, Can relate to other matches in same packet Can use PERL regular expressions – Can also do matches in the packet (IP/TCP,UDP) headers If a rule matches the action is taken: – Alert, log, pass, 16 Rules are applied in sequence
  • 17. Snort Actions alert – generate alert and log packet log - log packet pass – ignore packet activate – alert and turn on dynamic rule dynamic – inactive rule until activated then log Inline-mode only: drop – drop packet and log sdrop – drop packet without logging reject – drop packet, log, and send reset/ICMP port unreachable to sender Custom actions can also be used to bind to specific output plugins: Ruletype dds_alert { type alert output dds_write: domain=36 topic=“SnortAlert” } 17
  • 18. Normalized IDS Alert information struct SensorDetails { string name; string version; long agentId; struct NormalizedAlert { long type; SensorDetails sensor; NodeInfo node; NodeInfo source; }; NodeInfo target; struct NodeInfo { ProtocolInfo protocolInfo; NetworkAddr networkAddr; Timestamp alarmTimestamp; unsigned short port; string alertMsg; PhysicalAddress phylAddr; short priority; string hostName; sequence<ExtraValue> extra; }; }; struct ProtocolInfo { string type; UdpInfo udpInfo; TcpInfo tcpInfo; IpInfo ipInfo; IcmpInfo icmpInfo; EthernetInfo ethInfo; 18 };
  • 19. System Monitoring: Ganglia Overview Open source software (Linux, Windows) – Originally developed at UC berkeley Distributed Monitoring system for Clusters/Grids – Has scaled to clusters with 2000 nodes Many built-in metrics – CPU, Network, IO, Memory, Disk – Can be extended with user-defined metrics 19
  • 20. Ganglia Deployment (data collection) Host-based (gmond daemon on each host) – monitor changes in host state – announce relevant changes – listen to the state of other ganglia nodes – answer requests for an XML description of the cluster state. Outputs: – Metrics to multicast UDP Sent at configured period … or when value changes beyond configurable threshold – Responses to requests received via TCP multicast GMOND GMOND GMOND GMOND GMOND GMOND GMETRIC APP 20 (standard metrics) (custom metrics)
  • 21. Ganglia Implementation & Deployment Apache HMI Web Server RR Database GMETAD TCP Poll Cluster 1 RR GMOND GMETAD Database mu ltic P Poll TC sta GMOND Cluster 2 GMOND Cluster 3 GMOND GMOND GMETRIC APP 21
  • 22. Normalized System Monitoring Information struct ClusterInfo { string name; Timestamp localtime; string owner; string latlong; string url; }; struct NormalizedSysMon { SensorDetails sensorDetails; struct StandardMetrics{ ClusterInfo clusterInfo; DoubleMetric disk_total; StandardMetrics stdMetrics; LongMetric cpu_speed; }; LongMetric swap_total; StringMetric os_name; FloatMetric cpu_user; FloatMetric cpu_system; FloatMetric bytes_out; FloatMetric pckts_in; … }; 22
  • 23. CEP Overview Capabilities: • Filtering • Pattern Detection • Aggregation, transformation • Time-Correlation … Across multiple streams Real-Time Composite Data Feeds Events ... Alerts CEP Engine Actions Event 23 Storage
  • 24. CEP – Example 1 activity: ftp request DDS Topic tool: Snort RTView DDS Topic CEP CEP RTI activity: disk free Recorder Rule: DDS Topic If free disk < 10% and tool: Ganglia ftp request Then send DDS topic  alert 24
  • 25. CEP – Example 2 activity: ssh DDS Topic tool: Snort RTView DDS Topic CEP CEP RTI event: CPU load Recorder Rule: DDS Topic If CPU > 50% and tool: Ganglia ssh request Then send DDS topic  alert 25
  • 26. Potential Information normalization would allow rules to be written independent of sensors Use of CEP would – allow rules to apply across sensors – enable much more sophisticated rules that mix historical data, time-windows, causality, etc. Use of DDS would – enable prioritization and other QoS – provide unified API to access all data with highest performance – allow segmentation and parallelization of processing – enable easy visualization using general purpose tools – Provide many out of the box services: recording, durability… across all sensors with no additional work 26
  • 27. Status: RTI Prototype Demo CONOPS v0.1 Shapes Traffic Promia Raven UTM Shapes Traffic Generic Traffic SL RTView Windows Generic Traffic CEP via Windows Coral8 Engine Shapes Traffic RTI Developer Shapes Traffic Generic Traffic Processors Platform Tools Solaris (Analyzer, Wireshark) Generic Traffic Solaris Shapes Traffic Generic Traffic RTI DDS Shapes Traffic Generic Traffic Linux RTC Database Producers Linux (SQL, Archive) Ganglia Nmap Consumers Snort Nessus Rogue DDS SAINT Linux OpenPMF Naughtiness Sensors Shapes traffic = UDP/IPv4 DDS traffic created by RTI DDS Shapes demo application Generic Traffic = legitimate and illegitimate random TCP/IPv4 network traffic Legitimate = valid, well-formed packets of various protocols created using network traffic stimulator Illegitimate = invalid, non-well-formed but not malicious packets of various protocols 27 Rogue = packets that violate one or more security policies, whether or not malicious
  • 28. Future objectives Integrate additional sensors of each class & refine the Normalized data format Gather IDS data in real scenarios Develop more sophisticated CEP rules based on IDS data Develop CONOPS v 1.0 28
  • 29. Questions Gerardo Pardo-Castellote, Ph.D. gerardo.pardo@rti.com www.rti.com 29