surfnet ids os3 uva project extension of the surfnet
play

SURFnet IDS / OS3 UvA Project Extension of the SURFnet Intrusion - PowerPoint PPT Presentation

SURFnet IDS / OS3 UvA Project Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Michael Rave Coen Steenbeek 7 February 2007 Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP


  1. SURFnet IDS / OS3 UvA Project Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Michael Rave Coen Steenbeek 7 February 2007

  2. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Overview • Intrusion Detection Systems • SURFnet IDS • Problem Definition • Research • Solutions • Conclusion • Future Work • Questions 2/18

  3. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Intrusion Detection Systems • What is IDS? – detects unwanted manipulations – Hackers, script kiddies, worms, e.c. – Detection, no prevention • Different sorts of IDS’s – Network IDS – Host-based IDS – Hybrid IDS 3/18

  4. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP SURFnet IDS • Distributed IDS – Client - Server model • Distributed sensors – Modified Knoppix distribution – Layer-2 VPN tunnel in bridging mode • Honeypot – Nepenthes • Logging Server – PostgreSQL Database – Apache webserver 4/18

  5. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP SURFnet IDS 5/18

  6. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Problem Definition “How to give a desktop computer the same functionality of the current SURFnet IDS sensors without affecting the current functionality of the desktop computer?” 6/18

  7. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Sub-questions • How to obtain unused ports on Windows XP • How to forward certain ports on Windows XP • How to forward incoming traffic on certain ports to the honeypot without changing the source IP-address of the incoming packets 7/18

  8. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Research • Unused Ports – Netstatp – Nmap – Winpcap – … • Port forwarding – Trivial Port Forward – Netsh – Wintunnel – … 8/18

  9. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Solutions • “How to forward incoming traffic on certain ports to the honeypot without changing the source IP-address of the incoming packets” • Indirect Solution • Direct Solution 9/18

  10. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Solution Indirect 10/18

  11. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Implementation Indirect • Challenges Indirect – Source IP-address of attacker • Solution – IP-tunneling/IPSec/IPv6? – Not tested 11/18

  12. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Advantages/Disadvantages Indirect • Advantages – Sensor Server already present in current setup – Only one VPN connection – Better structure • Disadvantages – IP-tunneling/IPSec/IPv6 introduces difficulties – No working concept so not tested 12/18

  13. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Solution Direct 13/18

  14. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Implementation Direct • Challenges Direct – Source IP-address of attacker – Routing through same tunnel • Solutions – Netsh, pre-routed NAT – Source based routing 14/18

  15. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Advantages/Disadvantages Direct • Advantages – Secure VPN tunnel – No changes to current sensor – Already tested succesfully • Disadvantages – Every sensors needs its own VPN tunnel – Many rules in source based routing tables 15/18

  16. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Future Work • IP-tunneling/IPv6/IPSec for indirect solutions • Further tests • Efficient port checking – No opening of ports – Opening when attacked 16/18

  17. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Conclusion • Summary – Two Solutions – First tested successfully – Second needs more research and testing • We recommend – Direct solution • Secure VPN tunnel • Successfully tested • No modifications to old-style sensor • Only small modifications to honeypot server • Both sensors (old and new) in conjunction 17/18

  18. Extension of the SURFnet Intrusion Detection System Sensors to Microsoft Windows XP Questions? 18/18

Recommend


More recommend