SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Intrusion Detection in WLANs ,[object Object]
Megha Sarang
Amisha Sheth
Karthik Raghavan
Rohan Gupte,[object Object]
Intruder and Attacks Intruder: An entity who tries to find a way to gain unauthorized access to information through a network, inflict harm or engage in other malicious activities. Types of Attacks:
Rogue Access Point Unauthorized AP attached to wired enterprise network. Personal AP used by employee (ignorant of risks), AP used with a malicious intent. Windows 7 Virtual WiFi: Every Windows 7 laptop is a potential rogue AP.  RF signal spillage: Access from outside the premises.
Attacks Launched through Rouge APs Data leakage by passive sniffing. Man-in –the-Middle Attack. Network scans and Fingerprinting. Enterprise Data Access.  Free Internet Access. Denial of Service Attacks: ARP poisoning, IP spoofing, etc.
Protection Against Rogue APs and Attacks Firewalls: Does not detect Rouge AP. WPA2: Rogue AP is not a managed AP.                  You can enforce security controls only on APs you can                      	    manage.                  ‘Hole1961’, vulnerability found in WAP2.
Protection Against Rogue APs and Attacks 802.1x port control: Cannot protect from all Rouge AP configurations. E.g. case of a MAC spoofer. Most networks do not have 802.1x port control.
Protection Against Rogue APs and Attacks Antivirus & Wired IDS: Does not detect Rouge APs, as they work a layer below. Wired IDS ineffective against soft Rogue APs. NAC: Cannot protect from all rouge AP configurations. E.g. MAC spoofer.
Protection Against Rogue APs and Attacks Intrusion Detection System is the solution!!!
Need for Intrusion Detection System (IDS) Similar to a burglar alarm/ lock system in a car. Complements the Firewall security:  IDS detects if someone tries through break through the Firewall/ breaks in and tries to get unauthorized access. Firewalls effective in filtering incoming traffic from the internet. IDS is a security system that monitors computer systems and  network traffic and analyzes that traffic for possible hostile attacks originating from outside the organization and also for system misuse or attacks originating from inside the organization.
Components of an IDS ,[object Object]
Sensors: Monitor hosts or networks on a real-time basis. They match the malicious packet with a signature from a database.
A database of signatures: Patterns of different types of previously detected attacks.,[object Object]
IDS and Ad Hoc Networks No supporting infrastructure. Conventional methods of identification and authentication are not available. No Gateways, switches or routers on which IDS conventionally relies. Mobility introduces additional challenges. Some solutions/theories proposed: Secured routing protocols like SecAODV. Dempster-Shafer Theory.                               Research still going on……
General Limitations of Intrusion Detection Systems IDS must be run online, in real time, 24x7. Needs human intervention. Additional network traffic generated when sensors relay data to a central point where it can be stored and analyzed. IDS is as good as the database of signatures. Regular updates needed. False alarms might lead to complacency. Additional cost.
Network-based IDS Inspects all network activity to identify suspicious patterns. Signature detection (use of signature database) vs. Anomaly detection (packet sizes/ protocols/ traffic load). Not just large number of signatures but a number of signatures for wide variety of attack types.  E.g.:  Buffer overflows, stealth port scans, CGI attacks, SMB probes, NMAP probes, fragment attacks, and OS fingerprinting attempts. ( Example of a product: Netprowler) Passive ( logs information and sends alerts) vs. Reactive (features like killing processes, disabling user accounts, shunning attacker IP addresses, etc) Limitations: False positives, TCP Stream Reassembly/IP Defragmentation, Switched Networks.
Host-based IDS Monitors individual systems on the network. Sensors located inside a host to monitor system level behavior. Types: Host wrappers (or personal firewalls)      Tools that can be configured to look at all network packets, connection attempts, or login attempts to the monitored machine.  Agent-based software:  Also detect changes in system files and changes in user privileges. Effective against masking techniques like out-of-order delivery, and switched networks. Limitations: Cannot fend off attacks against the protocol stack itself.
Implementation of an IDS The success of an IDS implementation depends to a large extent on how it has been deployed. In most cases, it is desirable to implement a hybrid solution of network based and host based IDS to benefit from both. Detailed analysis about the building structure, Number and location of authorized Access Points, List of MAC addresses used, etc. Get an overall picture of the WLAN deployed using a sniffing software like Kismet, NetStumbler. Determine the number and location of sensors. Trained people who can understand alerts, program correlation tools, manage signature database, etc. ‘Off the shelf’ product vs. Managed Security Service Provider (MSSP).
Classification of APs ,[object Object],[object Object]
After Detecting a Rogue AP….. Over the air quarantine: Blocking by transmitting  spoofed disconnection frames. Vendor neutral. Switch port disable: Disables the switch port using SNMP. Switch vendor interoperability issues.
Signatures A pattern we want to look for in network traffic. What qualifies for a signature? Connection attempt from reserved IP address. Packet with illegal (bad) TCP flag combination. Email containing a virus. Tracking the number of times a command is issued to check DOS attacks. File access attack involves accessing FTP without logging in. Specific data in the header file.
Creating Signatures Use of Honeypots: Honeypots are decoy computer resources set up for the purpose of monitoring and logging the activities of entities that probe, attack or compromise them. They generate signatures. Types of Honeypots: dummy items in a database, low-interaction network components like preconfigured traffic sinks, or full-interaction hosts with real operating systems and services.
Examples of Signatures generated by Honeycomb
IPS vs. IDS
IPS vs. IDS

Weitere ähnliche Inhalte

Was ist angesagt?

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAAKASH S
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemNikhil Singh
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...skpatel91
 
A hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environmentsA hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environmentsMohamed Jelidi
 
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Jowin John Chemban
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Jowin John Chemban
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESTrinity Dwarka
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Eng. Mohammed Ahmed Siddiqui
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortDisha Bedi
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkEng. Mohammed Ahmed Siddiqui
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networksguest1b5f71
 
Analysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningAnalysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningPritesh Ranjan
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortDisha Bedi
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networksantoniomorancardenas
 

Was ist angesagt? (19)

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
 
A hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environmentsA hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environments
 
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
 
intruders types ,detection & prevention
intruders types ,detection & preventionintruders types ,detection & prevention
intruders types ,detection & prevention
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
 
Describe firewalls
Describe firewallsDescribe firewalls
Describe firewalls
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networks
 
Analysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningAnalysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data Mining
 
Practical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approachesPractical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approaches
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
 

Andere mochten auch

Wireless lan intrusion detection by using statistical timing approach
Wireless lan intrusion detection by using statistical timing approachWireless lan intrusion detection by using statistical timing approach
Wireless lan intrusion detection by using statistical timing approacheSAT Journals
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and ProtectionChandrak Trivedi
 
Wireless Intrusion Prevention Systems or WIPS
Wireless Intrusion Prevention Systems or WIPSWireless Intrusion Prevention Systems or WIPS
Wireless Intrusion Prevention Systems or WIPSMd Sohail Ahmad
 
Evil Twin Demonstration
Evil Twin DemonstrationEvil Twin Demonstration
Evil Twin DemonstrationEric Goldman
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesCisco Mobility
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 

Andere mochten auch (15)

Wireless lan intrusion detection by using statistical timing approach
Wireless lan intrusion detection by using statistical timing approachWireless lan intrusion detection by using statistical timing approach
Wireless lan intrusion detection by using statistical timing approach
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Wireless Intrusion Prevention Systems or WIPS
Wireless Intrusion Prevention Systems or WIPSWireless Intrusion Prevention Systems or WIPS
Wireless Intrusion Prevention Systems or WIPS
 
Evil Twin Demonstration
Evil Twin DemonstrationEvil Twin Demonstration
Evil Twin Demonstration
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
Wlan security
Wlan securityWlan security
Wlan security
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 

Ähnlich wie Intrusion Detection in WLANs

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionProgrammer
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1whitehat 'People'
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention MohammedAlmuhaimeed
 
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detectioneditor1knowledgecuddle
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)shraddha_b
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniLoay Elbasyouni
 
L5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxL5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxRebeccaMunasheChimhe
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptxAnonymousEImkf6RGdQ
 
Intrusion detection system IDS
Intrusion detection system IDSIntrusion detection system IDS
Intrusion detection system IDSMAURICE NTAHOBARI
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Wail Hassan
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...researchinventy
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxRineri1
 
Ids 00 introduction_ intrusion detection & prevention systems
Ids 00 introduction_ intrusion detection & prevention systemsIds 00 introduction_ intrusion detection & prevention systems
Ids 00 introduction_ intrusion detection & prevention systemsjyoti_lakhani
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemMohit Belwal
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
INTERNET SECURITY SYSTEM
INTERNET SECURITY SYSTEMINTERNET SECURITY SYSTEM
INTERNET SECURITY SYSTEMBhushan Gajare
 

Ähnlich wie Intrusion Detection in WLANs (20)

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
Snort IDS/IPS Basics
Snort IDS/IPS BasicsSnort IDS/IPS Basics
Snort IDS/IPS Basics
 
IS-Types of IDPSs.pptx
IS-Types of IDPSs.pptxIS-Types of IDPSs.pptx
IS-Types of IDPSs.pptx
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention
 
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detection
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
L5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxL5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptx
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptx
 
Intrusion detection system IDS
Intrusion detection system IDSIntrusion detection system IDS
Intrusion detection system IDS
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
 
Day4
Day4Day4
Day4
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptx
 
Ids 00 introduction_ intrusion detection & prevention systems
Ids 00 introduction_ intrusion detection & prevention systemsIds 00 introduction_ intrusion detection & prevention systems
Ids 00 introduction_ intrusion detection & prevention systems
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
INTERNET SECURITY SYSTEM
INTERNET SECURITY SYSTEMINTERNET SECURITY SYSTEM
INTERNET SECURITY SYSTEM
 

Intrusion Detection in WLANs

  • 1.
  • 5.
  • 6. Intruder and Attacks Intruder: An entity who tries to find a way to gain unauthorized access to information through a network, inflict harm or engage in other malicious activities. Types of Attacks:
  • 7. Rogue Access Point Unauthorized AP attached to wired enterprise network. Personal AP used by employee (ignorant of risks), AP used with a malicious intent. Windows 7 Virtual WiFi: Every Windows 7 laptop is a potential rogue AP. RF signal spillage: Access from outside the premises.
  • 8. Attacks Launched through Rouge APs Data leakage by passive sniffing. Man-in –the-Middle Attack. Network scans and Fingerprinting. Enterprise Data Access. Free Internet Access. Denial of Service Attacks: ARP poisoning, IP spoofing, etc.
  • 9. Protection Against Rogue APs and Attacks Firewalls: Does not detect Rouge AP. WPA2: Rogue AP is not a managed AP. You can enforce security controls only on APs you can manage. ‘Hole1961’, vulnerability found in WAP2.
  • 10. Protection Against Rogue APs and Attacks 802.1x port control: Cannot protect from all Rouge AP configurations. E.g. case of a MAC spoofer. Most networks do not have 802.1x port control.
  • 11. Protection Against Rogue APs and Attacks Antivirus & Wired IDS: Does not detect Rouge APs, as they work a layer below. Wired IDS ineffective against soft Rogue APs. NAC: Cannot protect from all rouge AP configurations. E.g. MAC spoofer.
  • 12. Protection Against Rogue APs and Attacks Intrusion Detection System is the solution!!!
  • 13. Need for Intrusion Detection System (IDS) Similar to a burglar alarm/ lock system in a car. Complements the Firewall security: IDS detects if someone tries through break through the Firewall/ breaks in and tries to get unauthorized access. Firewalls effective in filtering incoming traffic from the internet. IDS is a security system that monitors computer systems and network traffic and analyzes that traffic for possible hostile attacks originating from outside the organization and also for system misuse or attacks originating from inside the organization.
  • 14.
  • 15. Sensors: Monitor hosts or networks on a real-time basis. They match the malicious packet with a signature from a database.
  • 16.
  • 17. IDS and Ad Hoc Networks No supporting infrastructure. Conventional methods of identification and authentication are not available. No Gateways, switches or routers on which IDS conventionally relies. Mobility introduces additional challenges. Some solutions/theories proposed: Secured routing protocols like SecAODV. Dempster-Shafer Theory. Research still going on……
  • 18. General Limitations of Intrusion Detection Systems IDS must be run online, in real time, 24x7. Needs human intervention. Additional network traffic generated when sensors relay data to a central point where it can be stored and analyzed. IDS is as good as the database of signatures. Regular updates needed. False alarms might lead to complacency. Additional cost.
  • 19. Network-based IDS Inspects all network activity to identify suspicious patterns. Signature detection (use of signature database) vs. Anomaly detection (packet sizes/ protocols/ traffic load). Not just large number of signatures but a number of signatures for wide variety of attack types. E.g.:  Buffer overflows, stealth port scans, CGI attacks, SMB probes, NMAP probes, fragment attacks, and OS fingerprinting attempts. ( Example of a product: Netprowler) Passive ( logs information and sends alerts) vs. Reactive (features like killing processes, disabling user accounts, shunning attacker IP addresses, etc) Limitations: False positives, TCP Stream Reassembly/IP Defragmentation, Switched Networks.
  • 20. Host-based IDS Monitors individual systems on the network. Sensors located inside a host to monitor system level behavior. Types: Host wrappers (or personal firewalls) Tools that can be configured to look at all network packets, connection attempts, or login attempts to the monitored machine. Agent-based software: Also detect changes in system files and changes in user privileges. Effective against masking techniques like out-of-order delivery, and switched networks. Limitations: Cannot fend off attacks against the protocol stack itself.
  • 21. Implementation of an IDS The success of an IDS implementation depends to a large extent on how it has been deployed. In most cases, it is desirable to implement a hybrid solution of network based and host based IDS to benefit from both. Detailed analysis about the building structure, Number and location of authorized Access Points, List of MAC addresses used, etc. Get an overall picture of the WLAN deployed using a sniffing software like Kismet, NetStumbler. Determine the number and location of sensors. Trained people who can understand alerts, program correlation tools, manage signature database, etc. ‘Off the shelf’ product vs. Managed Security Service Provider (MSSP).
  • 22.
  • 23. After Detecting a Rogue AP….. Over the air quarantine: Blocking by transmitting spoofed disconnection frames. Vendor neutral. Switch port disable: Disables the switch port using SNMP. Switch vendor interoperability issues.
  • 24. Signatures A pattern we want to look for in network traffic. What qualifies for a signature? Connection attempt from reserved IP address. Packet with illegal (bad) TCP flag combination. Email containing a virus. Tracking the number of times a command is issued to check DOS attacks. File access attack involves accessing FTP without logging in. Specific data in the header file.
  • 25. Creating Signatures Use of Honeypots: Honeypots are decoy computer resources set up for the purpose of monitoring and logging the activities of entities that probe, attack or compromise them. They generate signatures. Types of Honeypots: dummy items in a database, low-interaction network components like preconfigured traffic sinks, or full-interaction hosts with real operating systems and services.
  • 26. Examples of Signatures generated by Honeycomb
  • 29. Conclusions Modern day IDSs are far from bulletproof. However, adds significant security. With better understanding of threats and attacks, vendors need to continuously upgrade their IDSs. IDS is not a substitute for a well-defined security policy. Need of an able security/network administrator. Easier for big technology players to implement than small start ups, due to availability of specialist resources. Opportunity for Managed Security Service Providers (MSSPs) to offer IDS along with their other security services.
  • 30. References White papers from http://www.sans.org/reading_room/whitepapers/wireless http://blog.airtightnetworks.com/category/wireless-security/ http://www.comnews.com/WhitePaper_Library/Security http://conferences.sigcomm.org/hotnets/2003/papers/honeycomb.pdf http://www.symantec.com/connect/articles/ http://www.ischool.utexas.edu/~netsec/ids.html http://www.designmpire.com/mohteshim.com/projects/anp.pdf http://rogueap.com/rogue-ap-docs/RogueAP-FAQ.pdf http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf