Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
نویسنده
چکیده
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The proposed concept is a pump-in-the-stack approach. This means, that NIDS-features are integrated into the network stack of our operating systems. Using the native stack is important, since this is the only place in our operating systems where we can get access to all packets (passing the stack) in realtime quality. The idea is to make use of already existing knowledge about state transitions, memory content, header information, and packet payload. This is very similar to stack hardening. But while hardening mechanisms are limited to block malicious traffic (violating RFC793), the proposed approach is to collect as much evidence as possible and to do some simple forensic analysis. Knowing that IPv4 is not suitable to collect information about the actual source of an attack, but there is no real difference to traditional IPv4 based forensic analyses. In addition to simple stack hardening mechanisms, the advantage of the proposed approach is to start forensic analysis long time before the host is going to become a “pathologic case”. Maybe that collecting forensic evidence and the preservation of collected information is inappropriate in the case of intrusion detection systems (IDS). But IDSs are the most likely candidates (at least in the absence of alternatives) to collect forensically pristine evidentiary data, if realor nearly realtime behaviour is required [1]. To verify this statement, two prototypes were built (representing the two most popular categories of operating systems) and stack-based intrusion detection mechanisms have been integrated into the network stack.
منابع مشابه
Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملActive Mapping: Resisting NIDS Evasion without Altering Traffic
A critical problem faced by a Network Intrusion Detection System (NIDS) is that of ambiguity. The NIDS cannot always determine what traffic reaches a given host nor how that host will interpret the traffic, and attackers may exploit this ambiguity to avoid detection or cause misleading alarms. We present a novel, lightweight solution, Active Mapping, which eliminates TCP/IP-based ambiguity in a...
متن کاملCS 294 - 28 Network Security - Lecture 10 - Spring 2008 NIDS Evasion
In today’s class, we cover the topic of how to deal evasion problem faced by a Network Intrusion Detection System (NIDS) due to the ambiguity of the monitored network traffic, with emphasis on normalizer [4]. Given that attackers may exploit this ambiguity to avoid detection and cause misleading alarms, our ultimate goal is to remove potential ambiguities and to have NIDS and the end system pro...
متن کاملThe Application Research on Network Forensics
With the development of network technology, computer crime, network forensics as a kind of active network security defense, has gained widely research and application. This article detailed introduces the concept of network Forensics, Forensics process, Forensics model and some common techniques and methods, the analysis of the Realtime Intrusion Forensics and other four kinds of typical networ...
متن کامل