CSCE 465 Lecture 19
« previous | Tuesday, April 2, 2013 | next »
Intrusion Detection System (IDS)
Firewall | Network IDS | |
---|---|---|
Monitoring | Passive | Active |
If it fails | Fail-Close | Fail-Open |
Network IDS Requirements:
- High-speed, large volume monitoring
- Real-time notification
- Separate mechanism from policy
- Extensible (add modules to detect new attacks)
- Broad array of protection
- Frugal with resources
- Resilient to Stress and attacks against IDS itself
Eluding IDS
Insertion Attack
Each letter represents a packet:
- End system sees "ATTACK"
- IDS Sees "ATXTACK"
- Attacker's data stream is "TXTCAAK"
Can be accomplished with "bad" checksum or carefully crafted TTL [1] value.
Evasion Attack
Each letter represents a packet:
- End system sees "ATTACK"
- IDS Sees "ATTCK"
- Attacker stream is "TTCAAK"
This can be accomplished with fragmentation and overlapping packets
Summary
What IDS Sees may not be what the end system gets: IDS needs to perform full reassembly of packets in order to see for sure, but can bog down system.
Hash Functions
(See MATH 470 Lecture 20→)
A one-way function/transformation that produces a fixed-length unique identifier (message digest) for a longer sequence of data
E.g. MD5 = 128 Bits; SHA-1 = 160 Bits
Properties:
- Performance: Easy to compute
- One-Way: Given , but not it should be computationally infeasible to find
- Weak Collision Resistance (Weak-collision-free): Given , it's computationally infeasible to find such that
- Strong Collision Resistance (Strong-collision-free): Computationally infeasible to find and such that
Length of Hash Image:
- Too long: unnecessary overhead
- Too short: (birthday paradox) easy to find collisions
Application: Commitment Protocol
- Alice picks and sends to Bob
- Bob picks his number and sends it to Alice.
- Alice sends
- Bob verifies
if Hash function is not a good one, it can be easy for either Alice or Bob to cheat.
Application: Message Encryption
- Alice and Bob share a secret key , but don't want to use encryption of the message with
- Alice sends encrypted random number to Bob
- Bob sends encrypted random number to Alice
- Concatenation is used as IV into OFB, where is encryption function to produce a one-time pad
Is reverse possible? can encryption be used to generate hash?
Footnotes
- ↑ Time to Live is the number of hops that the packet should be sent before it is dropped. Each router hop decreases this value by 1. For example, a packet with TTL=3 will be sent for 3 hops, and when the TTL reaches 0, the packet will be dropped.