Network Intrusion Detection: An Analysis Handbook 76
Network Intrusion Detection: An Analyst's Handbook | ||
author | Stephen Northcutt | |
pages | 267 | |
publisher | rating | 8/10 |
reviewer | D3 | |
ISBN | ||
summary | Any company or group that is serious about doing Intrusion Detection should read this book. |
I have been learning about real computer and network security since January of this year. Thankfully I have been working under someone who really knows his stuff and once worked with the author, Stephen Northcutt. I have attended SANS '99 in Baltimore and will be at the New Orleans conference in October. I am by no means an expert on security or cracking. However, it is one of the most interesting aspects of what I do. I feel this book will be an essential tool in my career development.
To me the field of computer network security seems like a blossoming flower. Yes, people have been hacking, cracking, and fixing systems since the dawn of computing. However, I firmly believe once the we have recovered from the Y2K hangover, security will be the big buzz. You can already see it happening in the media with the attention certain incidents have had.
So where does Northcutt's book fit in? If you are an admin charged with securing the way your company interacts with other companies, the internet, your internal employees, e-mail, etc. this book can be an excellent resource. Keep in mind that Intrusion Detection is not a starting point. It is an integrated part to the overall picture. Having cool intrusion detection at your site does little good if you don't even have a decent firewall, acceptable use policies, e-mail filters, safe CGI's on your web, and current patch levels to your systems. Yes, you will be able to know where you were cracked from but you will have still been cracked. Likewise, if you don't understand networking and protocols to an advanced admin level this book may be a bit intimidating.
A search for Network Intrusion Detection on Amazon on Monday showed me a total of 3 titles on the subject and Northcutt's was one of them. He is certainly an expert in the field, having been the lead on the Navy Shadow Intrusion Detection Team for DoD, as well as being the current Chief Information Warfare Officer for the U.S. Ballistic Missle Defense Organization.
The Book
The best advice on how to get the value out of this book comes from the opening of chapter 6 which reads "If you do not have a lot of experience with Internet Protocol (IP), here's a suggestion to get the most out of this book: read Chapters 6, 7, and 8 twice." Northcutt starts out with a review of the Mitnick attack on Tsutomu Shimomura's system. The format of using real world examples carries throughout the rest of the book. His writing style is much the same as his lectures at SANS. He draws you in to interact with the examples he has chosen. Instead of just pointing out what he wants you to see he will ask you to think about what part of a given signature is important. Then he'll ask you to go back and look again for what he feels important. I wish textbooks in college were written this way because it helped me learn.
Included with Ch. 1 is a review of TCP/IP packet structure. Chapter Two carries on with introducing signatures and filters. This clearly explains how to tell what particular attack the script kiddie used to bring down your site. The chapter on Architectural Issues is a nice overview of sensor placement, hardware, and other implementation factors. This comes off as a little light with respect to comparing and contrasting, especially with regard to choice of OS. To be fair, these generalities will probably help keep the book relevant in the ever changing world of OS/Hardware combo. The final two chapters prior to the critical 6, 7, and 8 trio, deal with important factors to consider a good IDS solution should have and a review of known commercial and government software. Unfortunately the rapid changes involved in this field prevent a complete overview of all the available products out there. My suggestion is to read Ch. 4 more closely if you are about to make a decision on an IDS. It will help you ask the right questions to get the solution which will best suit your needs.
As I alluded to above, Chs. 6 through 8 are the guts of the book. The tcpdumps give you a real insider's view of what some classic attacks look like. Again, Northcutt is very thourough in what he presents. The exploits, like the IDS solutions, are also an ever evolving series and there is no way to write a book to cover them all. The point here is to begin to educate the eyes of the analyst. Only someone who has an idea of what traffic is normal versus what smells can hope to make good decisions when it comes to sounding the alarm. As Northcutt points out, sometimes the difference is as subtle as what port is being used. He is encouraging in that you can find the signature "fingerprint" of a given attack. He even admits that there are strange patterns he's seen but has not yet solved what tool or script was used to generate them.
Chapter 9's Introduction to Hacking takes you from the target to the attacker. With data from a crack where the attacker forgot to remove the history file, you can see how quickly a box can be 'owned'. Ten gives a look into coordinated attacks while Eleven shows some of the tools of the trade. The final chapters deal with convincing management to do things the right way and gives a taste of where IDS is heading. I don't mean to downplay the importance of these chapters. Keep in mind that the best way to play with cool toys on your job is to have management backing!
Summary
Any company or group that is serious about doing Intrusion Detection should read this book. Northcutt's tongue in cheek humor keeps things from getting too heavy. His reference to the best remote NT administration tool being a car had me chuckling for a while. The information provided is very thorough. His examples are clear and informitive. The areas where I wanted more information, he provides links to help follow up. I wouldn't be surprised if crackers used this as a reference to develop ways around detection and so the cycle will continue. I should also add the book went through technical review by Tim Aldrich, M. Dodge Mumford (of NFR), Judy Novak, and Larry Paccone.
Purchase this book at Amazon.
Contents
Acknowledgments
Tell Us What You Think
Introduction
Shadow History
Shadow Friends
1. Mitnick Attack
2. Introduction to Filters and Signatures
3. Architectural Issues
4. Interoperability and Correlation
5. Network-Based Intrusion Detection Solutions
6. Detection of Exploits
7. Denial of Service
8. Intelligence Gathering Techniques
9. Introduction to Hacking
10. Coordinated Attacks
11. Additional Tools
12. Risk Management and Intrusion Detection
13. Automated and Manual Response
14. Business Case for Intrusion Detection
15. Future Directions
Index
This if offtopic, but... (Score:1)
cheaper at bookpool (Score:1)
oh yeah, it's cheaper at bookpool: http://www.bookpool.com/.x/ej94qos0a0/sm/073570868 1
jnazario
Don't books teaching security also teach cracking? (Score:1)
IP filter works (Score:1)
What I do is deny all ICMP, SYN, IP fragments, any UDP other than my ISP's DNS from their DNS port. If you use ICQ or equivalent linux/bsd/solaris clone, then you should only allow UDP packets from their main server.
Block any spoofed IPs (ones from the internal network that are supposedly coming in on your external interface....such as if you receive a class A IP (10.x.x.x or Class B 192.168.x.x or class C IP 192.168.0.x from your modem ppp0 or eth0 if you have a cable modem) then deny such packets as they are spoofed.
The IP filter homepage has a list of suggested packets to ignore and allow. The best bet is to deny all and work from there. Also, if you plan on doing portscanner, make sure you do it from a non-local host else it will screw up your results (or use nmap which has added functions).
Re:Don't books teaching security also teach cracki (Score:1)
Announcing security holes publicly (via bugtraq or whatever) motivates people to fix the software. Now, if you are stuck on a closed-source system, you have to wait for the company to put together a patch/update. Who knows how long that can take with some companies. Or you can use Open Source software and be assured a fix in hours, or minutes if you fix it yourself.
This is perhaps one of the strongest arguments to use Open Source software on sensitive equipment. You are not stuck disabling a service or just hoping you aren't attacked if the service is important to your business, while waiting for the company to get together a proper fix.
Re:Don't books teaching security also teach cracki (Score:1)
You're not serious are you? This is nonsense and naive at best. You're not familiar with BUGTRAQ are you? BUGTRAQ is a mailing list that is a critical resource for admins all over the world. BUGTRAQ is also a full disclosure mailing list and it is open to anyone to read. Attempting to hide this information will only serve to keep it out of the hands of the people who need it. Clever crackers will find it regardless. Furthermore, open disclosure encourages the fixing of security holes. Hiding this information will lull people into a false sense of security.
Perhaps you should spend some time reading at Security Focus [securityfocus.com] and Packet Storm [securify.com] to understand why full disclosure is a _good_ thing. You are fooling yourself if you thing licensing and attempting to hide security holes will provide any protection whatsoever.
'Maximum Security' (Score:1)
I learnt a hell of a lot. Go get it.
Re:Examples would make the book.. (Score:1)
Re:Some Advice. (Score:1)
Is there a way of mounting / R/O bearing in mind that parts of
axolotl
Re:Intrusion Detection FAQs (Score:1)
Re:cheaper at bookpool - but out of stock... (Score:1)
Fatbrain.com has it for $39.99 (Newriders list)
Amazon.com is $31.99
Buybooks.com as found by
booksearch is lowest at $24.50 and it's listed w/24-48hr shipping!
Edges are for leadin' not bleedin'
Huh? (Score:1)
Or does it merely mean that you can't handle security yourself on your own site, that you need to hire a licensed security consultant?
Either way, it smacks of dictatorship.
--
Re:Intrusion Detection FAQs (Score:1)
I'm sorry, but a lot of newbies and experts alike have found A LOT of value with this document.
Book Search results (Score:1)
Re:Excellent timing (Score:1)
As an answer to your question it has a long description on log-files, how to use them and suggested tools for automaticly checking them, but it is still mostly aimed at prevention rather then finding out how they got in in the first place.
For a list of exploits try bugtrack or rootshell.
The second good thing about LASG is the extensive list of references (also online) for more detailed information.
Re:FYI: Free IDSs (Score:1)
Re:Ping attacks? (Score:1)
i.e. switch off the icmp echo. check linux.com for further details in the tuning section.
Re:Don't books teaching security also teach cracki (Score:1)
Re:.... (Score:1)
Re:Don't books teaching security also teach cracki (Score:1)
"If you outlaw guns, only outlaws will have guns." or something like that...
And yes, who on earth would be responsible for licensing us? Who decides who gets one and who doesn't?
Ping attacks? (Score:1)
Re:Ping attacks? (Score:1)
what can you do about that?
(i guess ishould've phrased the original question better).
Re:Ping attacks? (Score:1)
what can you do about that?
Seems like the easiest thing to do would be to ignore pings for 30 seconds if you recieve more than X in a given time frame.
Kintanon
Re:Rerouting IP Traffic (Score:1)
Yes, you are right that it does take a while for the diplomacy route though. I had to threaten sprint that I would be moving my main DS3 service over to cerf if they didn't get their act together and install the filters I asked for.
----------
Re:Don't books teaching security also teach cracki (Score:1)
I hate to tell you, but bugtraq isn't the only way kids get these exploit scripts. Many are passed around on irc months and/or weeks before they make their way there. If you've ever ventured on efnet, you'll notice half the bots in a number of channels are hacked university/nasa/navy, and other boxes hacked with exploits that were cracked before and after the exploits made their way to bugtraq. If you want an example, I'll give you one. Last year there was an exploit for qualcomm pop3d that would allow anyone to remotely get root. Script kids had the exploit maybe a month before anyone knew about it, and so hacked a couple hundred boxes. Now, word of this made its way to qualcomm, and they did provide a patch. However, most people wouldn't know of the problem and have fixed it if they hadn't read about it on bugtraq.
So how does not mailing these problems to places like bugtraq fix the problem? It doesn't. It may stop a certain group of people from doing so, but it sure as hell won't stop the people who are a real threat.
And as for you alluding to terrorist attacks that kill people as proof that people shouldnt post to bugtraq -- that's just absurd.
----------
Re:Some Advice. (Score:1)
----------
Re:Free NIDS (Score:1)
Pretty often, but I think RealSecure has the functionality to let you define your own intrusions, so you don't have to wait for the update.
Re:Some Advice. (Score:1)
.... (Score:1)
Re:Some Advice. (Score:1)
They describe in detail their (multi-) firewall setup, how they log intrusion events, etc.
Their main advise is like you said: keep the firewall system to a bare minimum of services. It makes configuration and intrusion detection easier.
Get Real (Score:2)
Besides, the *only* way to really know how to secure systems is by trying to bust into them. Some of us call it White Hat Cracking, other just call it common sense. The first thing I do when I think I'm done setting up a network is to pound the hell out of it every way I know how. Generally, if I can't get in, neither can 99% of the baddies out there.
You'll never stop the script kiddies from having access to this info -- making it illegal will only keep it out of the hands of people who need it the most - admins. Security through obscurity is BS; read Cliff Stoll's "The Cuckoo's Egg [amazon.com]" if you need an object lesson as to why.
----
Re:Ping attacks? (Score:2)
----
Re:Excellent timing (Score:2)
Re: (Score:2)
Re:Intrusion Detection FAQs (Score:2)
Low cost, complete IDS (Score:2)
The reason its sold for $40 rather than $4000 is that it runs "non-promiscuous". The personal version is just the "Sentry" version with the sniffing component removed.
Doesn't work on Linux, though :-( But it will detect/block intrusions if the Windows box is used as a router (though that violates the license agreement, it doesn't check).
Re:Examples would make the book.. (Score:2)
Re:.... (Score:2)
I've also looked at Intrusion Dection: Network Security Beyond the Firewall by Terry Escamilla, and it's not bad.
I know I've got another book lying around somewhere, but I can't find it and don't remember who wrote it. :(
"IT is easy to run a secure computer system. You merely have to disconnect all dial-up connections and permit only direct-wired terminals, put the machine and its terminals in a shielded room, and post a guard at the door." - F.T. Grampp and R. H. Morris.
Re:Some Advice. (Score:2)
As well as that, I run a tty watching daemon that monitors user commands and pages me and mails a message if someone tries something especially stupid. I also have the regular userland jailed to prevent regular users from doing something stupid as well.
Another tip for the real sysadm nazi is to mount the filesystem with system commands as read only so that idgits can't install their handy rootkit that prevents you noticing what they are doing.
As well as that, you could also set it up to log certain breaking attempts and to automatically send mail to the set arin administrator of that ip range. That sometimes works and is satisfying when I get a reply back stating that the user doing such a thing was deleted (though you'll never get a response if it is a large ISP and doesn't care at all [see uunet dialup users and no responses for repeated spammers and breakin attempts]).
----------
Re:Ping attacks? (Score:2)
----------
Re:Free NIDS (Score:2)
In other words, use it as a complement to a large network with hundreds of machines not all administrated by you -- but don't think that by itself will stop all problems.
----------
Surefire ways (Score:2)
And while we're at it, cutting the wire is not a surefire way, either. Several years ago, a nasty little Gollum of a burglar stole my machine and the two hundred-odd floppies that made up my software development archives. I was left with only the sadly out-of-date safety-deposit-box copies, and one box of diskettes that I had taken into another room to riffle through, as memoirs of almost three years worth of design and coding. Ah, hell, most of it was crap anyway, and as fast as PCs were changing, it was all for the best, but I didn't think so at the time.
So, in summary, the only surefire way to keep people out of your computer is not to have one. And that sucks almost as much as not being connected. Or not having sex.
Free NIDS (Score:2)
I fully agree that IDSs work best as a part of a greater security infrastructure. This technology is the perfect complement to firewall, just as internal alarm system complements a locked door. How many people *here* would trust only a locked door to protect their computer?
BTW: there are versions of RealSecure (agent, for sure, and I think manager to) that run on NT, Solaris, and (drum roll, please) LINUX, so check it out!
Very Good Read (Score:2)
Licensed (Score:2)
"This kind of information should only be traded among LICENSED security consultants "
Hey guy, I don't mean to burst your bubble but the crackers/hackers that you really should be worried about are security consultants and such. The dangerous ones are those good guys who got stepped on or just got plain bored one day. Don't worry about the script kiddies they are for the most part a harmless pain the butt.
"(yes, we need licensing) because... this is dangerous stuff."
Remember what crackers/hackers are really all about, knowledge and the demand for free access to information. You close that door in their face and you might as well be throwing out propoganda for a cyberspace riot.
Rerouting IP Traffic (Score:2)
The idea that states you should get your ISP envolved is a good one. But you can also set your server up to reroute packets when your server is flooded with ip requests. Most people will reroute the traffic to a fake address in the 192.168.x.x or 10.x.x.x address ranges alotted for NAT. But I guess if your ISP refuses to help like mine did, you could reroute the traffic to their main webserver and see how long it takes them to respond to your request for help. Exactly 6 hrs and 3 DoS attacks later I was conntacted by the one of their senior network engineers. He informed that they would gladly look into the DoS matter if I would stop rerouting traffic to their site. HEHE... Diplomacy is way overrated!
Rerouting the traffic will only do so much, even with a well designed plan for rerouting flood traffic your servers are still vulnerable to DoS. But if you reroute the traffic you will more than likely discourage those plebes who don't understand why their DoS attack wasn't effective in the first place.
Re:Off-topic is myopic (Score:2)
Maybe they are being VERY picky and ping flooding was considered off topic since it's not an intrusion attack but rather a DoS attack?
Bah, just keep in mind that slashdot's system randomly assigns moderating rights to some users for a very limited amount of time. I guess the system is good in general, and like all systems sometimes weird people are given moderation rights (for a short while luckily). It's just frustrating for you since you are the victim, but in general it works ok.
(and yes, my post is definitely off topic)
FYI: Free IDSs (Score:3)
There's one called Snort that's pretty neat at http://www.clark.net/~roesch/security.ht ml [clark.net]
PortSentry is a port scan detector that can be found at http://www.psionic.com/abacus/portsentry [psionic.com]
Northcutt's SHADOW project stuff is at http://www.nswc.navy.mil/ISSEC/CID/ [navy.mil]
Examples would make the book.. (Score:3)
I'm going to have to check this one out.
Re:Ping attacks? (Score:3)
I'm not a sysadmin, nor do I play one on TV, but if you are getting a denial of service, contact your ISP and let them look into it. If they are incompetent pushbutton droids, change to a more enlightened localy owned service that are usually staffed by college students and other smart nerds. If even that isn't an option, well, all I can say is that your ISP only knows the source as pings can be spoofed. Leave them if they don't care about your service.
My recent experience. (Score:3)
I had shadow passwords enabled, but they overwrote
Just goes to show that even after year of admin experience, anyone can get cracked when they do dumb things.
New Riders link (Score:3)
Excellent timing (Score:3)
While buying this book is certainly on our agenda now, we were both wondering if there was any useful information currently on line about the subject. Most of the security stuff I could find was aimed squarely at prevention rather than detection and tracking. While that's a laudable goal, once you've been cracked, it would be nice to know who did it and how.
Not that I would track the little rat weasels down and wear their hides for coats, but knowing which hole to plug first, or again, would make me sleep better at night and urinate more freely during the day. Or is it the other way 'round?
Intrusion Detection FAQs (Score:4)
Network IDS FAQ [robertgraham.com]
This document explains how network intrusion detection systems works and how to use them.
firewall-seen FAQ [robertgraham.com]
This document answers the age old question "I'm seeing XXXX on my firewall, what does it mean?". It also applies to intrusion detection system, it describes today's most common attacks, why the attacker is doing them, and which ones may be false-positives.
Sniffing/wiretap FAQ [robertgraham.com]
Describes how "sniffing/wiretap/eavesdropping" works, which is the technology that IDS is base upon. Also describes how to analyze packets in detail, because when you get attacked, you NEED to be able to pull out a protocol analyzer and look at the attack.
Some Advice. (Score:4)
You also have to keep up on bugtraq. However, that's not going to always help, as people have a lot of these exploits weeks and even months before someone posts the vulnerability there. So that's where intrusion detection comes in. Tripwire and other nice programs work pretty well. You should probably also do a remote syslog or immediate mailings when problems are detected. This includes users or intruders editing or modifying files they shouldn't be, contacting remote ports they shouldnt be, having a local ethernet interface on promiscuous mode, immediate pager or mailing for commands that shouldnt be executed, such as su (use the command yourself, but copy it to another file name, so if someone else uses it, you know its unauthorized).
Now, if your problem is local authorized users, then you can do many things. You can, again, set up some intrusion detection -- or even a jailed login so you can minimize the damage that they can do once logged in. That, as well as limiting how man processes and memory users can take up, just in case you're worried about fork attacks or you just dont want your users using excessive resources.
heh, anyway. Have fun.
----------
Re:Rerouting IP Traffic (Score:4)
Most often the souce of the packets is spoofed and therefore very hard to block while still allowing normal traffic to come through. ISPs don't mind getting involved in helping to find the source of the problem but you must realize that they aren't the problem. This is akin to getting mad at Greyhound for the derelicts they keep dropping off in your neighborhood.
Your ISP is affected by this just as much as you are. ISPs do not, and cannot, buy enough bandwidth to support everyone at full speed. If an ISP sells 10 T-1's to customers chances are the ISP will only have the equivilant of 7 or 8 T-1's of bandwidth to the Internet. It's economically impossible to not oversell bandwidth. Because of this an attack to your connection that goes across the network of your ISP is using precious bandwidth.
You need to get in contact with hte ISP and give them as much data as you can. Simply calling and saying "it don't work" or something along those lines will not get to a solution as fast as getting some details and passing them along. You also need to realize that the ISP is probably just going to figure which incoming Internet connection this is coming from and call his upstream provider giving them the same information you gave. At this point the ISP can no longer do much about it except follow-up. And if you've ever dealt with a Telco or a bigger NSP you'll know how slow and incompetent these guys can be.
Your approach of just IP forwarding the packets to the ISP is not unlike finding unwanted garbage in your lawn and just tossing it to the neighbors lawn.