intrusion detection systems correlation: a weapon of mass ... · alert information is inherently...

79
Outline Introduction Correlation Visualization Conclusion Appendices Intrusion Detection Systems Correlation: a Weapon of Mass Investigation Pierre Chifflier Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France CanSecWest Vancouver 2008 Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 1/ 69

Upload: others

Post on 10-Aug-2020

11 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Intrusion Detection Systems Correlation:a Weapon of Mass Investigation

Pierre Chifflier Sébastien Tricaud

INL101/103 Bvd MacDonald

75019 Paris, France

CanSecWest Vancouver 2008

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 1/ 69

Page 2: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

1 Introduction

2 Correlation

3 Visualization

4 Conclusion

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 2/ 69

Page 3: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Raiders of the lost meta-IDS

What are IDSs?

Intrusion Detection SystemsMarketing folks may call it

Intrusion Prevention System (IPS)1

Security Information and Event Management (SIEM)

Since IPS and SIEM sound too 2005, we stick to IDS

1To prevent an attack, we should first detect it ;)Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 3/ 69

Page 4: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Raiders of the lost meta-IDS

What are they?

Host IDS (HIDS): Not (really) prone to false positives

Network IDS (NIDS): Cannot decrypt unknown encryptedtraffic, is not the target machine and sensitive to falsepositives

Hybrid IDS (HbIDS): Mixes HIDS and NIDS

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 4/ 69

Page 5: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Raiders of the lost meta-IDS

Interesting sources of information out there

Why do we keep our interest in Hybrid IDS when we havemore than just NIDS and HIDS ?

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 5/ 69

Page 6: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Raiders of the lost meta-IDS

Interesting sources of information out there

Why do we keep our interest in Hybrid IDS when we havemore than just NIDS and HIDS ?Low Level Sources:

Routers : Cisco, Linksys, Juniper, . . .Firewalls : Netfilter, NuFW, Checkpoint, pf, . . .Operating systems : System logs, users, running applications,. . .Physical : Alarm, . . .

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 5/ 69

Page 7: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Raiders of the lost meta-IDS

Interesting sources of information out there

Why do we keep our interest in Hybrid IDS when we havemore than just NIDS and HIDS ?Low Level Sources:

Routers : Cisco, Linksys, Juniper, . . .Firewalls : Netfilter, NuFW, Checkpoint, pf, . . .Operating systems : System logs, users, running applications,. . .Physical : Alarm, . . .

High Level Sources:Honeypots : Nepenthes, . . .Network : Snort, Sancp, NuFW, . . .Host : Auditd (SELinux), Linux PAM, Samhain, Ossec, PreludeLML, ClamAV . . .Scanners : Nessus, p0f, nmap . . .

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 5/ 69

Page 8: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Raiders of the lost meta-IDS

Meta IDS (MIDS)

Hybrid IDS

An Hybrid IDS combines HIDS and NIDS.

Meta IDSA Meta IDS (MIDS) mixes any element that can send datauseful for intrusion detection as a whole

Prelude IDSPrelude IDS has evolved to a Meta IDS

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 6/ 69

Page 9: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Raiders of the lost meta-IDS

Examples of alerts :

OSSEC: SSHD authentication success.

Prelude LML: Admin login successful

Snort: BLEEDING-EDGE SCAN NMAP -f -sS

ClamAV: Eicar-Test-Signature (succeeded)

Auditd (SE Linux): App Abnormal Termination

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 7/ 69

Page 10: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Raiders of the lost meta-IDS

Correlation path

Meta-IDS Filter Enhancement

Reaction Reconstruct Find relations

Alerts Filtered alerts

Enhanced alerts

Correlated alertsAttacks

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 8/ 69

Page 11: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

The correlation challenge

What everybody knows: IDS limitations

Too much information

Limited view

False positives

False negatives

Evasion (fragmentation, signature, time, . . . )

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 9/ 69

Page 12: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

The correlation challenge

IDS correlation

To limit IDS pitfalls, we need correlationWe need a Meta-IDSWe need a scalable and distributed architecture tocentralize informationWe need to define accurately each alert and each agent

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 10/ 69

Page 13: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

The correlation challenge

The IDMEF: Intrusion Detection Message Exchange Format

Normalize agent alerts regardless of their natureAlert information is inherently heterogeneousIntrusion detection environments are differentAnalyzer capabilities are differentOperating environments are differentCommercial vendor objectives are different

Provides an exhaustive vocabulary to IDS developers andusers

⇒ IDMEF (RFC 4765)http://www.rfc-editor.org/rfc/rfc4765.txt

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 11/ 69

Page 14: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

The correlation challenge

Prelude IDS

Meta-IDS implementing IDMEFlibprelude, libpreludedbPrelude LML: Analyze logsPrelude Correlator: Correlate alerts from agentsPrelude Manager: Centralize and store/deliver/relay alertsPrewikka: Graphical interface

Required capabilities for correlation:Encryption between agents and manager, manager tomanagerFailover , whenever alerts cannot be sent to the managerRelaying to centralize, backup and filter alertsReverse relaying to keep DMZ secureNormalize your alerts: Complete the IDMEF message

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 12/ 69

Page 15: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

The correlation challenge

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 13/ 69

Page 16: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

The correlation challenge

Prelude user architecture

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 14/ 69

Page 17: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

1 Introduction

2 Correlation

3 Visualization

4 Conclusion

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 15/ 69

Page 18: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Correlation

Objectives

What ?

Concentrate on high-level analysis

Reduce noise created by false positives or harmless events

Fight evasion

Discover new attacks

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 16/ 69

Page 19: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Correlation

Objectives

What ?

Concentrate on high-level analysis

Reduce noise created by false positives or harmless events

Fight evasion

Discover new attacks

How ?

Use trust score to improve the reliability

Combine elements from heterogeneous sources (use theMeta-IDS !)

Reconstruct and understand the attack

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 16/ 69

Page 20: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Correlation

Trust score (TS)

TS = severity of the alert × accuracy of the alert

0 (false alarm) < TS < 1 (known and verified attack)

Initial value depending on the alert (analyzer and signaturereliability)

NIDS: high probability of false alerts ⇒ low TS

Will be adjusted during correlation steps

Will be used to take the final decision

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 17/ 69

Page 21: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Correlation

Understand an attack

Objectives :

Reconstruct the sequence of events

Detect the targets, protocols, tools, . . .

Adapt the severity

Reduce false positives

Prepare for an eventual counter-measure

Ensure the Security Policy is properly applied

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 18/ 69

Page 22: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Correlation

Understand an attack

Objectives :

Reconstruct the sequence of events

Detect the targets, protocols, tools, . . .

Adapt the severity

Reduce false positives

Prepare for an eventual counter-measure

Ensure the Security Policy is properly applied

Tools:

Normalization, Centralization

Correlation

VisualizationPierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 18/ 69

Page 23: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Correlation

PSTN

1

2

3 4

5

6

7

VoIP provider network

Registration

Billing

Proxy

Gateway

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 19/ 69

Page 24: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Correlation

PSTN

1

2

3 4

5

6

7

VoIP provider network

Registration

Billing

Proxy

Gateway

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 19/ 69

Page 25: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Correlation

PSTN

1

2

3 4

5

6

7

VoIP provider network

Registration

Billing

Proxy

Gateway

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 19/ 69

Page 26: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Correlation

Meta-IDS Filter Enhancement

Reaction Reconstruct Find relations

Alerts Filtered alerts

Enhanced alerts

Correlated alertsAttacks

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 20/ 69

Page 27: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Correlation

Filtering

Alerts Normalization SelectionThresholdCompress

FilteredAlerts

Normalize input (classification.text, analyzer type)

Apply initial filtering

Compression: replace n alerts by one, keeping allinformation

Threshold: if n > threshold , ignore other alerts (loosinginformation)

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 21/ 69

Page 28: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Correlation

Alerts Normalization SelectionThresholdCompress

FilteredAlerts

Alert Filtered alertSSHD authentication success User login attempt

completion: success

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 22/ 69

Page 29: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Correlation

Alerts Normalization SelectionThresholdCompress

FilteredAlerts

Alert Filtered alertSSHD authentication success User login attempt

completion: successUser login failed (Alice) User login attempt (2 × Alice)User login failed (Alice) completion: failed

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 22/ 69

Page 30: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Correlation

Alerts Normalization SelectionThresholdCompress

FilteredAlerts

Alert Filtered alertSSHD authentication success User login attempt

completion: successUser login failed (Alice) User login attempt (2 × Alice)User login failed (Alice) completion: failed

User login successful (Alice) dropped

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 22/ 69

Page 31: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Correlation

Meta-IDS Filter Enhancement

Reaction Reconstruct Find relations

Alerts Filtered alerts

Enhanced alerts

Correlated alertsAttacks

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 23/ 69

Page 32: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Correlation

Enhancement (enlarge your alerts)

SimpleAlerts

Passive Active ExternalEnhanced

Alerts

Passive Infomation Collection (PIC):

Passive data (OS, applications, versions, inventory)

Profiling (sancp)

OSVDB, BID, CVE, patches, known exploits

Current attacks (DShield)

Passive . . . or not ! (hint: Nessus)

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 24/ 69

Page 33: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Correlation

Post-enhancement filter

FilteredAlerts

AdditionPost-addition

filterEnhanced

Alerts

Send alerts on spurious changesRe-evaluate alert with additional data

Delete alert or lower trust score if the target is not affectedIncrease trust score if affected

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 25/ 69

Page 34: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Correlation

FilteredAlerts

AdditionPost-addition

filterEnhanced

Alerts

Filtered alert Enhanced alert"THCIISLame IIS "THCIISLame IIS

SSL Exploit Attempt" SSL Exploit Attempt"Host OS: Linux 2.6.24

Reference: isc.sans.org/diary.php?date=2004-07-17

Exploit www.thc.org/exploits/THCIISSLame.c

dropped

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 26/ 69

Page 35: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Find relations

Attack definition

An attack is a sequence of alerts or events with a particularrelation

Attack = n × alerts

n ≥ 1

Classification of the attack can be done after the entirecorrelation

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 27/ 69

Page 36: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Find relations

Meta-IDS Filter Enhancement

Reaction Reconstruct Find relations

Alerts Filtered alerts

Enhanced alerts

Correlated alertsAttacks

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 28/ 69

Page 37: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Find relations

Find relations

EnhancedAlerts Equivalence

Time WindowSimilarities

Archive /Knowledge base

CorrelatedAlerts

Equivalence

Similarities, during a time window (source, destination,attack vector, . . . )

Archive / knowledge database (known patterns)

Search on a long time range

Regular events

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 29/ 69

Page 38: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Find relations

1. Scan

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 30/ 69

Page 39: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Find relations

1. Scan

2. Connection

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 30/ 69

Page 40: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Find relations

1. Scan

2. Connection

3. Connection

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 30/ 69

Page 41: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Find relations

EnhancedAlerts Equivalence

Time WindowSimilarities

Archive /Knowledge base

CorrelatedAlerts

Enhanced Alert Correlated alertPort scan + Sequence

Incoming connection + 3 elementsOutgoing connection

source/destOSSEC SSH login attempts

SSHD authentication success (Alice) + (1 × Alice)Prelude LML

User login successful (Alice)

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 31/ 69

Page 42: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Find relations

Meta-IDS Filter Enhancement

Reaction Reconstruct Find relations

Alerts Filtered alerts

Enhanced alerts

Correlated alertsAttacks

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 32/ 69

Page 43: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Find relations

Attack reconstruction

CorrelatedAlerts

SequenceReconstruction

Attackrecognition

IdentifiedAttacks

Need moreInformation Command

Try to reconstruct the attack (events and timeline)

Match vs patterns of known attacks

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 33/ 69

Page 44: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Find relations

CorrelatedAlerts

SequenceReconstruction

Attackrecognition

IdentifiedAttacks

Need moreInformation Command

Correlated Alert AttackSequence: Attack

Scan + High success probabilityIncoming connection + known patternOutgoing connection

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 34/ 69

Page 45: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Find relations

Meta-IDS Filter Enhancement

Reaction Reconstruct Find relations

Alerts Filtered alerts

Enhanced alerts

Correlated alertsAttacks

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 35/ 69

Page 46: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Find relations

Trust Score evaluation

SensorsEvent

Manager

CorrelatorSensor Alert

CorrelatorAlert

Operator

DB

Commands

Attack is reconstructed and identified

Trust Score is part of the decision to react

Ability to capture the whole session by sending commandsto agents

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 36/ 69

Page 47: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Find relations

Reaction

Report problem (mail)ArchivePrepare a visualizationCounter-measure

(try to) block attack (dangerous !)Collect more informationSend commands to agents

Notify

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 37/ 69

Page 48: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

1 Introduction

2 Correlation

3 Visualization

4 Conclusion

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 38/ 69

Page 49: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Graphical representations

IDS visualization

Required to manage large amount of data

Helps to focus on what is important

Uses the human correlation engine

Helps to write correlation signatures

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 39/ 69

Page 50: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Graphical representations

Problem

Alert are complex objects

Numerous criteria (N-dimensional plot)

How to graph correctly?

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 40/ 69

Page 51: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Graphical representations

Visualization techniques

What we use:

Parallel coordinate plot

2D nodes

3D nodes

Starplot

Other (Treemap, . . . )

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 41/ 69

Page 52: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Graphical representations

2D nodes

Graphviz makes easy to use relations

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 42/ 69

Page 53: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Graphical representations

Starplot

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 43/ 69

Page 54: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Graphical representations

Visualization dilemma: take the right parameters for the rightgraph

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 44/ 69

Page 55: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Graphical representations

Visualization dilemma: take the right parameters for the rightgraph

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 45/ 69

Page 56: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Graphical representations

Relevant parameters from IDMEF paths

Source (alert.source(0).node.address(0).address)

Destination (alert.target(0).node.address(0).address)

Impact (alert.assessment.impact.severity)

Completion (assessment.impact.completion)

Attack vector (alert.classification.text)

Agent type (analyzer(0).class)

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 46/ 69

Page 57: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Graphical representations

Code 1/3

Based on Prelude IDS

High-level language

Python + Prelude Easy bindings

svn co http://svn.prelude-ids.org/libprelude/

branches/libprelude-easy-bindings

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 47/ 69

Page 58: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Graphical representations

Code 2/3

How to get alertsfrom PreludeEasy import *

client = ClientEasy("pig", Client.IDMEF_READ)client.AddConnection("192.168.33.215")client.Start()idmef = client.RecvIDMEF()

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 48/ 69

Page 59: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Graphical representations

Code 3/3

Graph Objects (GO!)pen = QtGui.QPen()pen.setColor(colorize_impact_severity(idmef))

line1_y = GetYPos(idmef.Get("alert.target(0).node.address(0).address"))

line2_y = GetYPos(idmef.Get("alert.classification.text"))

scene.addLine(line1_x, line1_y,line2_x, line2_y,pen)

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 49/ 69

Page 60: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Graphical representations

Prelude IDMEF Grapher (pig)

Shows IDMEF paths

Uses Prelude IDMEF pool

Interesting to quickly understand a scanner

Snort and LML are used as agents

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 50/ 69

Page 61: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Examples

Saint: 166 alerts generated

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 51/ 69

Page 62: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Examples

Retina: 76 alerts generated

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 52/ 69

Page 63: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Examples

Nessus: 1019 alerts generated

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 53/ 69

Page 64: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Examples

RTGraph3d

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 54/ 69

Page 65: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Examples

GraphGL

We were jealous of rtgraph3d ;-)

Available at http://www.dindinx.net/graphgl/

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 55/ 69

Page 66: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Examples

Wolfotrack: Netfilter connection tracker made easy

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 56/ 69

Page 67: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Examples

Visualization Pros and Cons

Starplot 2D 3D Parallel Coordinate PlotLarge number of alerts No No Yes YesLarge number of criteria No Yes Yes YesTime base representation No No No YesEasy to read No Yes Yes YesLive filtering No No Yes Yes

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 57/ 69

Page 68: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Examples

Summary

Visualization is still under construction

Until now, parallel multi-axes view is the best we’ve found

We still do not know the best view for the best criterion

There is not just one good visualization

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 58/ 69

Page 69: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Future work

Understand application layer better

For how long should we monitor an attack ?

Write more correlation rulesets

Find better visualization models

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 59/ 69

Page 70: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Acknowledgment

INL staff

Yoann Vandoorselaere

Philippe Saadé

David Odin

RV Martin

Elodie and Anthony

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 60/ 69

Page 71: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Questions ?

Thank you for your attention

Contact us !Pierre Chifflier <[email protected]> https://www.wzdftpd.net/blog

Sébastien Tricaud <[email protected]> http://www.gscore.org/blog

INL http://www.inl.fr

Prelude IDS http://www.prelude-ids.org

Prelude IDS Trac http://trac.prelude-ids.org

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 61/ 69

Page 72: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

References

References

Conti, G.: Security Data Visualization. No Starch Press, SanFrancisco, CA, USA (2007)

Valdes, A., Skinner, K.: Probabilistic alert correlation. LectureNotes in Computer Science 2212 (2001)

Schultz, E.: Intrusion detection event correlation: Approaches,benefits and pitfalls (March 2007) CERIAS Security Seminars.

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 62/ 69

Page 73: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

References

Prelude user architecture

DB

Backup Manager

DB

Sensor

Sensor

Sensor

Sensor

Manager Manager

Frontend

Correlator

Correlator

Manager

Sensor

Sensor

Sensor

Super Manager

Administration

DB

Request

Reply

DMZ

Replication

CorrelatedAlerts Alerts

Alerts

AlertsAlerts

Frontend

CorrelatedAlerts

��

��

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 63/ 69

Page 74: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

NuFW

Example: NuFW

Example of agent: NuFW (http://www.nufw.org)

authenticating firewall, based on user identityProvides a native Prelude module for logAdd information on users on each connectionAdd valuable information for correlationAllows to strictly apply the Security Policy

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 64/ 69

Page 75: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

NuFW

Example of alert: NuFW (1)

Example of IDMEF alert, with interesting fields.

Alert emitted for a new HTTP connection using Firefox.

messageid: 5478076470analyzer(1):

analyzerid: 2334565015741136name: nufwmanufacturer: http://www.nufw.org/model: NuFWversion: 2.3.0 ($Revision: 3475 $)class: Firewallostype: Linuxosversion: 2.6.20-15-386process:

name:pid: 15197

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 65/ 69

Page 76: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

NuFW

Example of alert: NuFW (2)

create_time: 29/06/2007 11:26:24.0 +02:00classification:

text: Connection openeddetect_time: 29/06/2007 11:32:56.0 +02:00analyzer_time: 29/06/2007 11:32:56.642005 +02:00source(0):

spoofed: unknown (0)node:

category: unknown (0)address(0):

category: ipv4-addr (7)address: 192.168.0.2

user:category: application (1)user_id(0):

type: current-user (1)name: polluxnumber: 1000

process:name: firefoxpath: /usr/bin/firefox

service:iana_protocol_number: 6iana_protocol_name: tcpport: 3489

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 66/ 69

Page 77: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

NuFW

Example of alert: NuFW (3)

target(0):decoy: unknown (0)node:

category: unknown (0)address(0):

category: ipv4-addr (7)address: 82.165.85.221

service:iana_protocol_number: 6iana_protocol_name: tcpport: 80

assessment:impact:

severity: low (2)type: user (5)description: Connection state changed

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 67/ 69

Page 78: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Attack classification

Our attack classification:Authentication

Local userSystem userAdmin userOther

ProbeProtocolScanSniffUsersOther

CorruptionFileApplicationOther

Availability (Denial of Service)Resource consumptionUser account lockingApplication crashOther

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 68/ 69

Page 79: Intrusion Detection Systems Correlation: a Weapon of Mass ... · Alert information is inherently heterogeneous Intrusion detection environments are different ... Intrusion Detection

Outline Introduction Correlation Visualization Conclusion Appendices

Attack classification

Our classification

The alert itself is not sufficient to find the category

Use the alert (low-level), correlation, to find the type(category) of the attack

No global catch-all category (one per section)

clear separation between the goal and the type

Don’t mix the goal with the type of the attack: A filecorruption may be used for Probe as well as for Penetrate(the same exploit is often used for Probe and Penetrate)

We group attack means in each defined Goal

Pierre Chifflier, Sébastien Tricaud INL 101/103 Bvd MacDonald 75019 Paris, France

Intrusion Detection Systems Correlation: a Weapon of Mass Investigation 69/ 69