入侵检测规则基础知识.docx

上传人:b****7 文档编号:9078173 上传时间:2023-02-03 格式:DOCX 页数:8 大小:18.29KB
下载 相关 举报
入侵检测规则基础知识.docx_第1页
第1页 / 共8页
入侵检测规则基础知识.docx_第2页
第2页 / 共8页
入侵检测规则基础知识.docx_第3页
第3页 / 共8页
入侵检测规则基础知识.docx_第4页
第4页 / 共8页
入侵检测规则基础知识.docx_第5页
第5页 / 共8页
点击查看更多>>
下载资源
资源描述

入侵检测规则基础知识.docx

《入侵检测规则基础知识.docx》由会员分享,可在线阅读,更多相关《入侵检测规则基础知识.docx(8页珍藏版)》请在冰豆网上搜索。

入侵检测规则基础知识.docx

入侵检测规则基础知识

入侵检测规则基础知识(Basicknowledgeofintrusiondetectionrules)

Basicknowledgeofintrusiondetectionrules

Networkintrusiondetectionsystemrulereferstoapatternthatweneedtofindinnetworkcommunication.Inorderforyoutobedifferentfromeachother

Therulesofthetypehaveabasicconcept,solet'slookatsomeexamplesandmethodsthatcanbeusedtoidentify.

AconnectionrequestsentfromafixedIP.ThiscanbeeasilyidentifiedbytheoriginaladdressareaintheIPheaderfile.

AcollectionwithanillegalTCPtagpackage.ThiscanbedonethroughknownlegalandillegalcollectionoftagsandTCPheaderfiles

Themarkerscompareanddrawconclusions.

ContainsthespecialvirusE-mail.IDScanbeassociatedwithaknownvirusmessagebythenameofthemailorthenameoftheattachment

Thetitleofguaniscomparedandconcluded.

TheDNSbufferoverflowattemptisincludedinthequeuepayload.YoucananalyzetheDNSdomainandcheckthelengthofeachqueue

Degrees,sothatIDScantellifthereisabufferoverflowattemptintheDNSdomain.Oranotherway,

Tofindoutifthereisanoverflowprograminthepayloadqueue.

AdenialofserviceattackonaPOP3serverisimplementedbycommittingthousandsofidenticalcommands.Thewaytodealwiththisattack

Itisthenumberoftimesthatthecommandiscommitted,andthealarmwillbeissuedoncemorethanthenumberoftimesitisset.

FileaccessattacksonFTPserversbysubmittingfilesordirectoriestotrytoskipthepreviousloginprocess.Youcanopen

SendatrackingsystemtomonitorthesuccessfullandingofFTPcommunicationsifyoufindsomeonetryingtoadvancethroughthesystem

Incoming,thealarmwillbeissued.

Asyoucanseefromabove,thescopeoftheruleisverybroad,fromthesimplestcheckheadertohighlycomplex,forexample

Truetrackingofconnectionstatusorextensiveprotocolanalysis.Inthisarticle,we'lllookatsomesimplerules,andthen

Discusstheircomplexityindevelopment.NotethattheabilityoftherulechangesindifferentIDS,sothisarticle

Thetechniquesdescribedmaynotbeapplicableinthefirewallyouuse.Forexample,somenetworkIDSproductsareprovidedtocustomers

Theabilitytowriterulesorconfigureexistingrulesisweak,andthereareproductsthatalmostallowyoutocustomizealltheexistingrules

Anddefinealltherulesthatyoucanthinkofinthesystem.AnotherimportantfactortoconsiderissomeIDSproducts

Youcancheckthepayloadpropertiesofaspecificheaderfile,andsomeproductscangiveyoudataonanypartofanypackage.

Whatarethefunctionalservicesoftherule

Whatisthepurposeofintrusiondetectionrules?

Theansweristhatdifferentruleshavedifferentpurposes.Theresultsweneed

Whenanintrusionoccurs,thesystemalertsyou.Butlet'sthinkagain,whydoweneedtocustomizeormodifyourownrules

Then?

Youmayseesomesinglecommunicationonthenetwork,andyouwanttoalertthenexttimesuchacommunicationoccurs.

Youmayhavenoticedthatithasaspecialheaderfile,andyouwanttodefinearuletomatchthisknown

Mark;MaybeyouwanttoconfigureIDStodetectthosethingsthatarenotnormalorsuspicious,

Ratherthandetectingattacksandattacks

Detection.Somerulescantellyouwhichspecificattacksarebeingcarriedout,orifanattackeristryingtotargetavulnerability

Whileotherrulesmerelyindicatethatthereisanabnormalbehavior,ratherthanpointingoutwhichattacksarespecific.Theformerisboundtoflower

Spendmoretimeandresources,butcangiveyoumoreinformation,suchaswhyareyouattackedortheattacker'spurpose

Yao.

Headerfileattribute

Wehavequicklydescribedthetypesofrules,andthenlet'slookatasimplerulefeature:

headerfileproperties.a

Someheaderfileattributesareclearlyabnormal,sowehavetomakealotofoptionsintherules.Theclassicexampleofthisruleisthebelt

TCPpackageSettingswithSYNandFINflags.ThereisoneinRFC793(usedtodefinetheTCPstandard)

Aloopholethatallowsmanytoolstotrytobypassthefirewall,router,andintrusiondetectionsystem.very

Themulti-attackprogramincludesheaderfileattributeswhosepurposeistoviolateRFCsbecausemanyoperatingsystemsandapplicationsarebased

CompliancewithRFCsassumptionsanderrorsincommunicationbasedonthisarenotcorrected.Therearealotofkitsoutthere

Containserrorsorincompletecode,andpackagesmadefromthesetoolscontaintheheaderfileattributesthatviolateRFCs.

Thosepoorlywrittentoolsandvariousintrusiontechniquesprovidediscernibleattributesforwritingrules.

Thissoundsgood,butnotethatnotalloperatingsystemsandapplicationsarefullyinheritedfromRFCs.things

Infact,manysystemsorprogramsviolateRFCatleastontheonehand.So,withthepassageoftime,theagreementispossible

NewattributesarenotincludedintheRFC,andthennewstandardsemerge,turningpreviouslyunjustifiedstandardsintothepresent

Themethod.RFC3168isagoodexample.So,therulesofIDSarecompletelydependentontheRFC

Thatleadstoalotofpositiveerrors.Ofcourse,RFCisstillasignificantpartoftheruledevelopmentbecauseofalotofmalice

TheattackswereallaimedatRFCs.DuetotheRFCupgradeandotherfactors(whichwewilldiscusslater),

Soyouneedtoreviewandupgradeexistingrulesperiodically.

Whileanillegalheaderfileattributeisabasiccomponentoftherule,itisalsoimportanttohavelegitimatebutsuspectheaderproperties.Forexample,

Forconnectionsuspiciousportssuchas31337or27374(theseareoftenassociatedwithTrojanports),ifthisisthecase

ThelinkwarnsthattheTrojanhorsecanbequicklyidentified.Unfortunately,somenormalandbenigncommunicationmayalsobeusedthesame

Theport.Ifyoudon'tusemoredetailedrulestodefinetheotherfeaturesofthecommunication,youwillfinditdifficulttodeterminethetruenatureofthecommunication

Sex.Suspiciousbutlegalproperties,suchassomeportNumbers,arebestconsideredwithotherattributes.

Identifypossiblerulecomponents

Thebestwaytodeveloprulesbasedontheheaderfileattributesisthroughaninstance.Synscanisawidelyusedsweep

Traceandprobesystemtools.

Itwasactiveinearly2001becauseitscodewasoftenusedtomakeit

ThefirststageofbuildingRamenworms.Thisactivityprovidesagoodexample,becausethepackagecontainsalotofknowledge

Don'tcharacteristics.HerearesomeoftheIPandTCPheaderfilesthatexistintheearlywormpropagationintheRamenwormpacket

Sex.(notethatmyIDSisconfiguredtocancelunrequestedcommunicationbydefault,soIcanonlyseeeachattempt

Initialpackage)

1varioussourceIPaddresses

2TCPsourceport21,targetport21

Theservicetypeis0

4IPidentificationnumber39426

5SYNandFINtagSettings

6variousserialnumberSettings

VariousconfirmationnumberSettings

8TCPWindowssizeis1028

NowthatweknowthefeaturesoftheSynscanpackage'sheaderfile,wecanstartthinkingabouthowtomakeagoodone

Therules.Let'slookforillegal,abnormal,andsuspectattributesthatareinmanycases

Thecorrespondingattackertriestoexploitvulnerabilitiesoraspecialtechniqueusedbytheattacker.Althoughnormalpackagepropertiesareincluded

Itoftenincludesrestrictionsonsomecommunications,butthisrestrictiondoesnotmakeforgoodrulecharacteristics.Forexample,wewillmaketheagreement

ThenormalIPprotocolattributeisdefinedas6,sowecanonlylookattheTCPpacket.Butothersareperfectlynormal

Features,suchassettingtheservicetypeto0,areverydetrimentaltothedevelopmentoftherules.

SomeunusualfeaturesoftheSynscanpackagecanbeidentifiedusingthefollowingrules:

OnlytheSYNandFINmarkersareclearlymarkedformaliciousbehavior.

2anotherfeatureisthatthesepacketshavedifferentpropertiesbuttheACKflagisnotset.Ifyoudon'thaveSettings

TheACKmark,theconfirmationnumbershouldbesetto0.

Thereisalsoasuspiciousfeaturethatbothsourceandtargetportsaresetto21,whichisanabnormalFTPserver

Theagentisassociated.IfthetwoportNumbersarethesame,wecallthemreflexive.Inadditiontosomespecialcommunications(suchasspecificNe

TBIOScommunications,usuallyshouldnotexist.Theanti-bodyportdoesnotviolatetheTCPstandard,butismostly

Thenumberofeventsisabnormal.InnormalFTPcommunication,wewillseeahighend(greaterthan1023)

Asthesourceport,thetargetportis21.

Inthisway,wefoundthreefeaturesthatcanbeusedtomaketherules:

SYNandFINmarkers,andtheconfirmationnumberisnot

0andnoACKtagsareset,andthereflexiveportissetto21.Twothingstonotehere:

TCPw

Theindowssizeisoftensetto1028andtheIPidentificationnumbersetsallpackages39426.Usually,we

TheexpectedTCPWindowssizeisgreaterthan1028,althoughthisvalueisnotveryabnormal,butitisalso

Shouldbenoticed.Inthesameway,

IPRFCdefinesIPidentificationNumbersthatshouldhavedifferentvaluesindifferentpackages,so

Fixedvaluesarehighlyquestionable.

Choosearule

Sincewehavefoundfiveelementsthatcanbearule,wehaveanumberofdifferentoptionstodevelopbasedonheaders

Therulesofafile,andagoodruleshouldincludemorethanonefeature.Ifyoujustwanttosetthesimplestrules,then

YoucanusepackagesofSYNandFINtagstosetup.Althoughthisisabetterwaytoidentifybadbehavior,itcan't

Giveareasonwhythishappens.RememberthatSYNandFINareusuallyusedtobypassfirewallsandotherdevices

Theycanactasascanner,informationcollectionorattack.So,the

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > PPT模板 > 国外设计风格

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1