Intruders: Tran Song Dat Phuc Department of Computer Science and Engineering Seoultech 2014
Intruders: Tran Song Dat Phuc Department of Computer Science and Engineering Seoultech 2014
Intruders: Tran Song Dat Phuc Department of Computer Science and Engineering Seoultech 2014
• HACKERS:
• Those who hack into computers do so for the thrill of it or for
status.
• Attackers often look for targets of opportunity and share the
information with others within the hacking community.
• The intruder took advantage of the fact that the corporate network
was running unprotected services.
• The key to the break-in was the PCAnywhere application.
• The intruder can discover when a vice president walk into his
office as well as see the files on his Windows workstation.
Intruder Behavior Patterns
• HACKERS:
• Benign intruders might be tolerable, they just consume resources
and may slow performance for legitimate users.
• Serious (malign) intruders may lead to big damage, especially in
official or government systems.
The famous
assassinating
President
Kennedy 1963.
Intruder Behavior Patterns
• Intrusion detection systems (IDSs) and intrusion prevention
systems (IPSs) are designed to counter this type of hacker
threat.
• Organizations can consider restricting remote logons to specific
IP addresses and/or use virtual private network technology.
• Computer emergency response teams (CERTs) have
established with the cooperative ventures collect information
about system vulnerabilities and disseminate it to systems
managers.
• The systems administrators will quickly insert all software
patches to discover and fix those vulnerabilities.
• Ex: the versions of jailbreak (offer officially by a third party) on
Iphone, Ipod, Ipad … devices using standard iOS help Apple
Inc. find out vulnerabilities of security and fix them in next
updating of its software.
Intruder Behavior Patterns
• CRIMINALS:
• Organized groups of hackers have become a widespread and
common threat to Internet-based systems.
• Oftenly, attackers cover underground forums to trade tips and
data and coordinate attacks.
• A common target is a credit card file at an e-commerce server.
Attackers attemp to gain root access.
• The card numbers are used to purchase expensive items, and
then posted in carder sites, where others can access and
continue use it.
• IDSs and IPSs can be used for these types of attackers, but
maybe less effective because of the quick in-and-out nature of
the attack.
Intruder Behavior Patterns
• CRIMINALS:
• INSIDER ATTACKS:
• Among the most difficult to detect and prevent.
• Those who already have access and knowledge about the
structure and content of corporate database.
• Can be motivated by revenge or certain special reasons, such as
feeling of entitlement ...
Intruder Behavior Patterns
• INSIDER ATTACKS:
• 2013, Edward Snowden, a computer specialist, former employee
of CIA and NSA, disclosed thousands of classified documents to
the media. The leaked documents have weakened national
security.
Intruder Behavior Patterns
• INSIDER ATTACKS:
• IDSs and IPSs can be useful to counter this attack, combine with
some approaches as follows:
• Enforce least privilege, only allowing access to the resources
employees need to do their job.
• Set logs to see what users access and what commands they are
entering.
• Protect sensitive resources with strong authentication.
• Upon termination, delete employee’s computer and network
access.
• Upon termination, make a mirror image of employee’s hard drive
before reissuing it. It is useful when your company information
turns up at a competitor
…
Summary
Intrusion Techniques
Intrusion Techniques
• The objective of the intruder is to gain access to a system, or
increase the range of privileges accessible on a system.
• The intruder attempts to acquire information that should have been
protected. In some case, this information is user password.
• A system must maintain a file that associates a password with each
authorized user.
• The password can be protected in one of two ways:
• One-way function: the system stores only the value of a function
based on the user’s password. In practical, the password is used
to generate a key for the one-way function and a fixed-length
output is produced.
• Access control: access to the password file is limited to one or a
very few accounts.
Intrusion Techniques
• [ALVA90] reports some techniques for learning passwords:
• The sooner the intrusion is detected, the less damage and the
more quickly recovery can be achieved.
• An effective intrusion detection system acts to prevent intrusions.
• Intrusion detection enables the collection of information about
intrusion techniques that can be used to strengthen the intrusion
prevention facility.
Intrusion Detection
• [PORR92] identifies some approaches to intrusion detection:
• With four vector units per processing node, this works out
to 800,000 encryptions per second on a 128-node
machine and 6.4 million encryptions per second on a
1024-node machine.
Password Protection
• Instead of using a dumb brute-force technique of trying all
possible combinations of characters to discover a password,
password crackers rely on the fact that some people choose
easily guessable passwords.