forensics 12/1
Overview of Intrusion Detection Systems (IDS)
Purpose: Monitor and generate messages based on targets.
Types of IDS:
Host-Based IDS: Runs on a single machine.
Network-Based IDS: Operates across a group of computers.
Signature-Based IDS
Functionality: Utilizes a signature list to detect known threats.
Effectiveness: Requires an up-to-date signature list to ensure detection of new attacks.
Abnormal Traffic Detection: Current traffic is assessed to flag any anomalies based on established patterns.
Challenge: New attacks can result in unusual traffic patterns that may go undetected.
Behavior-Based IDS
Operation: Monitors network traffic patterns to detect irregular behaviors.
Challenges:
High probability of false positives due to issues like malfunctioning devices or misconfigured software.
Alarms can be triggered by normal operations if they differ from the learning model of “normal” traffic.
Maintenance: Dedicated teams regularly assess and manage alarms to minimize disruptions in services.
Hybrid IDS
Combines elements of both signature-based and behavior-based systems to enhance detection accuracy.
Snort: A Popular Intrusion Detection System
Popularity: Open-source with the largest user base globally.
Functionality: Offers multiple operational modes:
Sniffing Mode: Monitors traffic without generating alarms.
Alert Mode: Actively detects and generates alerts based on predetermined rules.
Snort Rules Structure: Consists of actions, protocols, directions, source, destination, and message format.
Example Rules:
To alert on TCP traffic if the source IP is outside specified parameters and the destination is valid.
Syslog and Log Management
Purpose of Syslog: Centralized logging for multiple devices and analysis of network events.
Components of Syslog Messages:
First Part: Timestamps indicating when and from where the log message was generated.
Second Part: Actual content/message from the application generating the log.
Severity Levels: Classifies incidents based on urgency, with code priority values assigned:
Formula for Priority Value: ( ext{Facility Code} imes 8) + ext{Severity Code}
Syslog Configuration
Log Entries Management: Defined rules dictate when and where to save log entries based on message priority.
Examples of Log Configuration: Rule setups determining which logs to collect and where to store them.
Logging Best Practices: Include centralized log storage for protection against tampering and ease of analyses.
Windows Event Logging
Windows Event Logs: Organized into three categories: Application logs, Security logs, System logs.
Accessing Logs: Utilizes Windows Event Viewer which allows the creation of custom views and filters to simplify tracking relevant log entries.
Event ID: A unique identifier associated with specific events, pivotal for filtering and processing log data.
Troubleshooting Log Entries
Importance of Monitoring: Regular checks to ensure that logs are not misleading or manipulated.
Network Forensics Challenges: Data from network devices may not be permanently stored, complicating investigations post-incident.
Diagnostic Entries: Often contain information more useful for development rather than for security assessments.
Firewall Logging
Types of Firewalls:
Stateless Inspection Firewalls: Operate strictly on a per-packet basis.
Stateful Inspection Firewalls: Have memory to track connections and allow stateful connections.
Firewall Logs Requirements: Typically, only critical traffic should be logged to avoid overwhelming log files with unnecessary data.
Monitoring Traffic: Outgoing and incoming traffic should be monitored closely to detect potential security breaches.
Conclusion of Chapter 9
Limited time to cover future chapters, focusing on the main concepts and practical implications of network and log management.
Importance of understanding the principles of IDS, Syslog, and Windows logging to manage security effectively in an organization.