08. Monitoring and Detecting Intrusions

Simplicity is the ultimate sophistication

Intrusion detection systems: IDS

In recent news: Microsoft Teams GIFShell Attack

Convince user to install a stager. Once done:

Hardware

Hardware-level Protection Mechanisms

Intel requires that privilege level can only be changed by kernel processes:

ARM uses TrustZone to:

Hardware sandboxing with CHERI (ARM):

Issues with enclaves:

Mobile Platforms

OS:

App management:

Permissions:

Monitoring and Response

MAPE-K control loop

(Monitor, Analyze, Plan, Execute), Knowledge.

Circa 2003, need for autonomic managers overlooking the functioning of running systems:

Using a knowledge source (log files, system events):

Exercise: MAKE-K on Assignment 2 Codebase

Quality attributes:

Base Rate Fallacy

Assuming that ‘interesting’ events are uncommon:

People cannot go through a thousand events to find the one true positive:

Intrusion Detection Systems

These can be categorized into three main techniques:

Factors to consider:

Snort:

All IDSes have a pipe-and-filter architecture, with the fastest, most basic rules being applied first to remove the most obvious bad packets.

Networking

LANs:

Ethernet:

TCP:

DDoS:

IDSs contain rules to detect suspicious activities:

DNS poisoning: