Network Intrusion Prevention

Network-based intrusion prevention is a key component of defense in depth and the ASA/PIX Security Appliance. The purpose of this technology is to recognize and stop attacks when they flow through the appliance. The ASA/PIX version 7 operating system implements two basic forms of network intrusion prevention; one is signature-based, and the other is behavior-based and is called application firewall features.

Signature-based intrusion prevention is similar to the way that antivirus software works on a host. The prevention device looks for a sequence of bytes on the network that matches an attack string; if the string matches, the device can either drop the traffic or report the attack to a logging server. Using the application firewall features, the ASA/PIX version 7 operating system can enforce strict protocol usage, which will protect you against unwanted software such as unencrypted personal messenger services, peer-to-peer file sharing, or software that might tunnel traffic other than web traffic through the HTTP protocol. You can determine the action the security appliance should take if this traffic is encountered. You have the following options:

  • Drop traffic.

  • Report the event to syslog.

  • Drop traffic and report the event to syslog.

  • Reset the connection.

  • Reset the connection and report the event to syslog.

  • Take no action.

Part of the application-based firewall includes user-defined rules. For example, if you know that the longest URL on your web server is 50 bytes, you might want to create a rule that tells the security appliance that any request coming in greater that 50 bytes might be an attack. When the security appliance enforces this rule, it will drop or report traffic that violates this rule depending on how you set it up. You have the same choice of event actions in the previous list if a user-defined rule is triggered.

The ASA/PIX Security Appliance uses signature-based prevention. It's up to the discretion of the security administrator whether traffic will be dropped or only reported.

The signatures used in the ASA/PIX Security Appliance are common attacks and relatively easy to identify, so in this book, we are dropping traffic. In some NIPS implementations where more complex signatures are used, you might not want to drop traffic, because an alarm might not represent an actual attack. We might not want to drop attacks at the security appliance for two reasons:

  • If the security appliance has a heavy traffic load, intrusion prevention might take up additional cycles and slow down network throughput.

  • If there is a chance that the security appliance might drop valid traffic. (This is called a false positive.)

Host Intrusion Prevention

Host intrusion prevention is the final layer of defense in depth. Simply stated, attacks (usually day-zero attacks) might get past the other defensive layers; therefore, an agent on the host must stop the attack on the host or server. CSA is designed for this type of use.

CSA is security software that can recognize when software is acting badly on a host and stop that software from doing damage and stop the host from getting infected with the malicious software.

Automated Host Hardening

CSA modifies system registries to turn off unneeded services and ensures that basic administration functions are operative.

System Behavior Rules Engine

The behavior rules engine stops bad behavior on the system. This behavior includes code being executed from the stack, which is one of the main ways that hackers break into systems. This behavior engine also stops writes to the registry and to key directories on a system. Hackers use all of these methods when attempting to run or install their software on a victim's system, and so CSA can stop many common attacks just with this rule.

Chapter 10, “Deploying Host Intrusion Prevention,” discusses the rules engines in greater detail.

Firewall Rules Engine

CSA has a fully functional firewall engine that behaves similarly to a personal firewall (but is more powerful). It can filter unwanted traffic and ensure that the host running the agent can't start an outbound connection, which might indicate that an attack is in process.

The CSA firewall capability includes a rule called Net Shield, which is capable of fooling traditional scanning tools that determine the operating system of a host or server. These scanning tools rely on certain header bits and the timing of packets to determine whether the host they are scanning is a Linux host or Microsoft Windows host. Net Shield randomly alters these bits, returning false information to those tools so that they give the attacker false information about the makeup of the network.

Application Rules Engine

The CSA application rules engine enforces proper behavior for applications to mitigate any attacks against application vulnerabilities. For example, a browser has a fairly narrow range of functions, such as the following:

  • Browse and update websites using HTTP

  • Browse and update using SSL or HTTPS

  • Write logs to certain directories

  • Run ActiveX and Java in certain contexts

Several actions, if taken by a web browser, indicate that a vulnerability of a browser is being exploited. A well-behaving browser would never do any of the following:

  • Copy cmd.exe to a different name or different location

  • Execute any applications

  • Install applications

  • Write to the registry

  • Write to the system directory

When CSA detects this type of behavior, it kills the process and stops the attack that is in process.

NOTE

For system protection, CSA is one of the most powerful security applications on the market. Note, however, that CSA is designed to work in conjunction with antivirus software. CSA stops attacks, known and unknown, but it does not clean up malicious software. Antivirus protection should be viewed at as a critical additional level of defense in depth on the host.


Global Correlation Engine

CSA also has a powerful feature that can identify attacking machines that might be trying to scan or attack your hosts and stop traffic from those machines. This feature is called the global event correlation engine.

The global event correlation engine is effective in stopping what has become known as the low and slow scan. Global correlation is also effective in stopping virus or worm propagation.

Each time an event is generated by the CSA agent, the agent sends the information to the CSA Management Console (CSA MC). The CSA MC can then make decisions based on repeated attack or malicious behavior events (such as a scan present on the network). After the malicious behavior is recognized, CSA creates a rule to defend against this behavior and makes the new rule available for all the host in the network that are running CSA.

CSA in Action

Take a practical look at how CSA stops attacks. (As mentioned previously, Chapter 10 examines in more detail how CSA mitigates attacks.) Use the attack paradigm discussed in Chapter 1 that illustrates how attackers break into a host or server. Table 2-1 maps the attack phase, attack action, and CSA mitigation engine.

Table 2-1. CSA in Action
Attack PhaseAttack ActionCSA Mitigation Engine
ProbeScan portsGlobal event correlation, firewall engine
Guess passwordsn/a
Ping addressesGlobal event correlation, firewall engine
Guess mail usersn/a
PenetrateMail attachmentsApplication engine
Buffer overflowsBehavior engine
ActiveX controlsApplication engine, behavior engine
Network installsApplication engine, behavior engine
Compressed messagesApplication engine, behavior engine
Back doorsApplication engine, behavior engine
PersistCreate new filesApplication engine, behavior engine
Modify existing filesApplication engine, behavior engine
Weaken registry settingsApplication engine, behavior engine
Install new servicesApplication engine, behavior engine
Register trap doorsApplication engine, behavior engine
PropagateMail copy of attackApplication engine, behavior engine
Web connectionApplication engine, firewall engine
IRCFirewall engine
FTPFirewall engine
Infect file sharesBehavior engine, firewall engine
ParalyzeDelete filesApplication engine, behavior engine
Modify filesApplication engine, behavior engine
Denial of serviceApplication engine, behavior engine, firewall engine
Crash computerApplication engine, behavior engine, firewall engine
Steal secretsApplication engine, behavior engine, firewall engine

NOTE

Some of these attack actions have “not applicable” (n/a) under the mitigation engine. That's because the action can't be stopped, but it doesn't matter. If hackers gain access through that action, CSA stops them when they try to run malicious code.


..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.224.66.196