home *** CD-ROM | disk | FTP | other *** search
-
- Summary of the Trusted Information Systems (TIS) Report on Intrusion
- Detection Systems - prepared by Victor H. Marshall
- ********************************************************************
- INTRUSION DETECTION IN COMPUTERS
- January 29, 1991
-
-
- 1. EXECUTIVE SUMMARY. Computer system security officials
- typically have very few, if any, good automated tools to gather
- and process auditing information on potential computer system
- intruders. It is most challenging to determine just what actions
- constitute potential intrusion in a complex mainframe computer
- environment. Trusted Information Systems (TIS), Inc. recently
- completed a survey to determine what auditing tools are available
- and what further research is needed to develop automated systems
- that will reliably detect intruders on mainframe computer
- systems. Their report #348 was done for the Air Force and
- includes details on nine specific software tools for intrusion
- detection.
-
-
- 2. BACKGROUND. Computer security officials at the system level
- have always had a challenging task when it comes to day-to-day
- mainframe auditing. Typically the auditing options/features are
- limited by the mainframe operating system and other system
- software provided by the hardware vendor. Also, since security
- auditing is a logical subset of management auditing, some of the
- available auditing options/features may be of little value to
- computer security officials. Finally, the relevant auditing
- information is probably far too voluminous to process manually
- and the availability of automated data reduction/analysis tools
- is very limited. Typically, 95% of the audit data is of no
- security significance. The trick is determining which 95% to
- ignore.
-
-
- 3. SPECIAL TOOLS NEEDED. A partial solution to this problem
- could be to procure or develop special automated tools for doing
- security auditing. For example, in the IBM mainframe
- environment, programs such as RACF, CA-ACF2, and CA-TOP SECRET
- are commonly used to control data access and programs such as CA-
- EXAMINE are used to supplement standard systems auditing.
- Nevertheless, most of these generally-available software systems
- do not comprehensively address the problem of intrusion
- detection. In fact, intrusion detection is one of the most
- challenging (security) auditing functions. There are, in fact,
- few existing systems designed to do this, and they must be
- tailored to specific operating systems. Also, they do not
- generally gather auditing information on activities within
- database management systems or application software. Much
- research and development needs to be done before intrusion
- detection will be generally available.
-
-
- 4. REPORT AVAILABLE. In the meantime, however, it would be wise
- to stay abreast of the state-of-the-art in automated auditing
- tools for helping security managers detect intruders. TIS, Inc.
- recently completed a very comprehensive report on the tools
- currently available for intrusion detection and the recommended
- directions for future research. TIS report #348 is entitled
- "Computer System Intrusion Detection, E002: Final Technical
- Report" and is dated September 11, 1990. It was done under
- contract to the Rome Air Development Center at Griffiss Air Force
- Base in New York. TIS report #348 comprehensively covers the
- known intrusion detection techniques. It also reviews the nine
- comprehensive intrusion detection tools currently available or
- under development.
-
-
- a. Intrusion Detection Techniques. Although intrusion
- detection is normally accomplished using software tools, hardware
- tools are potentially more secure because they cannot be easily
- altered. In either case, intrusion detection requires that
- security-related auditing data be collected, stored, and
- analyzed.
-
- (1) Data Collection. Specific events or sequences of
- events must be defined as important enough to cause generation of
- an audit record. Potentially every event has security
- significance, but logging the details of every event would
- probably eliminate any hope of processing efficiency (or even
- effectiveness). Thus, someone must decide which events to log
- and when. Also, as noted earlier, the events logged tend to be
- exclusively operating system events. It would be useful to be
- able to log some events internal to database management systems
- and/or application systems.
-
- (2) Data Storage. Some auditing data can be processed
- in real-time, but most of it will go to an audit log for later
- review. Security is concerned with the extent to which:
-
- - The storage medium for the audit log is
- READ-only and non-volatile,
-
- - The computer system used to store the audit
- log is connected/linked to the one from which
- the auditing data was gathered, and
-
- - The electronic (or manual) data paths are
- protected.
-
- (3) Data Analysis. By far, the most difficult task is
- to analyze the auditing data. A comprehensive audit log will
- certainly be too voluminous for reasonable human processing.
- Thus, the following techniques (in addition to other techniques)
- must be used in some ethical/legal combination to reduce the
- security-relevant audit data to meaningful conclusions:
-
- - User Profiles
- - Anomalies
- - Historical Norms
- - Trend Analyses
- - Probable Scenarios
- - Known System Flaws
- - Threat Probabilities
- - Simulated Intrusions
- - Statistical Sampling
- - Expert System Rules
- - ArtificIal Intelligence
- - Hierarchies of Concern (Levels of Security)
- - Heuristics
- - Neural Networking
-
- (4) User Interface. Finally, the data analysis
- process should have a "friendly" user (i.e., security manager)
- interface that supports rapid learning, minimal frustration, and
- effective results.
-
-
- b. Nine Tools Reviewed. The nine automated tools reviewed
- in some depth in TIS report #348 are:
-
- (1) ComputerWatch Audit Reduction Tool. AT&T Bell
- Laboratories developed ComputerWatch in 1989 to summarize their
- internal audit files produced by System V/MLS, a version of UNIX.
- ComputerWatch could be used on other systems if the appropriate
- changes were made to the format/filter module.
-
- (2) Discovery. TRW Information Systems Division
- developed Discovery in 1986 to analyze access data from their
- credit database housed in a dial-up network of IBM 3090s running
- under the MVS operating system. Because it is application-
- specific, Discovery could not be easily implemented in other
- environments. However, Discovery does process auditing data
- produced by IBM's standard System Management Facility (SMF).
-
- (3) Haystack. Haystack was developed by Haystack
- Laboratories, Inc. for the Air Force Cryptologic Support Center
- in 1988 to analyze data from Unisys 1100/2200 mainframes running
- under the OS/1100 operating system. The actual analysis is done
- on a personal computer (such as the Zenith Z-248) running under
- MS-DOS. Haystack could not be easily implemented in other
- environments.
-
- (4) Intrusion-Detection Expert System (IDES). The
- IDES model was developed by SRI International in 1985 and has
- been implemented on Sun workstations as a research prototype
- under a contract with the U.S. Navy (SPAWAR). A version of IDES
- for IBM mainframes (using the MVS operating system) will soon be
- implemented under a contract with the Federal Bureau of
- Investigation (FBI). IDES is designed to be easily implemented
- in many different environments. The IDES model has been the
- basis for most intrusion detection research to date and it forms
- the conceptual basis for Haystack, MIDAS, and W&S. (NOTE:
- Haystack was covered above. MIDAS and W&S are covered below.)
-
- (5) Information Security Officer's Assistant (ISOA).
- ISOA is an R&D prototype system developed by Planning Research
- Corporation (PRC) in 1989 to analyze data from two types of
- system - the UNIX SunOS and the IBM AT Xenix. The actual
- analysis is done on a Sun 3/260 color workstation. ISOA is table
- driven, so it can easily be used to monitor many different
- environments.
-
- (6) Multics Intrusion Detection and Alerting System
- (MIDAS). MIDAS was developed by the National Security Agency's
- (NSA's) National Computer Security Center (NCSC) in 1988 to
- analyze data from a Honeywell DPS-8/70 computer running the
- Multics operating system (in support of NSA's Dockmaster system).
- NCSC intends to further develop MIDAS so it can process audit
- data from Sun and Apple systems.
-
- (7) Network Anomaly Detection and Intrusion Reporter
- (NADIR). NADIR was developed by the Department of Energy"s Los
- Alamos National Laboratory (LANL) in 1989 to analyze data from a
- unique LANL Network Security Controller (NSC). There are no
- plans to modify NADIR for use in other systems.
-
- (8) Network Security Monitor (NSM). An NSM prototype
- was recently developed by the University of California Davis
- (UCD) and is currently running on a Sun 3/50. NMS was designed
- to analyze data from an Ethernet local area network (LAN) and the
- hosts connected to it. NSM is a research system, but UCD hopes
- to eventually expand it's scope to include real environments,
- real attacks, and perhaps wide area networks.
-
- (9) W&S. W&S is an anomaly detection system that has
- been under development at LANL for the NCSC and DOE since 1984.
- W&S runs on a UNIX workstation and can analyze data from several
- different systems.
-
-
- c. More Research Needed. The specific TIS recommendations
- for further research include the following near-term (1 to 5
- year) and long-term (over 5 year) recommendations.
-
- (1) Near Term Recommendation. The main near-term
- recommendation is to develop and commercially market an audit
- analysis "tool kit" flexible enough to meet the needs of a wide
- variety of security users and of a very dynamic environment.
- This would require that, among other things, someone:
-
- - Study the techniques for coordinating data from
- multiple levels of system abstraction.
-
- - Explore methods for integrating components of
- existing intrusion detection systems into a
- single prototype system.
-
- - Study the uses of neural networks and how they
- might be employed in audit analysis tools.
-
- - Develop the initial design for a proof-of-
- concept prototype to include a statistical tool
- (to develop user profiles), an expert system
- tool (to analyze the data based on predefined
- and consistent rules), and a neural network
- tool.
-
- - Determine the typical level of security
- expertise and perceived needs of a security
- manager who will use these auditing tools.
-
- - Test the prototype tool kit using real/live
- penetration techniques and data.
-
- (2) Long Term Recommendation. The main long term
- recommendation of TIS report #348 is that studies of the issues
- surrounding intrusion detection technology be conducted. These
- issues include:
-
- - Risk Management
-
- - Advanced Tools
-
- - Network Monitoring
-
- - Distributed Processing (of Audit Data)
-
- - Statistical Analysis
-
- - Detection Sensitivity Analysis
-
- - Collusion Among Computer Users
-
- - Distributed Network Attacks
-
- - Intrusion Response (Counterattack)
-
- - Computer User Responses to Intrusion Detection
-
- - Recognition (to Reduce False Positive
- Identifications)
-
-
- 5. TIS REPORT CONCLUSION. TIS report #348 concludes that there
- has been much good scientific study done on intrusion detection
- technologies, but insufficient time has been spent:
-
- - Analyzing precise user needs,
-
- - Determining the most appropriate technologies to use in
- specific situations, and
-
- - Cooperatively sharing the lessons learned from actual
- intrusions.
-
-
-
-
- VICTOR H. MARSHALL
- Systems Assurance Team Leader
- Booz, Allen & Hamilton Inc.
-
-
-
-
-
-