Information technology - Security techniques - IT intrusion detection framework

ISO/IEC TR 15947:2002 defines a framework for detection of intrusions into IT systems. It establishes common definitions for intrusion detection terms and concepts. It describes the methodologies, concepts and relationships among them, addresses possible orderings of intrusion detection tasks and related activities, and attempts to relate these tasks and processes to an organization's or enterprise's procedures to demonstrate the practical integration of intrusion detection within an organization or enterprise security policy.

Technologies de l'information — Techniques de sécurité — Cadre de détection de l'intrusion dans les systèmes des technologies de l'information

General Information

Status
Withdrawn
Publication Date
24-Oct-2002
Withdrawal Date
24-Oct-2002
Current Stage
9599 - Withdrawal of International Standard
Start Date
23-Apr-2008
Completion Date
08-Nov-2025
Ref Project

Relations

Technical report
ISO/IEC TR 15947:2002 - Information technology -- Security techniques -- IT intrusion detection framework
English language
22 pages
sale 15% off
Preview
sale 15% off
Preview

Frequently Asked Questions

ISO/IEC TR 15947:2002 is a technical report published by the International Organization for Standardization (ISO). Its full title is "Information technology - Security techniques - IT intrusion detection framework". This standard covers: ISO/IEC TR 15947:2002 defines a framework for detection of intrusions into IT systems. It establishes common definitions for intrusion detection terms and concepts. It describes the methodologies, concepts and relationships among them, addresses possible orderings of intrusion detection tasks and related activities, and attempts to relate these tasks and processes to an organization's or enterprise's procedures to demonstrate the practical integration of intrusion detection within an organization or enterprise security policy.

ISO/IEC TR 15947:2002 defines a framework for detection of intrusions into IT systems. It establishes common definitions for intrusion detection terms and concepts. It describes the methodologies, concepts and relationships among them, addresses possible orderings of intrusion detection tasks and related activities, and attempts to relate these tasks and processes to an organization's or enterprise's procedures to demonstrate the practical integration of intrusion detection within an organization or enterprise security policy.

ISO/IEC TR 15947:2002 is classified under the following ICS (International Classification for Standards) categories: 03.100.70 - Management systems; 35.030 - IT Security; 35.040 - Information coding. The ICS classification helps identify the subject area and facilitates finding related standards.

ISO/IEC TR 15947:2002 has the following relationships with other standards: It is inter standard links to ISO 28927-8:2009. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.

You can purchase ISO/IEC TR 15947:2002 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.

Standards Content (Sample)


TECHNICAL ISO/IEC
REPORT TR
First edition
2002-10-15
Information technology — Security
techniques — IT intrusion detection
framework
Technologies de l’information — Techniques de sécurité — Cadre de
détection de l’intrusion dans les systèmes de technologies de l’information
Reference number
©
ISO/IEC 2002
PDF disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but shall not
be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this
file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat accepts no liability in this
area.
Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters
were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event
that a problem relating to it is found, please inform the Central Secretariat at the address given below.
© ISO/IEC 2002
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic
or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISO's member body
in the country of the requester.
ISO copyright office
Case postale 56• CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.ch
Web www.iso.ch
Printed in Switzerland
ii © ISO/IEC 2002 – All rights reserved

Contents
1 Scope.1
2 References.2
3 Terms and Definitions.2
4 Introduction to Intrusion Detection.2
4.1 The Need for Intrusion Detection.2
4.2 Types of Attacks .3
4.2.1 Host-based Attacks.4
4.2.2 Network-based Attacks .4
5 Generic Model of Intrusion Detection Process .4
5.1 Data Sources.5
5.2 Event Detection.6
5.3 Analysis.6
5.4 Response . 7
5.5 Data Storage. 7
6 Characteristics of Intrusion Detection. 7
6.1 Data Source. 8
6.1.1 Host-based. 8
6.1.2 Network-based . 9
6.2 Event Detection and Analysis Frequency. 9
6.2.1 Continuous/Near Real-Time. 9
6.2.2 Periodically/Batch Processed. 9
6.2.3 Initiated Only Under Special Circumstances. 9
6.3 Intrusion Detection Analysis . 9
6.3.1 Misuse-based.10
6.3.2 Anomaly-based.10
6.4 Response Behavior.10
6.4.1 Passive.10
6.4.2 Active.10
7 Architecture Considerations.11
8 Management of an IDS .12
8.1 Configuration Management.12
8.1.1 Detection Function.12
8.1.2 Response Function .12
8.2 Security Services Management .12
8.3 Integration with Other Management Systems.12
8.4 Security of Management Operations .13
8.4.1 Authentication.13
8.4.2 Integrity.13
8.4.3 Confidentiality.13
8.4.4 Availability.13
8.5 Management Model .13
9 Intrusion Detection Analysis.14
9.1 Signature Analysis.14
9.2 Statistical Approach .15
9.3 Expert Systems.16
9.4 State-transition Analysis.16
9.5 Neural Networks .16
9.6 User Anomalous Behavior Identification.16
9.7 Hybrid Analysis .16
9.8 Other .16
10 Implementation and Deployment Issues.17
10.1 Efficiency.17
10.2 Functionality .17
© ISO/IEC 2002 – All rights reserved iii

10.3  Personnel for IDS Deployment and Operation.18
10.4 Other Implementation Considerations.18
11 Intrusion Detection Issues .19
11.1 Intrusion Detection and Privacy.19
11.2 Sharing of data on intrusions.20
11.3 Future Standardization .21
12 Summary .21
Bibliography .22
iv © ISO/IEC 2002 – All rights reserved

Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the
specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the
development of International Standards through technical committees established by the respective organization to deal with
particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other
international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In
the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 3.
The main task of the joint technical committee is to prepare International Standards. Draft International Standards adopted by
the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires
approval by at least 75 % of the national bodies casting a vote.
In exceptional circumstances, the joint technical committee may propose the publication of a Technical Report of one of the
following types:
— type 1, when the required support cannot be obtained for the publication of an International Standard, despite repeated
efforts;
— type 2, when the subject is still under technical development or where for any other reason there is the future but not
immediate possibility of an agreement on an International Standard;
— type 3, when the joint technical committee has collected data of a different kind from that which is normally published as
an International Standard (“state of the art”, for example).
Technical Reports of types 1 and 2 are subject to review within three years of publication, to decide whether they can be
transformed into International Standards. Technical Reports of type 3 do not necessarily have to be reviewed until the data they
provide are considered to be no longer valid or useful.
Attention is drawn to the possibility that some of the elements of this Technical Report may be the subject of patent rights. ISO
and IEC shall not be held responsible for identifying any or all such patent rights.
ISO/IEC TR 15947, which is a Technical Report of type 3, was prepared by Joint Technical Committee ISO/IEC JTC 1,
Information technology, Subcommittee SC 27, IT Security techniques.
© ISO/IEC 2002 – All rights reserved v

TECHNICAL REPORT ISO/IEC TR 15947:2002(E)
Information technology — Security techniques — IT intrusion detection
framework
1 Scope
This is a Type 3 Technical Report (TR), which defines a framework for detection of intrusions in IT
systems. Many classes of intrusions are considered. These include intrusions that are intentional or
unintentional, legal or illegal, harmful or harmless and unauthorized access by insiders or outsiders. The
TR focuses on:
• establishing common definitions for terms and concepts associated with an IT intrusion detection
framework,
• describing a generic model of intrusion detection,
• providing high level examples of attempts to exploit systems vulnerabilities,
• discussing common types of input data and the sources needed for an effective intrusion detection
capability,
• discussing different methods and combinations of methods of intrusion detection analysis,
• describing activities/actions in response to indications of intrusions.

This framework explains intrusion detection terms and concepts and describes the relationship among
them. Further, the framework addresses possible ordering of intrusion detection tasks and related
activities.
This TR provides the basis for a common understanding of intrusion detection. This material aims to
assist IT managers to deploy within their organizations Intrusion Detection Systems (IDS) that interact
and work together. This TR should facilitate collaboration among organizations across the world where
collaboration is desired and/or essential to counter intrusion attempts.

This framework document is not intended to cover every possible detail involved in intrusion detection,
such as detailed attack patterns, or statistical anomalies, or the many configurations that an IDS could
have.
© ISO/IEC 2002 – All rights reserved 1

2 References
ISO/IEC TR 13335 (all parts), Information technology – Guidelines for the management of IT
Security
ITU-T Recommendation X.816 (1995) | ISO/IEC 10181-7:1996, Information technology – Open
System Interconnection – Security frameworks for open systems: Security audit and alarms framework

3 Terms and Definitions
For the purposes of this Technical Report, the terms and definitions given in ISO/IEC TR 13335, and the
following, apply.
• attack is an attempt to exploit an IT system vulnerability.

• event is an occurrence of some specific data, situation, or activity.

• exploit is a defined way to breach the security of an IT system through a vulnerability.

• intrusion is deliberate or accidental unauthorized access to, activity against, and/or activity in, an
IT system
• intrusion detection is the process of identifying that an intrusion has been attempted, is occurring,
or has occurred.
• intrusion detection system (IDS) is a technical system that is used to identify and respond to
intrusions in IT systems.
• sensor or monitor is a component/agent of an IDS, which collects event data from an IT system
under observation.
4 Introduction to Intrusion Detection

Over the years fundamental changes have occurred in the IT environment. Personal Computers and
Workstations are nearly everywhere and can be interconnected via networks which provides new
challenges for IT security. However, there are business reasons to connect to the Internet and other
networks despite the fact that there are vulnerabilities that can be exploited.

Enhanced techniques and the greater ease of access to information, as well as, new vulnerabilities, are
being discovered each week. Simultaneously, attacks are being developed to exploit these
vulnerabilities. Intruders are continually enhancing their techniques, and information to aid them is
becoming more and more easily available. Equally important, computer literacy is commonplace, and,
due to the availability of attack scripts and advanced tools, the skills required to launch attacks are
decreasing. Consequently, attacks can be initiated without an individual knowing exactly what occurs
or what harm will result from the attack.

4.1 The Need for Intrusion Detection

The first layer of defence to protect IT systems uses physical and technical controls that should
encompass identification and authentication, physical and logical access control, auditing, and
cryptographic mechanisms. However, it is economically impossible to completely protect every IT
system, service and network at all times. For example, it is difficult to implement access control
mechanisms when the networks being used are global, have no geographical boundaries, and the
difference between an insider and an outsider is not obvious. Furthermore, the traditional perimeter
defense has become less viable because organizations are increasingly relying on remote access by
employees and extended business partners. This IT environment has created complex network
configurations that are very dynamic, and include multiple access points into an organization’s IT
systems and services.
2 © ISO/IEC 2002 – All rights reserved

Firewalls, as an important level of protection, may be used to control perimeter access to IT systems
and services, and can provide a form of event data used in intrusion detection. However, it is
impossible and cost prohibitive to protect against all intrusions. Thus, a layer of defence, simple or
complex, is needed in order to detect intrusions when they occur and to react to them in a safe and
appropriate manner. That layer of defence is the function of an IDS.

Intrusion detection attempts to identify computer misuse or an action that does not conform to security
policy. Typical misuse takes advantage of vulnerabilities in system configuration, poorly designed
software, user neglect and carelessness, and basic design flaws in protocols and operating systems.
Outsiders frequently exploit these vulnerabilities. However, more harm can occur from malicious
behavior by trusted insiders (e.g., disgruntled employees, trading partners, temporary employees) than
from penetrations by outsiders. This is because an authorized user can take advantage of their physical
access, privileges, and knowledge of local security safeguards.
Like every safeguard, intrusion detection has to be justified by an IT security risk analysis and
management process and integrated into the security policies of an enterprise. These aspects are
covered by the Guidelines for the Management of IT Security (GMITS), TR 13335, which provide
guidance on the management aspects of IT security. These aspects include how to identify and justify
the need for safeguards like an IDS. Corporate and the relevant system or service security policy
should state that safeguards be selected as appropriate to manage the risks of intrusion. These
safeguards include those that:

• reduce the chances of intrusions occurring,
• detect and recover effectively from intrusions that may occur.

In the latter situation, if the risks are deemed sufficient, an IDS should be selected. Further, it should be
mandatory for the IDS to be linked to a security incident management (reporting and handling) scheme
as discussed in WD 18044, Information Security Incident Management. That scheme should
encompass a dedicated incident management function to receive incident reports, including regarding
incidents identified by an IDS, conduct investigative analysis, respond and deal with the incidents,
facilitate recovery, facilitate weakness resolution and conduct incident pattern and trend analysis.

Further, there should be feedback from an IDS to refine the information on threats and vulnerabilities in
risk analysis support ‘databases’. This should, in turn, improve the quality of risk analysis and
management reviews.
4.2 Types of Attacks
Attacks on computers and networks can successfully exploit configuration faults, and implementation
faults. They could also exploit conceptual faults of network protocols or services and/or applications,
and could potentially take advantage of abnormal user behavior.

These attacks can give the attacker valuable information about the system, service and/or network that
is to be the focus of an attack. Further these attacks may permit the attacker to access a protected
network or server. Loss of system integrity (e.g., degradation of service), loss of data integrity or
confidentiality during the data transfer, or, loss of integrity or confidentiality for the stored data on a
host are some potential consequences of these attacks.

Attacks can be further broken down and considered as being either host-based or network-based or a
combination of both.
© ISO/IEC 2002 – All rights reserved 3

4.2.1 Host-based Attacks
Host-based attacks are generally considered to be attacks:
• on the application layer (SMTP, DNS, NFS, NIS) (e.g., e-mail forgery, spamming, buffer overflow
attacks, race condition attacks, man-in-the-middle attacks);
• on an authentication system (e.g., attacks utilizing eavesdropping or password guessing);
• that introduce compromising malicious code (e.g., attacks utilizing Trojan horses, worms, or
viruses);
• on WWW services (e.g., attacks aimed at cgi, ActiveX, or JavaScript);
• on system availability (e.g., denial-of-service attacks);
• on the operating system; and
• on network and application management systems (e.g., SNMP attacks).
4.2.2 Network-based Attacks
Network-based attacks are generally considered to be attacks on the:

• physical and data-link communications protocols and the systems that implement them (e.g. ARP-
spoofing, MAC-address cloning),
• network and transport communications protocols and the systems that implement them (IP, ICMP,
UDP, TCP) (e.g. IP-spoofing, IP-fragmentation attacks, buffer overflow attacks, SYN flooding
attacks, Malformed TCP-header information attacks).
5 Generic Model of Intrusion Detection Process
A generic model of intrusion detection can be defined by a set of functions. These functions include:
raw data sourcing, event detection, analysis, data storage, and response. These functions can be
implemented by separate components or be software packages as part of a larger system. The following
Figure 1 shows the manner in which these functions relate to each other.
4 © ISO/IEC 2002 – All rights reserved

Response
Analysis
Data Storage
Event
Detection
Data Source
Figure 1 - Generic Model of Intrusion Detection
The purpose of the event detection function is to detect and provide information about events for use in
the analysis function. This may include eliminating unnecessary data and extracting relevant
information.
The analysis function analyzes and processes input from the event detection function and other relevant
data. Its role is to further refine security-relevant information and to assess the probability that an
intrusion has been attempted, is occurring, or has occurred.
Event detection and analysis can produce large quantities of data. The frequency of event detection and
analysis will affect the amount of data and also contribute to the effectiveness of the intrusion detection
process. This information must be made available to the system’s administrator or a management
workstation.
The data storage function of intrusion detection defines the means to store security-related information
(e.g., attacks which occurred) and make it available at a later time.
The intrusion detection process includes a response function, which provides warnings and possibly
countermeasure capabilities; for example, terminating TCP sessions or modifying router control lists in
the case of network countermeasures. In this way the intrusion detection process may prevent further
attacks from occurring after initial attacks are detected.
5.1 Data Sources
The success of the intrusion detection process depends upon the data sources from which information is
taken for the detection of intrusions or intrusion attempts. The following sources can be delineated:
• Audit data from different system resources:

Audit data records contain messages and status information ranging from a high level of abstraction
to data at a very detailed level showing a chronological stream of events. Useful sources for audit
data are the log files of operating systems, which include the log of system events and activities
generated by the operating system, e.g. audit trails/logs. Applications that record information about
file systems, network services, access attempts, etc, are also good sources for raw data.
© ISO/IEC 2002 – All rights reserved 5

• Allocations of system resources by the operating system:

System monitoring parameters like CPU workload, memory utilization, starvation of system
resources, I/O rate, quantity of active network connections, etc., are interesting to help detect
intrusions,
• Network management logs:
Network management logs provide network device health, status, and device state transition
information,
• Network traffic:
Network traffic provides parameters like the source and destination addresses, as well as the source
and destination ports that are security relevant. Also the different options of the communications
protocols (e.g., source routing, SYN-flag) are useful for the IDS. It is helpful to collect the raw
data at a low level referring to the OSI model, because there are fewer possibilities for the data to
be manipulated prior to collection. If raw data is only gathered at a higher level of abstraction, for
example, from a proxy server, then the information that was present at the lower level may be lost,
• Other data sources:
Other data sources include firewalls, switches and routers, and of course IDS-specific
sensors/monitoring agents.
5.2 Event Detection
An "event" can be simple or complex. Simple events may be events that are commonly part of an
attack but which also occur during normal operation. Complex events may be combinations of simple
events that are highly likely to indicate a particular attack and may occur over an extended period of
time. For example, an event can be an attempt to modify a computer log in its syslog file. An event
need not be evidence of an intrusion in and of itself. Event detectors are the sensory organs of a
complete intrusion detection “system.” These sensors and monitors can be positioned on a network
device (e.g., router, bridge), on a firewall, or on a specific computer (e.g., application server, database
server).
5.3 Analysis
Analysis of events and other relevant data is performed to correlate and refine security-relevant
information and to assess the probability that an intrusion has been attempted, is occurring, or has
occurred.
The analysis function may utilize information or data from many sources. It may use:
• data collected from event detection,
• data that has resulted from previous analysis and deemed relevant for further analyses,
• data generated from the knowledge about how an individual or system is supposed to behave (i.e.
having known tasks supposed to be performed or having actions authorized to be done),
• data generated from the knowledge about how an entity or system is not supposed to behave (i.e.,
from known attacks or from known harmful actions),
• other relevant auxiliary data such as suspected attack source sites, individuals, or localities.
6 © ISO/IEC 2002 – All rights reserved

5.4 Response
The response function presents the appropriate results of the event processing by the analysis
component to the system administrator or the security officer. These results are usually presented on a
management console with a graphical user interface, where the alerts of all supervised IT systems and
networks are brought together. Various ways to inform the system administrator should be provided,
e.g. by e-mail, pager, or by messenger service.
The response function should also help the system administrator to assess the severity of the intrusion
and to make the right decision with regard to implementing the appropriate countermeasures. If a
countermeasure component is included with the IDS, an automated process can be started to curtail the
intrusion or to minimize the consequences of the attack.
The activities of the response function should be consistent with the organization’s incident
management scheme. Some IDS may provide a reaction as the appropriate response. A reaction could
be a re-configuration of an attacked system, the locking of an attacked account, or a protocol-
conformant closing off for a session. This approach helps to minimize the damage an attacker may
cause.
5.5 Data Storage
The data storage function would store the detected events, the audit logs, and whatever data necessary
for the analyses in a database. The results of the analyses, including detected intrusions, are stored in a
database for reporting, as well as for other purposes. The database may contain the collection of
profiles of known attacks, the profiles of normal behavior, and may contain analyses indicating
suspicious events that later can be used for coordination of suspicious event analysis. It can also
contain detailed raw event data collected and preserved as evidence (e.g., for traceability) once a
security alarm is raised. Data retention and data protection policies are needed to address various
concerns such as completion of analysis, data forensics, and evidence preservation.
6 Characteristics of Intrusion Detection
The characteristics of intrusion detection may be divided into functional and non-functional areas as
shown in Figure 2.
Functional characteristics refer to the internal mechanisms of the intrusion detection process, namely its
input information, its reasoning mechanism, and its interaction with an IT system, service or network.
The non-functional area is characterized by the frequency of event detection and analysis.
© ISO/IEC 2002 – All rights reserved 7

Non-functional
Characteristics
Functional Characteristics
Host-based
(Applications, Logs)
Data Source
Network-based
(Network Packets, Frames)
Misuse-based
Intrusion Detection
Analysis
Anomaly-based
Intrusion
Detection Passive
Response
Behavior
Active
Continuous/
Near-real Time
Event Detection
Periodic/Batch
& Analysis
Analysis
Frequency
Initiated only under
Special Circumstances
Figure 2 - Characteristics of Intrusion Detection
6.1 Data Source
The differentiation based on the location of the data source is a predominant one in the world of
intrusion detection. It is based on the kind of input information used for the event detection. There are
two different basic source locations for collecting raw data to be used in event detection and analysis:
hosts and networks. Therefore, these data sources will be called host-based and network-based. Event
logs/security audit trails and system logs from hosts or applications can be examined in the host-based
case. Network packets or frames are primary sources of network-based information, as are firewalls,
switches, routers and IDS-specific sensors/monitoring agents.
6.1.1 Host-based
As noted earlier host-based intrusion detection typically monitors system, event, and security logs in
their environments, i.e., monitors data sources in the host. Other technologies have been included in
host–based intrusion detection. For example, one popular method for detecting intrusions inspects key
system files and executables via checksums at regular intervals for unexpected changes. Another
inspects the log files for changes. When any of the log files change, the intrusion detection process
compares the new log entry with known attack signatures to check if there is a match. The timeliness of
the response is in direct relation to the frequency of the polling interval.
Host-based data sources:
• support a forensic analysis focus on host-specific event data,
• provide monitoring of specific system activities (user logon/logoff activities, file access activity,
attempts to install new executables and/or to access privileged services, system resource usage,
administrator activities such as adding user accounts and changes to key system files and
executables),
• permit the detection of attacks that network-based data sources do not, e.g., attacks from the
keyboard of a critical server.
8 © ISO/IEC 2002 – All rights reserved

6.1.2 Network-based
Network-based intrusion detection data include network management logs, raw network packets or
frames typically extracted by network adapters running in promiscuous mode monitoring and analyzing
all traffic in real-time/near real-time as it travels across the network. It also includes event data from
firewalls, switches, routers and IDS-specific sensors/monitoring agents. Network-based data sources
permit real-time or near real-time detection and response by providing data on suspicious attacks as
they occur (e.g. a denial-of-service attack).

6.2 Event Detection and Analysis Frequency
6.2.1 Continuous/Near Real-Time
In this scenario the event detector continuously looks for occurrences of specific data, situations, or
activities and detects events as they occur. Similarly, analyses are carried out continuously. In other
words, analyses are being done in real-time as opposed to being done periodically or batch processed.
Real-time intrusion detection is not necessarily "real-time" in a strict computing sense. Depending
upon the parameters such as the source of event data and the detection method, a time lag may exist
between the occurrence of an event and the time at which it is detected and reported. Moreover, the
elapsed time between when an attack is initiated and when the target system is penetrated may vary
depending upon the nature of the attack. Therefore, in some cases, the attack may be completed before
it is detected and reported to the proper authority. These delays between the attack and its
corresponding detection may or may not impose a threat depending upon the resilience of the
implemented IDS and the targets it is protecting.
6.2.2 Periodically/Batch Processed
Data or events can be processed on a periodic basis or be batch processed. For example, audit trails or
system logs are generally produced continually but they are processed or analyzed when the load on an
information system is lower, like at night. They may also be spun off onto tape or other storage media
and processed periodically by an auxiliary off-line subsystem. This may also be beneficial in order to
protect registered data.
6.2.3 Initiated Only Under Special Circumstances
Some analysis may only be initiated under special circumstances, such as when a widespread attack has
been identified and is causing dire results. In this case a concentrated effort may be initiated to fully
analyze all aspects of the attack and its consequences. These efforts are sometimes called forensic
analysis and may be used for the purpose of legal action. If legal action is contemplated applicable
rules of evidence will need to be followed.
6.3 Intrusion Detection Analysis
There are two general approaches to intrusion detection analysis: misuse-based and anomaly-based.
Specific methods within each of these categories will be discussed later. Some misuse-based methods
are also known as knowledge-based detection for detection by known attack appearance. Some
anomaly-based methods are sometimes described as behavior-based detection for deviation from
observed behavior.
Anomaly detection focuses on abnormal behavior of users. Normally the analysis in its role as a
detector is bundled with a database in which known attack signatures or the pre-defined rules or
properties of normal user behavior are stored. The analysis function evaluates the probability that the
analyzed event can be considered as an intrusion attempt.
© ISO/IEC 2002 – All rights reserved 9

6.3.1 Misuse-based
Misuse-based intrusion detection refers to the detection of intrusions by precisely defining misuses
ahead of time and watching for their occurrence. Misuse detection methods concentrate on the search
for evidence of attacks based on knowledge accumulated from known attacks and unauthorized activity.
The current prevailing methods use:
• signature analysis,
• expert systems,
• state transition analysis.
These methods will be described in Section 9.
6.3.2 Anomaly-based
Anomaly-based intrusion detection generally involves the search for deviation from a profile of usual
behavior based on observations of a system during normal operation or a profile defined by other
expected use parameters. A profile is a predetermined specific event pattern usually related to a series
of events, stored for the purposed of comparison.
The methods base their decision on the variance of observed behavior from predicted or expected
behavior and usually involve one or more of the following:
• statistical approach or a variation of the statistical approach known as expert systems,
• neural networks,
• user anomalous behavior identification,
• combinations of the above.
These methods will be described in Section 9.
6.4 Response Behavior
Response behavior describes the response of the intrusion detection process to attacks. When a
response has been decided upon it must be protected from interference. If an intruder is able to delete
or alter this communication he can potentially stop the intrusion detection process from carrying out
responses due to detected policy violations.
6.4.1 Passive
If the response is limited to activities within the intrusion detection process itself that do not modify IT
system behavior, e.g., to merely generate alarms on the administrator console, the response is said to be
passive. Passive response systems respond by notifying the proper authority. They do not take any
measures to prevent or limit the damages of an attack.
6.4.2 Active
When the response is to react to the attack by taking either corrective actions (modifying system
behavior) or proactive actions (logging out possible attackers, closing down services), then the response
is said to be active. Active response mechanisms may not only notify the proper authority, but also
initiate countermeasures. These countermeasures often seek to limit the damage inflicted by the attack.
This may be achieved by reconfiguration of other security services such as firewalls and routers. In
some cases counter-attacks or session termination techniques can be utilized to prevent further damage,
although if used they need to be used with caution.
10 © ISO/IEC 2002 – All rights reserved

7 Architecture Considerations
IDS may be implemented in various ways.
Within smaller organizations, or to protect a well defined and relatively independent system, a single
IDS may be a good solution.
In environments with quite large and complex infrastructures for networks, systems, and applications, a
single IDS may not be sufficient or practical to fulfill the requirements of intrusion detection. To meet
these requirements, several IDS may be needed, with each being tailored to a defined subsystem or
component. In such environments, attacks may target several subsystems or components. In another
scenario, an attack may target a specific configuration of the subsystems or components rather than a
vulnerability of a subsystem or component itself. In order to detect an attack in such a scenario, the
event data from several IDS need to be correlated and analyzed.
The goal of an IDS architecture is to implement intrusion detection functionality in an efficient and
effective way. Two primary architectural considerations in this context are the:
• way in which the several IDS are interconnected and interrelated,
• concentration or distribution of tasks within the IDS architecture.
An example of hierarchical intrusion detection architecture is shown in Figure 3.
CCeentntralral CConsonsololee
AnAnalyalyssis/is/
CoCorrelatiorrelationn
EEventsvents//AAlertslerts
EEventsvents//AAlertslerts
AnAnalyalyssis/is/ AnAnalyalyssis/is/
CoCorrelatiorrelationn CoCorrelatiorrelationn

EEventsvents
EEventsvents
EEventsvents
EEventsvents
EEventsvents
EventEventEvent
EventEventEvent
DetectioDetectioDetectionnn/// EventEventEvent
DetectioDetectioDetectionnn/// EventEventEvent
SSSeeensnsnsororor DetectioDetectioDetectionnn/// EventEventEvent
SSSeeensnsnsororor DetectioDetectioDetectionnn///
SSSeeensnsnsororor DetectioDetectioDetectionnn///
SSSeeensnsnsororor
SSSeeensnsnsororor
Raw DataRaw Data
Raw DataRaw DataRaw Data
Raw DataRaw DataRaw Data
Raw DataRaw DataRaw Data
Raw DataRaw DataRaw Data
Figure 3 - Hierarchical Intrusion Detection Architecture
In Figure 3, the outputs of several analysis and correlation components are additionally aggregated for a
higher level of analysis and correlation. As in any multi-tier application infrastructure, there may be
several locations to perform the required functions.
© ISO/IEC 2002 – All rights reserved 11

In a centralized architecture, the event detection and sensor components may simply collect raw data
and send it to a single component for further analysis and correlation. Although this approach has the
benefit of design simplicity, it may not scale well and its use may be appropriate only to smaller
environments.
More scalable solutions may perform some IDS tasks in decentralized components with the aim of
reducing the raw data as early in the process as possible and forward the relevant events to the next
layer of components. A chain of components may further analyze and correlate the event data, passing
only the relevant events or alerts to a final, central, component. Such systems may introduce some very
complex tasks. As an example, this requires configuring the filters and involved analysis and
correlation components in such a way that attack indications find their way to the central component,
and that the right alert is issued.
8 Management of an IDS
Management of systems for intrusion detection is crucial for efficient and effective deployment in
corporate network infrastructures. In order for an IDS to be efficient, the management subsystem must
provide sufficient functionality. This section addresses various management aspects of an IDS.
8.1 Configuration Management
Configuration management provides functions to exercise control over, identify, collect data from and
provide data to entities that are part of the IDS. For the purpose of intrusion detection, configuration
management includes management of the detection function and the corresponding response
mechanisms used.
8.1.1 Detection Function
Configuration of the detection function involves setting the criteria for what events and sequences of
events are violations of the security policy. This may also include describing misuse-patterns and
normal user behavior.
8.1.2 Response Function
The management of the response function determines the system behavior upon a security alarm. This
includes controlling various response-me
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...