DOC PREVIEW
SJSU CS 265 - Tripwire

This preview shows page 1-2 out of 7 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Tripwire: A File System Integrity Checker For Intrusion DetectionMeera BelurABSTRACTINTRODUCTIONFiles stored in the file system include user data, applications data, and system executables and databases. As such, it becomes a natural target of an attack for an intruder. An intruder could change one or more system files enabling future unauthorized access.The responsibility of the system administrators is to closely monitor which files have been altered or tampered with and take necessary actions. As such, UNIX System administrators are faced with difficulty to detect damages to these files and monitor the integrity of the file system contents. The standard check listing schemes like maintaining checklists, checksum records that are available in UNIX systems are not trustworthy and useful.Some of the shortcomings of the standard check listing schemes are list of files and associated checksums may be very hard to maintain. An intruder can make changes to the file contents without even changing the checksum generated for that file so that the changes made to the file gets unnoticed.In order to aid System Administrators in Intrusion detection, Tripwire is an Intrusion detection tool, which provides an efficient way of detecting anomalies in the file system. It looks for behavior that deviates from normal system use.In a system, files are constantly updated and if an intrusion detection tool reports every changed file then amount of data that has to be interpreted by the system administrators becomes huge. Consider a scheme where there are reports for ownership file changes and for changes in access timestamps for thousands of files. In that case, it is possible that changes in timestamp reports may obscure any potential dangerous ownership file changes and may go unnoticed by the system administrator. However, in some cases, changes to a file’s access stamp may be of interest. In such cases, “trap files” could be placed as tripwires against intruders. Tripwire generates output that is easy to scan by allowing selective files to be monitored. Usually the files that are selected for monitoring are the files that are not subjected to change a lot and any change to those files are of concern. For example, changes in system log files are expected, but a change in inode number, file modes or ownership is a cause of concern. In simplest terms, Tripwire creates a secure database of file and directory attributes including their signatures, which then can be used to compare against to see if a file or directory has changed somehow. Any differences are reported. When run against system files on a regular basis, any changes in critical system files will be spotted -- and appropriate damage control measures can be taken immediately. Tripwire uses several checksum/message-digest/secure-hash/signature routines to detect changes to files. The hash function is based on the contents of the file on which the function is applied, which are computationally infeasible to reverse engineer. You can customize Tripwire to use specific signature algorithm out of the many algorithms supported for each object.DESIGN AND IMPLEMENTATIONDatabase Initialization ModeIntegrity Checking ModeDatabase Update ModeInteractive Database Update ModePSEUDOCODEGLOSSARYBIBLIOGRAPHYTripwire: A File System Integrity Checker ForIntrusion DetectionMeera BelurCS265: Computer Cryptography and Security, Fall 2002Email: [email protected] in computer systems is important so as to protect the integrity of stored information. The file system provides mechanism for storage and access to data and programs in a computer system. Information residing on a file system is valuable and should be monitored for unauthorized and unexpected changes to protect the system against intrusion. In a network platform, monitoring these changes becomes quite a daunting task. Tripwire is a tool that aids UNIX system administrators to check for any changes that are made on selective set of files, directories, and databases. It notifies the system administrator of altered or corrupted files so that the system administrator can take actions in a timely manner. This paper describes the intrusion detection mechanism provided by Tripwire and also the design and implementation of Tripwire.INTRODUCTIONFiles stored in the file system include user data, applications data, and system executables and databases. As such, it becomes a natural target of an attack for an intruder. An intruder could change one or more system files enabling future unauthorized access. The responsibility of the system administrators is to closely monitor which files have beenaltered or tampered with and take necessary actions. As such, UNIX System administrators are faced with difficulty to detect damages to these files and monitor the integrity of the file system contents. The standard check listing schemes like maintaining checklists, checksum records that are available in UNIX systems are not trustworthy and useful. Some of the shortcomings of the standard check listing schemes are list of files and associated checksums may be very hard to maintain. An intruder can make changes to the file contents without even changing the checksum generated for that file so that the changes made tothe file gets unnoticed. In order to aid System Administrators in Intrusion detection, Tripwire is an Intrusion detection tool, which provides an efficient way of detecting anomalies in the file system. It looks for behavior that deviates from normal system use. In a system, files are constantly updated and if an intrusion detection tool reports every changed file then amount of data that has to be interpreted by the system administrators becomeshuge. Consider a scheme where there are reports for ownership file changes and for changes in access timestamps for thousands of files. In that case, it is possible that changes in timestamp reports may obscure any potential dangerous ownership file changes and may go unnoticed by the system administrator. However, in some cases, changes to a file’s access stamp may be of interest. In such cases, “trap files” could be placed as tripwires against intruders. Tripwire generates output that is easy to scan by allowing selective files to be monitored. Usually the files that are selected for monitoring are the files that are not subjected to change a lot and any change to those files are of concern. For example, changes in system log files are


View Full Document

SJSU CS 265 - Tripwire

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download Tripwire
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Tripwire and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Tripwire 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?