Intrusion Detection Systems Dj Gerena What is an

  • Slides: 10
Download presentation
Intrusion Detection Systems Dj Gerena

Intrusion Detection Systems Dj Gerena

What is an Intrusion Detection System • Hardware and/or software • Attempts to detect

What is an Intrusion Detection System • Hardware and/or software • Attempts to detect Intrusions • Heuristics /Statistics • Signatures • Gathers and reports incidents • Sent to console • Trigger a response

Composition of an IDS • Components are added into an existing network • Sensor

Composition of an IDS • Components are added into an existing network • Sensor • Copy a record of all network activity and sends it to the Collector • Determines if an attack is taking place • IDS Manager • Laptop/Desktop with IDS software • Check for alerts • Change settings • Database • Houses network baseline data or attack signatures

Anomaly Based vs. Signature Based IDS • Anomaly Based • Monitors network traffic •

Anomaly Based vs. Signature Based IDS • Anomaly Based • Monitors network traffic • Keeps track of patterns of traffic and information to obtain baseline • If deviation in network behavior is detected, IDS will assume an attack • Higher risk of false positive • Signature Based • Attack Signature database is maintained • Compare traffic to the database • If match is found, alert is sent • Requires constant updates

Network-Based vs. Host-Based IDS • Network-Based • Monitors all traffic on the network •

Network-Based vs. Host-Based IDS • Network-Based • Monitors all traffic on the network • Useful for monitoring non critical systems. • Host-Based • IDS customized to a specific server • Being closer to host allows for greater chance of detection • Prevents threats such as Trojans and backdoors from being installed form within the network

Passive vs. Reactive • Passive • When an attack is detected an alarm or

Passive vs. Reactive • Passive • When an attack is detected an alarm or alter will be triggered • No further action is performed by the IDS • Reactive • Collector will send an alert • Send instruction to firewall and router to block activity from occurring on the network • Response should be managed and assessed, regardless of system being used.

Response to Attacks • If an automatic response was not enacted • Verify that

Response to Attacks • If an automatic response was not enacted • Verify that an attack occurred • Shutdown any necessary ports or processes • Do a quick damage assessment • Once response has been applied • Patch/block vulnerabilities • Verify if attack has ended • Determine whether to lift blocks

Benefits of IDS • Eliminate the need to shut down a network when an

Benefits of IDS • Eliminate the need to shut down a network when an attack occurs • Allows user to observe the type of attack and methods used by the attack to prevent future attacks • The security baseline defines the criteria such as used bandwidth, protocols, ports, and the types of devices that can be connected to each-other.

Sources • http: //www. firewalls. com/blog/intrusion_detection/ • https: //www. sans. org/readingroom/whitepapers/detection/understanding-intrusiondetection-systems-337 • https: //www.

Sources • http: //www. firewalls. com/blog/intrusion_detection/ • https: //www. sans. org/readingroom/whitepapers/detection/understanding-intrusiondetection-systems-337 • https: //www. sans. org/readingroom/whitepapers/detection/intrusion-detection-systemsdefinition-challenges-343 • http: //www. youtube. com/watch? v=O 2 Gz-v 8 Wsw. Q