KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT390-01 Intrusion Detection and Incidence.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 5 Network Defenses.
Host Intrusion Prevention Systems & Beyond
Department Of Computer Engineering
INTRUSION DETECTION SYSTEM
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
UNIT 9 SEMINAR – THE LAST ONE  ! Unit 9 Chapter 9 in CompTIA Security + 1 Course Name – IT Introduction to Network Security Instructor – Jan McDanolds,
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
IDS Mike O’Connor Eric Tallman Matt Yasiejko. Overview IDS defined IDS defined What it does What it does Sample logs Sample logs Why we need it Why we.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
UNIT 4 SEMINAR Unit 4 Chapter 4 in CompTIA Security + Course Name – IT Introduction to Network Security Instructor – Jan McDanolds, MS Contact Information:
UNIT 4 SEMINAR Unit 4 Chapter 4 in CompTIA Security + Course Name – IT Introduction to Network Security Instructor – Jan McDanolds, MS Contact Information:
© 2003, Cisco Systems, Inc. All rights reserved. CSIDS 4.0—16-1 Chapter 16 Enterprise Intrusion Detection System Monitoring and Reporting.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 5 – Implementing Intrusion Prevention.
COEN 252 Computer Forensics
1. 2 Device management refers to the IDS Sensor's ability to dynamically reconfigure the filters and access control lists (ACL) on a router, switch, and.
COEN 252 Computer Forensics Collecting Network-based Evidence.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Guide to Network Defense and Countermeasures
Securing Wired Local Area Networks(LANs)
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Unit 4 IT 484 Networking Security Course Name – IT Networking Security 1203C Term Instructor.
Chapter 5: Implementing Intrusion Prevention
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and.
UNIT 3 SEMINAR Unit 3 Chapter 3 in CompTIA Security + Course Name – IT Introduction to Network Security Instructor – Jan McDanolds, MS Contact Information:
Packet Capture and Analysis: An Introduction to Wireshark 1.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
IS3220 Information Technology Infrastructure Security
UNIT 6 SEMINAR Unit 5 Chapter 7 and 8, plus Lab 10 Course Name – IT Network Design Instructor – Jan McDanolds, MS, Security+ Contact Information:
UNIT 8 SEMINAR Unit 8 Chapter 10, plus Lab 12 Course Name – IT Network Design Instructor – Jan McDanolds, MS, Security+ Contact Information: AIM.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Network Management Unit 4 Course Name – IT Network Management Instructor – Jan McDanolds, MS,
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
OSSEC HIDS ● Jonathan Schipp ● Dubois County Linux User Group ● Sept 4 th, 2011 ● jonschipp (at) gmail.com.
Configuring Network Devices
CompTIA Security+ Study Guide (SY0-401)
Instructor Materials Chapter 5: Network Security and Monitoring
Proventia Network Intrusion Prevention System
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
100% Exam Passing Guarantee & Money Back Assurance
Securing the Network Perimeter with ISA 2004
Chapter 5: Inter-VLAN Routing
Chapter 5: Network Security and Monitoring
Getting Started with LANGuardian
CompTIA Security+ Study Guide (SY0-401)
Security+ Guide to Network Security Fundamentals, Third Edition
ISMS Information Security Management System
Home Internet Vulnerabilities
Chapter 4: Protecting the Organization
Introduction to Network Security
Presentation transcript:

KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence Response Instructor – Jan McDanolds, MS, Security+ Contact Information: AIM – JMcDanolds – Office Hours: Tuesday, 7:00 PM ET or Wednesday, 8:00 PM ET

UNIT 5 Agenda for Unit 5 Readings: Chapter 7 and 8 in Cisco book Chapter 7 – Network Intrusion Prevention Overview - Capabilities - Benefits - Limitations - Hybrid IPS/IDS systems - Shared IDS/IPS capabailities Chapter 8 – NIPS Components - NIPS uses sensors to analyze network traffic: standalone appliance sensors, blade-based sensors, and IPS software integrated into the OS

UNIT 5 Unit 5 NIPS Field Trip: NSS Labs View list of reports – most of these cost $$ to view, a few older ones are free.

UNIT 4 REVIEW Unit 4 Review Readings: Chapter 5 – Host Intrusion Prevention Overview - Capabilities - Benefits - Limitations Chapter 6 – HIPS Components - Essential elements of HIPS products: a software package installed on the endpoint (client or agent) AND a management infrastructure to manage the agents

UNIT 4 REVIEW Unit 4 Review Q and A #1 Name one limitation of a HIPS #2 Name two of the most common methods of gathering data for HIPS #3 What is a shim? For Cisco's CSA, name the Windows shims.

UNIT 5 Network Intrusion Prevention Capabilities, Benefits and Limitations Capabilities - Stops intrusion traffic before it enters the network by placing the sensor as a Layer 2 forwarding device. - Dropping a single packet - Dropping all packets for a connection - Dropping all traffic from a source IP Benefits – provides traffic normalization and security policy enforcement

UNIT 5 Network Intrusion Prevention Capabilities, Benefits and Limitations (cont.) Limitations – deployment location impacts effectiveness. Issue of excessive traffic for a single IDS sensor. - Attacker located on the Internet attacks internal network - Attacker located on the internal network attacks another system on the internal network - Attacker located on the internal network attacks a system on the Internet

UNIT 5 Hybrid IPS/IPS System Hybrid provides IPS protection to prevent an attack coming and going to the Internet, plus the same device can watch for attacks between two internal systems. Capabilities: generating alerts, initiating IP logging, resetting TCP connections and initiating IP blocking.

UNIT 5 NIPS Components Types of sensors: standalone appliance sensors, blade- based sensors and IPS software integrated into the OS Capture traffic: atomic operations, stateful operations, protocol decode operations, anomaly operations and normalizing operations Response: alerting actions, logging actions, blocking actions and dropping actions

UNIT 5 Sensor Capabilities Selection of IPS sensors depends upon: Security budget, amount of network traffic, network topology and security staff to operate the components. Sensor Processing Capability – besides bandwidth, consider average packet size and average number of new TCP connections per second Sensor Interfaces – monitor more locations with multiple interfaces Sensor Form Factor – deploy the correct sensor for the location

UNIT 5 Capturing Network Traffic Capturing traffic for in-line mode: Deploying in-line IPS between: two routers, a firewall and a router, a switch and a router, a switch and a firewall, or between two switches Capturing traffic for promiscuous mode: Cisco mechanisms to capture traffic at the switch – Switch Port Analyzer (SPAN), Remote Switch Port Analyzer (RSPAN) and VLAN Accesss Control List (VACL) Mirror Traffic – send a copy of the network traffic

UNIT 5 Analyzing Network Traffic IPS sensor traffic categories: - Atomic operations - Stateful operations - Protocol decode operations - Anomaly operations - Normalizing operations

UNIT 5 Responding to Network Traffic Actions fall into these categories: - Alerting actions - Logging actions - Blocking actions - Dropping actions

UNIT 5 Sensor Management and Monitoring Two categories: small and large sensor deployments Small Sensor Deployments: device monitoring, web-based monitoring, and custom reporting Large Sensor Deployments: sensor appliances, IDS modules, router modules, IOS routers, and PIX firewalls

UNIT 5 Web Field Trip IBM on YouTube 8 minutes video – shows dashboards intrusion-prevention/

UNIT 5 NIPS articles Review documents in Doc Sharing NIST – Guide to Security Log Management SANS – Experimental Study of IDS

UNIT 5 Readings Unit 5 Readings: Chapter 7 and 8 in Intrusion Prevention Fundamentals ALSO Web Readings

UNIT 5 Unit 5 Assignment Review the rubric to see the point totals. Three questions – 15 points each.

UNIT 5 Unit 5 Assignments Download chapters from Doc Sharing Read chapters and web readings Post to Discussion Attend Seminar Complete Assignment – review rubric any questions: Or you can call me