Security Methods and Practice CET4884

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Guide to Network Defense and Countermeasures Third Edition
FIREWALLS Chapter 11.
Learning Objectives Upon completion of this material, you should be able to:
Security Technology: Intrusion Detection, Access Control and Other Security Tools Chapter 7.
Chapter 13: Intrusion Detection and Prevention Systems
Example of a hub and switch
Learning Objectives Upon completion of this material, you should be able to:
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 13 Intrusion Detection and Prevention Systems By Whitman, Mattord, & Austin© 2008.
Guide to Network Defense and Countermeasures Second Edition
Intrusion Detection Systems and Practices
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion Detection MIS ALTER 0A234 Lecture 3.
seminar on Intrusion detection system
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Introduction Intrusion: type of attack on information assets in which instigator attempts to gain entry into or disrupt system with harmful intent Intrusion.
Principles of Information Security, Fourth Edition
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
COEN 252 Computer Forensics
IIT Indore © Neminah Hubballi
Principles of Information Security, Fifth Edition
Principals of Information Security, Fourth Edition
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Operating system Security By Murtaza K. Madraswala.
Sec 130 Coreen L. Petrella. Intrusion Detection System (IDS) Late 1990’s Works like a Burglar Alarm It detects a violation and activates an alarm Audible.
Chapter 5: Implementing Intrusion Prevention
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Wireless Intrusion Prevention System
1 Figure 10-4: Intrusion Detection Systems (IDSs) IDSs  Event logging in log files  Analysis of log file data  Alarms Too many false positives (false.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Guide to Network Security First Edition Chapter Six Network Monitoring and Intrusion Detection and Prevention Systems.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Role Of Network IDS in Network Perimeter Defense.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
By: Surapheal Belay ITEC 6322 / Spring ABSTRACT NIST , guide to intrusion detection and prevention systems (IDPS), discusses four types of.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Some Great Open Source Intrusion Detection Systems (IDSs)
Intrusion Detection Lecture hours and locations: M W 11:30 AM - 12:45 PM HANGR00124 Instructor: Shushan Zhao Office: Swarts Hall 160 Office Phone:
Intrusion Detection, Access Control and Other Security Tools
CompTIA Security+ Study Guide (SY0-401)
IDS Intrusion Detection Systems
Principles of Information Security, Fourth Edition
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Security Methods and Practice CET4884
Basics of Intrusion Detection
Outline Introduction Characteristics of intrusion detection systems
Operating system Security
CompTIA Security+ Study Guide (SY0-401)
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Principles of Information Security, Fourth Edition
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Protection Mechanisms in Security Management
Presentation transcript:

Security Methods and Practice CET4884 Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools Ch7 Part I Principles of Information Security, Fourth Edition

Introduction Protection of organizations assets depend as much on people as technical controls Technical solutions, guided by policy and properly implemented are essential to an information security program Advanced technologies can be used to enhance the security of information assets Principles of Information Security, Fourth Edition

Intrusion Detection and Prevention Systems Intrusion: occurs when an attacker attempts to gain entry into or disrupt the normal operations of an information system Intrusion prevention: consists of activities that seek to deter an intrusion from occurring Intrusion detection: consists of procedures and systems created and operated to detect system intrusions Intrusion reaction: encompasses actions an organization undertakes when intrusion event is detected Intrusion correction activities: finalize restoration of operations to a normal state Principles of Information Security, Fourth Edition

Intrusion Detection and Prevention Systems (cont’d.) Detect a violation of its configuration and activate alarm Many IDSs enable administrators to configure systems to notify them directly of trouble via e-mail or pagers Systems can also be configured to notify an external security service organization of a “break-in” Principles of Information Security, Fourth Edition

IDPS Terminology Site policy awareness Tuning True attack stimulus Confidence value Alarm filtering Alarm clustering and compaction Alert or alarm Evasion False attack stimulus False negative and false positive Noise Site policy Principles of Information Security, Fourth Edition

Why Use an IDPS? Prevent problem behaviors by increasing the perceived risk of discovery and punishment Detect attacks and other security violations Detect and deal with preambles to attacks Document existing threat to an organization Act as quality control for security design and administration, especially of large and complex enterprises Provide useful information about intrusions that take place Principles of Information Security, Fourth Edition

Types of IDPS IDSs operate as network-based or host-based Network-based IDPS is focused on protecting network information assets Wireless IDPS: focuses on wireless networks Network behavior analysis IDPS: examines traffic flow on a network in an attempt to recognize abnormal patterns Principles of Information Security, Fourth Edition

Figure 7-1 Intrusion Detection and Prevention Systems Principles of Information Security, Fourth Edition

Types of IDPS (cont’d.) Network-based IDPS Resides on computer or appliance connected to segment of an organization’s network; looks for signs of attacks When examining packets, a NIDPS looks for attack patterns Installed at specific place in the network where it can watch traffic going into and out of particular network segment Principles of Information Security, Fourth Edition

Types of IDPS (cont’d.) NIDPS signature matching To detect an attack, NIDPSs look for attack patterns Done by using special implementation of TCP/IP stack: In process of protocol stack verification, NIDPSs look for invalid data packets In application protocol verification, higher-order protocols are examined for unexpected packet behavior or improper use Principles of Information Security, Fourth Edition

Types of IDPS (cont’d.) Advantages of NIDPSs Good network design and placement of NIDPS can enable organization to use a few devices to monitor large network NIDPSs are usually passive and can be deployed into existing networks with little disruption to normal network operations NIDPSs not usually susceptible to direct attack and may not be detectable by attackers Principles of Information Security, Fourth Edition

Types of IDPS (cont’d.) Disadvantages of NIDPSs Can become overwhelmed by network volume and fail to recognize attacks Require access to all traffic to be monitored Cannot analyze encrypted packets Cannot reliably ascertain if attack was successful or not Some forms of attack are not easily discerned by NIDPSs, specifically those involving fragmented packets Principles of Information Security, Fourth Edition

Types of IDPS (cont’d.) Wireless NIDPS Monitors and analyzes wireless network traffic Issues associated with it include physical security, sensor range, access point and wireless switch locations, wired network connections, cost Network behavior analysis systems Examine network traffic in order to identify problems related to the flow of traffic Types of events commonly detected include DoS attacks, scanning, worms, unexpected application services, policy violations Principles of Information Security, Fourth Edition

Types of IDPS (cont’d.) Host-based IDPS Resides on a particular computer or server and monitors activity only on that system Benchmark and monitor the status of key system files and detect when intruder creates, modifies, or deletes files Most HIDPSs work on the principle of configuration or change management Advantage over NIDPS: can usually be installed so that it can access information encrypted when traveling over network Principles of Information Security, Fourth Edition

Types of IDPS (cont’d.) Advantages of HIDPSs Can detect local events on host systems and detect attacks that may elude a network-based IDPS Functions on host system, where encrypted traffic will have been decrypted and is available for processing Not affected by use of switched network protocols Can detect inconsistencies in how applications and systems programs were used by examining records stored in audit logs Principles of Information Security, Fourth Edition

Types of IDPS (cont’d.) Disadvantages of HIDPSs Pose more management issues Vulnerable both to direct attacks and attacks against host operating system Does not detect multi-host scanning, nor scanning of non-host network devices Susceptible to some denial-of-service attacks Can use large amounts of disk space Can inflict a performance overhead on its host systems Principles of Information Security, Fourth Edition

Email, phone, skype, or face to face Questions? Email, phone, skype, or face to face Principals of Information Security, Fourth Edition