Outline Securing your system before the IDS and some tools to help you

Slides:



Advertisements
Similar presentations
Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
Advertisements

Network Security and Audits LITN Fall Conference 2006 Presented by Katie Givens Mosaic.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Intrusion Detection Systems and Practices
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Intrusion Detection CS-480b Dick Steflik. Hacking Attempts IP Address Scans scan the range of addresses looking for hosts (ping scan) Port Scans scan.
Presented by C.SARITHA ( 07R91A0568) INTRUSION DETECTION SYSYTEM.
Lecture 11 Intrusion Detection (cont)
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Computer Security Fundamentals by Chuck Easttom Chapter 9: Computer Security Software.
IDS Mike O’Connor Eric Tallman Matt Yasiejko. Overview IDS defined IDS defined What it does What it does Sample logs Sample logs Why we need it Why we.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
COEN 252 Computer Forensics Collecting Network-based Evidence.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Linux Networking and Security
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Network Security: Lab#5 Port Scanners and Intrusion Detection System
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Module 11: Designing Security for Network Perimeters.
Intrusion Detection on a Shoestring Budget Shane Williams UT Austin Graduate School of Library and Information Science Oct. 18, 2000 SANS Network Security.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
James S. Rothfuss, Computer Protection Program COMPUTING SCIENCES NETS Network Equipment Tracking System.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
-SHAMBHAVI PARADKAR TE COMP  PORT SCANNING.  DENIAL OF SERVICE(DoS). - DISTRIBUTED DENIAL OF SERVICE(DDoS). REFER Pg.637 & Pg.638.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Jason Ewing. What is an Intrusion Why Detecting Signs of Intrusion is Important? Types of Intrusion Detection Systems (IDS) Approaches for Detection Anomaly.
Some Great Open Source Intrusion Detection Systems (IDSs)
Common System Exploits Tom Chothia Computer Security, Lecture 17.
SIEM Rotem Mesika System security engineering
IDS Intrusion Detection Systems
Snort – IDS / IPS.
CSCE 548 Student Presentation By Manasa Suthram
Port Scanning James Tate II
Working at a Small-to-Medium Business or ISP – Chapter 8
CompTIA Security+ SY0-401 Real Exam Question Answer
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
NETWORK SECURITY LAB Lab 9. IDS and IPS.
Intrusion Detection Systems (IDS)
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Intrusion Detection system
Network Security Mark Creighton GBA 576 6/4/2019.
Protection Mechanisms in Security Management
Using Software Restriction Policies
Presentation transcript:

Outline Securing your system before the IDS and some tools to help you What is an IDS, 2 types How can an IDS help you and your company

First thing’s first! Do yourself a favor Passwords, housekeeping Vulnerability scanners (Saint scanning engine) Port scanners (Nmap)

Passwords Minimum length Both numbers and letters Lifespan All accounts must have a password! Maintaining good security practices

Housekeeping Unauthorized accounts Lifespan of accounts Permissions, users AND groups

Vulnerability Scanners “a computer program designed to search an application, computer or network for weaknesses.” - wikipedia

Saint Scanning Engine The Four Steps of a SAINT Scan Step 1: screens every live system on a network for TCP/UDP services. Step 2: For each service it finds running, it launches a set of probes designed to detect anything that could allow an attacker to gain unauthorized access, create a denial-of-service, or gain sensitive information about the network.

Step 3 – The scanner checks for vulnerabilities. Step 4 – When vulnerabilities are detected, the results are categorized in several ways, allowing customers to target the data they find most useful. The scanner can provide links to patches or new software versions that will eliminate the detected vulnerabilities!

Port Scanners Although an open port can be a vulnerability, I will break these programs up because they do work differently. “a piece of software designed to search a network host for open ports. This is often used by administrators to check the security of their networks and by crackers to compromise it.“ - wikipedia

Nmap All available hosts on the network What services (application name and version) those hosts are offering What operating systems (and OS versions) they are running What type of packet filters/firewalls are in use and more

Now what? Ready to implement your IDS Host based (Tripwire, Log Surfer, MOM, Sebek) simpler, monitors host activity Network based (Dragon, Manhunt, Snort) More involved, monitors network and it’s traffic

Snort “Snort is an open source network intrusion prevention and detection system utilizing a rule-driven language, which combines the benefits of signature, protocol and anomaly based inspection methods. With millions of downloads to date, Snort is the most widely deployed intrusion detection and prevention technology worldwide and has become the de facto standard for the industry.”

Symantec ManHunt “28 January, 2004 -- Symantec Corp. (NASDAQ: SYMC), the world leader in Internet security, today announced that Symantec ManHunt is the first intrusion protection solution to be awarded Common Criteria Evaluation Assurance Level 3 (EAL3) certification. This prestigious certification assures customers that Symantec ManHunt, which was evaluated by Computer Sciences Corporation of Annapolis Junction, MD and validated by the National Information Assurance Partnership (NIAP), has gone through a long and rigorous testing process and conforms to standards sanctioned by the International Standards Organization.”

IDS Methods Signature Analysis Statistical Anomaly/Protocol Analysis Similar to antivirus software Tries to match data traffic Statistical Anomaly/Protocol Analysis Catches what signature misses Compares traffic to baseline Clipping level

References www.tripwire.com www.insecure.org/nmap www.saintcorporation.com http://en.wikipedia.org/wiki/Main_Page www.networkintrusion.co.uk www.snort.org