Access control techniques

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Chapter 15 Computer Security Techniques
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Marjie Rodrigues
Security-Authentication
Intrusion Detection - Arun Hodigere. Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Chapter 10: Authentication Guide to Computer Network Security.
Intrusion Detection System [Snort]
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
IIT Indore © Neminah Hubballi
What is FORENSICS? Why do we need Network Forensics?
BUSINESS B1 Information Security.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
Operating system Security By Murtaza K. Madraswala.
Network Security Jiuqin Wang June, 2000 Security & Operating system To protect the system, we must take security measures at two levels: Physical level:
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
7.5 Intrusion Detection Systems Network Security / G.Steffen1.
Biometrics Authentication Technology
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Biometric Technologies
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Intrusion Detection System
WebWatcher A Lightweight Tool for Analyzing Web Server Logs Hervé DEBAR IBM Zurich Research Laboratory Global Security Analysis Laboratory
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Role Of Network IDS in Network Perimeter Defense.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Technical Devices for Security Management Kathryn Hockman COSC 481.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Some Great Open Source Intrusion Detection Systems (IDSs)
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Biometrics Security in Banking Systems Image processing in ATM
Identity and Access Management
NETWORKS Fall 2010.
Challenge/Response Authentication
Basics of Intrusion Detection
Outline Introduction Characteristics of intrusion detection systems
Operating system Security
Principles of Computer Security
Seminar Presentation on Biometrics
Security.
Faculty of Science IT Department Lecturer: Raz Dara MA.
Intrusion Detection system
Operating System Concepts
Chapter Goals Discuss the CIA triad
Presentation transcript:

Access control techniques 1.User possessions : Tokens Memory Tokens : Storing information ATM Protection of pin code Smart Tokens : more powerful than memory tokens. Extension of Memory Tokens. More Integrated circuits into Memory Tokens

Access control techniques 2. Biometric Techniques Possession based Knowledge based Physiological based Behavioral biometric Multi biometric

Possession based : token which the user possesses Possession based : token which the user possesses . Eg smart cards Problem :Token lost Knowledge based : token which user knows . Password and pin

Physiological based Kind of biometric uses physical traits such as Fingerprint ,hand and face etc for authentication. Face Recognition: facial features of human being Fingerprint Recognition :reliable biometric characteristics. Iris Recognition: colored part of eyeball surrounding the pupil. Vein Recognition: like fingerprint ,veins. Ear Recognition: like face recognition. Shape not change with age. ECG (Electrocardiogram):test which perform to capture the electrical activity of the heart .

Behavioral Biometric : Speech pattern ,signature ,gait and keystrokes Behavioral Biometric : Speech pattern ,signature ,gait and keystrokes . Gait : walking style of person. Keystroke : typing speed Multi –biometric:

Biometrics Applications Authentication system Network security Combating cybercrimes Biometrics enabled smart cards E-commerce and internet

Intrusion Detection

Two step process Active components Passive components

Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from outside the network or legitimate users of the network. Intrusion can be a physical, system or remote intrusion.

Different ways to intrude Buffer overflows Unexpected combinations Unhandled input

Intrusion Detection Systems (IDS) Intrusion Detection Systems look for attack signatures, which are specific patterns that usually indicate malicious or suspicious intent.

Intrusion Detection Systems (IDS) Different ways of classifying an IDS IDS based on signature based misuse host based network based

Signature based IDS This IDS possess an attacked description that can be matched to sensed attack manifestations. The question of what information is relevant to an IDS depends upon what it is trying to detect. E.g DNS, FTP etc.

Signature based IDS (contd.) ID system is programmed to interpret a certain series of packets, or a certain piece of data contained in those packets,as an attack. For example, an IDS that watches web servers might be programmed to look for the string “phf” as an indicator of a CGI program attack. Most signature analysis systems are based off of simple pattern matching algorithms. In most cases, the IDS simply looks for a sub string within a stream of data carried by network packets. When it finds this sub string (for example, the ``phf'' in ``GET /cgi-bin/phf?''), it identifies those network packets as vehicles of an attack.

Drawbacks of Signature based IDS They are unable to detect novel attacks. Suffer from false alarms Have to programmed again for every new pattern to be detected.

Types Host based IDS: application logs ,modification Protocol Based :analyses comm protocol Hybrid IDS: combined approach Network Intrusion Detection system:n/w traffic monitoring Application protocol based Intrusion Detection system: Misuse Detection: gather info and detect Network based vs host based :

Host/Applications based IDS The host operating system or the application logs in the audit information. These audit information includes events like the use of identification and authentication mechanisms (logins etc.) , file opens and program executions, admin activities etc. This audit is then analyzed to detect trails of intrusion.

Drawbacks of the host based IDS The kind of information needed to be logged in is a matter of experience. Unselective logging of messages may greatly increase the audit and analysis burdens. Selective logging runs the risk that attack manifestations could be missed.

Network based IDS This IDS looks for attack signatures in network traffic via a promiscuous interface. A filter is usually applied to determine which traffic will be discarded or passed on to an attack recognition module. This helps to filter out known un-malicious traffic.

Strengths of Network based IDS Cost of ownership reduced Packet analysis Evidence removal Real time detection and response Malicious intent detection Complement and verification Operating system independence