Security Methods and Practice CET4884

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Guide to Network Defense and Countermeasures Third Edition
FIRST LINE OF DEFENSE Intrusion Prevention System Stephen Gates – CISSP Hoàng Thế Long – Nguyễn Thái Bình
Learning Objectives Upon completion of this material, you should be able to:
Security Technology: Intrusion Detection, Access Control and Other Security Tools Chapter 7.
Chapter 13: Intrusion Detection and Prevention Systems
Example of a hub and switch
Learning Objectives Upon completion of this material, you should be able to:
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 13 Intrusion Detection and Prevention Systems By Whitman, Mattord, & Austin© 2008.
Guide to Network Defense and Countermeasures Second Edition
Intrusion Detection Systems and Practices
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion Detection MIS ALTER 0A234 Lecture 3.
Computer Security: Principles and Practice
seminar on Intrusion detection system
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Introduction Intrusion: type of attack on information assets in which instigator attempts to gain entry into or disrupt system with harmful intent Intrusion.
Principles of Information Security, Fourth Edition
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
IIT Indore © Neminah Hubballi
Principles of Information Security, Fifth Edition
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Guide to Network Defense and Countermeasures
LAN Switching and Wireless – Chapter 1 Vilina Hutter, Instructor
Chapter 5: Implementing Intrusion Prevention
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Guide to Network Security First Edition Chapter Six Network Monitoring and Intrusion Detection and Prevention Systems.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
Some Great Open Source Intrusion Detection Systems (IDSs)
Security Methods and Practice CET4884
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
Intrusion Detection Lecture hours and locations: M W 11:30 AM - 12:45 PM HANGR00124 Instructor: Shushan Zhao Office: Swarts Hall 160 Office Phone:
SIEM Rotem Mesika System security engineering
CompTIA Security+ Study Guide (SY0-401)
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
IDS Intrusion Detection Systems
Principles of Information Security, Fourth Edition
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Ch.22 INTRUSION DETECTION
NETWORKS Fall 2010.
Outline Introduction Characteristics of intrusion detection systems
Firewalls.
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-501)
Principles of Information Security, Fourth Edition
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Intrusion Prevention Systems
Intrusion Detection system
PLANNING A SECURE BASELINE INSTALLATION
Protection Mechanisms in Security Management
Presentation transcript:

Security Methods and Practice CET4884 Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools Ch7 Part II Principles of Information Security, Fourth Edition

IDPS Detection Methods Signature-based IDPS Examine data traffic in search of patterns that match known signatures Widely used because many attacks have clear and distinct signatures Problem with this approach is that as new attack strategies are identified, the IDPS’s database of signatures must be continually updated Principles of Information Security, Fourth Edition

IDPS Detection Methods (cont’d.) Statistical anomaly-based IDPS The statistical anomaly-based IDPS (stat IDPS) or behavior-based IDPS sample network activity to compare to traffic that is known to be normal When measured activity is outside baseline parameters or clipping level, IDPS will trigger an alert IDPS can detect new types of attacks Requires much more overhead and processing capacity than signature-based May generate many false positives Principles of Information Security, Fourth Edition

IDPS Detection Methods (cont’d.) Stateful protocol analysis IDPS SPA: process of comparing predetermined profiles of definitions of benign activity for each protocol state against observed events to identify deviations Stores and uses relevant data detected in a session to identify intrusions involving multiple requests/responses; allows IDPS to better detect specialized, multisession attacks Drawbacks: analytical complexity; processing overhead; may fail to detect unless protocol violates fundamental behavior; may cause problems with protocol it’s examining Principles of Information Security, Fourth Edition

IDPS Detection Methods (cont’d.) Log file monitors Log file monitor (LFM) similar to NIDPS Reviews log files generated by servers, network devices, and even other IDPSs for patterns and signatures Patterns that signify attack may be much easier to identify when entire network and its systems are viewed holistically Requires allocation of considerable resources since it will involve the collection, movement, storage, and analysis of large quantities of log data Principles of Information Security, Fourth Edition

IDPS Response Behavior Once IDPS detects an anomalous network situation, it has a number of options IDPS responses can be classified as active or passive Active response: collecting additional information about the intrusion, modifying the network environment, taking action against the intrusion Passive response: setting off alarms or notifications, collecting passive data through SNMP traps Principles of Information Security, Fourth Edition

Selecting IDPS Approaches and Products Technical and policy considerations What is your systems environment? What are your security goals and objectives? What is your existing security policy? Organizational requirements and constraints What are requirements that are levied from outside the organization? What are your organization’s resource constraints? Principles of Information Security, Fourth Edition

Selecting IDPS Approaches and Products (cont’d.) IDPSs product features and quality Is the product sufficiently scalable for your environment? How has the product been tested? What is the user level of expertise targeted by the product? Is the product designed to evolve as the organization grows? What are the support provisions for the product? Principles of Information Security, Fourth Edition

Strengths and Limitations of IDPSs IDPSs perform the following functions well: Monitoring and analysis of system events and user behaviors Testing security states of system configurations Baselining security state of system and tracking changes Recognizing system event patterns matching known attacks Recognizing activity patterns that vary from normal activity Principles of Information Security, Fourth Edition

Strengths and Limitations of IDPSs (cont’d.) IDPSs perform the following functions well: (cont’d.) Managing OS audit and logging mechanisms and data they generate Alerting appropriate staff when attacks are detected Measuring enforcement of security policies encoded in analysis engine Providing default information security policies Allowing non-security experts to perform important security monitoring functions Principles of Information Security, Fourth Edition

Strengths and Limitations of IDPSs (cont’d.) IDPSs cannot perform the following functions: Compensating for weak/missing security mechanisms in protection infrastructure Instantaneously detecting, reporting, responding to attack when there is heavy network or processing load Detecting new attacks or variants of existing attacks Effectively responding to attacks by sophisticated attackers Investigating attacks without human intervention Principles of Information Security, Fourth Edition

Strengths and Limitations of IDPSs (cont’d.) IDPSs cannot perform the following functions (cont’d.): Resisting attacks intended to defeat or circumvent them Compensating for problems with fidelity of data sources Dealing effectively with switched networks Principles of Information Security, Fourth Edition

Deployment and Implementation of an IDPS An IDPS can be implemented via one of three basic control strategies Centralized: all IDPS control functions are implemented and managed in a central location Fully distributed: all control functions are applied at the physical location of each IDPS component Partially distributed: combines the two; while individual agents can still analyze and respond to local threats, they report to a hierarchical central facility to enable organization to detect widespread attacks Principles of Information Security, Fourth Edition

Deployment and Implementation of an IDPS (cont’d.) IDPS deployment Like decision regarding control strategies, decision about where to locate elements of intrusion detection systems can be art in itself Planners must select deployment strategy that is based on careful analysis of organization’s information security requirements but, at the same time, causes minimal impact NIDPS and HIDPS can be used in tandem to cover both individual systems that connect to an organization’s networks and networks themselves Principles of Information Security, Fourth Edition

Deployment and Implementation of an IDPS (cont’d.) Deploying network-based IDPSs NIST recommends four locations for NIDPS sensors Location 1: Behind each external firewall, in the network DMZ Location 2: Outside an external firewall Location 3: On major network backbones Location 4: On critical subnets Principles of Information Security, Fourth Edition

Deployment and Implementation of an IDPS (cont’d.) Deploying host-based IDPSs Proper implementation of HIDPSs can be a painstaking and time-consuming task Deployment begins with implementing most critical systems first Installation continues until either all systems are installed or the organization reaches planned degree of coverage it is willing to live with Principles of Information Security, Fourth Edition

Email, phone, skype, or face to face Questions? Email, phone, skype, or face to face Principals of Information Security, Fourth Edition