NETWORK SECURITY LAB Lab 9. IDS and IPS.

Slides:



Advertisements
Similar presentations
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Advertisements

Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Access Control Chapter 3 Part 5 Pages 248 to 252.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Presented by Justin Bode CS 450 – Computer Security February 17, 2010.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Log Analysis and Intrusion Detection By Srikrishna Gudavalli Venkata Naga Vamsi Krishna Ravi Kiran Yellepeddy.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Host Intrusion Prevention Systems & Beyond
Intrusion Prevention System Group 6 Mu-Hsin Wei Renaud Moussounda Group 6 Mu-Hsin Wei Renaud Moussounda.
Department Of Computer Engineering
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Security Guidelines and Management
Computer Security Fundamentals by Chuck Easttom Chapter 9: Computer Security Software.
IDS Mike O’Connor Eric Tallman Matt Yasiejko. Overview IDS defined IDS defined What it does What it does Sample logs Sample logs Why we need it Why we.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
UNIT 4 SEMINAR Unit 4 Chapter 4 in CompTIA Security + Course Name – IT Introduction to Network Security Instructor – Jan McDanolds, MS Contact Information:
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
What is FORENSICS? Why do we need Network Forensics?
Intrusion Detection Systems Austen Hayes Cameron Hinkel.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Applied Watch Technologies The Enterprise Open Source Security Infrastructure open.freedom Go ahead. Be free.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Network Security: Lab#5 Port Scanners and Intrusion Detection System
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Integration Framework: QRadar 7.2 MR1.
Chapter 2 Securing Network Server and User Workstations.
Cryptography and Network Security Sixth Edition by William Stallings.
Securing networks and systems Aleksandr Lenin. Outline Networking (recap) – Networks, Isolation domains: VLAN, subnets – CIDR/VLSM, Network zoning Firewalls.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Some Great Open Source Intrusion Detection Systems (IDSs)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
OSSEC HIDS ● Jonathan Schipp ● Dubois County Linux User Group ● Sept 4 th, 2011 ● jonschipp (at) gmail.com.
IDS Intrusion Detection Systems
Snort – IDS / IPS.
Backdoor Attacks.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
GCED Exam Braindumps
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Information Security Session October 24, 2005
CompTIA Security+ Study Guide (SY0-501)
Security+ Guide to Network Security Fundamentals, Third Edition
Intrusion Detection & Prevention
Intrusion Detection Systems (IDS)
ISMS Information Security Management System
Intrusion detection systems?
Chapter 4: Protecting the Organization
Intrusion Detection system
Network hardening Chapter 14.
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Presentation transcript:

NETWORK SECURITY LAB Lab 9. IDS and IPS

Introduction – IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) increase the security level of network by: • Monitoring traffic • Inspecting and scanning data packets – Inspection and detection is mainly based on the malicious signatures already recognized – Flavors of IDS/IPS: – Software and Hardware – NIDS (Network IDS) – HIDS (Host IDS)

HIDS and NIDS • HIDS: Any antivirus can be considered as a HIDS as it will alert the user the moment a suspicious file or activity is detected. – Hosted on the device per-se – Reports malicious activities immediately to the user. • NIDS: – Strategically placed in the network. – All network devices such as servers, routers, access points and client computers can be inspected for any malicious activity. – Performs regular network traffic analysis – Can store information in Security Information and Event Management System (SIEM) – Alerts the system admin on unusual activities at both inspection and network traffic routines

NIDS – Network Activity Monitoring - Benchmarks & Rules can be configured

HIDS HIDS: - Placed on a single host and not for network Keeps checkpoints for comparison Scans files, file system, logs and software and alerts for the changes as malicious activity

Tools in practice - Industry is inundated with tools for IDS/IPS: - Snort - IBM Qradar (SIEM) - NG – Secure Federated ID - FireEye MVX-IPS - McAfee Security Platform - NSFocus IPS - Secure works –iSensor Intrusion Protection system …

Hands on - Follow the Instruction document in the folder Lab 9 – IDS and IPS for the hands on: - Setting up Snort as IDS on Windows