Kai, 2004 INSA1 The Evolution of Intrusion Detection Systems.

Slides:



Advertisements
Similar presentations
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Advertisements

Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Guide to Network Defense and Countermeasures Second Edition
Survey of Information Assurance Intrusion Detection systems.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
The Role of Intrusion Detection Systems (IDSs) Article Authors: - John McHugh - Alan Christie - Julia Allen Presentation: - Ali Ardalan - October 12 th,
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 Intrusion Detection CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 4, 2004.
STATE OF THE PRACTICE OF INTRUSION DETECTION TECHNOLOGIES Presented by Hap Huynh Based on content by SEI.
A survey of commercial tools for intrusion detection 1. Introduction 2. Systems analyzed 3. Methodology 4. Results 5. Conclusions Cao er Kai. INSA lab.
m 1 University of Palestine Student / Mahmoud Elqedra Assistant Professor / Dr. Sana’a Wafa Al-Sayegh.
seminar on Intrusion detection system
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
Cs490ns - cotter1 Intrusion Detection. cs490ns - cotter2 Outline What is it? What types are there? –Network based –Host based –Stack based Benefits of.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Lesson 5 Intrusion Detection Systems
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Computer Security Fundamentals by Chuck Easttom Chapter 9: Computer Security Software.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Intrusion Detection Systems and Network Security
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Intrusion Detection Chapter 12.
COEN 252 Computer Forensics
Intrusion Detection Chapter 12.
Intrusion Detection Sytems
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Network Security Evan Roggenkamp
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
FORESEC Academy FORESEC Academy Security Essentials (III)
Guide to Network Defense and Countermeasures
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Applied Watch Technologies The Enterprise Open Source Security Infrastructure open.freedom Go ahead. Be free.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
An overview.
1 A Network Security Monitor Paper By: Heberlein et. al. Presentation By: Eric Hawkins.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
@Yuan Xue Announcement Homework 4 graded Homework 5 due next Tuesday Online class evaluation Final Poster Time Tentative: Monday.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
Cisco Discovery 3 Chapter 1 Networking in the Enterprise JEOPARDY.
Some Great Open Source Intrusion Detection Systems (IDSs)
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
OSSEC HIDS ● Jonathan Schipp ● Dubois County Linux User Group ● Sept 4 th, 2011 ● jonschipp (at) gmail.com.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Lesson 8 Intrusion Detection Systems
IDS Intrusion Detection Systems
(A CORPORATE NETWORK APPROACH)
Intrusion Control.
NETWORK SECURITY LAB Lab 9. IDS and IPS.
CompTIA Security+ Study Guide (SY0-501)
Intrusion Detection Systems (IDS)
Intrusion Detection Systems
How to Detect Attacks and Supervise Rail Systems?
Intrusion Detection system
Presentation transcript:

Kai, 2004 INSA1 The Evolution of Intrusion Detection Systems

Kai, 2004 INSA 2 IDS Components Network Intrusion Detection (NID) 1. Switched networks 2. Encrypted networks 3. High-speed networks Host-based Intrusion Detection (HID) Hybrid Intrusion Detection Network-Node Intrusion Detection (NNID)

Kai, 2004 INSA 3 revealed the necessary information for commercial intrusion detection system development Stalker was a host-based, pattern matching system that included robust search capabilities to manually and automatically query the audit data UC Davis’ Lawrence Livermore Lab produced an IDS that analyzed audit data by comparing it with defined patterns. Distributed Intrusion Detection System (DIDS) augmented the existing solution by tracking client machines as well as the servers it originally monitored. A Brief History of IDS audit trails contained vital information that could be valuable in tracking misuse and understanding user behavior analyze audit trails from government mainframe computers and create profiles of users based upon their activities Intrusion Detection Expert System UC Davis's Todd Heberlein develop NSM, the first network intrusion detection system along with the Haystack team, Heberlein introduced the first idea of hybrid intrusion detection. the first commercial vendor of IDS tools, with its Stalker line of host-based products. SAIC was also developing a form of host-based intrusion detection, called Computer Misuse Detection System (CMDS). Air Force's Cryptologic Support Center developed the Automated Security Measurement System to monitor network traffic on the US Air Force's network. ASIM made considerable progress in overcoming scalability and portability issues. NetRanger, the first commercially viable network intrusion detection device. The security market leader developed a network intrusion detection system called RealSecure. SAIC’s CMDS team the first visible host-based intrusion detection company

Kai, 2004 INSA 4 The players in IDS market (I) Cisco Air Force Cryptologic Support Center ASIM ASIM Development Staff from AF CSC Wheel Group NetRanger Network-Based Catalyst 6000 IDS 4230 IDS 4210 Host-Based (Entercept tech) Standard Edition Enterprise Edition CISCO Entercept tech Standard Edition Enterprise Edition $124MillionIn 1997

Kai, 2004 INSA 5 The players in IDS market (II) Internet Security Systems (ISS) ISS Network-Based RealSecure Host-Based RealSecure In 1997In 1999 Network ICE BlackICE Sentry (GigaBit) BlackICE Sentry

Kai, 2004 INSA 6 The players in IDS market (III) Symantec Network-Based NetProwler Host-Based Intruder Alert Symantec Axent

Kai, 2004 INSA 7 The players in IDS market (IV) Enterasys Network-Based Dragon Host-Based Squire Enterasys/Cabetron Network Security Wizards

Kai, 2004 INSA 8 UCAL Davis Lawrence Livermore labs Haystack Labs Stalker Haystack Development staff SAIC Centrax Entrax CMDS Development Staff People from Haystack Labs Trusted Information Systems Network Associates CyberSafe Host-Based Centrax Network-Based Centrax (NNID tech.) NetworkICE MimeStar SecureNet Pro ODS CMDS Host-based CMDS Host-based Kane Network-based SecureNet Pro Intrusion.com Host-based Kane

Kai, 2004 INSA 9 Conclusion Government funding and corporate interest helped Anderson, Heberlein, and Denning spawned the evolution of IDS. Intrusion detection has indeed come a long way, becoming a necessary means of monitoring, detecting, and responding to security threats.