7.5 Intrusion Detection Systems Network Security / G.Steffen1.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
Lecture 14 Firewalls modified from slides of Lawrie Brown.
(part 4).  Gateways  A gateway is responsible for translating information from one format to another and can run at any layer of the OSI model, depending.
Security Firewall Firewall design principle. Firewall Characteristics.
Guide to Network Defense and Countermeasures Second Edition
IDS/IPS Definition and Classification
Intrusion Detection Systems and Practices
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
seminar on Intrusion detection system
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
COEN 252 Computer Forensics
IIT Indore © Neminah Hubballi
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
C HAPTER 16 C ISCO IOS IPS. S ECURING N ETWORKS WITH IDS AND IPS Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) sensors protect.
Survey “Intrusion Detection: Systems and Models” “A Stateful Intrusion Detection System for World-Wide Web Servers”
COEN 252 Computer Forensics Collecting Network-based Evidence.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Guide to Network Defense and Countermeasures
Operating system Security By Murtaza K. Madraswala.
Protection Mechanisms
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Chapter 5: Implementing Intrusion Prevention
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
1 Figure 10-4: Intrusion Detection Systems (IDSs) IDSs  Event logging in log files  Analysis of log file data  Alarms Too many false positives (false.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
7.4 Firewalls Network Security / G.Steffen1. In This Section What is a Firewall? Types of Firewall Comparison of Firewalls Types What Firewall Can-and.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
1 Intrusion Detection “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking resources.”
Intrusion Detection System
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Computer Security Firewalls and Intrusion Prevention Systems.
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
Some Great Open Source Intrusion Detection Systems (IDSs)
Security Methods and Practice CET4884
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
CompTIA Security+ Study Guide (SY0-401)
IDS Intrusion Detection Systems
Access control techniques
Principles of Computer Security
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-501)
Intrusion Detection Systems (IDS)
Presentation transcript:

7.5 Intrusion Detection Systems Network Security / G.Steffen1

In This Section Intrusion Detection Systems (IDS) Types of IDSs IDS Strengths & Limitations Network Security / G.Steffen2

Intrusion Detection Systems (IDSs) IDS is a device that monitors activity to identify malicious or suspicious events. It acts like a sensor. It can perform a variety of functions such as: Monitoring users & system activity Auditing system configuration Assessing the integrity of critical system & data files Identifying abnormal activity Correcting system configuration errors 3Network Security / G.Steffen

Types of IDSs 1 Signature-based IDS It performs simple pattern-matching & report situations that matches a pattern corresponding to a known attack type. It tends to use statistical analysis The problem is the signature itself Heuristic IDS (Anomaly based IDS) It builds a model of acceptable behavior & flag exceptions to that model Network Security / G.Steffen4

Types of IDSs 2 Network-based IDS It is a stand-alone device attached to the network to monitor traffic throughout that network. Host-based IDS It runs on a single workstation or client/host to protect that one host. State-based IDS – It sees the system going through changes of overall state or configuration Model-based IDS Misuse ID – In this the real activity is compared against a known suspicious area. Network Security / G.Steffen5

Stealth Mode Most IDSs run in stealth mode Network Security / G.Steffen6 Stealth Mode IDS Connected to Two Networks

Design Approach for an IDS Filter on packet headers Filter on packet content Maintain connection state Use complex, multi packet signatures Filter in real time, online Hide its presence Use minimal number of signatures with maximum effect Use optimal sliding time window size to match segments Network Security / G.Steffen7

IDS Strengths & Limitations Upside of IDSs It can detect ever-growing number of serious problems Evolving with time Continuous improvement Downside of IDSs It is sensitive, therefore difficult to measure and adjust It does not run itself Network Security / G.Steffen8