Cryptography and Network Security Sixth Edition by William Stallings.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Guide to Network Defense and Countermeasures Third Edition
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Guide to Network Defense and Countermeasures Second Edition
Network Security Monitoring
IDS/IPS Definition and Classification
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 Intrusion Detection CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 4, 2004.
Unsupervised Intrusion Detection Using Clustering Approach Muhammet Kabukçu Sefa Kılıç Ferhat Kutlu Teoman Toraman 1/29.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion Detection MIS ALTER 0A234 Lecture 3.
seminar on Intrusion detection system
1 Intrusion Detection Prevention Systems Prepared by: Abeer Saif Supervised by: Dr. Lo’ai Tawalbeh.
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Host Intrusion Prevention Systems & Beyond
ACCESS CONTROL & INTRUSION DETECTION BY:RAUL FERNANDES
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Security Guidelines and Management
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Network Security Evan Roggenkamp
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Guide to Network Defense and Countermeasures
Operating system Security By Murtaza K. Madraswala.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
7.5 Intrusion Detection Systems Network Security / G.Steffen1.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Guide to Network Security First Edition Chapter Six Network Monitoring and Intrusion Detection and Prevention Systems.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Role Of Network IDS in Network Perimeter Defense.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
1 Intrusion Detection Prevention Systems Prepared by: Abeer Saif Supervised by: Dr. Lo’ai Tawalbeh.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
By: Surapheal Belay ITEC 6322 / Spring ABSTRACT NIST , guide to intrusion detection and prevention systems (IDPS), discusses four types of.
Some Great Open Source Intrusion Detection Systems (IDSs)
Security Methods and Practice CET4884
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
Intrusion Detection Lecture hours and locations: M W 11:30 AM - 12:45 PM HANGR00124 Instructor: Shushan Zhao Office: Swarts Hall 160 Office Phone:
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Security Methods and Practice CET4884
Intrusion Prevention Systems
Intrusion Detection Prevention Systems
How to Detect Attacks and Supervise Rail Systems?
Intrusion Detection system
Intrusion-Detection Systems
Presentation transcript:

Cryptography and Network Security Sixth Edition by William Stallings

IDS and IPS Overview

3 Definition Intrusion Detection Systems (IDS) Process of monitoring the events occurring in a computer system or network and analysing them for signs of possible incident Incidents have many causes; malware, attackers gaining unauthorized access, misuse of privileges or gaining additional privileges Software that automates the intrusion detection process Intrusion Prevention Systems (IPS) All the above but also attempt to stop possible incidents

4 Uses of IDPS IDPS primary focus is identifying possible incident IDPS can also identify reconnaissance activity Identifying security policy problems Documenting the existing threat to an organization Deterring individuals from violating security policies

5 Key functions of IDPS Technologies Analyse and monitor events to identify undesirable activity Recording information related to observed events Notifying security administrators of important events Producing reports. The IPS stops the attack itself The IPS change the security environment The IPS changes the attack’s content.

6 Key functions of IDPS Technologies IDPS cannot provide completely accurate detection False positive False negative Most IDPS also offer features that compensate for the use of common evasion techniques Evasion is modifying the format or timing of malicious activity so that its appearance changes but its effect is the same Attackers use evasion techniques to try to prevent IDPS from detecting their attack

Common detection methodologies Signature-based detection A signature is a pattern that correspond to a known threat Compares signatures against observed events to identify possible incidents Simplest detection and have little understanding of state. Cannot remeber previous request. Anomaly-based detection Comparing definitions of what activities is considered normal against observed events to identify significant deviations Profiles that represent normal behaviour of such things as users, network connections or applications Major benefit is they can be effective at detecting previously unknown threats. Can inadvertently include malicious activity as part of profile. Generate many false positive and difficult for analyst to determine why an alert was generated Stateful protocol analysis The proces of comparing profiles of generally accepted definitions of protocol state against observed events to identify deviations Understanding and Tracking state of network, transport and applications protocol that have a notion of state Very ressource-intensive and cannot detect that do not violate protocol behavior

Type of IDPS technologies Network-based Monitor network traffic for particular network segments or devices and analyse the network and application protocol activity to identify suspicious activity Wireless Monitor wireless traffic and analyse its wireless network protocols to identify suspicious activity involving the protocols themselves It cannot identify suspicious activity in the application or higher-layer network Network behavior analysis (NBA) Examines network traffic to identify threats that generate unusual traffic activity such as DDoS or malware Host-based Monitors the characteristics of a single host and the events occurring within that host for suspicious activity

9 Component and architecture Sensors and agents Management server. Database server. Console Management network and management interface Isolate management network from production network Can also be isolated through VLAN

10 Security capabilities Information gathering capabilities Logging capabilities Detection capabilities Threshold Blacklist and whitelist Alert settings Code viewing and editing Prevention capabilities