I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

IDS In Depth Search: Ideas, Descriptions, and Solutions Presentation by Marshall Washburn November 30 th, 2010 CPSC 420/620 w/ Dr. Grossman.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
IDS/IPS Definition and Classification
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion Detection/Prevention Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality,
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
Host Intrusion Prevention Systems & Beyond
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
INTRUSION DETECTION SYSTEM
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
Intrusion Detection Systems. A properly implemented IDS is watched by someone besides your system administrators, such as security personnel.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Signature Based and Anomaly Based Network Intrusion Detection
Intrusion Detection Systems Austen Hayes Cameron Hinkel.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection and Prevention. Objectives ● Purpose of IDS's ● Function of IDS's in a secure network design ● Install and use an IDS ● Customize.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Guide to Network Defense and Countermeasures
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
7.5 Intrusion Detection Systems Network Security / G.Steffen1.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
Intrusion Detection Reuven, Dan A. Wei, Li Patel, Rinku H.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Securing networks and systems Aleksandr Lenin. Outline Networking (recap) – Networks, Isolation domains: VLAN, subnets – CIDR/VLSM, Network zoning Firewalls.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
Some Great Open Source Intrusion Detection Systems (IDSs)
Security Methods and Practice CET4884
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
OSSEC HIDS ● Jonathan Schipp ● Dubois County Linux User Group ● Sept 4 th, 2011 ● jonschipp (at) gmail.com.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
IDS Intrusion Detection Systems
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Principles of Computer Security
Firewalls.
NETWORK SECURITY LAB Lab 9. IDS and IPS.
Intrusion Detection & Prevention
Intrusion Prevention Systems
Intrusion Detection system
Presentation transcript:

I NTRUSION P REVENTION S YSTEM (IPS)

O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall

I NTRODUCTION Intrusion  A set of actions aimed to compromise the Integrity, confidentiality, or availability, of a computing and networking resource.  Exploits against operating systems, application etc  Buffer overflows, cross site scripting, other vulnerabilities o Intrusion prevention systems ( IPS ) Also known as intrusion detection and prevention systems ( IDPS ), are network security appliances that monitor network and system activities for malicious or harmful activity.

O BJECTIVES o The main objectives of intrusion prevention systems are : Identification of malicious activity Log information about said activity Attempt to block/stop harmful activity Report malevolent activity.

IPS’ S D ETECTION METHODS The majority of intrusion prevention systems utilize one of two detection methods: Signature-based Detection This method of detection utilizes signatures of attack patterns that are preconfigured and predetermined. A signature-based intrusion prevention system monitors the network traffic for matches to these signatures. Once a match is found the intrusion prevention system takes the appropriate action.

Statistical anomaly-based or Knowledge-based Detection A statistical anomaly-based IDS determines normal network activity like what sort of bandwidth is generally used, what protocols are used, what ports and devices generally connect to each other. It alert the administrator or user and prevent malicious contents when anomalous(not normal) traffic is detected

Protocol Analysis Detection : Protocol analysis detection is based on the anomalies specific to protocol This model is integrated into the ips model recently It identifies TCP/IP protocol specific flaws in the network The pace at which the malicious signature attacker is growing is incredibly fast.But the network protocol, in comparison, is well defined and changing slowly. Therefore, the signature database must be updated frequently to detect attack Protocol analysis detection systems are easier to use because they require no signature updates The best way to present alarms is to explain which part of the state system was compromised. For this the ips operators have to have thorough knowledge of the protocol design; the best way is the documentation provided by the IDS

C LASSIFICATIONS Intrusion prevention systems can be classified into four different types: o Network-based intrusion prevention system (NIPS): monitors the entire network for suspicious traffic by analyzing protocol activity. In a NIPS, sensors are located at network borders of the network. Sensors capture all network traffic and analyzes the content of individual packets for malicious traffic and prevents them. Example: Snort (Snort is a free and open source network intrusion prevention system (NIPS) created by Martin Roesch in 1998.Snort is now developed by Sourcefire. )

C ONTINUE … Host-based intrusion prevention system (HIPS): It is an installed software package which monitors a single host for suspicious activity by analyzing events occurring within that host. Example: OSSEC ( OSSEC is a free, open source host-based intrusion Prevention system (IDS). It provides intrusion Prevention for most operating systems, including Linux, OpenBSD, FreeBSD, Mac OS X, Solaris and Windows OS.) Log file monitoring(LFM): Log file monitor monitoring log files created by network services. LFM IDS searches through the logs and identifies malicious activity. IN similar manner to NIDS, these system looks for pattern in the log files that suggest an intrusion File integrity checking(FIC): These mechanism checks for Trojan horse, or files that have otherwise been modified, indicating an intruder has already ben there

H OW IDS WORKS ? IDS works with a copy of the traffic. It can detect an attack and send an alert (and take other actions), but it cannot prevent the attack because it does not operate on traffic inline in the forwarding path.

H OW IPS WORKS ? IPS device operates in inline mode i.e. because the IPS device is in the actual traffic path. This makes the device more effective against worms and atomic attacks (attacks that are carried out by a single packet).

IPS VS. IDS IDS typically record information related to observed malicious events, notify security administrators of important observed events, and produce reports. IPS is considered an extension of intrusion detection system because they both monitor network traffic and system activities for malicious activity. But unlike intrusion detection systems, intrusion prevention systems are able to actively prevent/block intrusions that are detected. Detection –Alarm or alert Prevention– Stop before it gets into the network

IPS VS. FIREWALL IPS monitors the system for unwanted entry and reports or alerts the same to the user and prevents the connection. A firewall monitors the system based on the rules that are set by the user and regulates the activity between the system and the Internet. Therefore, to protect the system from unwanted intrusions, it is always recommended to use firewalls in conjunction with Intrusion Prevention Systems (IPS). This is also why the majority of internet security systems comes with both firewall and IPS.

IPS VS. FIREWALL The Firewall has static rules The IPS learns and creates rules (or gets them added with updates from the manufacturer). You want the FW, because if all packets were allowed on the network the IPS would be overwhelmed so you can't just do an IPS (e.g. if you had a 1000 people in your house the security guard inside couldn't watch them all) But you want the IPS to add a second layer of intelligence beyound the rules enforced at the FW (e.g. someone looking for shady behavior in the house gives a better level of security).