Download presentation
Presentation is loading. Please wait.
1
A survey of commercial tools for intrusion detection 1. Introduction 2. Systems analyzed 3. Methodology 4. Results 5. Conclusions Cao er Kai. INSA lab. 2003.09
2
1. Introduction Intrusion Detection Systems generic ID architecture Common Intrusion Detection Framework (CIDF) - DARPA (Defense Advanced Research Projects Agency) Event generators (E-boxes) Event analyzers (A-boxes) Event databases (D-boxes) Event response units (R-boxes)
3
event generators obtain information from sources and transformed into a standard format (gido) event analyzers statistical analysis and pattern recognition searching event databases storage of events and information (gidos) response units initiate the proper response
5
2. Systems analyzed
6
3. Methodology Comparison criteria Granularity of data processing Source of audit data (raw events) network-based : Ethernet (see all traffic) IPSEC host-based : security logs Detection method 1. rule based 2. anomaly based Response to detected intrusions passive active
7
System organization Centralized : data analysis Distributed : data collection Security : withstand attacks againstitself Degree of interoperability Exchange of audit data records Exchange of misuse patterns or statistical information about user activities Exchange of alarm reports and event notifications Manageability HP Openview, BMC Patrol Adaptivity System and network infrastructure requirements TCP/IP
8
Classification of comparison criteria
9
4. Results Functional aspects Granularity of data processing real-time T-Sight Source of audit data (Raw events) host-based (H) both host-based and network-based (NW/H) network-based (NW) switched networks network encryption Response to detected intrusions Passive responses sending e-mails, paging or displaying alert messages. Active response network-based systems : terminating transport level sessions Host-based systems : control processes, terminate network sessions Interfaces to network management applications : SNMP (send traps) Interfaces to network elements : firewall control sessions/connections Service availability aspects Legal aspects : “ returning fire ”
10
Degree of interoperability 1. Exchange of audit data records 2. Exchange of security policies 3. Exchange of misuse patterns or statistical information about user activities 4. Exchange of alarm reports, event notifications and response mechanisms
12
Adaptivity (customization) Adding new intrusion patterns Adopting rules for site specific protocols and applications Detection method Rule based detection anomaly based detection Detection capabilities Physical and data-link layer Network and transport layer Operating Systems Applications, databases, management and support systems, office automation
15
Security aspects 1. Confidentiality of audit data 2. Integrity of audit data : using encryption 3. Confidentiality of the detection policy 4. Integrity of detection policy 5. Protection of response mechanisms 6. Availability Encrypted communication channels Heartbeat functions Stealth behavior Access control Weaknesses of network-based systems
16
Architectural aspects System organization distributed environment single host or network segment System and network infrastructure requirements Operating systems Network technology
19
Operational aspects Performance aspects Communication overhead network-based intrusion detection, the overhead is caused by the distribution of audit data and the communication between the various subsystems of the IDS. Computational overhead host-based IDS execute and collect audit data on the target they monitor.
20
Management aspects Configuration management management of the detection capability and the corresponding response mechanisms Security management Access security Audit trails and security alarms Security of management 1. Authenticity 2. Integrity 3. Confidentiality 4. Availability Management interfaces Management model Many-to-Many One-to-Many One-to-one
21
5. Conclusions The role of IDS in corporate security infrastructures: IDS are not a substitute for other security services such as firewalls, authentication servers etc Host-based versus network-based IDS. Security of IDS Lack of modularity and interoperability Background of vendors
22
RealSecure
23
Architecture: RealSecure Engines Network interface Ethernet, fast Ethernet, FDDI and Token-ring Packet Capture Module Windows NT: network service Solaris: Data Link Provider Interface Filter Module Attack recognition Module Response Module
24
RealSecure RealSecure Agents RealSecure Manager Central real-time alarm Central data management Central engine configuration
25
Intruder Alert
26
Architecture Interface console Manager interface console and manager only runs on Windows NT/95 Agents
27
Intruder Alert Intruder Alert Domains: groups of agents/hosts Intruder Alert Policies Drop & Detect Policies Detect and respond Policies Custom-configurable Policies Carte Blanche
28
NetRanger
29
Architecture Sensors Ethernet, Fast Ethernet, Token Ring and FDDI Director Post office
30
Stake Out I.D
31
Architecture Network Observation Intrusion Detection Evidence logging Alert Notification Incident Analyzer/Reporter
32
Kane Security Monitor
33
Architecture Monitoring Console Collection Auditor and Alerting Engine Intelligent Agents
34
Session Wall-3
35
Architecture Network Usage Reporting Network Security WEB and Internal Usage Policy Monitoring and Controls Company Preservation
36
Entrax
37
Architecture Command Console Assessment Manager Alert Manager Detection Policy Editor Audit Policy Editor Collection Policy Editor Report Manager Target Agent
38
CMDS (Computer Misuse Detection System)
39
SecureNET PRO
40
CyberCop
41
Architecture CyberCop Sensors CyberCop Management Server
42
INTOUCH INSA
43
T-sight
44
NIDES
45
ID-Trak
46
SecureCom
47
POLYCENTER
48
Network Flight Recorder
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.