Module 152.5 - Lesson - Network Instrusion Detection and Prevention Systems
Module 152.5 - Lesson - Network Instrusion Detection and Prevention Systems
OPNsense Module 05
Network Intrusion Detection and Prevention Systems
Module 03 Objective:
Type
❖
preprogrammed list of known attack
behaviors. These behaviors will trigger the
alert. These “signatures” can include, for
example, subject lines and attachments on
emails known to carry viruses. A carry virus is
similar to antivirus software (the term
of
“signature-based” originates with antivirus
software).
Detection
A Signature-based IDS is popular and effective but
is only as good as its database of known
signatures.
What is: (continued)
I I
D P
S S
Eyes vs. Hands
Which
Would you want to only use your
eyes or your hands? one
❖ The obvious answer is that you
would rather use both. You need
should
good detection, as well as the
actual capability to do you use?
something about it.
OPNsense Module 05
Network Intrusion Detection and Prevention Systems
What is SURICATA?
❖ Suricata is a free and open source, and a
mature, fast, and robust network threat
detection engine.
LS111 Cyber Security Education, (Feb 20, 2022). Suricata IDS/IPS Installation on Opnsense - Virtual Lab Building Series: Ep3 [Video]. YouTube
https://www.youtube.com/watch?v=TPKLu4a3A4E
Additional Documentation
❑ https://suricata-ids.org/docs/
❑ https://suricata-ids.org/features/all-features/
❑ https://docs.opnsense.org/manual/ips.html
Module 5 Summary
An Intrusion Detection System (IDS) only DETECTS intrusions. It
is installed as part of an out-of-band management system. While
it is used to sample data for intrusions, it is not intended to
inspect every packet that traverses the network.
IDS / IPS Solutions can be used in tandem with each other. They
can be placed on the host, the network, or both:
AtlanTech stated that they do not want to have to go through logs to find a breach.
What are some potential solutions for limiting network access?
Do you think that suggestion should be multilayered? If so, what suggestions do
you have?