Cyber Security III Access Control and Intrusion Detection: Dr. Smita Kachole
Cyber Security III Access Control and Intrusion Detection: Dr. Smita Kachole
• These low- level activities can be detected very quickly and the
reporting is quick and timely, giving the administrator time for
an appropriate response. Some of these low- level attacks are
so small that no NIDS can detect them.
Advantages of HIDS
• Near real- time detection and response. HIDS
have the ability to detect minute activities at
the target hosts and to report them to the
administrator very quickly—at a rate near real-
time.
• This is possible because the operating system
can recognize the event before any IDS can, in
which case, an intruder can be detected and
stopped before substantial damage is done.
Advantages of HIDS
• The ability to deal with encrypted and switched
environments.
• Large networks are routinely switch chopped into many
smaller network segments. Each one of these smaller
networks is then tagged with a NIDS. In a heavily switched
network, it can be difficult to determine where to deploy a
network- based IDS to achieve sufficient network coverage.
• HID provides the needed greater visibility into these
switched environments by residing on as many critical
hosts as needed.
• HIDS that monitor the operating systems can deal with
encryptions better than NIDS
Advantages of HIDS
• Cost effectiveness.
• No additional hardware is needed to install
HIDS
• Installing NIDS requires dedicated and
expensive servers.
Disadvantages of HIDS
• Since HIDS are deployed at a host, they have a
very limited view of the network.
• Since HIDS are close to users, they are more
susceptible to illegal tampering.
Network-Based
Intrusion Detection Systems
• NIDS are network sensors configured to monitor
all network traffic including traffic on the
communication media and on all network servers
and firewalls.
• They monitor the traffic on the network to detect
intrusions. They are responsible for detecting
anomalous, inappropriate, or other data that may
• be considered unauthorized and harmful
occurring on a network.
Network-Based
Intrusion Detection Systems
• NIDS may or may not run with firewalls.
• There are several ways an NIDS sensor may be
placed and run.
• It can either be placed and run as an
independent stand- alone machine where it
watches over all traffic entering the network from
the outside, watches traffic entering a subnet,
• Or monitors itself as the target machine to watch
over its own traffic
Network-Based
Intrusion Detection Systems
• It is possible that an attacker can evade this
detection by NIDS exploiting ambiguities in the
traffic stream
• Ambiguities-
– Many NIDS do not have the capabilities to analyze
the full range of behaviour that can be exposed by
the user and allowed by a particular protocol.
– Since NIDS are far removed from individual hosts,
they do not have full knowledge of each host’s
protocol implementation.
Network-Based
Intrusion Detection Systems
• Anomalies-
– NIDS do not have a full picture of the network
topology between the NIDS and the hosts, the
NIDS may be unable to determine whether a given
packet will even be seen by the hosts.
Advantages of NIDS
• NIDS focus, placement, running, and requirements,
give them advantages over firewalls and host- based
IDS
• The ability to detect attacks that a host- based system
would miss because NIDS monitor network traffic at a
Transport Layer
• At this level, NIDS are able to look at, not only the
packet addresses, but also the packet port numbers
from the packet headers.
• HIDS which monitor traffic at a lower Link Layer may
fail to detect some types of attack.
Advantages of NIDS
• A difficulty removing evidence. Because NIDS
are on dedicated machines that are routinely
protected, it is more difficult for an attacker to
remove evidence.
• Also, since NIDS use live network traffic and it
• is this traffic that is captured by NIDS when
there is an attack, this also makes it difficult
for an attacker to remove evidence.
Advantages of NIDS
• Real-time detection and response.
• Because NIDS are at the most opportune and
strategic entry points in the network, they are
able to detect foreign intrusions into the network
in real- time and report as quickly as possible to
the administrator for a quick and appropriate
response.
• Real- time notification, allows for a quick and
appropriate response and can even let the
administrators allow the intruder more time as
they do more and targeted surveillance.
Advantages of NIDS
• The ability to detect unsuccessful attacks and malicious
intent.
• Because the HIDS are inside the protected internal network,
they never come into contact with many types of attack,
since such attacks are often stopped by the outside firewall.
• NIDS, especially those in the DMZ, come across these
attacks (those that escape the first firewall) that are later
rejected by the inner firewall and those targeting
• the DMZ services that have been let in by the outer firewall.
• Besides showing these attacks, NIDS can also record the
frequency of these attacks.
Disadvantages of NIDS
• Blind spots: Deployed at the borders of an
organization’s network, NIDS are blind to the
whole inside network. As sensors are placed in
designated spots, especially in switched
networks, NIDS have blind spots—sometimes
whole network segments they cannot see.
• Encrypted data: One of the major weaknesses of
NIDS is on encrypted data. They have no
capabilities to decrypt encrypted data. They can
• only scan unencrypted parts of the packets such
as headers.
Challenges to Intrusion Detection
• False alarms-
• Technology is not yet ready to handle a large
scale attack-
• The technology, while good, is not a cure for
all computer network problems-
• An example of a widely used IDS is Snort
• ACARM-ng
• Bro NIDS
Evolution IDS
• IDS have a large amount of false positives.
• Intrusion Prevention System provides improvement
• IPS objective is to anticipate hacker’s attacks as soon
as a “footprint” is known. It must not only react to
an attack in progress, but also prevent the attack
that begins. An IPS is put inline and examines all
in/out packets, and can affect the speed of the
network (bottleneck) if it is underpowered.
Intrusion Prevention Systems
• Intrusion Prevention Systems (IPS) are the latest
in a line of products created to counter network
attacks
• IPS encompasses aspects of many well-known,
existing security technologies including anti-
virus, software, intrusion detection and firewalls.
• In the IPS model, instead of developing reactive
security policies, security policy becomes a
proactive tool to protect an organisation
Intrusion Prevention Systems
• To achieve the ideal of self-protection, all attacks
against any part of the protected environment will
be deflected by IPS.
• Because IPS are secure they can take any stream of
network packets and make the determination of
intent – whether it is an attack or legitimate use –
then take appropriate action with complete
perfection.
• In reality it is incredibly difficult because new attacks
strategies are constantly evolving. To combat new
attacks, IPS must constantly update their attack
library in a similar way to anti-virus scanners
Intrusion Prevention Systems
• IPS must be deterministic in all of its decisions in
order to perform its function of scrubbing traffic.
• An IPS is supposed to work all of the time, and
make access control decisions on the network.
• Firewalls provided the first deterministic
approach to access control on the network,
providing basic IPS capability.
• IPS devices add next-generation capability to
these firewalls
How IPS work
• IPS are network devices that can accept or deny
traffic based on IP addresses, protocol/service,
application level analysis and verification.
• IPS receive traffic from the network, reassemble
traffic streams and look at application protocols
and commands to detect suspicious fields that
warrant some predefined action.
• These actions vary from logging suspicious
events to dropping the connection completely
How IPS work
• An IPS inspects all layers of packet information
that travel on the network (except for the
physical layer), rather than only the first 4 layers
traditionally inspected by a firewall.
• A six-layer inspection method, commonly called
“deep packet” inspection, allows an IPS to run
signatures against packets up to an application
level.
• The result is a highly accurate filtering device
that, unlike a NIDS, has minimal false positives.
How IPS work
• As with a typical firewall, the IPS has at least two network
interfaces; one designated as internal and one as external.
• As packets appear at either interface they are passed to the
detection engine, at which point the IPS device determines, (as
any IDS would) whether or not the packet being examined
poses a threat.
• However, if it should detect a malicious packet, in addition to
raising an alert, it will discard the packet and mark that flow as
“bad”.
• As the remaining packets that make up that particular TCP
session arrive at the IPS device, they are discarded
immediately.
• Legitimate packets are passed through to the second interface
and on to their intended destination.
How IPS work
• The hardware component of an IPS is based on
multiple server processor technology so the
device can sit almost invisibly within a network.
• These processors process millions of
instructions simultaneously each second in
order to handle a much larger volume of traffic
than a single processor.
• In fact, most IPS attain minimal to unnoticeable
latency sitting in-line on a network as they can
analyse traffic at up to gigabit speeds.
How IPS work