0% found this document useful (0 votes)
20 views11 pages

Understanding Intrusion Detection Systems

The document discusses different types of intrusion detection systems (IDS). It describes signature-based intrusion detection systems (SIDS) which use pattern matching to detect known attacks by comparing activity signatures to a database of previous intrusion signatures. The goal of IDS is to identify malicious network traffic that traditional firewalls cannot detect in order to maintain system security. IDS systems are broadly categorized into signature-based and anomaly-based approaches.

Uploaded by

sanasalman871
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views11 pages

Understanding Intrusion Detection Systems

The document discusses different types of intrusion detection systems (IDS). It describes signature-based intrusion detection systems (SIDS) which use pattern matching to detect known attacks by comparing activity signatures to a database of previous intrusion signatures. The goal of IDS is to identify malicious network traffic that traditional firewalls cannot detect in order to maintain system security. IDS systems are broadly categorized into signature-based and anomaly-based approaches.

Uploaded by

sanasalman871
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Intrusion and it’s types

5TH SEMESTER

BSCS (MA)

SUBMITTED BY

SANA JAVED(2104) AMNA AFZAL (2105)


BARIRA SHAHZAD(2106) MAHNOOR(21121)

SUBMITTED TO
MAM SAIRA NOSHEEN
Intrusion

Intrusion can be defined as any kind of unauthorized


activities that cause damage to an information
system. This means any attack that could pose a
possible threat to the information confidentiality,
integrity or availability will be considered an
intrusion
Example

Activities that would make the computer services


unresponsive to legitimate users are considered an
intrusion.
Intrusion detection systems

An IDS is a software or hardware system that


identifies malicious actions on computer systems in
order to allow for system security to be maintained
Goal

The goal of an IDS is to identify different kinds of


malicious network traffic and computer usage, which
cannot be identified by a traditional firewall
This is vital to achieving high protection against
actions that compromise the availability, integrity, or
confidentiality of computer systems.
Categories of IDS

IDS systems can be broadly categorized into two


groups:
Signature-based Intrusion Detection System (SIDS)
Anomaly-based Intrusion Detection System (AIDS).
Signature-based intrusion detection systems (SIDS)

Signature intrusion detection systems (SIDS) are


based on pattern matching techniques to find a
known attack; these are also known as Knowledge-
based Detection or Misuse Detection (Khraisat et al.,
2018).
In SIDS, matching methods are used to find a
previous intrusion. In other words, when an
intrusion signature matches with the signature of a
previous intrusion that already exists in the
signature database, an alarm signal is triggered.
For SIDS, host’s logs are inspected to find sequences
of commands or actions which have previously been
identified as malware. SIDS have also been labeled in
the literature as Knowledge-Based Detection or
Misuse Detection (Modi et al., 2013).
Figure 1 demonstrates the conceptual working of SIDS approaches.
The main idea is to build a database of intrusion signatures and to
compare the current set of activities against the existing signatures
and raise an alarm if a match is found
For example

A rule in the form of “if: antecedent -then:


consequent” may lead to
“if (source IP address=destination IP address) then
label as an attack ”.
SIDS usually gives an excellent detection accuracy
for previously known intrusions (Kreibich &
Crowcroft, 2004)
However, SIDS has difficulty in detecting zero-day
attacks for the reason that no matching signature
exists in the database until the signature of the new
attack is extracted and stored
SIDS are employed in numerous common tools, for
instance, Snort (Roesch, 1999) and NetSTAT (Vigna
& Kemmerer, 1999).

You might also like