Intrusion Detection Systems
Intrusion Detection Systems
SYSTEMS
(IDS)
John Felber
Agenda
Sources
What is an Intrusion Detection System
Types of Intrusion Detection Systems
How an IDS Works
Detection Methods
Issues
Why are IDS important
How does an IDS fit into your security plan?
Pros and Cons
Questions
Sources
Baker, A. R., & Esler, J. (2007). Snort IDS and IPS Toolkit.
Baumrucker, C. T., Burton, J. D., & Dentler, S. (2003). Cisco
Security Professional's Guide to Secure Intrusion Detection
Systems.
Endorf, C., Schultz, E., & Mellander, J. (2004). Intrusion
Detection and Prevention.
Training, U. A.-I. (n.d.). Intrusion Detection Systems (IDS)
and Auditing.
Types of Detection System
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
Intrusion Response System (IRS)
What is an Intrusion Detection
System?
Defined as the tools, methods, and resources
to help identify, assess, and report
unauthorized or unapproved network activity.
An IDS detects activity in traffic that may or
may not be an intrusion.
IDSes can detect and deal with insider
attacks, as well as, external attacks, and are
often very useful in detecting violations of
corporate security policy and other internal
threats.
Key characteristics of IDS:
Passive system: IDS monitors and detects
threats but does not actively take action to
prevent or block them.
◦ Focuses on detection: IDS aims to identify and
notify about potential security incidents.
◦ Analyzes network traffic and system logs: IDS
inspects packets and system logs to identify
anomalies or known attack patterns.
(NIDS)
Host Based Intrusion Detection
Are usually installed on servers and are more focused
on analyzing the specific operating systems and
applications, resource utilization and other system
activity residing on the Host-based IDS host.
attempts
Hybrid Intrusion Detection
Are systems that combine both Host-based IDS,
which monitors events occurring on the host
system and Network-based IDS, which monitors
network traffic, functionality on the same
security platform.
A Hybrid IDS, can monitor system and
application events and verify a file system’s
integrity like a Host-based IDS, but only serves
to analyze network traffic destined for the
device itself.
A Hybrid IDS is often deployed on an
organization’s most critical servers.
Honeypots
Are decoy servers or systems setup to gather
information regarding an attacker of intruder into
networks or systems.
Appear to run vulnerable services and capture vital
information as intruders attempt unauthorized
access.
Provide you early warning about new attacks and
exploitation trends which allow administrators to
successfully configure a behavioral based profile
and provide correct tuning of network sensors.
Can capture all keystrokes and any files that might
have been used in the intrusion attempt.
Passive Systems
Detects a potential security breach
Logs the information
Signals an alert on the console
Does not take any preventive measures to
entire network
Offers centralized management for
attacks
Provides an additional layer of protection
Cons
Generates false positives and negatives
Reacts to attacks rather than preventing them
Requires full-time monitoring and highly skilled
staff dedicated to interpreting the data
Requires a complex incident response process
Cannot monitor traffic at higher network traffic
rates
Generates an enormous amount of data to be
analyzed
Cannot deal with encrypted network traffic
It is expensive
Questions