0% found this document useful (0 votes)
17 views

Intrusion Detection Systems

Uploaded by

shahida.jasmine
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Intrusion Detection Systems

Uploaded by

shahida.jasmine
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

INTRUSION DETECTION

SYSTEMS
(IDS)

John Felber
Agenda
 Sources
 What is an Intrusion Detection System
 Types of Intrusion Detection Systems
 How an IDS Works
 Detection Methods
 Issues
 Why are IDS important
 How does an IDS fit into your security plan?
 Pros and Cons
 Questions
Sources
 Baker, A. R., & Esler, J. (2007). Snort IDS and IPS Toolkit.
 Baumrucker, C. T., Burton, J. D., & Dentler, S. (2003). Cisco
Security Professional's Guide to Secure Intrusion Detection
Systems.
 Endorf, C., Schultz, E., & Mellander, J. (2004). Intrusion
Detection and Prevention.
 Training, U. A.-I. (n.d.). Intrusion Detection Systems (IDS)
and Auditing.
Types of Detection System
 Intrusion Detection System (IDS)
 Intrusion Prevention System (IPS)
 Intrusion Response System (IRS)
What is an Intrusion Detection
System?
 Defined as the tools, methods, and resources
to help identify, assess, and report
unauthorized or unapproved network activity.
 An IDS detects activity in traffic that may or
may not be an intrusion.
 IDSes can detect and deal with insider
attacks, as well as, external attacks, and are
often very useful in detecting violations of
corporate security policy and other internal
threats.
Key characteristics of IDS:
 Passive system: IDS monitors and detects
threats but does not actively take action to
prevent or block them.
◦ Focuses on detection: IDS aims to identify and
notify about potential security incidents.
◦ Analyzes network traffic and system logs: IDS
inspects packets and system logs to identify
anomalies or known attack patterns.

 Provides alerts: IDS generates alerts or


notifications to security personnel for
further analysis and response.
Intrusion Prevention System (IPS):
 An IPS is an advanced form of IDS that not
only detects but also actively prevents and
blocks potential security threats.
 IPSs use similar techniques to IDS, such as

signature-based detection and anomaly


detection, but they also have the ability to
take immediate action to stop the detected
threats.
 This proactive approach allows IPSs to

mitigate attacks in real-time, reducing the


impact on the network and systems.
Key characteristics of IPS:
 Active system: IPS actively blocks or prevents
detected threats from reaching their targets.

 Focuses on prevention: IPS aims to stop attacks


in real-time and prevent them from causing harm.

 Analyzes and takes action: IPS inspects


network traffic, identifies threats, and actively
blocks or modifies traffic to prevent attacks.

 Provides alerts and blocks: IPS generates alerts


and takes action to block malicious traffic or
connections.
Intrusion Response System (IRS):

 An IRS, also known as an Incident Response


System, is focused on managing and responding
to security incidents that are detected by IDS or
IPS.
 It involves a coordinated set of procedures,
tools, and resources to effectively handle
security incidents and minimize their impact.

 The purpose of an IRS is to ensure an organized,


and efficient response to security breaches,
including investigation, recovery, and
prevention of future incidents.
Key characteristics of IRS:

 Incident management: IRS provides a structured


approach to handle and respond to security incidents.

 Coordination and collaboration: IRS involves multiple


stakeholders working together to address incidents
effectively.

 Investigation and analysis: IRS conducts forensic


analysis to determine the cause, extent, and impact of
security breaches.

 Remediation and prevention: IRS takes steps to contain


and mitigate the incident, recover affected systems, and
implement measures to prevent future incidents.
Types of IDS based on
Architecture
 Host Based Intrusion Detection System
(HIDS)
 Network Based Intrusion Detection System

(NIDS)
Host Based Intrusion Detection
 Are usually installed on servers and are more focused
on analyzing the specific operating systems and
applications, resource utilization and other system
activity residing on the Host-based IDS host.

 It will log any activities it discovers to a secure


database and check to see whether the events match
any malicious event record listed in the knowledge
base.

 Host-based IDS are often critical in detecting internal


attacks directed towards an organization’s servers
such as DNS, Mail, and Web Servers.
Network Based Intrusion
Detection
 Are dedicated network devices distributed within
networks that monitor and inspect network traffic
flowing through the device.
 Instead of analyzing information that originates and
resides on a host, Network-based IDS uses packet
sniffing techniques to pull data from TCP/IP packets
or other protocols that are traveling along the
network.
 Most Network-based IDS log their activities and
report or alarm on questionable events.
 Network-based IDS work best when located on the
DMZ, on any subnets containing mission critical
servers and just inside the firewall.
Comparison
Host Based Network Based
 Narrow in scope (watches only  Broad in scope (watches all
specific host activities) network activities)
 More complex setup  Easier setup
 Better for detecting attacks from  Better for detecting attacks from
the inside the outside
 More expensive to implement
 Less expensive to implement
 Detection is based on what any
 Detection is based on what can
single host can record
be recorded on the entire
 Does not see packet headers
network
 Usually only responds after a
 Examines packet headers
suspicious log entry has been
 Near real-time response
made
 OS-independent
 OS-specific

 Detects local attacks before they  Detects network attacks as

hit the network payload is analyzed


 Verifies success or failure of attacks  Detects unsuccessful attack

attempts
Hybrid Intrusion Detection
 Are systems that combine both Host-based IDS,
which monitors events occurring on the host
system and Network-based IDS, which monitors
network traffic, functionality on the same
security platform.
 A Hybrid IDS, can monitor system and
application events and verify a file system’s
integrity like a Host-based IDS, but only serves
to analyze network traffic destined for the
device itself.
 A Hybrid IDS is often deployed on an
organization’s most critical servers.
Honeypots
 Are decoy servers or systems setup to gather
information regarding an attacker of intruder into
networks or systems.
 Appear to run vulnerable services and capture vital
information as intruders attempt unauthorized
access.
 Provide you early warning about new attacks and
exploitation trends which allow administrators to
successfully configure a behavioral based profile
and provide correct tuning of network sensors.
 Can capture all keystrokes and any files that might
have been used in the intrusion attempt.
Passive Systems
 Detects a potential security breach
 Logs the information
 Signals an alert on the console
 Does not take any preventive measures to

stop the attack


Passive Systems
Reactive/Active Systems
 Responds to the suspicious activity like a
passive IDS by logging, alerting and
recording, but offers the additional ability to
take action against the offending traffic.
Reactive/Active Systems
Types of IDS based on
Detection Mechanism
 Signature Based IDS
 Anomaly Based IDS
Signature Based IDS
 Monitor network or server traffic and match bytes or packet
sequences against a set of predetermined attack lists or
signatures.
 Should a particular intrusion or attack session match a
signature configured on the IDS, the system alerts
administrators or takes other pre-configured action.
 Signatures are easy to develop and understand if you know
what network behavior you’re trying to identify.
 However, because they only detect known attacks, a signature
must be created for every attack.
 New vulnerabilities and exploits will not be detected until
administrators develop new signatures.
 Another drawback to signature-based IDS is that they are very
large and it can be hard to keep up with the pace of fast
moving network traffic.
Anomaly Based IDS
 Use network traffic baselines to determine a “normal”
state for the network and compare current traffic to
that baseline.
 Use a type of statistical calculation to determine
whether current traffic deviates from “normal” traffic,
which is either learned and/or specified by
administrators.
 If network anomalies occur, the IDS alerts
administrators.
 A new attack for which a signature doesn’t exist can be
detected if it falls out of the “normal” traffic patterns.
 High false alarm rates created by inaccurate profiles of
“normal” network operations.
Issues
False Negatives False Positives
 When an IDS fails to detect an  Described as a false alarm.
attack  When an IDS mistakenly
 False negatives occur when the
reports certain “normal”
pattern of traffic is not network activity as
identified in the signature malicious.
database, such as new attack  Administrators have to fine
patterns.
 False negatives are deceptive
tune the signatures or
because you usually have no
heuristics in order to
way of knowing if and when prevent this type of
they occurred. problem.
 You are most likely to identify

false negatives when an attack


is successful and wasn’t
detected by the IDS.
Why are IDS important?
 The ability to know when an intruder or attacker is
engaged in reconnaissance or other malicious activity
can mean the difference between being compromised
and not being compromised.
 An IDS can alert the administrator of a successful
compromise, allowing them the opportunity to
implement mitigating actions before further damage is
caused
 As Corporations and other Institutions are being legally
compelled to disclose data breaches and compromises
to their affected customers, this can have profound
effects upon a compromised company, in the way of bad
press, loss of customer trust, and the effects on their
stock.
How does it fit into your
security plan?
 As a network security expert you should know you cannot just
rely on one or a few tools to secure your network. You need to
have a defense in depth mindset and layer your network
defenses.
 Through the use of inside and outside firewalls, DMZs, Routers
and Switches, an IDS is a great addition to your security plan.
 You can use them to identify vulnerabilities and weaknesses in
your perimeter protection devices, such as: firewalls, switches
and routers. The firewall rules and router access control lists can
be verified regularly for compliance.
 You can use IDSes to enforce security policies, such as:
unauthorized Internet access, downloads of executable files, use
of file sharing programs like Kazza, or Instant Messenger use.
 IDSes are also an invaluable source of evidence. Logs from an
IDS can become an important part of computer forensics and
incident handling efforts.
Pros
 Can detect external hackers, as well as,
internal network-based attacks
 Scales easily to provide protection for the

entire network
 Offers centralized management for

correlation of distributed attacks


 Provides defense in depth
 Gives administrators the ability to quantify

attacks
 Provides an additional layer of protection
Cons
 Generates false positives and negatives
 Reacts to attacks rather than preventing them
 Requires full-time monitoring and highly skilled
staff dedicated to interpreting the data
 Requires a complex incident response process
 Cannot monitor traffic at higher network traffic
rates
 Generates an enormous amount of data to be
analyzed
 Cannot deal with encrypted network traffic
 It is expensive
Questions

You might also like