Ntroduction: Surveillance"
Ntroduction: Surveillance"
INTRODUCTION
Internet is forcing organizations into an era of open and trusted communications. This
openness at the same time brings its share of vulnerabilities and problems such as financial
losses, damage to reputation, maintaining availability of services, protecting the personal
and customer data and many more, pushing both enterprises and service providers to take
steps to guard their valuable data from intruders, hackers and insiders. Intrusion Detection
System has become the fundamental need for the successful content networking. IDS
provide two primary benefits: Visibility and Control [1]. It is the combination of these two
benefits that makes it possible to create and enforce an enterprise security policy to make
the private computer network secure. Visibility is the ability to see and understand the
nature of the traffic on the network while Control is the ability to affect network traffic
including access to the network or parts thereof. Visibility is paramount to decision making
and makes it possible to create a security policy based on quantifiable, real world data.
Control is key to enforcement and makes it possible to enforce compliance with security
policy.
Monitors and analyzes the individual packets passing around a network for
detecting attacks or malicious activities happening in a network that are designed
to be overlooked by a firewalls simplistic filtering rules.
Analyses the network traffic and identifies attacks and security breaches,
which take place by exploiting the technology of network implementation, reports
the alerts to the Management module and performs the preset actions. IDS Agents
are more autonomous in their functions as compared to the Sensors.
In this technique, the sensors which are placed in different LAN segments
filter and analyse network packets in real time and compares them against a
database of known attack signatures. Attack signatures are known methods that
intruders have employed in the past to penetrate a network. If the packet contents
match an attack signature, the IDS can take appropriate countermeasure steps as
enabled by the network security administrator. These countermeasures can take
the form of a wide range of responses. They can include notifications through
simple network management protocol (SNMP) traps or issuance of alerts to an
administrators email or phone, shutting down the connection or shutting down
the system under threat etc.
There exist three strategic locations where NIDS can be installed in the
network for effective monitoring of the network, as depicted in the diagrams
below.
In this point, the NIDS can keep track of all network events of interests, even
those attacks which subsequently may fail. As it has to handle large traffic, NIDS
ought to be installed on a faster machine so that analysis is done in real time. Also
it has to be configured correctly so that number of false alarms can be reduced.
Figure 1 shows such a configuration.
Figure 1: Network IDS placed before the Gateway Firewall
The last possibility where NIDS can be stationed is within the corporate
network as shown in figure 3. Such a location aims at monitoring the attacks
emerging from the local networks and also those which are transmitted via
firewall. As the number of attacks possible in this place is lesser than the
preceding cases, this makes the application demands smaller. In this case IDS
generates few false alarms. The scope of visibility is limited to within the corporate
network, thus will not be able to detect the failed attacks as in the previous cases.
Figure 3: Network IDS within the private network
In order to monitor the network, the traffic in that segment of the network
has to be made available to the Network IDS. There exists several ways to
eavesdrop the network packets without obstructing their normal flow across the
network as mentioned below.
Network TAPs [4] are the hardware devices having three interfaces, entry,
exit and test port. IDS is connected to the test port where it can see the entire
network traffic as shown in figure 5. TAPs does not introduce any delay or affect
the data movement in the network and operates transparently as it doesnt possess
IP and hardware address.
The Network IDS has to operate transparently to avoid the intruders from
targeting the IDS itself. So generally the IDS is configured to work in a special
mode called Stealth mode. In this arrangement, the IDS sniffing interface is put
in promiscuous mode without assigning the IP address, thus only listening to the
packets flowing across the network keeping its presence transparent from network
users.
Usually the IDS has two Network interfaces, one to monitor the network and
the second one for administrative purposes, like configuring IDS, updating
signatures, communication with IDS sensors/Manager ,dispatching alerts etc.
Attacker can easily detect the configuration and location of IDS by analyzing these
messages in the network. It is possible therefore to guard the IDS by encoding its
messages or to create a separate network for management as shown in the
diagram. The advantage of having a separate network between IDS Manager and
IDS Sensors is not only to provide security but also to ensure out of band
communication, meaning no bandwidth of the existing network is utilized for its
communication.
Figure 6: Deployment scenario of NIDS with sensors in strategic points