Principles of Information Security, Fifth Edition
Principles of Information Security, Fifth Edition
Principles of Information Security, Fifth Edition
Fifth Edition
Chapter 7
Security Technology: Intrusion
Detection and Prevention Systems,
and Other Security Tools
Do not wait; the time will never be just right. Start where you stand and
work with whatever tools you may have at your command, and better
tools will be found as you go along.
NAPOLEON HILL (1883–1970) FOUNDER OF THE SCIENCE of SUCCESS
Learning Objectives
• Upon completion of this material, you should be
able to:
– Identify and describe the categories and models of
intrusion detection and prevention systems
– Describe the detection approaches employed by
modern intrusion detection and prevention systems
– Define and describe honeypots, honeynets, and
padded cell systems
– List and define the major categories of scanning and
analysis tools, and describe the specific tools used
within each category
Principles of Information Security, Fifth Edition 2
Introduction
• Intrusion detection:
– Primary purpose to identify and report an intrusion
– Can quickly contain attack and prevent/mitigate loss or
damage
– Detect and deal with preambles to attacks
• Data collection allows the organization to examine
what happened after an intrusion and why.
• Serves as a deterrent by increasing the fear of
detection
• Can help management with quality assurance and
continuous improvement
Principles of Information Security, Fifth Edition 7
Types of IDPSs
• Advantages of NIDPSs
– Good network design and placement of NIDPS can
enable an organization to monitor a large network
with few devices.
– NIDPSs are usually passive and can be deployed
into existing networks with little disruption to normal
network operations.
– NIDPSs are not usually susceptible to direct attack
and may not be detectable by attackers.
• Disadvantages of NIDPSs
– Can become overwhelmed by network volume and
fail to recognize attacks
– Require access to all traffic to be monitored
– Cannot analyze encrypted packets
– Cannot reliably ascertain if attack was successful or
not
– Some forms of attack are not easily discerned by
NIDPSs, specifically those involving fragmented
packets.
• Advantages of HIDPSs
– Can detect local events on host systems and detect
attacks that may elude a network-based IDPS
– Functions on host system, where encrypted traffic
will have been decrypted and is available for
processing
– Not affected by use of switched network protocols
– Can detect inconsistencies in how applications and
systems programs were used by examining records
stored in audit logs
• Disadvantages of HIDPSs
– Pose more management issues
– Vulnerable both to direct attacks and attacks against
host operating system
– Does not detect multihost scanning, nor scanning of
non-host network devices
– Susceptible to some DoS attacks
– Can use large amounts of disk space
– Can inflict a performance overhead on its host
systems
• Signature-based detection
– Examines network traffic in search of patterns that
match known signatures
– Widely used because many attacks have clear and
distinct signatures
– Problem with this approach is that new attack
patterns must continually be added to IDPS’s
database of signatures.
• Slow, methodical attack involving multiple events
might escape detection.
• Anomaly-based detection
– Anomaly-based detection (or behavior-based
detection) collects statistical summaries by
observing traffic known to be normal.
– When measured activity is outside baseline
parameters or clipping level, IDPS sends alert to
administrator.
– IDPS can detect new types of attacks.
– Requires much more overhead and processing
capacity than signature-based detection
– May generate many false positives
Principles of Information Security, Fifth Edition 19
IDPS Detection Methods (cont’d)