Ids Ips
Ids Ips
What is an IDS ?
• An intrusion detection system (IDS) is an
application that monitors network traffic and
searches for known threats and suspicious or
malicious activity.
• The IDS sends alerts to IT and security teams
when it detects any security risks and threats.
IDS
• An Intrusion Detection System (IDS) is a
monitoring system that detects suspicious
activities and generates alerts when they are
detected.
• Based upon these alerts, a security operations
center (SOC) analyst or incident responder
can investigate the issue and take the
appropriate actions to remediate the threat.
SPAN (Switched Port Analyzer)
What is Intrusion ?
• Intrusion is an attacker gaining unauthorized
access to a device, network, or system. Cyber
criminals use increasingly sophisticated
techniques and tactics to infiltrate
organizations without being discovered.
Common Techniques of Intrusion
• Address Spoofing
• Fragmentation
• Pattern Evasion
• Coordinated Attack
IDS Vs IPS
• Similar to a firewall, IPS is deployed inline to
the traffic flow. IPS is an active network
component that examines every passing
packet and takes the correct remedial action
per its configuration and policy. In contrast,
IDS is a passive component typically not
deployed inline and instead monitors the
traffic flow via span or tap technology to then
raise notifications.
Firewall Vs IDS/IPS
• The main difference being that firewall performs
actions such as blocking and filtering of traffic
while an IPS/IDS detects and alert a system
administrator or prevent the attack as per
configuration.
• A firewall allows traffic based on a set of rules
configured. It relies on the source, the
destination addresses, and the ports. A firewall
can deny any traffic that does not meet the
specific criteria.
Types of IDS
• NIDS (Network Intrusion Detection System)
• HIDS (Host Intrusion Detection System)
• SIDS(Signature-based Intrusion Detection
System)
• AIDS (Anomaly-based Intrusion Detection
System)
• PIDS(Perimeter Intrusion Detection System)
Work
• Monitoring the performance of key firewalls, files, routers,
and servers to detect, prevent, and recover from cyberattacks
• Enabling system administrators to organize and understand
their relevant operating system audit trails and logs that are
often difficult to manage and track
• Providing an easy-to-use interface that allows staff who are
not security experts to help with the management of an
organization’s systems
• Providing an extensive database of attack signatures that can
be used to match and detect known threats Providing a quick
and effective reporting system when anomalous or malicious
activity occurs, which enables the threat to be passed up the
stack
• Generating alarms that notify the necessary individuals, such
as system administrators and security teams, when a breach
NIDS (Network Intrusion Detection System)
HIDS (Host Intrusion Detection System)
Zero-Day Attacks
Worms and viruses can spread across the world
in minutes.
Zero-day attack (zero-day threat) is a computer attack that
tries to exploit software vulnerabilities.
Zero-hour describes the moment when the exploit is
discovered.
Monitor for Attacks
Organization Site
Network-Based IPS Implementations
Signature Attributes
• Malicious traffic displays distinct characteristics or
“signatures.”
• These signatures uniquely identify specific worms,
viruses, protocol anomalies, or malicious traffic.
• IPS sensors are tuned to look for matching
signatures or abnormal traffic patterns.
• When a sensor matches a signature with a data
flow, it takes action, such as logging the event or
sending an alarm to IDS or IPS.
• Signatures have three distinctive attributes:
• Type
• Trigger (alarm)
• Action
IPS Signature Characteristics
Signature File
• As new threats are identified, new signatures
must be created and uploaded to an IPS.
• To make this process easier, all signatures are
contained in a signature file and uploaded to
an IPS on a regular basis.
IPS Signature Characteristics
Signature Micro-Engines
• To make the scanning of
signatures more efficient, the
Cisco IOS software relies on
signature micro-engines (SME),
which categorize common
signatures in groups.
• The Cisco IOS software can then
scan for multiple signatures
based on group characteristics,
instead of one at a time.
• The available SMEs vary
depending on the platform, Cisco
IOS version, and version of the
signature file.
IPS Signature Characteristics
Signature Alarm
The heart of any IPS signature is the signature alarm, often referred to as the
signature trigger.
Signature Alarm
Pattern-Based Detection
Pattern-based detection, also known as signature-
based detection, compares the network traffic to
a database of known attacks and triggers an
alarm, or prevents communication if a match is
found.
Signature Alarm
Anomaly-Based Detection
• Anomaly-based detection, also known as
profile-based detection, involves first defining a
profile of what is considered normal for the
network or host.
• The signature triggers an action if excessive
activity occurs beyond a specified threshold that
is not included in the normal profile.
IPS Signature Alarms
Policy-Based Detection
• Policy-based detection is also known as
behavior-based detection.
• The administrator defines behaviors that are
suspicious based on historical analysis.
Tune Signature
• An administrator must balance the number of
incorrect alarms that can be tolerated with the
ability of the signature to detect actual
intrusions.
• If IPS systems use untuned signatures, they
produce many false positive alarms.
Tuning IPS Signature Alarms
Signature Actions
• Whenever a signature detects the activity
for which it is configured, the signature
triggers one or more actions.
• Several actions can be performed:
• Generate an alert.
• Log the activity.
• Drop or prevent the activity.
• Reset a TCP connection.
• Block future activity.
• Allow the activity.
IPS Signature Actions
Generate an Alert
• An IPS can be enabled to produce alert or a
verbose alert.
• Atomic alerts are generated every time a
signature triggers
• Some IPS solutions enable the administrator to
generate summary alerts, which indicates
multiple occurrences of the same signature
from the same source address or port.
IPS Signature Actions
Monitor Activity
Monitoring the security-related events on a
network is also a crucial aspect of protecting a
network from attack.
Manage and Monitor IPS
Monitoring Considerations