KCG College of Technology, Chennai-96 Computer Science and Engineering
KCG College of Technology, Chennai-96 Computer Science and Engineering
KCG College of Technology, Chennai-96 Computer Science and Engineering
d) Signature-based IDS
It is based on detection methods. A signature-based IDS(also called Knowledge-
based IDs) examines data traffic in search of patterns that match known signatures – that
is,preconfigured ,predetermined attack patterns.
Many attacks have clear and distinct signatures such as (i) footprinting and
fingerprinting activities,have an attack pattern that includes the use of ICMP,DNS
querying,and e-mail routing analysis (ii) Exploits involve a specific attack sequence
designed to take advantage of a vulnerability to gain access to a system (iii) Denial of
Service(DoS) and Distributed Denial of Service(DDoS) attacks.
e) Statistical Anomaly-Based IDS(Also called Behaviour-based IDS)
This approach is used for detecting intrusions based on the frequency with which
certain network activities takes place. Statistical Anomaly-Based IDS collects
statistical summaries by observing traffic that is known to be normal. A baseline is
established based on normal period. The Stats IDs periodically sample network
activity,and using statistical methods ,compares the sampled network activity to the
baseline. When the measured activities are outside the baseline parameters,it is said to be
exceeding the clipping level;at this point,the IDS will trigger an alert to notify the
administrator.
f) Log File Monitors(LFM)
Log File Monitor(LFM) is an approach to IDS that is similar to NIDS. Using LFm
the system reviews the log files generated by servers,network devices,and wven other
IDSs. These systems look for patterns and signatures in the log files that may indicate an
attack or intrusion is in process or has already succeeded.
14) What are the advantages and disadvantages of using honey pot or padded cell
approach?
Advantages:
Attackers can be diverted to targets that they cannot damage.
Administrators have time to decide how to respond to an attacker.
Attackers action can be easily and extensively monitored
Honey pots may be effective at catching insiders who are snooping around a
network.
Disadvantages:
The legal implication of using such devices are not well defined.
Honey pots and Padded cells have not yet been shown to be generally useful
security technologies.
An exper attacker,once diverted into a decoy system,may become angry and
launch a hostile attack againt an organization’s systems
Admins and security managers will need a high level of expertise to use these
systems.
15) How Scanning and Analysis tools are useful in enforcing Information Security?
Scanning and Analysis Tools
Scanners, sniffers, and other analysis tools are useful to security administrators in
enabling them to see what the attacker sees
Scanner and analysis tools can find vulnerabilities in systems
One of the preparatory parts of an attack is known as footprinting – collecting IP
addresses and other useful data
The next phase of pre-attack data gathering process is called fingerprinting – scanning
all known addresses to make a network map of the target
16) What are foot printing and finger printing?
The attack protocol is a series of steps or processes used by an attacker ,in a logical
sequence ,to launch an attack against a target system or netweok. One of the preparatory
part of the attack protocol is the collection of publicly available information about a
potential target,a process known as footprinting.
Footprinting is the organized research of the Internet addresses owned or
controlled by the target organization. The attacker uses public Internet data sources to
perform keyword searches to identify the network addresses of the organization. This
research ios augmented by browsing the organization’s web pages.
The next phase of the attack protocol is a second intelligence or data-gathering process
called fingerprinting. This is systematic survey of all of the target organization’s
Internet addresses(which are collected during the footprinting phase); the survey is
conducted to ascertain the network services offered by the hostsin that range.
Fingerprinting reveals useful information about the internal structure and operational
nature of the target system or network for the anticipated attack.
17) Explain different types of the Scanning and Analyis tools available.
Port Scanners
Port scanners fingerprint networks to find ports and services and other useful
information
Why secure open ports?
o An open port can be used to send commands to a computer, gain access to a
server, and exert control over a networking device
o The general rule of thumb is to remove from service or secure any port not
absolutely necessary for the conduct of business
Vulnerability Scanners
Vulnerability scanners are capable of scanning networks for very detailed information
As a class, they identify exposed usernames and groups, show open network shares,
expose configuration problems, and other vulnerabilities in servers
Packet Sniffers
A network tool that collects copies of packets from the network and analyzes them
Can be used to eavesdrop on the network traffic
To use a packet sniffer legally, you must be:
o on a network that the organization owns
o under direct authorization of the owners of the network
o have knowledge and consent of the content creators (users)
Content Filters
Although technically not a firewall, a content filter is a software filter that allows
administrators to restrict accessible content from within a network
The content filtering restricts Web sites with inappropriate content
Trap and Trace
Trace: determine the identity of someone using unauthorized access
Better known as honey pots, they distract the attacker while notifying the
administrator
18) What is Cryptography? Explain the key terms associated with cryptography.
Cryptography ,which comes from the Greek work kryptos,meaning “hidden”,and
graphein,meaning “to write”,is aprocess of making and using codes to secure the
transmission of information.
Cryptoanalysis is the process of obtaining the original message(called plaintext)
from an encrypted message(called the ciphertext) without knowing the algorithms
and keys used to perform the encryption.
Encryption is the process of converting an original message into a form that is
unreadable to unauthorized individuals-that is,to anyone without the tools to convert
the encrypted message back to its original format.
Decryption is the process of converting the cipher text into a message that conveys
readily understood meaning.
Electronic Monitoring
Records events where other types of physical controls are not practical
May use cameras with video recorders
Drawbacks:
o reactive and do not prevent access or prohibited activity
o recordings often not monitored in real time and must be reviewed to have any
value
Alarms and Alarm Systems
Alarm systems notify when an event occurs
Used for fire, intrusion, environmental disturbance, or an interruption in services
These systems rely on sensors that detect the event: motion detectors, smoke
detectors, thermal detectors, glass breakage detectors, weight sensors, and contact
sensors
Fire Safety
The most serious threat to the safety of the people who work in the organization is the
possibility of fire
Fires account for more property damage, personal injury, and death than any other
threat
It is imperative that physical security plans examine and implement strong measures
to detect and respond to fires and fire hazards
Textbook