Lec 7
Lec 7
Lec. 7
Protecting Organization
• Advantages?
– Easy deployment
– Difficult to evade
• Disadvantages?
– Different hosts process packets differently
Comparison
Host Based Network Based
• Narrow in scope (watches only • Broad in scope (watches all network
specific host activities) activities)
• More complex setup • Easier setup
• Better for detecting attacks from the • Better for detecting attacks from the
inside outside
• More expensive to implement • Less expensive to implement
• Detection is based on what any single • Detection is based on what can be
host can record recorded on the entire network
• Does not see packet headers • Examines packet headers
• Usually only responds after a • Near real-time response
suspicious log entry has been made • OS-independent
• OS-specific • Detects network attacks as payload is
• Detects local attacks before they hit analyzed
the network • Detects unsuccessful attack attempts
• Verifies success or failure of attacks
Distributed (Hybrid) IDS
• Are systems that combine both Host-based IDS, which
monitors events occurring on the host system and
Network-based IDS, which monitors network traffic,
functionality on the same security platform.
IDS Manager
Untrusted
Internet
router
router router
Deployment of NIDS sensors
Example:
Deployment of NIDS sensors
Location 1: NIDS sensor is just inside the external firewall
this position has a number of advantages:
• Sees attacks that might target the Web server or FTP server.
• Even if the incoming attack is not recognized, the IDS can
sometimes recognize the outgoing traffic that results from the
compromised server.
Deployment of NIDS sensors
location 2:
NIDS sensor is placed between the external firewall and the Internet or
WAN.
In this position, the sensor can monitor all network traffic, unfiltered.
Advantages :
• Documents number of attacks originating on the Internet that target
the network.
• Documents types of attacks originating on the Internet that target the
network.
Disadvantage:
A sensor at location 2 has a higher processing burden than any sensor
located elsewhere on the site network.
Deployment of NIDS sensors
Location 3:
A firewall and one or more sensors are configured to protect major
backbone networks, such as those that support internal servers
and database resources
The Advantages:
• Monitors a large amount of a network’s traffic, thus increasing the
possibility of spotting attacks.
• Detects unauthorized activity by authorized users within the
organization’s security perimeter.
a sensor at location 3 is able to monitor for both internal and external
attacks. Because the sensor monitors traffic to only a subset of devices
at the site, it can be tuned to specific protocols and attack types, thus
reducing the processing burden.
Deployment of NIDS sensors
Location 4:
could configure a firewall and NIDS sensor to provide
additional protection of critical subsystems, such as
personnel and financial networks
Advantages:
• Detects attacks targeting critical systems and resources.
• Allows monitoring of limited resources to the network
assets.
A sensor at location 4 can be tuned to specific protocols
and attack types, thus reducing the processing burden.
IDS Analysis Strategies