Lec 1 IDS
Lec 1 IDS
• Disadvantage:
• consume computer system resources
• may conflict with existing security policies (such as firewalls) and operating
systems
• It’s difficult to analysis intrusion attempts on multiple computers
• difficult to maintain in large networks with different operating systems and
configurations
• Many essential servers cannot support this operation
Display
signature
Add custom
signature
NIDS
23
Distributed host-based IDS
* Host agent
* LAN agent (analyzes LAN traffic)
* Central manager
24
Distributed host-based IDS: agent
architecture retain only sec. data,
use a std format,
host audit record
Analysis module:
Suspicious activity?
Send to central mgr
25
Comparison between IDS And IPS
IPS IDS
In line Off line
Some impact on network (latency,
No Impact on network (latency, jitter)
jitter)
Response action cannot stop trigger
Stops trigger packets
packets
Sensor issues might affect network No Network impact if there is a sensor
traffic failure
Sensor overloading impacts the No network impact if there is sensor
network overload
Can use stream normalization More vulnerable to network security
techniques evasion techniques
Passive NIDS sensors
27
AIDS Approaches
• The most important approaches:
• Statistical-based detection
• Data mining-based detection
• Knowledge-based detection
• Machine learning-based detection
• flow-based detection
Statistical anomaly-based approach
• Most widely used
• user or system behavior is measured by a number of
variables sampled over time such as:
• Login and logout time of each session
• The resource consumed duration a period of time
processor-memory-disk during the session
• Number of files accessed in a period of time.
Data Mining-based approach
• Work with signature approach
• Build model from large data store, so it’s reduce the amount
of data that must be reserved
• Advantage
• Reduce the research in large store
• Reduce the false alarm
• Disadvantage
• Analyzed of large store database
Knowledge-based detection technique
• Knowledge-based detection techniques use a set of predefined rules to detect
malicious activities. These rules can be based on expert knowledge, such as a
signature database or an intrusion detection system.
• The rules can also be based on the behaviour of the system.
• knowledge accumulated about specific attacks and system vulnerabilities
• IDS have information about these vulnerabilities and looks for attempts to
exploit them
• For example, the system can be monitored for changes in access patterns or
unusual activities.
• Knowledge-based detection techniques are often used in combination with
other techniques, such as anomaly-based detection, to provide a more
comprehensive approach to detecting malicious activities.
Knowledge-based detection technique
• Advantage • Disadvantage
• Accuracy is good • requires updated
• Low false alarm rate regularly with new
vulnerable
Machine Learning-based approach
• technique which can be capable knowledge
automatically
• learn from experience, training, analytical observation
• The system can continuously self-improve
• used in DDoS attack
• Disadvantage:
• expensive
packet based NIDS
• Packet-based NIDS: process all traffic receive on the edge router, and analyze the
whole payload content beside headers
• Packet-based Network Intrusion Detection Systems (NIDS) analyze individual
packets that are sent across a network in order to detect malicious activity.
• They look for anomalies such as unexpected data in a packet, unexpected
protocol behavior, or unexpected source and destination addresses.
• Additionally, NIDSs can be configured to look for specific patterns, such as known
malicious code signatures, in order to detect malicious activities.
• advantage:
• all common kinds of known attacks and intrusions practically can be detected
• Disadvantage
• cannot detect unknown attack
• Difficulty in work with high speed network and vast amount of data
Flow-based NIDS
• Flow based is a steam share the following characteristics:
• IP address, port number source and destination and protocol value
• provide information about behavior of connection
• attack that only injected in payload will not be identified in flow-
based approach
• Flow based can detect attackes such as:
• DoS, computer worms, network probing , flooding
Flow based advantage
• Advantage • disadvantage
• Detect unknown attack or zero • Increased false alarm
days
Snort IPS
• Snort is an open source network IPS that performs real-time traffic
• analysis and generates alerts when threats are detected on IP
networks
• The Snort engine runs in a virtual service container on Cisco 4000
Series ISRs
• Snort IPS Rule Actions
• (Snort can be enabled in IDS mode or in IPS mode).
Snort IDS, IPS
• Snort IDS mode
• Alert : Generate an alert
• Log : Log the packet.
• Pass : Ignore the packet.
• Snort IPS mode
• Drop : Block and log the packet
• Reject : Block the packet, log it, and then send a TCP reset if the protocol is
TCP or an ICMP port unreachable message if the protocol is UDP.
• Sdrop : Block the packet but do not log it
Snort IPS interfaces
• (Snort IPS requires two VPG interfaces)
• VPG: virtual port group
• Management interface (VPG0)
• This is the interface that is used to source logs to the log collector
and for retrieving signature updates from Cisco.com.
• For this reason, this interface requires a routable IP address.
• Data interface (VPG1)
• This is the interface that is used to send user traffic between the Snort virtual
container service and the router forwarding plane.
Configure snort for kali