Unit III
Unit III
IDS
A system called an intrusion detection system (IDS) observes network traffic for
malicious transactions and sends immediate alerts when it is observed. It is
software that checks a network or system for malicious activities or policy
violations. Each illegal activity or violation is often recorded either centrally using
an SIEM system or notified to an administration. IDS monitors a network or
system for malicious activity and protects a computer network from unauthorized
access from users, including perhaps insiders. The intrusion detector learning task
is to build a predictive model (i.e. a classifier) capable of distinguishing between
‘bad connections’ (intrusion/attacks) and ‘good (normal) connections’.
Advantages
Early Threat Detection: IDS identifies potential threats early, allowing for
quicker response to prevent damage.
Enhanced Security: It adds an extra layer of security, complementing other
cybersecurity measures to provide comprehensive protection.
Network Monitoring: Continuously monitors network traffic for unusual
activities, ensuring constant vigilance.
Detailed Alerts: Provides detailed alerts and logs about suspicious activities,
helping IT teams investigate and respond effectively.
What is Firewall
Working of Firewall
Firewall match the network traffic against the rule set defined in its table. Once the
rule is matched, associate action is applied to the network traffic. For example,
Rules are defined as any employee from Human Resources department cannot
access the data from code server and at the same time another rule is defined like
system administrator can access the data from both Human Resource and technical
department. Rules can be defined on the firewall based on the necessity and
security policies of the organization. From the perspective of a server, network
traffic can be either outgoing or incoming.
Firewall maintains a distinct set of rules for both the cases. Mostly the outgoing
traffic, originated from the server itself, allowed to pass. Still, setting a rule on
outgoing traffic is always better in order to achieve more security and prevent
unwanted communication. Incoming traffic is treated differently.
Most traffic which reaches on the firewall is one of these three major Transport
Layer protocols- TCP, UDP or ICMP. All these types have a source address and
destination address. Also, TCP and UDP have port numbers. ICMP uses type
code instead of port number which identifies purpose of that packet.
Packet Filtering Firewall
Stateful firewalls (performs Stateful Packet Inspection) are able to determine the
connection state of packet, unlike Packet filtering firewall, which makes it more
efficient. It keeps track of the state of networks connection travelling across it, such
as TCP streams. So the filtering decisions would not only be based on defined rules,
but also on packet’s history in the state table.
Software Firewall
A software firewall is any firewall that is set up locally or on a cloud server. When
it comes to controlling the inflow and outflow of data packets and limiting the
number of networks that can be linked to a single device, they may be the most
advantageous. But the problem with software firewall is they are time-consuming.
Hardware Firewall
Application layer firewall can inspect and filter the packets on any OSI layer, up
to the application layer. It has the ability to block specific content, also recognize
when certain application and protocols (like HTTP, FTP) are being misused. In
other words, Application layer firewalls are hosts that run proxy servers. A proxy
firewall prevents the direct connection between either side of the firewall, each
packet has to pass through the proxy.
This kind of firewall filters communications at the application layer, and protects
the network. A proxy firewall acts as a gateway between two networks for a
particular application.
Limitations of Firewall