Unit 4
Unit 4
Functions of IDS
Monitoring: Continuously monitors network or system activities for
anomalies or suspicious patterns.
Detection: Identifies known attack signatures or unusual behavior
indicative of potential threats.
Alerting: Generates alerts or notifications for system administrators when
potential intrusions are detected.
Reporting: Logs activities and events to provide details for further
analysis.
Response: While traditional IDS focuses on detection, modern IDS
solutions may also include limited automated responses like blocking
traffic.
Advantages of IDS
1. Early detection of suspicious activities.
2. Improves the security posture of networks and systems.
3. Logs events for forensic investigations.
4. Helps in compliance with regulations such as GDPR or PCI-DSS.
Conclusion
Intrusion Detection Systems (IDS) are a crucial component of a cybersecurity
framework. They provide valuable insights into potential threats, allowing
organizations to take proactive measures against intrusions. By combining
various types of IDS, such as HIDS, NIDS, and anomaly-based systems,
organizations can enhance their security posture and reduce vulnerabilities.
However, regular updates, proper configuration, and integration with other
security tools like firewalls and Intrusion Prevention Systems (IPS) are
necessary to maximize IDS effectiveness.
2, Describe about host based intrusion detection with an example.
Advantages of HIDS
1. Detailed Host Visibility: Provides comprehensive monitoring and
detection at the system level.
2. File Integrity Protection: Detects any unauthorized modifications to
critical files and directories.
3. Insider Threat Detection: Monitors user actions, making it useful for
identifying suspicious behavior by legitimate users.
4. Encrypted Traffic Inspection: Since it operates on the host, it can
monitor activities within encrypted sessions (e.g., SSL/TLS
communications).
5. Customizable Rules: Administrators can configure the HIDS to monitor
specific files, directories, or processes critical to the organization.
Disadvantages of HIDS
1. Host Resource Usage: Consumes system resources like CPU and
memory, which may impact host performance.
2. Limited Scope: Only monitors the host it is installed on and does not
provide network-wide visibility.
3. False Positives: May flag legitimate changes as suspicious, requiring
manual investigation.
4. Reactive: Focuses on detecting threats after they occur rather than
preventing them.
5. Maintenance: Requires regular updates to rules, baselines, and
configurations to remain effective.
Common Tools for HIDS
1. Tripwire: A popular HIDS tool for file integrity monitoring and system
change detection.
2. OSSEC: An open-source HIDS that monitors logs, file integrity, and user
activities.
3. AIDE (Advanced Intrusion Detection Environment): Focuses on file
integrity checking and rootkit detection.
4. Samhain: A HIDS solution that detects changes to files and logs
activities.
Conclusion
Host-Based Intrusion Detection Systems (HIDS) play a critical role in
identifying and mitigating host-specific threats. They are particularly useful in
monitoring file integrity, user actions, and internal system behaviors. However,
they are most effective when combined with Network-Based Intrusion
Detection Systems (NIDS) for a holistic security approach. By employing tools
like Tripwire or OSSEC and continuously updating the detection rules,
organizations can improve their resilience against cyberattacks and insider
threats.
3, Describe about Honeypots.
Honeypots: An Overview
A honeypot is a cybersecurity tool designed to act as a decoy system or
resource to lure attackers, study their behavior, and improve security defenses. It
mimics a legitimate system, such as a server, network, or application, but is
deliberately designed to attract malicious activities. Honeypots are an effective
way to detect and understand emerging cyber threats, especially those targeting
specific vulnerabilities or systems.
Purpose of a Honeypot
1. Threat Detection: Identifies malicious activities and attack patterns.
2. Threat Intelligence: Collects valuable data about attackers' tactics and
techniques.
3. Vulnerability Assessment: Identifies weaknesses in the system by
monitoring how attackers exploit the honeypot.
4. Deception and Diversion: Distracts attackers from real systems,
protecting critical infrastructure.
Types of Honeypots
1. Based on Deployment Purpose:
o Research Honeypots: Study attack methodologies and collect
intelligence.
o Production Honeypots: Deployed in live environments to detect
and mitigate threats.
2. Based on Level of Interaction:
o Low-Interaction Honeypots: Simulate basic services or systems
with minimal attacker interaction.
o High-Interaction Honeypots: Fully functional systems that allow
detailed attacker engagement and data collection.
o Medium-Interaction Honeypots: Balance between low and high
interaction with limited functionality to reduce risks.
3. Specialized Honeypots:
o Email Honeypots: Trap spammers and phishing attempts.
o Database Honeypots: Simulate databases to attract SQL injection
attacks.
o IoT Honeypots: Mimic Internet of Things (IoT) devices to detect
threats targeting connected devices.
Advantages of Honeypots
1. Early Threat Detection: Identifies malicious activities that traditional
security systems may miss.
2. Low False Positives: Alerts generated by honeypots are reliable since
legitimate users should not interact with them.
3. Cost-Effective: Requires fewer resources compared to comprehensive
security systems.
4. Supports Vulnerability Testing: Identifies system or application
weaknesses.
Disadvantages of Honeypots
1. Limited Scope: Only detects threats targeting the honeypot itself.
2. Risk of Exploitation: If not isolated properly, attackers could use a high-
interaction honeypot as a launchpad for attacks.
3. Complexity: High-interaction honeypots require expertise to deploy and
manage.
Conclusion
Honeypots are a powerful tool in cybersecurity, enabling organizations to detect
and study threats while improving their defenses. Though not a standalone
solution, they complement traditional security measures and provide valuable
insights into attackers' tactics, ensuring better preparedness against evolving
threats.