Cybersecurity 10 Feb
Cybersecurity 10 Feb
Security
Dr. Uddipana
Dowerah
Intrusion Detection and Prevention
Systems
Intrusion Detection/Prevention Systems (IDS/IPS)
• IDS and IPS are placed at strategic points in the network to be able to
monitor traffic from all devices
Advantages of IPS:
• It can stop single packet attacks
Disadvantages of IPS:
• It can negatively affect the performance of the network
• It can disrupt the network if a problem or misconfiguration of the IPS occurs
Key Features of IDPS
• Recording information related to observed events
• Records details of detected events locally
• May transmit them to centralized systems like security information and
event management (SIEM) solutions.
• Producing reports
• Produces summaries of monitored events or detailed insights into specific
security incidents.
IPS vs. IDS
• IPS are differentiated from IDS by one characteristic: IPS can respond to a
detected threat by attempting to prevent it from succeeding
• Compensates for Security Gaps – Helps protect networks when they are
vulnerable or unable to respond quickly to emerging threats.
• NIDPS monitors inbound and outbound traffic to devices across the network.
• NIDPS may also be placed inside the network to catch insider threats or
hackers who hijacked user accounts.
• To avoid impeding the flow of legitimate traffic, a NIDS is often placed “out-
of-band,” meaning that traffic doesn’t pass directly through it.
• That way, legitimate traffic doesn’t have to wait for analysis, but the NIDS can
still catch and flag malicious traffic.
How NIDPS works?
• Monitors Network Traffic – A NIDPS is installed on a computer or appliance
connected to a network segment to analyze traffic for signs of attacks.
• Sends Alerts – If an attack is detected, the system notifies administrators for further
action.
• Strategic Deployment – Placed at key network points, such as inside an edge router,
to monitor specific network segments or the entire network.
• More Effective Than Host-Based IDPS – It can detect a wider range of threats but
requires a more complex setup and maintenance.
Advantages of NIDPS
➢ Broad Network Coverage
• Monitors traffic across multiple hosts without requiring installation on
each system.
• Can protect an entire network segment from attacks.
• The HIDPS only monitors activity on that device, including traffic to and from
it.
• HIDPS can detect attacks that bypass network defenses (e.g., insider
threats, encrypted malware).
• Since it operates on the host system, it can inspect traffic after decryption.
• Signature-based detection
• Anomaly-based detection
• Policy-based detection
IDS Detection Techniques
• Signature-based detection
• Anomaly-based detection
• Policy-based detection
Signature Based Detection
• Signature-based detection analyzes network packets for attack
signatures
• Signature-based detection
• Anomaly-based detection
• Policy-based detection
Anomaly Based Detection
• Collects statistical summaries by observing traffic that is known to be
normal.
• The baseline data can include variables such as host memory or CPU
usage, network packet types, and packet quantities
Anomaly Based Detection
• Advantage:
• can detect new types of attacks, since it looks for abnormal activity of
any type.
• Disadvantages:
• require much more overhead and processing capacity than signature-
based IDPSs, because they must constantly compare patterns of activity
against the baseline.
• systems may not detect minor changes to system variables and may
generate many false positives.
IDS Detection Techniques
• Signature-based detection
• Anomaly-based detection
• Policy-based detection
Policy Based Detection
• For example, a SOC might set access control policies dictating which users
and devices can access a host. If an unauthorized user tries connecting to
the host, a policy-based IPS stops them.
IDPS Response Behavior
• When an IDPS detects a threat, it logs the event and reports it to the SOC
Spoofing
• faking IP addresses and DNS records to make it look like their traffic is
coming from a trustworthy source.
Evasion Techniques
Fragmentation
• splitting malware or other malicious payloads into small packets,
obscuring the signature and avoiding detection.
• By strategically delaying packets or sending them out of order, hackers
can prevent the IDS from reassembling them and noticing the attack.
Encryption
• using encrypted protocols to bypass an IDS if the IDS doesn’t have the
corresponding decryption key.
Operator fatigue
• generating large number of IDS alerts on purpose to distract the incident
response team from their real activity.
NIDPS Deployment
NIST recommends the following four locations for NIDPS sensors:
• Location 1: Behind each external firewall, in the network DMZ
NIDPS Deployment
NIST recommends the following four locations for NIDPS sensors:
• Location 1: Behind each external firewall, in the network DMZ
• Advantages:
• IDPS sees attacks that originate from the outside that may penetrate the
network’s perimeter defenses.
• IDPS can identify problems with the network firewall policy or
performance
• Even if the incoming attack is not detected, the IDPS can sometimes
recognize, in the outgoing traffic, patterns that suggest that the server
has been compromised.
NIDPS Deployment
NIST recommends the following four locations for NIDPS sensors:
• Location 2: Outside an external firewall
NIDPS Deployment
NIST recommends the following four locations for NIDPS sensors:
• Location 2: Outside an external firewall
• Advantages:
• IDPS documents the number of attacks originating on the Internet that
target the network.
NIDPS Deployment
NIST recommends the following four locations for NIDPS sensors:
• Location 3: On major network backbones
NIDPS Deployment
NIST recommends the following four locations for NIDPS sensors:
• Location 3: On major network backbones
• Advantages:
• IDPS monitors a large amount of a network’s traffic, thus increasing its
chances of spotting attacks.
• IDPS detects unauthorized activity by authorized users within the
organization’s security perimeter.
NIDPS Deployment
NIST recommends the following four locations for NIDPS sensors:
• Location 4: On critical subnets
NIDPS Deployment
NIST recommends the following four locations for NIDPS sensors:
• Location 4: On critical subnets
• Advantages:
• IDPS detects attacks targeting critical systems and resources.
• This location allows organizations with limited resources to focus these
resources on the most valuable network assets
Examples of IDPS
Open Source
• SNORT (IDS/IPS)
• Prelude (IDS)
• HoneyNet (Honey Pot/IDS)
Commercial
• TippingPoint
• Internet Security Systems
• Juniper
• RadWare
• Mirage Networks
Honeypots
• A honeypot is a decoy system or network designed
to attract cyber attackers and detect malicious
activities.
• Port Scanners
• Vulnerability Scanners
• Packet Sniffers
• Wireless IDPS
• NBA IDPS