0% found this document useful (0 votes)
5 views20 pages

IAS Module 6-8

The document outlines a course module on Information Assurance and Security, focusing on Intrusion Detection and Prevention Systems (IDPS) and related security tools. It covers the definition, types, detection methods, and advantages and disadvantages of IDPS, as well as honeypots and honeynets for observing and analyzing malicious behavior. The module aims to equip students with the knowledge to identify and describe various security technologies and their applications in protecting information systems.

Uploaded by

Anton Vergara
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views20 pages

IAS Module 6-8

The document outlines a course module on Information Assurance and Security, focusing on Intrusion Detection and Prevention Systems (IDPS) and related security tools. It covers the definition, types, detection methods, and advantages and disadvantages of IDPS, as well as honeypots and honeynets for observing and analyzing malicious behavior. The module aims to equip students with the knowledge to identify and describe various security technologies and their applications in protecting information systems.

Uploaded by

Anton Vergara
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES

Cagayan de Oro Campus

College of Information Technology and


Computing
Computer Science Department

Information Assurance and Security


IT 321

COURSE MODULES

by

Marylene Saldon-Eder
Faculty, Computer Science

Name of Student : Yecyec, Marian Ivy Kate, Arao, Hugh Humphrey,


Budlong, Kenjie, Dominguez, Carl Vince, Maulod, Zayq., Orencia, Kim,
Pateño, Renchille, Quinto, Honey Pearl, Roslinda, Cal Patrick, Sangcopan,
Jaber, Tapulgo, Jewel, Vallecera, Kirk.
Year / Section : CS3B
UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

COURSE TITLE: Information Assurance and Security


COURSE CODE: CS321
MODULE NO.: 7
TITLE: Security Technology: Intrusion Detection and Prevention Systems and
Other Security Tools

Upon completion of this lecture, you should be able to:

Identify and describe the categories and models of intrusion


detection and prevention systems
Describe the detection approaches employed by modern
intrusion detection and prevention systems
Define and describe honeypots, honeynets, and padded cell
systems
List and define the major categories of scanning and analysis
tools and describe the specific tools used within each category

INTRODUCTION TO INTRUSION DETECTION AND PREVENTION


SYSTEMS
I. Introduction

An intrusion is an event where an individual or system attempts to breach the


confidentiality, integrity, or availability of an information system. These attempts
can range from unauthorized access to complete system disruption and may be
launched by internal users or external attackers. It is essential to distinguish
between general security incidents, such as natural disasters or unintentional
outages, and intrusions, which are deliberate and malicious.

II. Intrusion Detection and Prevention Systems (IDPS)

An IDPS is a combination of intrusion detection and intrusion prevention


capabilities within a single framework. It monitors information systems for signs
of security violations and either alerts administrators or takes action to prevent
harm. It functions much like a digital burglar alarm, detecting abnormal or
malicious activity based on predefined rules or behavioral patterns.
UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

IDPSs can issue alerts through multiple channels such as emails, pop-up
messages, text notifications, and integration with management consoles. They
may also be configured to initiate an active response, such as disabling user
accounts, blocking IP addresses, or shutting down specific network services.
Many modern IDPSs also include capabilities to integrate with other systems,
such as firewalls and routers, to enforce security policies dynamically.

The main advantage of IDPSs is their ability to act in real-time. Rather than
waiting for an attack to unfold fully, they can interrupt the intrusion process,
potentially minimizing damage and reducing recovery time.

III. Why Use an IDPS

The primary benefit of using an IDPS is early intrusion detection. Identifying


suspicious activity as it begins allows for swift action, which can prevent
significant losses. Additionally, IDPSs can recognize the early signs of attack
reconnaissance, such as footprinting (information gathering) and fingerprinting
(system probing).

An IDPS is particularly useful for monitoring systems with known vulnerabilities


that cannot yet be patched. It provides visibility into attempted exploits and can
alert security personnel before a full compromise occurs. IDPSs also aid in
detecting zero-day attacks—exploits that take advantage of previously
UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

unknown vulnerabilities. Though detection is difficult, anomaly-based and


behavioral IDPSs provide a better chance of spotting such threats.

IDPSs collect logs and evidence useful for forensic analysis and can
demonstrate compliance with regulatory requirements. They also deter
attackers by increasing the perceived difficulty and risk of detection.

IV. Types of IDPS

1. Network-Based IDPS (NIDPS)

- Monitors network segments and traffic for suspicious activity. It uses


sensors and management consoles, often requiring SPAN ports or
mirror ports to access full traffic. It excels at detecting a wide array of
network-based threats but is limited by encrypted traffic and high-volume
environments.

❖ Advantages
➢ Can monitor and protect large segments of network traffic with relatively
few devices.
➢ Operates independently of individual hosts, reducing system resource
overhead.
➢ Effective at detecting external threats, such as DoS attacks, port scans,
and worms.
➢ Generally non-intrusive in passive mode, making it easier to deploy in
existing networks.

❖ Disadvantages
➢ Cannot analyze encrypted traffic, limiting visibility into secure sessions
(e.g., SSL/TLS).
➢ May be overwhelmed by high volumes of traffic, reducing detection
accuracy.
➢ Requires access to full network traffic, which may not be available in all
architectures.
➢ Cannot reliably detect attacks that occur within encrypted tunnels or on
isolated hosts.
➢ May lack visibility into local activities on individual systems.

2. Wireless IDPS
UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

- Focuses on wireless traffic and is capable of identifying rogue access


points, protocol violations, and attacks specific to wireless networks. It
requires strategic sensor placement and presents challenges in terms of

cost and physical security.

❖ Advantages
➢ Specialized detection of threats unique to wireless environments.
➢ Can detect rogue access points and devices, which may go unnoticed by
wired systems.
➢ Enables organizations to inventory and monitor all wireless assets in real
time.
➢ More accurate detection due to the limited number of wireless protocols
and traffic types.

❖ Disadvantages
➢ Limited to monitoring wireless layers, often unable to analyze upper-
layer protocols like TCP/UDP.
➢ Signal interference and range limitations can affect detection capability.
➢ Physically vulnerable due to deployment in accessible public spaces.
➢ Higher costs due to the need for multiple sensors for full coverage.
➢ May be susceptible to evasion by attackers using passive or directional
wireless attacks.

3. Network Behavior Analysis (NBA)

- Monitors traffic flow rather than content, identifying anomalies such as


unusual communication patterns or excessive data transfer. It can detect
policy violations, scanning, and certain types of malware activity.

❖ Advantages
➢ Capable of detecting unknown and emerging threats through anomaly
analysis.
➢ Does not require access to payload data, allowing it to work even with
encrypted traffic.
➢ Effective for internal network monitoring, especially for insider threats or
misconfigurations.
➢ Works well in large-scale environments where packet-based analysis is
impractical.

❖ Disadvantages
➢ False positives can occur due to natural traffic variability.
➢ Requires time to build a reliable baseline of normal behavior.
UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

➢ Limited visibility into specific attack payloads or exploit signatures.


➢ May struggle to detect slow, stealthy attacks that do not exceed baseline
thresholds.
➢ High computational and storage overhead for continuous behavioral
modeling.

4. Host-Based IDPS (HIDPS)

- Installed on individual systems and monitors local file integrity,


configurations, and log activities. It is highly effective for encrypted data
and can detect insider threats or changes made at the host level, but
requires more intensive configuration and management.

❖ Advantages
➢ Provides deep visibility into system-level activities that network devices
cannot observe.
➢ Can detect insider threats, local exploits, and unauthorized access
attempts.
➢ Works effectively on encrypted sessions, since analysis occurs after
decryption.
➢ Useful for compliance monitoring and protecting sensitive assets on
critical hosts.

❖ Disadvantages
➢ Requires individual installation and configuration on each host,
increasing administrative overhead.
➢ Consumes system resources, potentially impacting performance.
➢ Vulnerable to host-level tampering or attacks that disable the agent.
➢ Cannot detect threats outside its host environment (e.g., lateral
movement across the network).
➢ May produce high volumes of logs and false alerts if not tuned correctly.

V. Detection Methods

1. Signature-Based Detection

- An IDPS that uses signature-based detection (sometimes called


knowledge-based detection or misuse detection) examines network
traffic in search of patterns that match known signatures—that is,
preconfigured, predetermined attack patterns. Signature-based
technology is widely used because many attacks have clear and distinct
signatures

2. Anomaly-Based Detection
UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

- Anomaly-based detection (or behavior-based detection) collects


statistical summaries by observing traffic that is known to be normal.
This normal period of evaluation establishes a performance baseline

over a period of time known as the training period. Once the baseline is
established, the IDPS periodically samples network activity and uses
statistical methods to compare the sampled activity to the baseline.

3. Stateful Protocol Analysis

- Stateful Protocol Analysis (SPA) uses the opposite of a signature


approach. Instead of comparing known attack patterns against observed
traffic or data, the system compares known normal or benign protocol
profiles against observed traffic. These profiles are developed and
provided by the protocol vendors. Essentially, the IDPS knows how a
protocol such as FTP is supposed to work, and therefore can detect
anomalous behavior.

VI. Log File Monitors (LFM)

A log file monitor (LFM) IDPS is similar to an NIDPS. An LFM reviews the log
files generated by servers, network devices, and even other IDPSs, looking for
patterns and signatures that may indicate an attack or intrusion is in process or
has already occurred. This attack detection is enhanced by the fact that the
LFM can look at multiple log files from different systems, even if they use
different operating systems or log formats. The patterns that signify an attack
can be subtle and difficult to distinguish when one system is examined in
isolation, but they may be more identifiable when the events recorded for the
entire network and each of its component systems can be viewed as a whole.

LFM’s purposes are to:


● Identify errors, warnings, and other issues that might indicate problems
with systems or applications.
● Track application performance and identify bottlenecks or slow-downs.
● Detects security breaches, unauthorized access, or suspicious activities.
● Provide information about the root cause of problems and aid in
diagnosing issues.

Examples of Log File Monitors

➢ SiteScope: A commercial monitoring platform that offers a log file


monitor for scanning log files for specific entries.
UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

➢ Nagios: A popular open-source monitoring system that provides log file


monitoring capabilities.

➢ ELK Stack: A combination of Elasticsearch, Logstash, and Kibana used


for log management and analysis

➢ OpManager: ManageEngine's OpManager offers agent-based log file


monitoring, monitoring system and application logs in real-time.

➢ LogicMonitor: Provides log file monitoring capabilities for detecting


events and triggering alerts.

VII. Security Information and Event Management (SIEM)

An information management system specifically tasked to collect and correlate


events and other log data from a number of servers or other network devices
for the purpose of interpreting, filtering, correlating, analyzing, storing, reporting,
and acting on the resulting information.

Many organizations have come to rely on security information and event


management (SIEM) as a central element to empower a security operations
center (SOC) to identify and react to the many events, incidents, and attacks
against the organization’s information systems.

SIEM’s roots are in the UNIX syslog approach to log file aggregation; for years,
organizations and security professionals have sought ways to leverage existing
systems and have them work together to maintain situation awareness, identify
noteworthy issues, and enable response to adverse events.
UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

SIEM Operational Capabilities


● Real-Time Monitoring: Many attacks remain undetected for extended
periods, allowing data exfiltration and damage.
● 2019 median dwell time was 56 days; SolarWinds attack dwell time
spanned months.
● SIEM systems can integrate contextual data and reduce attacker dwell
time, improving containment and reducing loss.
UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

HONEYPOTS, HONEYNETS AND PADDED CELL SYSTEMS


I. Introduction to Honeypots

A honeypot is a deliberately deployed decoy system designed to attract


attackers by appearing to be a legitimate part of the network. Its purpose is not
to block or repel attacks, but to observe and study malicious behavior in a
controlled environment. Honeypots do not hold real data or provide actual
services; rather, they log every interaction in detail. By studying attacker
methods, organizations can gain valuable intelligence on vulnerabilities, tactics,
and motives. Honeypots are also used to divert attackers from critical systems
and to buy time for response teams to intervene.

Honeypots are cybersecurity mechanisms that mimic real systems to attract


and analyze attacks. They are categorized based on their deployment and the
level of interaction they allow:

1. Based on Deployment:

● Research Honeypots:
- Used by researchers to study cyberattack strategies and develop
prevention techniques. These honeypots are not part of a
production environment but are valuable for academic and
security research.

● Production Honeypots:
- Deployed within operational networks, they act as decoys
containing false information to lure attackers away from actual
systems. This provides system administrators time to patch
vulnerabilities and enhance defenses.

2. Based on Interaction:

● Low Interaction Honeypots:


- Simulate only commonly targeted services and offer limited
access to attackers. They are easy to deploy and pose low risk
since the actual operating system is not exposed. However,
skilled attackers can often identify and bypass them.

● Medium Interaction Honeypots:


UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

- Allow more interaction than low interaction honeypots by


simulating realistic responses and limited activity. They offer
better insights while still maintaining a reasonable level of safety.

● High Interaction Honeypots:

- Provide full operating system access and simulate real services,


making them highly effective in collecting detailed attacker
information. However, they are costly, complex to implement, and
riskier because a compromised honeypot could be used to attack
other systems.

II. How Honeypots Work:

● Detection and Monitoring:


- Help security teams understand attacker techniques, patterns, and
vulnerabilities, including zero-day threats.

● Diversion:
- Redirect attackers from genuine targets, wasting their time and
resources.

● Prevent:
- Trigger alerts upon unauthorized access, enabling rapid response to
threats.
UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

Advantages and Disadvantages of Honeypots:

Advantages Disadvantages

Provide real-time data on malicious Can be identified by experienced


activity. attackers due to behavioral
inconsistencies.

Detect threats even when encrypted Have a narrow scope, detecting only
communication is used. direct attacks.

Consume attacker time and effort on May be exploited as a stepping stone to


fake systems. compromise other systems if breached.

Strengthen overall network security. Vulnerable to fingerprinting, where


attackers recognize the honeypot setup.

III. Honeynets

A honeynet is a more complex implementation that consists of a network of


interconnected honeypots. It simulates a real network environment, offering a broader
UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

and more realistic platform for observing sophisticated intrusions. Honeynets may
contain different types of decoy systems, such as web servers, databases, and
applications, to entice attackers with a variety of targets. This setup provides a deeper

understanding of coordinated attack strategies and techniques used by advanced


threat actors. The data gathered from honeynets is often more comprehensive and
useful for developing defensive strategies.

What is the difference between a honeypot and honeynet?


The key difference between a honeypot and a honeynet is their scale and
structure. A honeypot is a single decoy system designed to attract and monitor
attackers, while a honeynet is a network of multiple honeypots, often configured
with real applications and services to mimic a legitimate production
environment. Honeynets provide deeper insight into attacker behavior and
tactics by simulating a more realistic and valuable target. Any interaction with a
honeynet is considered suspicious, as it is not intended for legitimate users.

IV. Padded Cell Systems

A padded cell system combines the features of an intrusion detection system


with a secure, isolated environment in which suspected attackers are placed.
Once an IDPS detects an unauthorized intrusion attempt, it redirects the
intruder to the padded cell. This system is a monitored environment that mirrors
a legitimate system but is isolated from the actual network to prevent any harm.
The attacker remains unaware of the redirection and continues their activities,
all of which are logged for analysis. This approach enhances security by
preventing intrusions from reaching critical assets while simultaneously
providing valuable forensic and behavioral data.

V. Trap-And-Trace Systems

Trap-and-trace systems are proactive security mechanisms designed to


lure, detect, observe, and trace attackers within a network. Unlike traditional
defensive tools that block or ignore threats, trap-and-trace systems aim to
engage with the attacker to gain intelligence on their methods and possibly
UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

identify their source.

Key Components:
● Traps (often in the form of honeypots or honeynets): These are decoy
systems or services intentionally left vulnerable or exposed to attract
attackers.

● Tracing Mechanisms: These include logging tools, packet analyzers,


and network forensics that record attacker actions and attempt to trace
the path back to the attacker’s origin.

● Data Collection: Every interaction with the trap is logged for further
analysis, including IP addresses, payloads, tools used, and patterns of
behavior.

Primary Goals:

● Attribution - Identify who the attacker is or where they are coming from.

● Behavior Analysis - Understand the techniques and tactics used during


the intrusion.

● Legal/Investigative Use - Provide data that can be used in legal


proceedings or for reporting to authorities.

● Delay and Diversion - Waste the attacker’s time and resources,


keeping them away from real assets.

Limitations:
● Attackers may detect the trap and avoid it.

● Legal and ethical concerns may arise when interacting with attackers in
certain jurisdictions.

● Requires careful network segmentation to ensure attackers can’t use the


trap as a launchpad into real systems.

VI. Active Intrusion Prevention Systems (AIPS)


UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

A cybersecurity mechanism that not only detects malicious activity but actively
takes real-time action to prevent or mitigate attacks on a network or
system. Unlike passive systems that simply monitor and alert, AIPS can block
traffic, isolate compromised systems, redirect attackers, or modify system
configurations in response to threats, helping to stop intrusions before they
cause damage.

Common Active Prevention Techniques:


● Automatic Blocking:
- Shuts down connections from suspicious IPs or accounts.

● Dynamic Reconfiguration:
- Changes firewall rules or access policies in response to a threat.

● Rate Limiting or Throttling:


- Slows down communication from sources showing abnormal behavior.

● Traffic Redirection:
- Redirects malicious traffic to controlled environments for observation.

● Fake Services:
- Presents attackers with false but realistic-looking data to distract and
gather information.

Risks and Challenges:

● False positives can result in blocking legitimate users or services.


● Requires constant tuning and monitoring to maintain effectiveness.
● May escalate attacker behavior or trigger evasion techniques.

Specialized Active Intrusion Prevention Tool: LaBrea

LaBrea is an early and widely recognized tool in active defense, specifically designed
to slow down and trap malicious traffic, rather than simply blocking it.

How LaBrea Works:

➔ LaBrea listens for unused IP addresses in a network (i.e., IPs not assigned to
any real machine).
➔ When an attacker or worm tries to scan these unused addresses, LaBrea
responds as if a machine is present.
➔ It then opens a connection and intentionally stalls it, sending responses that
keep the connection alive but unproductive.
UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

➔ This creates a "tarpit" effect—malware or scanners become stuck, unable to


progress quickly to other targets.

SCANNING AND ANALYSIS TOOLS


I. Introduction to Scanning and Analysis Tools

Scanning and analysis tools are critical components of a security professional’s toolkit,
designed to examine systems, networks, and applications for vulnerabilities,
anomalies, and misconfigurations. These tools are used to discover and analyze
potential attack surfaces, detect unauthorized services, and collect forensic evidence
in case of a security incident.

They are essential for proactive defense, enabling organizations to discover


weaknesses before attackers can exploit them. In addition, these tools help maintain
compliance with regulatory standards, enhance visibility into infrastructure, and
support incident response efforts through logging and behavioral analysis.

II. Scanning and Analysis Tools Categories

A. Port Scanners

Port scanners probe target systems to identify open, closed, or filtered ports
and determine what services are running on them. They send packets to
specified ports on a host and analyze the response to learn which services are
accessible.

They are often used during network reconnaissance to map potential points of
entry. In defensive contexts, they help administrators audit their networks,
disable unnecessary services, and harden systems against unauthorized
access.

B. Vulnerability Scanners

Vulnerability scanners systematically inspect systems for known flaws, security


holes, and misconfigurations by referencing extensive vulnerability databases.
They assess everything from operating system patches and open ports to
outdated software versions and insecure configurations.

These tools enable organizations to prioritize remediation efforts by rating


vulnerabilities by severity and likelihood of exploitation. They play a key role in
UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

vulnerability management programs and help demonstrate compliance with


industry standards like ISO 27001, PCI DSS, and NIST.

C. Packet Sniffers / Protocol Analyzers

These tools capture and analyze data packets traversing the network, providing
detailed insights into the structure, content, and flow of communications. They

dissect packet headers and payloads to understand what data is being


transmitted and how it’s formatted.

Used heavily in network diagnostics and security analysis, they help uncover
unauthorized data transfers, detect malware communication, and troubleshoot
performance issues. Their visibility into raw traffic is invaluable during
investigations of data breaches or suspicious behavior.

D. Application Protocol Analyzers

Application protocol analyzers are specialized tools that examine the behavior
of high-level protocols like HTTP, FTP, DNS, and SMTP to detect misuse or
protocol-specific attacks. They analyze how data is transmitted at the
application layer and whether any deviation from expected behavior occurs.

They are crucial for detecting attacks such as DNS spoofing, HTTP flooding,
and command injection that target vulnerabilities within legitimate services. By
focusing on application-layer interactions, these tools can identify sophisticated
threats that bypass lower-level filters.

E. Network Behavior Analysis (NBA) Tools

NBA tools monitor traffic flows and behavior over time to identify anomalies that
deviate from normal usage patterns. They use statistical and heuristic analysis
to flag issues such as bandwidth spikes, protocol misuse, and unexpected
communications.

These tools are effective at detecting zero-day threats, worms, and insider
threats that signature-based systems may miss. They are especially useful in
environments with high data throughput or encrypted traffic where payload
inspection is limited.
UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

III. Functional Roles of Scanning and Analysis Tools

Function Description

Asset Discovery Identifies all systems, devices, and services on a network


for inventory and analysis.

Vulnerability Detection Scans for security flaws, missing patches, and exploitable
configurations.

Protocol Inspection Analyzes the use and behavior of network and application
protocols.

Behavioral Monitoring Establishes baselines and detects deviations that suggest


malicious activity.

Threat Identification Finds attack patterns, malware indicators, and intrusion


attempts.

Compliance Checks adherence to internal policies and external


Verification regulatory standards.

Forensic Investigation Reconstructs incidents using logs, packet captures, and


system data.

Incident Response Supplies alerts, evidence, and recommendations during


Support active threats.

IV. Challenges and Considerations


● Many tools are prone to false positives and negatives, which can overwhelm
analysts or allow threats to slip through.

● High-performance environments may experience system strain due to scanning


and logging processes.

● Continuous updates are essential to maintain effectiveness against new threats


and vulnerabilities.
UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

● Encrypted communications often limit the visibility of certain tools, reducing


their detection capability.

● Skilled analysts are needed to configure, interpret, and act on data produced by
scanning and analysis tools.

● Integrating multiple tools into a unified security framework can be technically


complex but is necessary for maximum visibility.

CASE EXERCISES

Miller Harrison was still working his way through his


attack protocol. Nmap started as it usually did, by
giving the program identification and version
number. Then it started reporting back on the first
host in the SLS network. It reported all of the open
ports on this server. The program moved on to a
second host and began reporting back the open
ports on that system, too. Once it reached the third
host, however, it suddenly stopped. Miller restarted
Nmap, using the last host IP address as the
starting point for the next scan. No response. He
opened another command window and tried to ping
the first host he had just port-scanned. No luck. He
tried to ping the SLS firewall. Nothing. He
happened to know the IP address for the SLS edge
router. He pinged that and got the same result. He
had been “blackholed,” meaning his IP address had

References
● Balbix. (2020, January 24). What is Vulnerability Scanning. Balbix.
https://www.balbix.com/insights/what-is-vulnerability-scanning/

● Hossain, Md. A., & Islam, Md. S. (2023). Ensuring network security with a
robust intrusion detection system using ensemble-based machine learning.
Array, 19, 100306. https://doi.org/10.1016/j.array.2023.100306

● Information Security: Scanning and Analysis Tools. (n.d.). BrainKart.


https://www.brainkart.com/article/Information-Security--Scanning-and-Analysis-
Tools_7942/

● Introduction to Honeypots, Honeynets, and Padded Cells. (n.d.).


Library.mosse-Institute.com.
https://library.mosse-institute.com/articles/2022/05/introduction-to-honeypots-
UNIVERSITY OF SCIENCE AND TECHNOLOGY of SOUTHERN PHILIPPINES
Cagayan de Oro Campus

honeynets-and-padded-cells/introduction-to-honeypots-honeynets-and-padded-
cells.html

● Intrusion Detection and Prevention System (IDPS). (n.d.). Rapid7.


https://www.rapid7.com/fundamentals/intrusion-detection-and-prevention-
systems-idps/

● NIST. (2024). Intrusion Detection and Prevention Systems.


https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=901146

● Scarfone, K., Mell, P., Stavroulakis, P., & Stamp, M. (2010). Intrusion Detection
and Prevention Systems. Csrc.nist.gov; Springer.
https://csrc.nist.gov/pubs/book-section/2010/10/intrusion-detection-and-
prevention-systems/final

● TRAP AND TRACE SYSTEMS. (n.d.).


https://www.idc-online.com/technical_references/pdfs/data_communications/
Trap_and_Trace_Systems.pdf

● Whitman, M. E., & Mattord, H. J. (2022). Principles of information security (7th


ed.). Cengage Learning.

You might also like