Intrusion Detection System
Intrusion Detection System
AND
INTRUSION DETECTION SYSYEM
PRESENTATION OUTLINE
Introduction
What ?
Why ?
Typical Intrusion Scenario
Types of Attacks
What IDS does ?
Types of IDS
Based on detection approach
Advantages/ Disadvantages
Based on protected system
Network / Host based detection
Evaluation of IDS
2
Commercially available IDS
Snort
INTRUDERS
One of the two most publicized threats to security is the
intruder (the other is viruses), often referred to as a hacker or
cracker.
There are three identified classes of intruders:
5
WHY IDS ?
Straight Forward Reason
to protect data and system integrity.
Fact :
can not be done with ordinary password and file
security
Misconception :
A network firewall will keep the bad guys off my network, right?
My anti-virus will recognize and get rid of any virus I might catch,
right?
And my password-protected access control will stop the office
cleaner trawling through my network after I've gone home, right?
9
TYPES OF ATTACK
Unauthorized access to the resources
Password cracking
Spoofing e.g. DNS spoofing
Scanning ports & services
Network packet listening
Stealing information
Unauthorized network access
Uses of IT resources for private purpose
Unauthorized alternation of resources
Falsification
of identity
Information altering and deletion
Unauthorized transmission and creation of data
10
Configuration changes to systems and n/w services
TYPES OF ATTACK CONTD..
Denial of Service
Flooding
Ping flood
Mail flood
Compromising system
Buffer overflow
Remote system shutdown
14
I.D.S
I.D Protected
Approach System
Hybrids
Data
Structure
Source
Behavior
Analysis
After an
Timing
Attack 15
On-The-
Passive Fly Interval
Active IDS
IDS Processin Based IDS
g
IDS TYPES : BASED ON DETECTION APPROACH
Knowledge-based or Signature-based
Behavior-based or Anomaly-based
Knowledge-based
Matching signature of well-known attacks against
state-change in systems or stream of packets
flowing through network
Example of signatures :
A telnet attempt with username “root” which is violation of an
organization’s security policy
An e-mail with a subject “Free Pictures” and an attachment
“freepics.exe” -characteristics of a malware
16
ADVANTAGE / DISADVANTAGES OF KB-
IDS
19
ADVANTAGES / DISADVANTAGES OF BBIDS
20
NETWORK BASED INTRUSION
DETECTION
IDS are placed on the network, nearby
system(s) being monitored
Monitors n/w traffic for particular n/w
segments or devices
The network interface card placed in
packets
Primary types of signatures are
String signature
Port Signature
Limitations
Can not detect attacks on encrypted n/w traffic (E.g. HTPS, VPN)
IDS sensors are susceptible to various attacks 22
Large volume of traffic can crash IDS sensor itself
23
HOST BASED IDS
Piece or pieces of software on the system to
be monitored
Uses log files and network traffic in/out of
26
CURRENTLY AVAILABLE IDSS
Network Based IDS Host Based IDS
Internet Security Systems Real Internet Security Systems Real
Secure Secure
Symantec Net Prowler Symantec Intruder Alert
Network Ice Black Ice Tripwire
Defender
CyberSafe Centrax Cyber Safe Centrax
Detection Appliance
27
SNORT
Open source NIDS developed by SourceFire.
It combines the benefits of signature based
28
29
QUESTIONS / COMMENTS
30