Intrusion Detection Systems
Intrusion Detection Systems
SYSTEMS
(IDS)
Agenda
Sources
What is an Intrusion Detection System
Types of Intrusion Detection Systems
How an IDS Works
Detection Methods
Issues
Why are IDS important
How does an IDS fit into your security plan?
Pros and Cons
Questions
Sources
Baker, A. R., & Esler, J. (2007). Snort IDS and IPS Toolkit.
Baumrucker, C. T., Burton, J. D., & Dentler, S. (2003). Cisco
Security Professional's Guide to Secure Intrusion Detection
Systems.
Endorf, C., Schultz, E., & Mellander, J. (2004). Intrusion
Detection and Prevention.
Training, U. A.-I. (n.d.). Intrusion Detection Systems (IDS)
and Auditing.
What is an Intrusion Detection
System?
Defined as the tools, methods, and resources
to help identify, assess, and report
unauthorized or unapproved network activity.
An IDS detects activity in traffic that may or
may not be an intrusion.
IDSes can detect and deal with insider
attacks, as well as, external attacks, and are
often very useful in detecting violations of
corporate security policy and other internal
threats.
Host Based Intrusion Detection
Are usually installed on servers and are more
focused on analyzing the specific operating
systems and applications, resource utilization and
other system activity residing on the Host-based
IDS host.
It will log any activities it discovers to a secure
database and check to see whether the events
match any malicious event record listed in the
knowledge base.
Host-based IDS are often critical in detecting
internal attacks directed towards an organization’s
servers such as DNS, Mail, and Web Servers.
Network Based Intrusion
Detection
Are dedicated network devices distributed within
networks that monitor and inspect network traffic
flowing through the device.
Instead of analyzing information that originates and
resides on a host, Network-based IDS uses packet
sniffing techniques to pull data from TCP/IP packets
or other protocols that are traveling along the
network.
Most Network-based IDS log their activities and
report or alarm on questionable events.
Network-based IDS work best when located on the
DMZ, on any subnets containing mission critical
servers and just inside the firewall.
Comparison
Host Based Network Based
Narrow in scope (watches only Broad in scope (watches all
specific host activities) network activities)
More complex setup Easier setup
Better for detecting attacks from Better for detecting attacks from
the inside the outside
More expensive to implement
Less expensive to implement
Detection is based on what any
Detection is based on what can
single host can record
be recorded on the entire
Does not see packet headers
network
Usually only responds after a
Examines packet headers
suspicious log entry has been
Near real-time response
made
OS-independent
OS-specific
attempts
Hybrid Intrusion Detection
Are systems that combine both Host-based IDS,
which monitors events occurring on the host
system and Network-based IDS, which monitors
network traffic, functionality on the same
security platform.
A Hybrid IDS, can monitor system and
application events and verify a file system’s
integrity like a Host-based IDS, but only serves
to analyze network traffic destined for the
device itself.
A Hybrid IDS is often deployed on an
organization’s most critical servers.
Honeypots
Are decoy servers or systems setup to gather
information regarding an attacker of intruder into
networks or systems.
Appear to run vulnerable services and capture vital
information as intruders attempt unauthorized
access.
Provide you early warning about new attacks and
exploitation trends which allow administrators to
successfully configure a behavioral based profile
and provide correct tuning of network sensors.
Can capture all keystrokes and any files that might
have been used in the intrusion attempt.
Passive Systems
Detects a potential security breach
Logs the information
Signals an alert on the console
Does not take any preventive measures to
entire network
Offers centralized management for
attacks
Provides an additional layer of protection
Cons
Generates false positives and negatives
Reacts to attacks rather than preventing them
Requires full-time monitoring and highly skilled
staff dedicated to interpreting the data
Requires a complex incident response process
Cannot monitor traffic at higher network traffic
rates
Generates an enormous amount of data to be
analyzed
Cannot deal with encrypted network traffic
It is expensive
Questions