Presentation is loading. Please wait.

Presentation is loading. Please wait.

IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.

Similar presentations


Presentation on theme: "IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes."— Presentation transcript:

1 IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes it to determine if an attack or an intrusion has occurred. Some ID Systems can automatically respond to an intrusion. Two Models Anomaly Detection Model database of normal activity search for deviations Misuse Detection Model database of malicious signatures search for matches

2 IDS - What Can It Do?  Monitor and analyze user/system/network activities  Audit configuration vulnerabilities  Assess integrity of critical files  Recognize patterns of known attacks  Statistically analyze for abnormal activities  Respond with warnings and/or actions  Install decoy servers (honey pots)  Install vendor patches (some IDS) false positivefalse negative

3 Two Types of IDS Network-based Intrusion Detection System (NIDS) Host-based Intrusion Detection System (HIDS) Searches for patterns in packets, patterns of packets and packets that don ’ t belong. Can log results or communicate via SMTP/SNMP Sensors, analyzers and management consoles Searches for patterns in logs, processes, and/or memory. Can check file integrity (MD5) Observe network traffic flow HID also called agent Reactive sensors might alter router/firewall rules More extreme response: throttling, session hijacking

4 Rule-based Appliances Snort Rules alert tcp !138.49.38.0/24 any -> 138.49.38.0/24 111\ ( content... msg...) log udp any any -> 138.49.38.0/24 1:1024 alert tcp any any -> 138.49.38.0/24 ( flags:SF; msg:”possible SYN FIN scan”) pass icmp any any <> 138.49.38.0/24 (itype:0)

5 IDS Disadvantages Network-based Intrusion Detection System (NIDS) Host-based Intrusion Detection System (HIDS) Large bandwidth can overwhelm sensor Sensor can view network flow, but not its impact upon host(s) Encryption Cannot see all network traffic Processor time Log file requirements OS vulnerabilities may impact agent An IDS is another tool in the arsenal. Agents are OS specific

6 Example: Port Scans IP addresses PortsPorts Port sweepPort scan

7 ProductsSnortSnort //www.snort.org SourcefireSourcefire //www.sourcefire.com Cisco Secure IDS //www.cisco.com/go/ids/ TripwireTripwire //www.tripwire.com

8


Download ppt "IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes."

Similar presentations


Ads by Google