FIRST LINE OF DEFENSE Intrusion Prevention System Stephen Gates – CISSP Hoàng Thế Long – 13320795 Nguyễn Thái Bình - 13320785.

Slides:



Advertisements
Similar presentations
FIREWALLS Chapter 11.
Advertisements

Security Technology: Intrusion Detection, Access Control and Other Security Tools Chapter 7.
Chapter 13: Intrusion Detection and Prevention Systems
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 13 Intrusion Detection and Prevention Systems By Whitman, Mattord, & Austin© 2008.
The Security Network Track # 2, Panel #3 Presented by John C. Deal Erik Visnyak October 6, 2009 CyberSecurity for the GIG; a historical perspective.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Intrusion Detection Systems and Practices
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
seminar on Intrusion detection system
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Security Guidelines and Management
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Storage Security and Management: Security Framework
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Using Windows Firewall and Windows Defender
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Vantage Report 3.0 Product Sales Guide
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Sec 130 Coreen L. Petrella. Intrusion Detection System (IDS) Late 1990’s Works like a Burglar Alarm It detects a violation and activates an alarm Audible.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Wireless Intrusion Prevention System
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
Module 11: Designing Security for Network Perimeters.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Guide to Network Security First Edition Chapter Six Network Monitoring and Intrusion Detection and Prevention Systems.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
CPT 123 Internet Skills Class Notes Internet Security Session B.
IS3220 Information Technology Infrastructure Security
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Security Log Visualization with a Correlation Engine: Chris Kubecka Security-evangelist.eu All are welcome in the House of Bytes English Language Presentation.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
Some Great Open Source Intrusion Detection Systems (IDSs)
Security Methods and Practice CET4884
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Working at a Small-to-Medium Business or ISP – Chapter 8
NETWORKS Fall 2010.
Security Methods and Practice CET4884
Securing Information Systems
Home Internet Vulnerabilities
Intrusion Prevention Systems
Chapter 4: Protecting the Organization
Intrusion Detection system
6. Application Software Security
Presentation transcript:

FIRST LINE OF DEFENSE Intrusion Prevention System Stephen Gates – CISSP Hoàng Thế Long – Nguyễn Thái Bình

Sans Institute Top 10 Cyber Threats for Increasingly sophisticated website attacks that exploit browser vulnerabilities 2.Increasing sophistication and effectiveness in botnets 3.Cyber espionage efforts by well-resourced organizations to extract large amounts of data for economic and political purposes 4.Mobile phone threats, especially against iPhones, Google's Android phones, and voice over IP systems 5.Insider attacks 6.Advanced identity theft from persistent bots 7.Increasingly malicious spyware 8.Web application security exploits 9.Increasingly sophisticated social engineering to provoke insecure behavior 10.Supply chain attacks that infect consumer devices Source :SANS Institute

FIRST LINE OF DEFENSE What is an IPS?

Intrusion prevention systems (IPS), also known as intrusion detection and prevention systems (IDPS), are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it.network security Source :Principles of Information Security – Michael E. Whitman, Herbert J. Mattord

5 1. To prevent problem behaviors by increasing the perceived risk of discovery and punishment for those who would attack or otherwise abuse the system 2. To detect attacks and other security violations that are not prevented by other security measures 3. To detect and deal with the preambles to attacks (commonly experienced as network probes and other “doorknob rattling” activities) 4. To document the existing threat to an organization 5. To act as quality control for security design and administration, especially in large and complex enterprises 6. To provide useful information about intrusions that do take place, allowing improved diagnosis, recovery, and correction of causative factors Why use an IDPS (cont.)?

6 Best Reason –One of the best reasons to install an IDPS is that they serve as deterrents by increasing the fear of detection among would-be attackers. If internal and external users know that an organization has an intrusion detection and prevention system, they are less likely to probe or attempt to compromise it, just as criminals are much less likely to break into a house that has an apparent burglar alarm. Why use an IDPS (cont.)?

Type of IDPS Network - based IDPS (NIDPS) –monitors the entire network for suspicious traffic by analyzing protocol activity Wireless IDPS Network Behavior Analysis System (NBA) Host -based IDPS (HIDPS) –an installed software package which monitors a single host for suspicious activity by analyzing events occurring within that host.

Type of IDS/IPS

IPDS Detection Methods 9 1. The signature-based approach 2. The statistical-anomaly approach 3. The stateful packet inspection approach

IPDS Response Options 10 Audible/visual alarm message Page or phone message Log entry Evidentiary packet dump Take action against the intruder Launch program Reconfigure firewall Terminal Session Terminate connection

Strengths of IDPS 11 Monitoring and analysis of system events and user behaviors Testing the security states of system configurations Baselining the security state of a system, then tracking any changes to that baseline Recognizing patterns of system events that correspond to known attacks Recognizing patterns of activity that statistically vary from normal activity Managing operating system audit and logging mechanisms and the data they generate Alerting appropriate staff by appropriate means when attacks are detected Measuring enforcement of security policies encoded in the analysis engine Providing default information security policies Allowing non-security experts to perform important security monitoring functions

Limitations of IDPS 12 Compensating for weak or missing security mechanisms in the protection infrastructure,such as firewalls, identification and authentication systems, link encryption systems,access control mechanisms, and virus detection and eradication software Instantaneously detecting, reporting, and responding to an attack when there is a heavy network or processing load Detecting newly published attacks or variants of existing attacks Effectively responding to attacks launched by sophisticated attackers Automatically investigating attacks without human intervention Resisting all attacks that are intended to defeat or circumvent them Compensating for problems with the fidelity of information sources Dealing effectively with switched networks

Others 13 Reporting and Archiving Capabilities Failsafe Considerations for IDPS Reponses Selecting IDPS Approaches and Products Organizational Requirements and Contraints IDPS Product Features and Quality

FIRST LINE OF DEFENSE Why enterprise needs IPS?

Typical Network Topology SW Customer Traffic “Good Users” Internet’s No-Man’s Land

What’s Firewall UTM limitation SW “Good Users” Internet’s No-Man’s Land “Attacker s”

What’s else Firewall UTM can not do? SW “Good Users” Internet’s No-Man’s Land “Attacker s”

18 Cyberoam Firewall UTM

Customer Traffic DDoS Attacks Protocol Abuse Undesired Users & Service SW Server-Side Exploits Customer Traffic “Good Users” Internet’s No-Man’s Land “Attackers” Without IPS

“Good Users” “Attackers” Undesired Users & Services DDoS Attacks Protocol Abuse Server-Side Exploits SW “Good Users” Internet’s No-Man’s Land “Attackers” Customer Traffic With IPS

21 Corero IPDS

IPDS Boongke Centralized Management & ReportingCorero Security Operations Center SecureWatch Excerpts of SecureWatch Reports 22

FIRST LINE OF DEFENSE Q & A