Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Guide to Network Defense and Countermeasures Second Edition
Firewall Configuration Strategies
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Firewalls and Intrusion Detection Systems
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Intrusion Detection Systems and Practices
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Security Awareness: Applying Practical Security in Your World
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Host Intrusion Prevention Systems & Beyond
Department Of Computer Engineering
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Security Guidelines and Management
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Intrusion Detection Systems and Network Security
Hacker Zombie Computer Reflectors Target.
Using Windows Firewall and Windows Defender
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Guide to Network Defense and Countermeasures
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 5: Implementing Intrusion Prevention
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Cryptography and Network Security Sixth Edition by William Stallings.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
PERIMETER SECURITY Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Intrusion Detection and Prevention Systems By Colton Delman COSC 454 Information Assurance Management.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
CompTIA Security+ Study Guide (SY0-401)
IDS Intrusion Detection Systems
Click to edit Master subtitle style
Introduction to Networking
CompTIA Security+ Study Guide (SY0-401)
Intrusion Detection system
Presentation transcript:

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition Intrusion Detection Systems and Network Security Chapter 13

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition Objectives Apply the appropriate network tools to facilitate network security. Determine the appropriate use of tools to facilitate network security. Apply host-based security applications.

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition Key Terms Access control lists (ACLs) Antispam Antivirus Content-based signature Context-based signature False negative False positive Firewall Heuristic scanning Honeypot Host-based IDS (HIDS) Internet content filter Intrusion detection system (IDS)

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition Network Security: A Layered Approach As need for security increases, layers of security should be added. –Layers could include passwords, firewalls, access lists, file permissions, and intrusion detection systems Intrusion detection systems are one of the more complex layers. –Detects inappropriate or malicious activity on a computer or network.

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition History of Intrusion Detection Systems Stalker (host-based) released 1989 Mid-1990s IDS gain popularity commercially. WheelGroup develops first network-based IDS under the name NetRanger. Internet Security Systems’ Realsecure released in By 1998 IDS was considered a vital part of network security.

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition History of the Internet and IDS

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition Traffic collector / sensor Analysis engine Signature database User interface and reporting IDS Components

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition IDS Components (continued)

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition Host-based IDS (HIDS) Network-based IDS (NIDS) Distinguished by detection method: –Signature-based IDS - Relies heavily on a predefined set of attack and traffic patterns called signatures. –Anomaly-based (heuristic) IDS - Monitors activity and attempts to classify it as either “normal” or “anomalous.” Types of IDS

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition Network IDS Components

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition Advantages of NIDS –Providing IDS coverage requires fewer systems. –Deployment, maintenance, and upgrade costs are usually lower. –A NIDS has visibility into all network traffic and can correlate attacks among multiple systems. Disadvantages of NIDS –It is ineffective when traffic is encrypted. –It can’t see traffic that does not cross it. –It must be able to handle high volumes of traffic. –It doesn’t know about activity on the hosts themselves.

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition

© 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition

© 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition Passive NIDS –Generates an alarm when it matches a pattern and does not interact with the traffic in any way. Active NIDS –Reactive response to an attack such as a TCP reset. TCP reset –The most common defensive ability for an active NIDS. –The reset message (RST) tells both sides of the connection to drop the session and stop communicating immediately. Active vs. Passive NIDS

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition Content-based signatures –Matching characters or strings –Generally the simplest types –Easy to build and look for simple things, such as a certain string of characters or a certain flag set in a TCP packet Context-based signatures (heuristics) –Matching patterns of activity –Generally more complex Signatures

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition A network device—hardware, software, or a combination thereof Determines what traffic should be allowed or denied to pass in or out of a network Firewalls

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition

© 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition

© 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition Firewall Mechanisms –Network Address Translation (NAT) –Basic packet filtering (header information) –Stateful inspection (header and contents) pg 335 –Access control lists (ACLs) Rules applied to ports and IP addresses How Firewalls Work

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition In addition to IDS functions, it has the capability of stopping or preventing malicious attack. Some can inspect encrypted traffic (SSL traffic) Often rated by the amount of traffic that can be processed without dropping packets. Intrusion Prevention Systems

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition

© 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition Used to: –Filter undesirable content –Filter malicious code such as browser hijacking attempts Challenges: –Blacklists of websites difficult to maintain –Keyword filtering may generate false positives –Determined users will attempt to bypass the system Barracuda Case Study Internet Content Filters

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition

© 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition A honeypot is a system or group of systems designed to attract an attacker’s attention. –Allows the attackers methods to be observed without putting real systems at risk –Activity recorded for later analysis –Afford information and additional security but require significant cost and effort to maintain A honeynet is a group of honeypots. Honeypots and Honeynets

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition

© 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition

© 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition Examines activity only on a specific host –Examines logs, audit trails, and network traffic coming into or leaving the host –Examination is done in real time or periodically Flags that may raise the alarm in a HIDS –Login failures –Logins at irregular hours –Privilege escalation –Additions of new user accounts Host-Based IDS (HIDS)

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition The traffic collector aggregates information. The analysis engine reviews the data. –May implement a decision tree to classify activities and make decisions –Signature database may be used to match activities to predefined activity or patterns Users work with HIDS through the user interface which include the visible components of the HIDS. How HIDS Work

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition Used to identify, neutralize, or remove malicious programs, macros, and files. Scanning approaches: –Signature-based scanning –Heuristic scanning Modern antivirus products have: Antivirus Products –Automated updates –Automated scanning –Media scanning –Manual Scanning – scanning –Resolution

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition Host-based protective mechanism that controls traffic going into and out of a single system. Various free and commercial firewall software is available. Zone Alarm Personal Software Firewalls

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition

© 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition Pop-up Blockers –Attempts to prevent web pages from opening a new tab or window Windows Defender –Designed to remove spyware and unwanted programs from your PC –Includes spyware detection and removal, scheduled scanning, automatic updates, real-time protection, software explorer, and configurable responses Pop-up Blockers and Windows Defender

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond, Third Edition Chapter Summary Apply the appropriate network tools to facilitate network security. Determine the appropriate use of tools to facilitate network security. Apply host-based security applications.