Presentation is loading. Please wait.

Presentation is loading. Please wait.

m 1 University of Palestine Student / Mahmoud Elqedra Assistant Professor / Dr. Sana’a Wafa Al-Sayegh.

Similar presentations


Presentation on theme: "m 1 University of Palestine Student / Mahmoud Elqedra Assistant Professor / Dr. Sana’a Wafa Al-Sayegh."— Presentation transcript:

1 mahmoud_moon2001@hotmail.co m 1 University of Palestine Student / Mahmoud Elqedra Assistant Professor / Dr. Sana’a Wafa Al-Sayegh

2 mahmoud_moon2001@hotmail.co m 2 Topics  Define of Intrusion detection system (IDS)  types of IDS  Advantages of Network based & host based  Challenges of IDS  Conclusion  References

3 mahmoud_moon2001@hotmail.co m 3 is a security system that monitors computer systems and network traffic and analyzes that traffic for possible hostile attacks originating from outside the organization and also for system misuse or attacks originating from inside the organization. Intrusion detection system (IDS)

4 mahmoud_moon2001@hotmail.co m 4 Types of IDS  Host based Intrusion Detection system has only host based sensors network based (HIDS)  Intrusion detection system has network-based sensor (NIDS)

5 mahmoud_moon2001@hotmail.co m 5 Advantages of NIDS 1. Lower Cost of Ownership. 2. Easier to deploy. 3. Detect network based attacks. 4. Retaining evidence. 5. Real Time detection and quick response. 6. Detection of failed attacks.

6 mahmoud_moon2001@hotmail.co m 6 Advantages of HIDS  Verifies success or failure of an attack  Monitors System Activities  Detects attacks that a network based IDS fail to detect  Near real time detection and response Does not require additional hardware  Lower entry cost

7 mahmoud_moon2001@hotmail.co m 7 Challenges of IDS  IDS technology itself is undergoing a lot of enhancements.  The success of an IDS implementation depends to a large extent on how it has been deployed.  Some organizations implement a hybrid solution.  It is important to take care of sensor to manager ratio  The IDS technology is still reactive rather than proactive  While deploying a network based IDS solution, it is important to keep in mind one very important aspect of the network based IDS in switched environment.

8 mahmoud_moon2001@hotmail.co m 8 Conclusion  strong identification and authentication:  Intrusion Detection Systems are not a solution to all security concerns  An IDS is not a substitute for a good security policy:  Human intervention is require

9 mahmoud_moon2001@hotmail.co m 9 1. Watching the Watchers: Intrusion Detection by Greg Shipley http://www.networkcomputing.com/1122/1122f3.html 2. Network vs Host-based Intrusion Detection; A guide to Intrusion Detection Technology http://secinf.net/info/ids/nvh_ids/ 3. Intrusion Detection: Challenges and myths by Marcus J. Ranum http://secinf.net/info/ids/ids_mythe.html 4. State of the Practice of Intrusion Detection Technologies http://www.sei.cmu.edu/publications/documents/99.reports/99tr028/99tr028exsu m.html List of References:

10 mahmoud_moon2001@hotmail.co m 10 5. Protect your network with an Intrusion Detection system, Gartner Research http://www.techrepublic.com/article.jhtml?src=search&id=r00520010209ggr 01.htm 6. FAQ: Network Intrusion Detection Systems by Robert Graham http://www.ticm.com/kb/faq/idsfaq.html 7. Limitations of Network Intrusion Detection by Steve Schupp http://www.sans.org/infosecFAQ/intrusion/net_id.htm List of References:


Download ppt "m 1 University of Palestine Student / Mahmoud Elqedra Assistant Professor / Dr. Sana’a Wafa Al-Sayegh."

Similar presentations


Ads by Google