Sie sind auf Seite 1von 21

Intrusion Detection Systems

Presented by: Priyanka Ghagare Guided By: Amol Bhilare

Index
Introduction Why do I need an IDS,I have a Firewall? Components of Intrusion Detection Types of IDS

Firewall Versus Network IDS


Problems with Current IDSs

Next Generation IDSs


Conclusion

Introduction
Intrusion
A set of actions aimed to compromise the security goals, namely
Integrity, confidentiality, or availability, of a computing and networking resource

Intrusion detection
The process of identifying and responding to intrusion activities.

WHY DO I NEED AN IDS, I HAVE A FIREWALL?

Firewall
Active filtering Fail-close

Network IDS
Passive monitoring
Fail-open

IDS

FW

Components of Intrusion Detection System


system activities are observable Audit Records Audit Data Preprocessor Activity Data Detection Models Detection Engine Alarms Decision Table Decision Engine normal and intrusive activities have distinct evidence

Action/Report

Types of IDS
Different ways of classifying an IDS

IDS based on
anomaly detection signature based misuse host based network based

Anomaly based IDS


This IDS models the normal usage of the network as a noise characterization. Anything distinct from the noise is assumed to be an intrusion activity.
E.g flooding a host with lots of packet.

The primary strength is its ability to recognize novel attacks.

Anomaly Detection
90 80 70 60 activity 50 measures40 30 20 10 0 CPU Process Size

probable intrusion
normal profile abnormal

Relatively high false positive rate anomalies can just be new normal activities.

Signature based misuse


This IDS possess an attacked description that can be matched to sensed attack manifestations. The question of what information is relevant to an IDS depends upon what it is trying to detect.
E.g DNS, FTP etc.

Misuse Detection
pattern matching Intrusion Patterns activities intrusion

Example: if (src_ip == dst_ip) then land attack Cant detect new attacks

Host/Applications based IDS


The host operating system or the application logs in the audit information. These audit information includes events like the use of identification and authentication mechanisms (logins etc.) , file opens and program executions, admin activities etc. This audit is then analyzed to detect trails of intrusion.

Network IDSs
Deploying sensors at strategic locations
E.g., Packet sniffing via tcpdump at routers

Inspecting network traffic


Watch for violations of protocols and unusual connection patterns

Monitoring user activities


Look into the data portions of the packets for malicious command sequences

May be easily defeated by encryption


Data portions and some header information can be encrypted

Other problems

Architecture of Network IDS


Policy script Alerts/notifications

Policy Script Interpreter


Event control Event stream

Event Engine
tcpdump filters Filtered packet stream

libpcap
Packet stream

Network

Functions of IDS
Monitoring and analyzing both user and system activities. Analyzing system configurations and vulnerabilities. Assessing system and file.

Detecting and preventing network intrusions.


Antivirus, antispyware management Integrity

Monitoring Networks and Hosts


Network Packets
tcpdump

Operating System Events

BSM

Problems with Current IDSs


Knowledge and signature-based:
We have the largest knowledge/signature base Ineffective against new attacks

Individual attack-based:
Intrusion A detected; Intrusion B detected No long-term proactive detection/prediction

Statistical accuracy-based:
x% detection rate and y% false alarm rate
Are the most damaging intrusions detected?

Statically configured.

Next Generation IDSs


Adaptive Detect new intrusions Scenario-based Correlate (multiple sources of) audit data and attack information Cost-sensitive Model cost factors related to intrusion detection Dynamically configure IDS components for best protection/cost performance

Adaptive IDSs
ID Modeling Engine
semiautomatic

anomaly data ID models

IDS
anomaly detection

(misuse detection)

ID models

ID models

IDS IDS

Where do I put my IDS?

Conclusion
IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all.If all of these points are not adhered to, an IDS implementation along with a firewall alone can not make a highly secured infrastructure.

Das könnte Ihnen auch gefallen