SlideShare a Scribd company logo
1 of 22
Network security
IntrusIon 
 An intrusion is a deliberate unauthorized attempt, 
successful or not, to break into, access, manipulate, or 
misuse some valuable property and where the misuse 
may result into or render the property unreliable or 
unusable. 
 The person who is an intruder. 
2
types of IntrusIons: 
 Attempted break-ins, which are detected by a typical behavior 
profiles or violations of security constraints. An intrusion detection 
system for this type is called anomaly-based IDS. 
3
types of IntrusIon 
 Masquerade attacks, which are detected by atypical behavior 
profiles or violations of security constraints. These intrusions are also 
detected using anomaly-based IDS. 
4
types of IntrusIon 
 Penetrations of the security control system, which are detected by 
monitoring for specific patterns of activity. 
 Leakage, which is detected by atypical use of system resources. 
5
 Denial. of service, which is detected by atypical use of system 
resources 
 Malicious use, which is detected by atypical behavior profiles, 
violations of security constraints, or use of special privileges 
6
IntrusIon DetectIon 
 Intrusion detection is a technique of detecting unauthorized 
access to a computer system or a computer network. 
 An intrusion into a system is an attempt by an outsider to the 
system to illegally gain access to the system. Intrusion 
prevention, on the other hand, is the art of preventing an 
unauthorized access of a system’s resources. 
 The two processes are related in a sense that while intrusion 
detection passively detects system intrusions, intrusion 
prevention actively filters network traffic to prevent intrusion 
attempts. 
7
IntrusIon DetectIon systems 
 An intrusion detection system (IDS) is a system used to 
detect unauthorized intrusions into computer systems and 
networks. Intrusion detection as a technology is not new, it 
has been used for generations to defend valuable resources. 
 These are three models of intrusion detection mechanisms: 
anomaly-based detection, signature-based detection, and 
hybrid detection. 
8
types of IntrusIon DetectIon system 
 Host-based IDSs 
 Get audit data from host audit trails. 
 Detect attacks against a single host 
 Distributed IDSs 
 Gather audit data from multiple host and possibly the 
network that connects the hosts 
 Detect attacks involving multiple hosts 
 Network-Based IDSs 
 Use network traffic as the audit data source, relieving 
the burden on the hosts that usually provide normal 
computing services 
 Detect attacks from network.
IntrusIon DetectIon system types 
 Intrusion detection systems (IDS) can be classified into different ways. The major 
classifications are Active and passive IDS, Network Intrusion detection systems (NIDS) 
and host Intrusion detection systems (HIDS) 
 Network Intrusion Detection Systems (NIDS) usually consists of a 
network appliance (or sensor) with a Network Interface Card 
(NIC) operating in promiscuous mode and a separate management 
interface. The IDS is placed along a network segment or boundary 
and monitors all traffic on that segment. 
 A Host Intrusion Detection Systems (HIDS) and software 
applications (agents) installed on workstations which are to be 
monitored. The agents monitor the operating system and write 
data to log files and/or trigger alarms. A host Intrusion 
detection systems (HIDS) can only monitor the individual 
workstations on which the agents are installed and it cannot 
monitor the entire network. Host based IDS systems are used to 
monitor any intrusion attempts on critical servers. 
Kizza - Guide to Computer Network Security 10
IntrusIon DetectIon technIques 
 Misuse detection 
 Catch the intrusions in terms of the characteristics 
of known attacks or system vulnerabilities. 
 Anomaly detection 
 Detect any action that significantly deviates from 
the normal behavior.
 Anomaly Detection – 
 Anomaly based systems are “learning” systems in a 
sense that they work by continuously creating 
“norms” of activities. These norms are then later 
used to detect anomalies that might indicate an 
intrusion. 
 Anomaly detection compares observed activity 
against expected normal usage profiles “leaned”. The 
profiles may be developed for users, groups of users, 
applications, or system resource usage. 
12
 Misuse Detection - 
 The misuse detection concept assumes that each intrusive activity is 
representable by a unique pattern or a signature so that slight variations of 
the same activity produce a new signature and therefore can also be 
detected. 
 Misuse detection systems, are therefore, commonly known as signature 
systems. They work by looking for a specific signature on a system. 
Identification engines perform well by monitoring these patterns of known 
misuse of system resources. 
 Hybrid Detection - 
 Because of the difficulties with both the anomaly-based and signature-based 
detections, a hybrid model is being developed. Much research is now focusing 
on this hybrid model. 
13
Misuse Detection vs. AnoMAly 
Detection 
Advantage Disadvantage 
Misuse 
Detection 
Accurately and 
generate much 
fewer false alarm 
Cannot detect 
novel or unknown 
attacks 
Anomaly 
Detection 
Is able to detect 
unknown attacks 
based on audit 
High false-alarm 
and limited by 
training data.
Response to systeM intRusion 
 A good intrusion detection system alert should 
produce a corresponding response. 
 A good response must consist of pre-planned 
defensive measures that include an incident 
response team and ways to collect IDS logs for 
future use and for evidence when needed. 
15
 Incident Response Team 
 An incident response team (IRT) is a primary and 
centralized group of dedicated people charged with the 
responsibility of being the first contact team whenever 
an incidence occurs. An IRT must have the following 
responsibilities: 
 keeping up-to-date with the latest threats and incidents, 
 being the main point of contact for incident reporting, 
 notifying others whenever an incident occurs, 
 assessing the damage and impact of every incident, 
 finding out how to avoid exploitation of the same vulnerability, 
and 
 recovering from the incident. 
16
Honey pots 
o A honeypot is an intrusion detection technique used to study hacker 
movements and helping the system against later attacks usually 
made up of a virtual machine that sits on a network or single client. 
o Honeypots do not solve a specific problem, instead they are a tool 
that contribute to your overall security architecture. 
o The primary use of honeypots is to collect the information,this 
information is then used to better identify ,understand & protect 
against threats. 
17
DATA CONTROL 
Internet 
Honeywall 
Honeypot 
Honeypot 
No Restrictions 
Connections Limited Packet Scrubbed
Types of honeypots 
LOW-INTERACTION 
HIGH-INTERACTION 
19
1)LOW-INTERACTION 
o The main difference between the two is their complexity and 
interaction they allow an attacker. By emulating operating 
systems and other services, low-interaction honeypots do 
not give attackers much control. The main advantage of this 
is their simplicity that allow maintenance plus the low risk 
factor. 
o Capture limited information. 
20
o2H)igHhI-inGteHra-ctiIonN hTonEeyRpoAtsC dTiffIerO inN that they involve real 
operating systems and applications. Unlike low-interaction, 
these honeypots work with real systems; nothing is 
emulated. The advantage of this is that by giving attackers 
real systems to work with, you can capture a wide range of 
information and learn new techniques being used. 
o Captures extensive information. 
o High risk and hard to maintain. 
21
Kizza - Guide to Computer Network Security 22

More Related Content

What's hot

Intrusion detection system – a study
Intrusion detection system – a studyIntrusion detection system – a study
Intrusion detection system – a studyijsptm
 
Intrusion detection systems
Intrusion detection systemsIntrusion detection systems
Intrusion detection systemsSeraphic Nazir
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemPreshan Pradeepa
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSieijjournal
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET Journal
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemDevil's Cafe
 
Intrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIntrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIJERA Editor
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...researchinventy
 
IPS Product Comparison of Cisco 4255 & TippingPoint 5000E
IPS Product Comparison of Cisco 4255 & TippingPoint 5000EIPS Product Comparison of Cisco 4255 & TippingPoint 5000E
IPS Product Comparison of Cisco 4255 & TippingPoint 5000Eallengalvan
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMApoorv Pandey
 
Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systemsvamsi_xmen
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)Netwax Lab
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemNikhil Singh
 

What's hot (19)

Intrusion detection system – a study
Intrusion detection system – a studyIntrusion detection system – a study
Intrusion detection system – a study
 
intruders types ,detection & prevention
intruders types ,detection & preventionintruders types ,detection & prevention
intruders types ,detection & prevention
 
Intrusion detection systems
Intrusion detection systemsIntrusion detection systems
Intrusion detection systems
 
1776 1779
1776 17791776 1779
1776 1779
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Intrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIntrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring System
 
Introduction IDS
Introduction IDSIntroduction IDS
Introduction IDS
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
 
IPS Product Comparison of Cisco 4255 & TippingPoint 5000E
IPS Product Comparison of Cisco 4255 & TippingPoint 5000EIPS Product Comparison of Cisco 4255 & TippingPoint 5000E
IPS Product Comparison of Cisco 4255 & TippingPoint 5000E
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
 
Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
 
46 102-112
46 102-11246 102-112
46 102-112
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 

Viewers also liked

Masquerader Detection
Masquerader DetectionMasquerader Detection
Masquerader DetectionArquam Md
 
Automated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation VulnerabilitiesAutomated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation VulnerabilitiesYuji Kosuga
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention ToolsSplitty
 
Intrusion detection system with GA
Intrusion detection system with GAIntrusion detection system with GA
Intrusion detection system with GAChungHsiangHsueh
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
Dr.r.k.dhuria hydroponics aks, new delhi
Dr.r.k.dhuria hydroponics aks, new delhiDr.r.k.dhuria hydroponics aks, new delhi
Dr.r.k.dhuria hydroponics aks, new delhiAyurvetAks
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 

Viewers also liked (7)

Masquerader Detection
Masquerader DetectionMasquerader Detection
Masquerader Detection
 
Automated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation VulnerabilitiesAutomated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation Vulnerabilities
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools
 
Intrusion detection system with GA
Intrusion detection system with GAIntrusion detection system with GA
Intrusion detection system with GA
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Dr.r.k.dhuria hydroponics aks, new delhi
Dr.r.k.dhuria hydroponics aks, new delhiDr.r.k.dhuria hydroponics aks, new delhi
Dr.r.k.dhuria hydroponics aks, new delhi
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 

Similar to Intrusiond and detection

A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesKelly Taylor
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSieijjournal1
 
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsIRJET Journal
 
Detecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkDetecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkIOSR Journals
 
Information Security.pptx
Information Security.pptxInformation Security.pptx
Information Security.pptxDrRajapraveen
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIRJET Journal
 
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsA Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsCSCJournals
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...Zara Nawaz
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsAlison Hall
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013ijcsbi
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Wail Hassan
 
Intrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction TechniqueIntrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction TechniqueIDES Editor
 

Similar to Intrusiond and detection (20)

IS - Firewall
IS - FirewallIS - Firewall
IS - Firewall
 
A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And Techniques
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection Systems
 
Detecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkDetecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian Network
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
Information Security.pptx
Information Security.pptxInformation Security.pptx
Information Security.pptx
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
 
1776 1779
1776 17791776 1779
1776 1779
 
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsA Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention Systems
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Intrusion .ppt
Intrusion .pptIntrusion .ppt
Intrusion .ppt
 
IDS VS IPS.pptx
IDS VS IPS.pptxIDS VS IPS.pptx
IDS VS IPS.pptx
 
Intrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction TechniqueIntrusion Detection System - False Positive Alert Reduction Technique
Intrusion Detection System - False Positive Alert Reduction Technique
 

Recently uploaded

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Recently uploaded (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Intrusiond and detection

  • 2. IntrusIon  An intrusion is a deliberate unauthorized attempt, successful or not, to break into, access, manipulate, or misuse some valuable property and where the misuse may result into or render the property unreliable or unusable.  The person who is an intruder. 2
  • 3. types of IntrusIons:  Attempted break-ins, which are detected by a typical behavior profiles or violations of security constraints. An intrusion detection system for this type is called anomaly-based IDS. 3
  • 4. types of IntrusIon  Masquerade attacks, which are detected by atypical behavior profiles or violations of security constraints. These intrusions are also detected using anomaly-based IDS. 4
  • 5. types of IntrusIon  Penetrations of the security control system, which are detected by monitoring for specific patterns of activity.  Leakage, which is detected by atypical use of system resources. 5
  • 6.  Denial. of service, which is detected by atypical use of system resources  Malicious use, which is detected by atypical behavior profiles, violations of security constraints, or use of special privileges 6
  • 7. IntrusIon DetectIon  Intrusion detection is a technique of detecting unauthorized access to a computer system or a computer network.  An intrusion into a system is an attempt by an outsider to the system to illegally gain access to the system. Intrusion prevention, on the other hand, is the art of preventing an unauthorized access of a system’s resources.  The two processes are related in a sense that while intrusion detection passively detects system intrusions, intrusion prevention actively filters network traffic to prevent intrusion attempts. 7
  • 8. IntrusIon DetectIon systems  An intrusion detection system (IDS) is a system used to detect unauthorized intrusions into computer systems and networks. Intrusion detection as a technology is not new, it has been used for generations to defend valuable resources.  These are three models of intrusion detection mechanisms: anomaly-based detection, signature-based detection, and hybrid detection. 8
  • 9. types of IntrusIon DetectIon system  Host-based IDSs  Get audit data from host audit trails.  Detect attacks against a single host  Distributed IDSs  Gather audit data from multiple host and possibly the network that connects the hosts  Detect attacks involving multiple hosts  Network-Based IDSs  Use network traffic as the audit data source, relieving the burden on the hosts that usually provide normal computing services  Detect attacks from network.
  • 10. IntrusIon DetectIon system types  Intrusion detection systems (IDS) can be classified into different ways. The major classifications are Active and passive IDS, Network Intrusion detection systems (NIDS) and host Intrusion detection systems (HIDS)  Network Intrusion Detection Systems (NIDS) usually consists of a network appliance (or sensor) with a Network Interface Card (NIC) operating in promiscuous mode and a separate management interface. The IDS is placed along a network segment or boundary and monitors all traffic on that segment.  A Host Intrusion Detection Systems (HIDS) and software applications (agents) installed on workstations which are to be monitored. The agents monitor the operating system and write data to log files and/or trigger alarms. A host Intrusion detection systems (HIDS) can only monitor the individual workstations on which the agents are installed and it cannot monitor the entire network. Host based IDS systems are used to monitor any intrusion attempts on critical servers. Kizza - Guide to Computer Network Security 10
  • 11. IntrusIon DetectIon technIques  Misuse detection  Catch the intrusions in terms of the characteristics of known attacks or system vulnerabilities.  Anomaly detection  Detect any action that significantly deviates from the normal behavior.
  • 12.  Anomaly Detection –  Anomaly based systems are “learning” systems in a sense that they work by continuously creating “norms” of activities. These norms are then later used to detect anomalies that might indicate an intrusion.  Anomaly detection compares observed activity against expected normal usage profiles “leaned”. The profiles may be developed for users, groups of users, applications, or system resource usage. 12
  • 13.  Misuse Detection -  The misuse detection concept assumes that each intrusive activity is representable by a unique pattern or a signature so that slight variations of the same activity produce a new signature and therefore can also be detected.  Misuse detection systems, are therefore, commonly known as signature systems. They work by looking for a specific signature on a system. Identification engines perform well by monitoring these patterns of known misuse of system resources.  Hybrid Detection -  Because of the difficulties with both the anomaly-based and signature-based detections, a hybrid model is being developed. Much research is now focusing on this hybrid model. 13
  • 14. Misuse Detection vs. AnoMAly Detection Advantage Disadvantage Misuse Detection Accurately and generate much fewer false alarm Cannot detect novel or unknown attacks Anomaly Detection Is able to detect unknown attacks based on audit High false-alarm and limited by training data.
  • 15. Response to systeM intRusion  A good intrusion detection system alert should produce a corresponding response.  A good response must consist of pre-planned defensive measures that include an incident response team and ways to collect IDS logs for future use and for evidence when needed. 15
  • 16.  Incident Response Team  An incident response team (IRT) is a primary and centralized group of dedicated people charged with the responsibility of being the first contact team whenever an incidence occurs. An IRT must have the following responsibilities:  keeping up-to-date with the latest threats and incidents,  being the main point of contact for incident reporting,  notifying others whenever an incident occurs,  assessing the damage and impact of every incident,  finding out how to avoid exploitation of the same vulnerability, and  recovering from the incident. 16
  • 17. Honey pots o A honeypot is an intrusion detection technique used to study hacker movements and helping the system against later attacks usually made up of a virtual machine that sits on a network or single client. o Honeypots do not solve a specific problem, instead they are a tool that contribute to your overall security architecture. o The primary use of honeypots is to collect the information,this information is then used to better identify ,understand & protect against threats. 17
  • 18. DATA CONTROL Internet Honeywall Honeypot Honeypot No Restrictions Connections Limited Packet Scrubbed
  • 19. Types of honeypots LOW-INTERACTION HIGH-INTERACTION 19
  • 20. 1)LOW-INTERACTION o The main difference between the two is their complexity and interaction they allow an attacker. By emulating operating systems and other services, low-interaction honeypots do not give attackers much control. The main advantage of this is their simplicity that allow maintenance plus the low risk factor. o Capture limited information. 20
  • 21. o2H)igHhI-inGteHra-ctiIonN hTonEeyRpoAtsC dTiffIerO inN that they involve real operating systems and applications. Unlike low-interaction, these honeypots work with real systems; nothing is emulated. The advantage of this is that by giving attackers real systems to work with, you can capture a wide range of information and learn new techniques being used. o Captures extensive information. o High risk and hard to maintain. 21
  • 22. Kizza - Guide to Computer Network Security 22