SlideShare a Scribd company logo
1 of 18
Download to read offline
Intrusion Detection
Intrusion Detection
System
System
Intrusion and Intrusion
Intrusion and Intrusion
Detection
Detection
 Intrusion : Attempting to break into or
Intrusion : Attempting to break into or
misuse your system.
misuse your system.
 Intruders may be from outside the
Intruders may be from outside the
network or legitimate users of the
network or legitimate users of the
network.
network.
 Intrusion can be a physical, system or
Intrusion can be a physical, system or
remote intrusion.
remote intrusion.
Different ways to intrude
Different ways to intrude
 Buffer overflows
Buffer overflows
 Unexpected combinations
Unexpected combinations
 Unhandled input
Unhandled input
 Race conditions
Race conditions
Intrusion Detection System
Intrusion Detection System
Knowledge
Base
Response
Model
Alert
Data-
base
Event
Provider
Analysis Engine
Other
machines
Intrusion Detection
Intrusion Detection
Systems (IDS)
Systems (IDS)
 Different ways of classifying an IDS
Different ways of classifying an IDS
IDS based on
IDS based on
– anomaly detection
anomaly detection
– signature based misuse
signature based misuse
– host based
host based
– network based
network based
– Stack based
Stack based
Intrusion Detection
Intrusion Detection
Systems (IDS)
Systems (IDS)
Intrusion Detection Systems look for
Intrusion Detection Systems look for
attack signatures, which are specific
attack signatures, which are specific
patterns that usually indicate malicious
patterns that usually indicate malicious
or suspicious intent.
or suspicious intent.
Anomaly based IDS
Anomaly based IDS
 This IDS models the normal usage of
This IDS models the normal usage of
the network as a noise
the network as a noise
characterization.
characterization.
 Anything distinct from the noise is
Anything distinct from the noise is
assumed to be an intrusion activity.
assumed to be an intrusion activity.
– E.g flooding a host with lots of packet.
E.g flooding a host with lots of packet.
 The primary strength is its ability to
The primary strength is its ability to
recognize novel attacks.
recognize novel attacks.
Drawbacks of Anomaly
Drawbacks of Anomaly
detection IDS
detection IDS
 Assumes that intrusions will be
Assumes that intrusions will be
accompanied by manifestations that are
accompanied by manifestations that are
sufficiently unusual so as to permit
sufficiently unusual so as to permit
detection.
detection.
 These generate many false alarms and
These generate many false alarms and
hence compromise the effectiveness of the
hence compromise the effectiveness of the
IDS.
IDS.
Signature based IDS
Signature based IDS
 This IDS possess an attacked
This IDS possess an attacked
description that can be matched to
description that can be matched to
sensed attack manifestations.
sensed attack manifestations.
 The question of what information is
The question of what information is
relevant to an IDS depends upon what
relevant to an IDS depends upon what
it is trying to detect.
it is trying to detect.
– E.g DNS, FTP etc.
E.g DNS, FTP etc.
Signature based IDS
Signature based IDS
(contd.)
(contd.)
 ID system is programmed to interpret a certain
ID system is programmed to interpret a certain
series of packets, or a certain piece of data
series of packets, or a certain piece of data
contained in those packets,as an attack. For
contained in those packets,as an attack. For
example, an IDS that watches web servers might
example, an IDS that watches web servers might
be programmed to look for the string “phf” as an
be programmed to look for the string “phf” as an
indicator of a CGI program attack.
indicator of a CGI program attack.
 Most signature analysis systems are based off of
Most signature analysis systems are based off of
simple pattern matching algorithms. In most cases,
simple pattern matching algorithms. In most cases,
the IDS simply looks for a sub string within a stream
the IDS simply looks for a sub string within a stream
of data carried by network packets. When it finds
of data carried by network packets. When it finds
this sub string (for example, the ``phf'' in ``GET /cgi-
this sub string (for example, the ``phf'' in ``GET /cgi-
bin/phf?''), it identifies those network packets as
bin/phf?''), it identifies those network packets as
vehicles of an attack.
vehicles of an attack.
Drawbacks of Signature
Drawbacks of Signature
based IDS
based IDS
 They are unable to detect novel
They are unable to detect novel
attacks.
attacks.
 Suffer from false alarms
Suffer from false alarms
 Have to programmed again for every
Have to programmed again for every
new pattern to be detected.
new pattern to be detected.
Host/Applications based
Host/Applications based
IDS
IDS
 The host operating system or the
The host operating system or the
application logs in the audit
application logs in the audit
information.
information.
 These audit information includes
These audit information includes
events like the use of identification and
events like the use of identification and
authentication mechanisms (logins
authentication mechanisms (logins
etc.) , file opens and program
etc.) , file opens and program
executions, admin activities etc.
executions, admin activities etc.
 This audit is then analyzed to detect
This audit is then analyzed to detect
trails of intrusion.
trails of intrusion.
Drawbacks of the host
Drawbacks of the host
based IDS
based IDS
 The kind of information needed to be
The kind of information needed to be
logged in is a matter of experience.
logged in is a matter of experience.
 Unselective logging of messages may
Unselective logging of messages may
greatly increase the audit and analysis
greatly increase the audit and analysis
burdens.
burdens.
 Selective logging runs the risk that
Selective logging runs the risk that
attack manifestations could be missed.
attack manifestations could be missed.
Strengths of the host
Strengths of the host
based IDS
based IDS
 Attack verification
Attack verification
 System specific activity
System specific activity
 Encrypted and switch environments
Encrypted and switch environments
 Monitoring key components
Monitoring key components
 Near Real-Time detection and
Near Real-Time detection and
response.
response.
 No additional hardware
No additional hardware
Stack based IDS
Stack based IDS
 They are integrated closely with the
They are integrated closely with the
TCP/IP stack, allowing packets to be
TCP/IP stack, allowing packets to be
watched as they traverse their way up
watched as they traverse their way up
the OSI layers.
the OSI layers.
 This allows the IDS to pull the packets
This allows the IDS to pull the packets
from the stack before the OS or the
from the stack before the OS or the
application have a chance to process
application have a chance to process
the packets.
the packets.
Network based IDS
Network based IDS
 This IDS looks for attack signatures in
This IDS looks for attack signatures in
network traffic via a promiscuous
network traffic via a promiscuous
interface.
interface.
 A filter is usually applied to determine
A filter is usually applied to determine
which traffic will be discarded or
which traffic will be discarded or
passed on to an attack recognition
passed on to an attack recognition
module. This helps to filter out known
module. This helps to filter out known
un-malicious traffic.
un-malicious traffic.
Strengths of Network
Strengths of Network
based IDS
based IDS
 Cost of ownership reduced
Cost of ownership reduced
 Packet analysis
Packet analysis
 Evidence removal
Evidence removal
 Real time detection and response
Real time detection and response
 Malicious intent detection
Malicious intent detection
 Complement and verification
Complement and verification
 Operating system independence
Operating system independence
Future of IDS
Future of IDS
 To integrate the network and host
To integrate the network and host
based IDS for better detection.
based IDS for better detection.
 Developing IDS schemes for detecting
Developing IDS schemes for detecting
novel attacks rather than individual
novel attacks rather than individual
instantiations.
instantiations.

More Related Content

Similar to Chapter 3- Intrusion Detection.pdf

Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1whitehat 'People'
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptxAnonymousEImkf6RGdQ
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention MohammedAlmuhaimeed
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortDisha Bedi
 
L5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxL5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxRebeccaMunasheChimhe
 
Intrusion Detection in WLANs
Intrusion Detection in WLANsIntrusion Detection in WLANs
Intrusion Detection in WLANsronrulzzz
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsPaul Green
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionProgrammer
 
Information Security.pptx
Information Security.pptxInformation Security.pptx
Information Security.pptxDrRajapraveen
 
Bro Policy Assignment
Bro Policy AssignmentBro Policy Assignment
Bro Policy AssignmentTara Hardin
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)shraddha_b
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxRineri1
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Wail Hassan
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotVi Tính Hoàng Nam
 

Similar to Chapter 3- Intrusion Detection.pdf (20)

Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
Snort IDS/IPS Basics
Snort IDS/IPS BasicsSnort IDS/IPS Basics
Snort IDS/IPS Basics
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptx
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
L5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxL5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptx
 
Ids vs ips
Ids vs ipsIds vs ips
Ids vs ips
 
Intrusion Detection in WLANs
Intrusion Detection in WLANsIntrusion Detection in WLANs
Intrusion Detection in WLANs
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Information Security.pptx
Information Security.pptxInformation Security.pptx
Information Security.pptx
 
Bro Policy Assignment
Bro Policy AssignmentBro Policy Assignment
Bro Policy Assignment
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptx
 
arun.ppt
arun.pptarun.ppt
arun.ppt
 
Ids
IdsIds
Ids
 
arun.ppt
arun.pptarun.ppt
arun.ppt
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypot
 

More from AmanuelZewdie4

Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxAmanuelZewdie4
 
Chapter 7 Other Emerging Technologies.pptx
Chapter 7  Other Emerging Technologies.pptxChapter 7  Other Emerging Technologies.pptx
Chapter 7 Other Emerging Technologies.pptxAmanuelZewdie4
 
Chapter Introduction to Modular Programming.ppt
Chapter Introduction to Modular Programming.pptChapter Introduction to Modular Programming.ppt
Chapter Introduction to Modular Programming.pptAmanuelZewdie4
 
Chapter 3 Telecom Sys.pptx
Chapter 3  Telecom Sys.pptxChapter 3  Telecom Sys.pptx
Chapter 3 Telecom Sys.pptxAmanuelZewdie4
 
Chapter 3 Software.ppt
Chapter 3 Software.pptChapter 3 Software.ppt
Chapter 3 Software.pptAmanuelZewdie4
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptxAmanuelZewdie4
 
Chapter 5 - Augmented Reality.pptx
Chapter 5 - Augmented Reality.pptxChapter 5 - Augmented Reality.pptx
Chapter 5 - Augmented Reality.pptxAmanuelZewdie4
 
chapter 6 Satellite Systems.pptx
chapter 6 Satellite Systems.pptxchapter 6 Satellite Systems.pptx
chapter 6 Satellite Systems.pptxAmanuelZewdie4
 

More from AmanuelZewdie4 (10)

Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
Chapter-7.pptx
Chapter-7.pptxChapter-7.pptx
Chapter-7.pptx
 
lecture04.ppt
lecture04.pptlecture04.ppt
lecture04.ppt
 
Chapter 7 Other Emerging Technologies.pptx
Chapter 7  Other Emerging Technologies.pptxChapter 7  Other Emerging Technologies.pptx
Chapter 7 Other Emerging Technologies.pptx
 
Chapter Introduction to Modular Programming.ppt
Chapter Introduction to Modular Programming.pptChapter Introduction to Modular Programming.ppt
Chapter Introduction to Modular Programming.ppt
 
Chapter 3 Telecom Sys.pptx
Chapter 3  Telecom Sys.pptxChapter 3  Telecom Sys.pptx
Chapter 3 Telecom Sys.pptx
 
Chapter 3 Software.ppt
Chapter 3 Software.pptChapter 3 Software.ppt
Chapter 3 Software.ppt
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
Chapter 5 - Augmented Reality.pptx
Chapter 5 - Augmented Reality.pptxChapter 5 - Augmented Reality.pptx
Chapter 5 - Augmented Reality.pptx
 
chapter 6 Satellite Systems.pptx
chapter 6 Satellite Systems.pptxchapter 6 Satellite Systems.pptx
chapter 6 Satellite Systems.pptx
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

Chapter 3- Intrusion Detection.pdf

  • 2. Intrusion and Intrusion Intrusion and Intrusion Detection Detection  Intrusion : Attempting to break into or Intrusion : Attempting to break into or misuse your system. misuse your system.  Intruders may be from outside the Intruders may be from outside the network or legitimate users of the network or legitimate users of the network. network.  Intrusion can be a physical, system or Intrusion can be a physical, system or remote intrusion. remote intrusion.
  • 3. Different ways to intrude Different ways to intrude  Buffer overflows Buffer overflows  Unexpected combinations Unexpected combinations  Unhandled input Unhandled input  Race conditions Race conditions
  • 4. Intrusion Detection System Intrusion Detection System Knowledge Base Response Model Alert Data- base Event Provider Analysis Engine Other machines
  • 5. Intrusion Detection Intrusion Detection Systems (IDS) Systems (IDS)  Different ways of classifying an IDS Different ways of classifying an IDS IDS based on IDS based on – anomaly detection anomaly detection – signature based misuse signature based misuse – host based host based – network based network based – Stack based Stack based
  • 6. Intrusion Detection Intrusion Detection Systems (IDS) Systems (IDS) Intrusion Detection Systems look for Intrusion Detection Systems look for attack signatures, which are specific attack signatures, which are specific patterns that usually indicate malicious patterns that usually indicate malicious or suspicious intent. or suspicious intent.
  • 7. Anomaly based IDS Anomaly based IDS  This IDS models the normal usage of This IDS models the normal usage of the network as a noise the network as a noise characterization. characterization.  Anything distinct from the noise is Anything distinct from the noise is assumed to be an intrusion activity. assumed to be an intrusion activity. – E.g flooding a host with lots of packet. E.g flooding a host with lots of packet.  The primary strength is its ability to The primary strength is its ability to recognize novel attacks. recognize novel attacks.
  • 8. Drawbacks of Anomaly Drawbacks of Anomaly detection IDS detection IDS  Assumes that intrusions will be Assumes that intrusions will be accompanied by manifestations that are accompanied by manifestations that are sufficiently unusual so as to permit sufficiently unusual so as to permit detection. detection.  These generate many false alarms and These generate many false alarms and hence compromise the effectiveness of the hence compromise the effectiveness of the IDS. IDS.
  • 9. Signature based IDS Signature based IDS  This IDS possess an attacked This IDS possess an attacked description that can be matched to description that can be matched to sensed attack manifestations. sensed attack manifestations.  The question of what information is The question of what information is relevant to an IDS depends upon what relevant to an IDS depends upon what it is trying to detect. it is trying to detect. – E.g DNS, FTP etc. E.g DNS, FTP etc.
  • 10. Signature based IDS Signature based IDS (contd.) (contd.)  ID system is programmed to interpret a certain ID system is programmed to interpret a certain series of packets, or a certain piece of data series of packets, or a certain piece of data contained in those packets,as an attack. For contained in those packets,as an attack. For example, an IDS that watches web servers might example, an IDS that watches web servers might be programmed to look for the string “phf” as an be programmed to look for the string “phf” as an indicator of a CGI program attack. indicator of a CGI program attack.  Most signature analysis systems are based off of Most signature analysis systems are based off of simple pattern matching algorithms. In most cases, simple pattern matching algorithms. In most cases, the IDS simply looks for a sub string within a stream the IDS simply looks for a sub string within a stream of data carried by network packets. When it finds of data carried by network packets. When it finds this sub string (for example, the ``phf'' in ``GET /cgi- this sub string (for example, the ``phf'' in ``GET /cgi- bin/phf?''), it identifies those network packets as bin/phf?''), it identifies those network packets as vehicles of an attack. vehicles of an attack.
  • 11. Drawbacks of Signature Drawbacks of Signature based IDS based IDS  They are unable to detect novel They are unable to detect novel attacks. attacks.  Suffer from false alarms Suffer from false alarms  Have to programmed again for every Have to programmed again for every new pattern to be detected. new pattern to be detected.
  • 12. Host/Applications based Host/Applications based IDS IDS  The host operating system or the The host operating system or the application logs in the audit application logs in the audit information. information.  These audit information includes These audit information includes events like the use of identification and events like the use of identification and authentication mechanisms (logins authentication mechanisms (logins etc.) , file opens and program etc.) , file opens and program executions, admin activities etc. executions, admin activities etc.  This audit is then analyzed to detect This audit is then analyzed to detect trails of intrusion. trails of intrusion.
  • 13. Drawbacks of the host Drawbacks of the host based IDS based IDS  The kind of information needed to be The kind of information needed to be logged in is a matter of experience. logged in is a matter of experience.  Unselective logging of messages may Unselective logging of messages may greatly increase the audit and analysis greatly increase the audit and analysis burdens. burdens.  Selective logging runs the risk that Selective logging runs the risk that attack manifestations could be missed. attack manifestations could be missed.
  • 14. Strengths of the host Strengths of the host based IDS based IDS  Attack verification Attack verification  System specific activity System specific activity  Encrypted and switch environments Encrypted and switch environments  Monitoring key components Monitoring key components  Near Real-Time detection and Near Real-Time detection and response. response.  No additional hardware No additional hardware
  • 15. Stack based IDS Stack based IDS  They are integrated closely with the They are integrated closely with the TCP/IP stack, allowing packets to be TCP/IP stack, allowing packets to be watched as they traverse their way up watched as they traverse their way up the OSI layers. the OSI layers.  This allows the IDS to pull the packets This allows the IDS to pull the packets from the stack before the OS or the from the stack before the OS or the application have a chance to process application have a chance to process the packets. the packets.
  • 16. Network based IDS Network based IDS  This IDS looks for attack signatures in This IDS looks for attack signatures in network traffic via a promiscuous network traffic via a promiscuous interface. interface.  A filter is usually applied to determine A filter is usually applied to determine which traffic will be discarded or which traffic will be discarded or passed on to an attack recognition passed on to an attack recognition module. This helps to filter out known module. This helps to filter out known un-malicious traffic. un-malicious traffic.
  • 17. Strengths of Network Strengths of Network based IDS based IDS  Cost of ownership reduced Cost of ownership reduced  Packet analysis Packet analysis  Evidence removal Evidence removal  Real time detection and response Real time detection and response  Malicious intent detection Malicious intent detection  Complement and verification Complement and verification  Operating system independence Operating system independence
  • 18. Future of IDS Future of IDS  To integrate the network and host To integrate the network and host based IDS for better detection. based IDS for better detection.  Developing IDS schemes for detecting Developing IDS schemes for detecting novel attacks rather than individual novel attacks rather than individual instantiations. instantiations.