Intrusion detection systems

1,438 views

Published on

Published in: Education
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,438
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
84
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Intrusion detection systems

  1. 1. Presented by:Nazir AhmadEnroll No.: 110215
  2. 2. Contentsi. Introductionii. Process Modeliii. Terminologyiv. Detection Methodologiesv. Basic components and the Architecturevi. Types of IDSvii. Efficiency Metricsviii. References
  3. 3. IntroductionAn Intrusion Detection System is a device or softwareapplication that monitors network or system activitiesfor malicious activities or policy violations andproduces reports to management station
  4. 4. Simple Process Model for ID
  5. 5. Terminology• Alert/Alarm: A signal suggesting that a system hasbeen or is being attacked.• True Positive: A legitimate attack which triggers anIDS to produce an alarm.• False Positive: An event signaling an IDS toproduce an alarm when no attack has taken place.• False Negative: A failure of an IDS to detect anactual attack.• True Negative: When no attack has taken place andno alarm is raised.
  6. 6. Detection MethodologiesIDS generally use two primary classes ofMethodologies to Detect an intrusion1. Signature -based Detection2. Behavior-based Detection
  7. 7. Signature-based IDo A signature is a pattern that corresponds to aknown threat. Signature-based detection is theprocess of comparing signatures against observedevents to identify possible incidents.o Also known as Misuse Intrusion Detection andknowledge base Intrusion Detection.
  8. 8. Behavior-based IDo Behavior-based intrusion-detection techniquesassume that an intrusion can be detected byobserving a deviation from the normal or expectedbehavior of the system or the users.o Also called as Anomaly-based Intrusion Detection.
  9. 9. Components of a typical IDS Components: Sensors, Analyzers, Database Server and User Interface. • Sensor or Agent: sensors are responsible for collection of data. They continuously monitor the activity. The term “sensor” is typically used for IDSs that monitor the networks and network behavior analysis technologies. The term “agent” is used for host-based IDSs . • Analyzers: it receives information from the sensors and analyses them to determine if an intrusion has occurred.
  10. 10. IDS components contd…… • Database Server: A database server is a repository for event information recorded by sensors, agents, and/or Analyzers. • User Interface/Console: A console is a program that provides an interface for the IDS’s users and administrators. Console software is typically installed onto standard desktop or laptop computers.
  11. 11. Basic Architecture
  12. 12. Example
  13. 13. Types of IDS• Host Intrusion Detection System (HIDS), whichmonitors the characteristics of a single host and theevents occurring within that host for suspiciousactivity.•Network Intrusion Detection (NIDS), whichidentifies intrusions by examining network traffic andmonitors multiple hosts.
  14. 14. Efficiency of IDSAccuracy: Accuracy deals with the proper detection of attacksand the absence of false alarms. Inaccuracy occurs when anintrusion-detection system flags a legitimate action in theenvironment as anomalous or intrusive.Performance: The performance of an intrusion-detection systemis the rate at which audit events are processed. If the performanceof the intrusion-detection system is poor, then real-time detectionis not possible.Completeness: Completeness is the property of an intrusion-detection system to detect all attacks. Incompleteness occurs
  15. 15. Referencesi. Books/papers•Guide to Intrusion Detection and Prevention Systems (IDPS), NISTSpecial Publications USA, Karen Scarfone and Peter Mell•An Introduction to Intrusion-Detection Systems, IBM Research and ZurichResearch Laboratory, Herve Debar• An overview to Software Architecture in Intrusion Detection System,Department of Computer Engineering I.A.U. Booshehr Branch Iran,Mehdi Bahrami and Mohammad Bahrami.•Next Generation Intrusion Detection Systems, McAfee Network SecurityTechnologies Group, Dr. Fengmin Gongii. Internet• www.wikipedia.org• www.intursiondetectionsystem.org• www.sans.org

×