SlideShare a Scribd company logo
1 of 26
Download to read offline
NETWORK SECURITY
Name of the Staff : M.FLORENCE DAYANA M.C.A.,M.Phil.,(Ph.D).,
Head, Dept. of CA
Bon Secours College For Women
Thanjavur.
Class : II MSc., CS
Semester : III
Unit : V
Topic : Intruders
2/15/2019 1
System Security
• systems security refers to the processes and
methodologies involved with keeping
information confidential, available, and assuring
its integrity.
• It also refers to: Access controls, which prevent
unauthorized personnel from entering or
accessing a system.
Intruders
• An Intruder is a person who attempts to
gain unauthorized access to a system, to
damage that system, or to disturb data.
• significant issue for networked systems is
hostile(dislike) or unwanted access,
trespass(enter without permission) being
unauthorized login or by software such as
a virus, worm, or Trojan horse.
• either via network or local or remote user
• Types of intruders:
– Masquerader- An individual who is not authorized to
use the computer (outsider)
– Misfeasor- authentic user doing unauthorized
actions. A legitimate user who accesses unauthorized
data, programs, or resources (insider)
– Clandestine(confidential)user- : An individual who
seizes supervisory control of the system and uses this
control to evade auditing and access controls or to
suppress audit collection (either)
Intrusion Techniques
• The basic aim is to gain access and/or
increase privileges on some system.
• basic attack methodology is taken from
– target acquisition and information gathering
– initial access
– privilege escalation (rise)
– covering tracks
• key goal often is to acquire a user (preferably
administrator) password
• so the attacker can login and exercise
all the access rights of the account owner.
Password Guessing
• one of the most common attack is password
guessing
• attacker knows a login (from email/web page etc)
• then attempts to guess password for it
– defaults, short passwords, common word searches
– user info (variations on names, birthday, phone, common
words/interests)
– exhaustively searching all possible passwords
• check by login or against stolen password file
• success depends on password chosen by user
• surveys show many users choose poorly
Password Capture
• another attack involves password capture
– watching over shoulder as password is entered
– using a trojan horse program eg. game program
– monitoring an insecure network login
– extracting recorded info after successful login
(web history/cache, last number dialed etc)
• using valid login/password can impersonate user
• users need to be educated to use suitable
precautions/countermeasures
Intrusion Detection
• Intrusions are the activities that violate the
security policy of system
• Intrusion Detection is the process used to
identify intrusions(ie).,
– block if detected quickly (block access & minimize
damage)
– act as deterrent (can collect info on intruders to
improve future security)
• Intrusion detection is based on the assumption that the
behavior of the intruder differs from that of a legitimate
user in ways that can be quantified
Approaches to Intrusion Detection
• Statistical anomaly detection- collect data relating
to the behavior of legitimate users, then use
statistical tests to determine with a high level of
confidence whether new behavior is legitimate user
behavior or not.
-Threshold(entry)-define thresholds,
independent of user, for the frequency of
occurrence of events.
-Profile based-develop profile of activity of each
user and use to detect changes in the behavior
• Rule-based detection-attempt to define a set
of rules used to decide if given behavior is an
intruder.
• There are two types,
– Anomaly(abnormal)-rules detect deviation from
previous usage patterns
– Penetration(entry -action) identification-expert
system approach that searches for suspicious
behavior(doubt)
Audit Records
• A fundamental tool for intrusion detection is
the audit record.
• Some record of ongoing activity by users must
be maintained as input to an intrusion
detection system.
• There are two types of records:
1.Native audit records
2.Detection-specific audit records
Audit Record Analysis
• An analysis of audit records over a period of
time can be used to determine the activity
profile of the average user.
• Then current audit records are used as input
to detect intrusion, by analyzing incoming
audit records to determine deviation from
average behavior.
• Example:
Counter-times of logins, command executed during a
single user session, number of password failures,
Gauge-the number of logical connections assigned to
a user application
Interval timer-the length of time between successive
logins to an account,
Resource Utilization-number of pages printed
during a user session
• Using the examples,
various tests can be performed to determine
whether current activities fit within
acceptable limits.
• • Mean and standard deviation.
• • Multivariate
• • Markov process
• • Time series
• • Operational
Base-Rate Fallacy
• practically an intrusion detection system needs to
detect a substantial percentage of intrusions with
few false alarms
– if few intrusions detected -> the system provides a
false sense of security
– If the system frequently triggers an alert when there is
no intrusion (a false alarm), then either system
managers will begin to ignore the alarms.
Distributed Intrusion Detection
• traditional focus is on single systems
• but typically have networked systems
• more effective defense can be achieved by
coordination and cooperation among
intrusion detection systems across the
network.
Deisgn Issuses
– integrity & confidentiality of networked data
– centralized or decentralized architecture
Distributed Intrusion Detection -
Architecture
There are 3 components:
1.Host agent module
-audit collection
module operating as a
background process on a
monitored system
2. LAN monitor agent module
-like a host agent
module except it analyzes LAN
traffic
3.Central manager module
-Receives reports from
LAN monitor and host agents
and processes and correlates
these reports to detect intrusion
Distributed Intrusion Detection – Agent Implementation
•The agent captures each native O/S
audit record, & applies a filter that
retains only records of security interest.
•These records are then reformatted
into a standardized format (HAR).
•Then a template-driven logic module
analyzes the records for suspicious
activity. When suspicious activity is
detected, an alert is sent to the central
manager.
•The central manager includes an
expert system that can draw inferences
from received data.
•The manager may also query
individual systems for copies of HARs
to correlate with those from other
agents.
Honeypots
• a honeypot is a computer security mechanism set to
detect, deflect, or, in some manner, counteract
attempts at unauthorized use of information systems.
• Honeypots are decoy systems to lure attackers away
from accessing critical systems
– to collect information about the attacker’s activity
– to encourage attacker to stay on system so administrator can
respond
• These pots are filled with fabricated information
designed to valuable.
• instrumented to collect detailed information on
attackers activities
• single or multiple networked systems
Password Studies
• Password length is only part of the problem, since
many people pick a password that is guessable, such
as their own name, their street name, a common
dictionary word, and so forth. This makes the job of
password cracking straightforward.
• In 1992 - many short passwords (ie) easly searchable
• In 1990 - many guessable passwords
• conclusion is that users choose poor passwords too
often
• A strategy is needed to force users to select
passwords that are difficult to guess.
Password Management
• front-line of defense against intruders is the
password system.
• where a user provides a name/login identifier
(ID) and a password
• Passwords are usually stored in encrypted.
• Unix systems uses multiple DES
– more recent operating systems use cryptographic
hash function
Managing Passwords - Education
• Goal is to eliminate guessable passwords while
allowing user to select a memorable password
• Four basic techniques are in use: education,
computer generation, reactive checking(regular
check up) & proactive checking.(random using
method)
• can use policies and good user education
• educate on importance of good passwords
• give guidelines for good passwords
– minimum length (>6)
– require a mix of upper & lower case letters, numbers,
punctuation
– not dictionary words
• but likely to be ignored by many users
Managing Passwords - Computer Generated
• Computer-generated passwords create a
password for the user, but have problems
• if password is random likely not memorisable,
so will be written down
• even pronounceable not remembered
• In general, computer-generated password
schemes have a history of poor acceptance by
users
Managing Passwords - Reactive Checking(regular Check
up)
• A reactive password checking strategy is one
in which the system periodically runs its own
password cracker to find guessable passwords
• The system cancels any passwords that are
guessed and notifies the user.
• any existing passwords remain vulnerable until
the reactive password checker finds them.
Managing Passwords - Proactive Checking(Random
Check)
• most promising approach to improving
password security is a proactive password
checker.
• User is allowed to select his own password,
but have system verify it is acceptable or
rejects.
– simple rule enforcement
– Compile a large dictionary of “bad” passwords
And check the password is disapproved list.
– use algorithmic (markov model or bloom filter) to
detect poor choices

More Related Content

What's hot

Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key CryptosystemDevakumar Kp
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanismsRajapriya82
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itlavakumar Thatisetti
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 

What's hot (20)

Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Cryptography
CryptographyCryptography
Cryptography
 
Web Security
Web SecurityWeb Security
Web Security
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
IP Security
IP SecurityIP Security
IP Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Email security
Email securityEmail security
Email security
 
message passing
 message passing message passing
message passing
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
S/MIME
S/MIMES/MIME
S/MIME
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
Key management
Key managementKey management
Key management
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 

Similar to Intruders

Similar to Intruders (20)

ch18 ABCD.pdf
ch18 ABCD.pdfch18 ABCD.pdf
ch18 ABCD.pdf
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
 
Cs8792 cns - unit v
Cs8792   cns - unit vCs8792   cns - unit v
Cs8792 cns - unit v
 
ch08.ppt
ch08.pptch08.ppt
ch08.ppt
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.ppt
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
Penetration Testing.pptx
Penetration Testing.pptxPenetration Testing.pptx
Penetration Testing.pptx
 
Network Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. ShivashankarNetwork Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. Shivashankar
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Unit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptxUnit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptx
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 
Ch18
Ch18Ch18
Ch18
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Attackers process
Attackers processAttackers process
Attackers process
 
basic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptbasic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.ppt
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Unit-5.pptx
Unit-5.pptxUnit-5.pptx
Unit-5.pptx
 

More from Dr.Florence Dayana

Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.Florence Dayana
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.Florence Dayana
 
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptxM. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptxDr.Florence Dayana
 
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfM. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfDr.Florence Dayana
 
M.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfM.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfDr.Florence Dayana
 
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdfM. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdfDr.Florence Dayana
 
Professional English - Reading
Professional English - ReadingProfessional English - Reading
Professional English - ReadingDr.Florence Dayana
 
Professional English - Speaking
Professional English - SpeakingProfessional English - Speaking
Professional English - SpeakingDr.Florence Dayana
 
Professional English - Listening
Professional English - ListeningProfessional English - Listening
Professional English - ListeningDr.Florence Dayana
 
Network Security- Secure Socket Layer
Network Security- Secure Socket LayerNetwork Security- Secure Socket Layer
Network Security- Secure Socket LayerDr.Florence Dayana
 
M.florence dayana dream weaver
M.florence dayana   dream weaverM.florence dayana   dream weaver
M.florence dayana dream weaverDr.Florence Dayana
 
M.florence dayana computer networks transport layer
M.florence dayana   computer networks transport layerM.florence dayana   computer networks transport layer
M.florence dayana computer networks transport layerDr.Florence Dayana
 
M.Florence Dayana Computer Networks Types
M.Florence Dayana  Computer Networks TypesM.Florence Dayana  Computer Networks Types
M.Florence Dayana Computer Networks TypesDr.Florence Dayana
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks IntroductionDr.Florence Dayana
 
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMM. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMDr.Florence Dayana
 
M.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C LanguageM.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C LanguageDr.Florence Dayana
 
M.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network securityM.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network securityDr.Florence Dayana
 

More from Dr.Florence Dayana (20)

Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
 
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptxM. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
 
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfM. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
 
M.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfM.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdf
 
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdfM. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
 
Professional English - Reading
Professional English - ReadingProfessional English - Reading
Professional English - Reading
 
Professional English - Speaking
Professional English - SpeakingProfessional English - Speaking
Professional English - Speaking
 
Professional English - Listening
Professional English - ListeningProfessional English - Listening
Professional English - Listening
 
INPUT AND OUTPUT DEVICES.pdf
INPUT  AND OUTPUT DEVICES.pdfINPUT  AND OUTPUT DEVICES.pdf
INPUT AND OUTPUT DEVICES.pdf
 
NETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptxNETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptx
 
Network Security- Secure Socket Layer
Network Security- Secure Socket LayerNetwork Security- Secure Socket Layer
Network Security- Secure Socket Layer
 
M.florence dayana dream weaver
M.florence dayana   dream weaverM.florence dayana   dream weaver
M.florence dayana dream weaver
 
M.florence dayana computer networks transport layer
M.florence dayana   computer networks transport layerM.florence dayana   computer networks transport layer
M.florence dayana computer networks transport layer
 
M.Florence Dayana Computer Networks Types
M.Florence Dayana  Computer Networks TypesM.Florence Dayana  Computer Networks Types
M.Florence Dayana Computer Networks Types
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks Introduction
 
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMM. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
 
M.Florence Dayana
M.Florence DayanaM.Florence Dayana
M.Florence Dayana
 
M.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C LanguageM.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C Language
 
M.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network securityM.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network security
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

Intruders

  • 1. NETWORK SECURITY Name of the Staff : M.FLORENCE DAYANA M.C.A.,M.Phil.,(Ph.D)., Head, Dept. of CA Bon Secours College For Women Thanjavur. Class : II MSc., CS Semester : III Unit : V Topic : Intruders 2/15/2019 1
  • 2. System Security • systems security refers to the processes and methodologies involved with keeping information confidential, available, and assuring its integrity. • It also refers to: Access controls, which prevent unauthorized personnel from entering or accessing a system.
  • 3. Intruders • An Intruder is a person who attempts to gain unauthorized access to a system, to damage that system, or to disturb data. • significant issue for networked systems is hostile(dislike) or unwanted access, trespass(enter without permission) being unauthorized login or by software such as a virus, worm, or Trojan horse. • either via network or local or remote user
  • 4. • Types of intruders: – Masquerader- An individual who is not authorized to use the computer (outsider) – Misfeasor- authentic user doing unauthorized actions. A legitimate user who accesses unauthorized data, programs, or resources (insider) – Clandestine(confidential)user- : An individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection (either)
  • 5. Intrusion Techniques • The basic aim is to gain access and/or increase privileges on some system. • basic attack methodology is taken from – target acquisition and information gathering – initial access – privilege escalation (rise) – covering tracks • key goal often is to acquire a user (preferably administrator) password • so the attacker can login and exercise all the access rights of the account owner.
  • 6. Password Guessing • one of the most common attack is password guessing • attacker knows a login (from email/web page etc) • then attempts to guess password for it – defaults, short passwords, common word searches – user info (variations on names, birthday, phone, common words/interests) – exhaustively searching all possible passwords • check by login or against stolen password file • success depends on password chosen by user • surveys show many users choose poorly
  • 7. Password Capture • another attack involves password capture – watching over shoulder as password is entered – using a trojan horse program eg. game program – monitoring an insecure network login – extracting recorded info after successful login (web history/cache, last number dialed etc) • using valid login/password can impersonate user • users need to be educated to use suitable precautions/countermeasures
  • 8. Intrusion Detection • Intrusions are the activities that violate the security policy of system • Intrusion Detection is the process used to identify intrusions(ie)., – block if detected quickly (block access & minimize damage) – act as deterrent (can collect info on intruders to improve future security) • Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified
  • 9. Approaches to Intrusion Detection • Statistical anomaly detection- collect data relating to the behavior of legitimate users, then use statistical tests to determine with a high level of confidence whether new behavior is legitimate user behavior or not. -Threshold(entry)-define thresholds, independent of user, for the frequency of occurrence of events. -Profile based-develop profile of activity of each user and use to detect changes in the behavior
  • 10. • Rule-based detection-attempt to define a set of rules used to decide if given behavior is an intruder. • There are two types, – Anomaly(abnormal)-rules detect deviation from previous usage patterns – Penetration(entry -action) identification-expert system approach that searches for suspicious behavior(doubt)
  • 11. Audit Records • A fundamental tool for intrusion detection is the audit record. • Some record of ongoing activity by users must be maintained as input to an intrusion detection system. • There are two types of records: 1.Native audit records 2.Detection-specific audit records
  • 12.
  • 13. Audit Record Analysis • An analysis of audit records over a period of time can be used to determine the activity profile of the average user. • Then current audit records are used as input to detect intrusion, by analyzing incoming audit records to determine deviation from average behavior.
  • 14. • Example: Counter-times of logins, command executed during a single user session, number of password failures, Gauge-the number of logical connections assigned to a user application Interval timer-the length of time between successive logins to an account, Resource Utilization-number of pages printed during a user session
  • 15. • Using the examples, various tests can be performed to determine whether current activities fit within acceptable limits. • • Mean and standard deviation. • • Multivariate • • Markov process • • Time series • • Operational
  • 16. Base-Rate Fallacy • practically an intrusion detection system needs to detect a substantial percentage of intrusions with few false alarms – if few intrusions detected -> the system provides a false sense of security – If the system frequently triggers an alert when there is no intrusion (a false alarm), then either system managers will begin to ignore the alarms.
  • 17. Distributed Intrusion Detection • traditional focus is on single systems • but typically have networked systems • more effective defense can be achieved by coordination and cooperation among intrusion detection systems across the network. Deisgn Issuses – integrity & confidentiality of networked data – centralized or decentralized architecture
  • 18. Distributed Intrusion Detection - Architecture There are 3 components: 1.Host agent module -audit collection module operating as a background process on a monitored system 2. LAN monitor agent module -like a host agent module except it analyzes LAN traffic 3.Central manager module -Receives reports from LAN monitor and host agents and processes and correlates these reports to detect intrusion
  • 19. Distributed Intrusion Detection – Agent Implementation •The agent captures each native O/S audit record, & applies a filter that retains only records of security interest. •These records are then reformatted into a standardized format (HAR). •Then a template-driven logic module analyzes the records for suspicious activity. When suspicious activity is detected, an alert is sent to the central manager. •The central manager includes an expert system that can draw inferences from received data. •The manager may also query individual systems for copies of HARs to correlate with those from other agents.
  • 20. Honeypots • a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. • Honeypots are decoy systems to lure attackers away from accessing critical systems – to collect information about the attacker’s activity – to encourage attacker to stay on system so administrator can respond • These pots are filled with fabricated information designed to valuable. • instrumented to collect detailed information on attackers activities • single or multiple networked systems
  • 21. Password Studies • Password length is only part of the problem, since many people pick a password that is guessable, such as their own name, their street name, a common dictionary word, and so forth. This makes the job of password cracking straightforward. • In 1992 - many short passwords (ie) easly searchable • In 1990 - many guessable passwords • conclusion is that users choose poor passwords too often • A strategy is needed to force users to select passwords that are difficult to guess.
  • 22. Password Management • front-line of defense against intruders is the password system. • where a user provides a name/login identifier (ID) and a password • Passwords are usually stored in encrypted. • Unix systems uses multiple DES – more recent operating systems use cryptographic hash function
  • 23. Managing Passwords - Education • Goal is to eliminate guessable passwords while allowing user to select a memorable password • Four basic techniques are in use: education, computer generation, reactive checking(regular check up) & proactive checking.(random using method) • can use policies and good user education • educate on importance of good passwords • give guidelines for good passwords – minimum length (>6) – require a mix of upper & lower case letters, numbers, punctuation – not dictionary words • but likely to be ignored by many users
  • 24. Managing Passwords - Computer Generated • Computer-generated passwords create a password for the user, but have problems • if password is random likely not memorisable, so will be written down • even pronounceable not remembered • In general, computer-generated password schemes have a history of poor acceptance by users
  • 25. Managing Passwords - Reactive Checking(regular Check up) • A reactive password checking strategy is one in which the system periodically runs its own password cracker to find guessable passwords • The system cancels any passwords that are guessed and notifies the user. • any existing passwords remain vulnerable until the reactive password checker finds them.
  • 26. Managing Passwords - Proactive Checking(Random Check) • most promising approach to improving password security is a proactive password checker. • User is allowed to select his own password, but have system verify it is acceptable or rejects. – simple rule enforcement – Compile a large dictionary of “bad” passwords And check the password is disapproved list. – use algorithmic (markov model or bloom filter) to detect poor choices