SlideShare a Scribd company logo
1 of 26
INTRODUCTION
Question:
How would you define an intrusion?
CUIT420:
CYBER SECURITY
MS CHIMHENO
rchimheno@cut.ac.zw
Office: E-12
L5A – INTRUSION DETECTION SYSTEMS (IDS)
LEARNING OUTCOMES
At the end of this lecture students should be able to:
 Explain IDS
 Describe the ways to detect an intrusion
 Describe the types of Intrusion Detection Systems
INTRUSION DETECTION SYSTEMS (IDS)
 An intrusion detection system is used to monitor and protect
networks or systems for malicious activities.
 To alert security personnel about intrusions, intrusion detection
systems are highly useful.
 IDSes are used to monitor network traffic.
 An IDS is also referred to as a "packet-sniffer," which intercepts
packets traveling along various communication mediums and
protocols, usually TCP/IP.
INTRUSION DETECTION SYSTEMS (IDS)
What IDS does -
 An IDS checks for suspicious activities.
 It notifies the administrator about intrusions immediately.
 It gathers and analyzes information from within a computer or a
network, to identify the possible violations of security policy,
including unauthorized access, as well as misuse.
 It analyses packets after they are captured.
 It evaluates a suspected intrusion once it has taken place and signals
an alarm
IDS AND THEIR PLACEMENT
PURPOSE OF IDS
 The main purposes of IDSes are that they not only prevent
intrusions but also alert the administrator immediately when the
attack is still going on.
 The administrator could identify methods and techniques being
used by the intruder and also the source of attack.
HOW IDS WORKS
HOW IDS WORKS
An IDS works in the following way:
o IDSes have sensors to detect signatures and some advanced IDSes
have behavioral activity detection to determine malicious behavior.
Even if signatures don't match this activity detection system can
alert administrators about possible attacks.
o If the signature matches, then it moves to the next step or the
connections are cut down from that IP source, the packet is
dropped, and the alarm notifies the admin and the packet can be
dropped.
HOW IDS WORKS
An IDS works in the following way:
o Once the signature is matched, then sensors pass on anomaly
detection, whether the received packet or request matches or not.
o If the packet passes the anomaly stage, then stateful protocol
analysis is done.
o After that through switch the packets are passed on to the
network.
o If anything mismatches again, the connections are cut down from
that IP source, the packet is dropped, and the alarm notifies the
WAYS TO DETECT AN INTRUSION
WAYS TO DETECT AN INTRUSION
Signature Recognition
Anomaly Detection
Protocol Anomaly Detection
SIGNATURE DETECTION
 Signature recognition is also known as misuse detection.
 It tries to identify events that indicate an abuse of a system by creating
models of intrusions.
 Incoming events are compared with intrusion models to make a detection
decision.
 While creating signatures, the model must detect an attack without
disturbing the normal traffic on the system.
 The simplest form of signature recognition uses simple pattern matching to
compare the network packets against binary signatures of known attacks.
 A binary signature may be defined for a specific portion of the packet, such
as the TCP flags.
 There is a possibility that other packets that match might represent the
ANOMALY DETECTION
 Anomaly detection is otherwise called “not-use detection”.
 The model consists of a database of anomalies.
 Any event that is identified with the database in considered an anomaly.
 Any deviation from normal use is labeled an attack.
 Creating a model of normal use is the most difficult task in creating an
anomaly detector.
 In the traditional method of anomaly detection, important data is kept for
checking variations in network traffic for the model.
 However, in reality, there is less variation in network traffic and too many
statistical variations making these models imprecise; some events labeled as
anomalies might only be irregularities in network usage.
PROTOCOL ANOMALY DETECTION
 Protocol anomaly detection is based on the anomalies specific to a
protocol.
 It identifies the TCP/IP protocol specific flaws in the network.
 Protocols are created with specifications, known as RFCs, for dictating
proper use and communication.
 The pace at which the malicious signature attacker is growing is incredibly
fast. But the network protocol, in comparison, is well defined and
changing slowly. Therefore, the signature database must be updated
frequently to detect attacks.
 Protocol anomaly detection systems are easier to use because they
TYPES OF IDS
TYPES OF IDS
Network-based intrusion detection
Host-based intrusion detection
Log file monitoring
File integrity checking
NETWORK-BASED INTRUSION DETECTION
 The NIDS checks every packet entering the network for the presence of
anomalies and incorrect data.
 NIDS captures and inspects all traffic, regardless of whether it is
permitted.
 Based on the content, at either the IP or application-level, an alert is
generated.
 Network-based intrusion detection systems tend to be more distributed
than host-based IDSes. The NIDS is basically designed to identify the
anomalies at the router- and host-level.
 The mechanisms typically consist of a black box that is placed on the
network in the promiscuous mode, listening for patterns indicative of an
HOST-BASED INTRUSION DETECTION
 In the host-based system, the IDS analyzes each system's
behavior.
 The HIDS can be installed on any system ranging from a
desktop PC to a server.
 The HIDS is more versatile than the NIDS
 Host-based systems are also effective at detecting unauthorized
file modification.
 HIDS is also more platform-centric, with more focus on the
Windows OS, but there are other HIDSes for UNIX platforms.
LOG FILE MONITORING
 Log File Monitor (LFM) monitors log files created by network
services.
 The LFT IDS searches through the logs and identifies malicious
events.
 These systems look for patterns in the log files that suggest an
intrusion.
 A typical example would be parsers for HTTP server log files that
look for intruders who try well-known security holes, such as the
"phf" attack.
FILE INTEGRITY CHECKING
 These mechanisms check for Trojan horses, or files that have
otherwise been modified, indicating an intruder has already
been there, for example, Tripwire.
SYSTEM INTEGRITY VERIFIERS (SIV)
 A System Integrity Verifier (SIV) monitors system files to
determine whether an intruder has changed the files.
 Although they have limited functionality, integrity monitors can
add an additional layer of protection to other forms of intrusion
detection.
INDICATIONS OF SYSTEM INTRUSIONS
FILE SYSTEM INTRUSIONS
NETWORK INTRUSIONS
 Sudden increase in bandwidth consumption is an indication of
intrusion.
 Repeated probes of the available services on your machines.
 Connection requests from IPs other than those in the network range
are an indication that an unauthenticated user (intruder) is
attempting to connect to the network.
 You can identify repeated attempts to log in from remote machines.
 Arbitrary log data in log files indicates attempts of denial-of-service
attacks, bandwidth consumption, and distributed denial-of-service
CONCLUSION
 Describe the ways to detect an intrusion.

More Related Content

Similar to L5A - Intrusion Detection Systems.pptx

The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention MohammedAlmuhaimeed
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)Netwax Lab
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxRineri1
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1whitehat 'People'
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - IIITAMBEMAHENDRA1
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)Papun Papun
 
Intrusion detection system IDS
Intrusion detection system IDSIntrusion detection system IDS
Intrusion detection system IDSMAURICE NTAHOBARI
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMApoorv Pandey
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptxAnonymousEImkf6RGdQ
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 
Security measures for networking
Security measures for networkingSecurity measures for networking
Security measures for networkingShyam Kumar Singh
 
IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPSMinhaz A V
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionProgrammer
 

Similar to L5A - Intrusion Detection Systems.pptx (20)

The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention
 
IS-Types of IDPSs.pptx
IS-Types of IDPSs.pptxIS-Types of IDPSs.pptx
IS-Types of IDPSs.pptx
 
idps
idpsidps
idps
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptx
 
Snort IDS/IPS Basics
Snort IDS/IPS BasicsSnort IDS/IPS Basics
Snort IDS/IPS Basics
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Intrusion detection system IDS
Intrusion detection system IDSIntrusion detection system IDS
Intrusion detection system IDS
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
 
Describe firewalls
Describe firewallsDescribe firewalls
Describe firewalls
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptx
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Idps
IdpsIdps
Idps
 
Security measures for networking
Security measures for networkingSecurity measures for networking
Security measures for networking
 
IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPS
 
Ips and-ids
Ips and-idsIps and-ids
Ips and-ids
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

L5A - Intrusion Detection Systems.pptx

  • 2. CUIT420: CYBER SECURITY MS CHIMHENO rchimheno@cut.ac.zw Office: E-12 L5A – INTRUSION DETECTION SYSTEMS (IDS)
  • 3. LEARNING OUTCOMES At the end of this lecture students should be able to:  Explain IDS  Describe the ways to detect an intrusion  Describe the types of Intrusion Detection Systems
  • 4. INTRUSION DETECTION SYSTEMS (IDS)  An intrusion detection system is used to monitor and protect networks or systems for malicious activities.  To alert security personnel about intrusions, intrusion detection systems are highly useful.  IDSes are used to monitor network traffic.  An IDS is also referred to as a "packet-sniffer," which intercepts packets traveling along various communication mediums and protocols, usually TCP/IP.
  • 5. INTRUSION DETECTION SYSTEMS (IDS) What IDS does -  An IDS checks for suspicious activities.  It notifies the administrator about intrusions immediately.  It gathers and analyzes information from within a computer or a network, to identify the possible violations of security policy, including unauthorized access, as well as misuse.  It analyses packets after they are captured.  It evaluates a suspected intrusion once it has taken place and signals an alarm
  • 6. IDS AND THEIR PLACEMENT
  • 7. PURPOSE OF IDS  The main purposes of IDSes are that they not only prevent intrusions but also alert the administrator immediately when the attack is still going on.  The administrator could identify methods and techniques being used by the intruder and also the source of attack.
  • 9. HOW IDS WORKS An IDS works in the following way: o IDSes have sensors to detect signatures and some advanced IDSes have behavioral activity detection to determine malicious behavior. Even if signatures don't match this activity detection system can alert administrators about possible attacks. o If the signature matches, then it moves to the next step or the connections are cut down from that IP source, the packet is dropped, and the alarm notifies the admin and the packet can be dropped.
  • 10. HOW IDS WORKS An IDS works in the following way: o Once the signature is matched, then sensors pass on anomaly detection, whether the received packet or request matches or not. o If the packet passes the anomaly stage, then stateful protocol analysis is done. o After that through switch the packets are passed on to the network. o If anything mismatches again, the connections are cut down from that IP source, the packet is dropped, and the alarm notifies the
  • 11. WAYS TO DETECT AN INTRUSION
  • 12. WAYS TO DETECT AN INTRUSION Signature Recognition Anomaly Detection Protocol Anomaly Detection
  • 13. SIGNATURE DETECTION  Signature recognition is also known as misuse detection.  It tries to identify events that indicate an abuse of a system by creating models of intrusions.  Incoming events are compared with intrusion models to make a detection decision.  While creating signatures, the model must detect an attack without disturbing the normal traffic on the system.  The simplest form of signature recognition uses simple pattern matching to compare the network packets against binary signatures of known attacks.  A binary signature may be defined for a specific portion of the packet, such as the TCP flags.  There is a possibility that other packets that match might represent the
  • 14. ANOMALY DETECTION  Anomaly detection is otherwise called “not-use detection”.  The model consists of a database of anomalies.  Any event that is identified with the database in considered an anomaly.  Any deviation from normal use is labeled an attack.  Creating a model of normal use is the most difficult task in creating an anomaly detector.  In the traditional method of anomaly detection, important data is kept for checking variations in network traffic for the model.  However, in reality, there is less variation in network traffic and too many statistical variations making these models imprecise; some events labeled as anomalies might only be irregularities in network usage.
  • 15. PROTOCOL ANOMALY DETECTION  Protocol anomaly detection is based on the anomalies specific to a protocol.  It identifies the TCP/IP protocol specific flaws in the network.  Protocols are created with specifications, known as RFCs, for dictating proper use and communication.  The pace at which the malicious signature attacker is growing is incredibly fast. But the network protocol, in comparison, is well defined and changing slowly. Therefore, the signature database must be updated frequently to detect attacks.  Protocol anomaly detection systems are easier to use because they
  • 17. TYPES OF IDS Network-based intrusion detection Host-based intrusion detection Log file monitoring File integrity checking
  • 18. NETWORK-BASED INTRUSION DETECTION  The NIDS checks every packet entering the network for the presence of anomalies and incorrect data.  NIDS captures and inspects all traffic, regardless of whether it is permitted.  Based on the content, at either the IP or application-level, an alert is generated.  Network-based intrusion detection systems tend to be more distributed than host-based IDSes. The NIDS is basically designed to identify the anomalies at the router- and host-level.  The mechanisms typically consist of a black box that is placed on the network in the promiscuous mode, listening for patterns indicative of an
  • 19. HOST-BASED INTRUSION DETECTION  In the host-based system, the IDS analyzes each system's behavior.  The HIDS can be installed on any system ranging from a desktop PC to a server.  The HIDS is more versatile than the NIDS  Host-based systems are also effective at detecting unauthorized file modification.  HIDS is also more platform-centric, with more focus on the Windows OS, but there are other HIDSes for UNIX platforms.
  • 20. LOG FILE MONITORING  Log File Monitor (LFM) monitors log files created by network services.  The LFT IDS searches through the logs and identifies malicious events.  These systems look for patterns in the log files that suggest an intrusion.  A typical example would be parsers for HTTP server log files that look for intruders who try well-known security holes, such as the "phf" attack.
  • 21. FILE INTEGRITY CHECKING  These mechanisms check for Trojan horses, or files that have otherwise been modified, indicating an intruder has already been there, for example, Tripwire.
  • 22. SYSTEM INTEGRITY VERIFIERS (SIV)  A System Integrity Verifier (SIV) monitors system files to determine whether an intruder has changed the files.  Although they have limited functionality, integrity monitors can add an additional layer of protection to other forms of intrusion detection.
  • 23. INDICATIONS OF SYSTEM INTRUSIONS
  • 25. NETWORK INTRUSIONS  Sudden increase in bandwidth consumption is an indication of intrusion.  Repeated probes of the available services on your machines.  Connection requests from IPs other than those in the network range are an indication that an unauthenticated user (intruder) is attempting to connect to the network.  You can identify repeated attempts to log in from remote machines.  Arbitrary log data in log files indicates attempts of denial-of-service attacks, bandwidth consumption, and distributed denial-of-service
  • 26. CONCLUSION  Describe the ways to detect an intrusion.

Editor's Notes

  1. IDSes have sensors to detect signatures and some advanced IDSes have behavioral activity detection to determine malicious behavior. Even if signatures don't match this activity detection system can alert administrators about possible attacks. If the signature matches, then it moves to the next step or the connections are cut down from that IP source, the packet is dropped, and the alarm notifies the admin and the packet can be dropped. Once the signature is matched, then sensors pass on anomaly detection, whether the received packet or request matches or not. If the packet passes the anomaly stage, then stateful protocol analysis is done. After that through switch the packets are passed on to the network. If anything mismatches again, the connections are cut down from that IP source, the packet is dropped, and the alarm notifies the admin and packet can be dropped.
  2. One example of a host-based system is a program that operates on a system and receives application or operating system audit logs. These programs are highly effective for detecting insider abuses. If one of these users attempts unauthorized activity, host based systems usually detect and collect the most pertinent information promptly.
  3. For example, a basic integrity monitor uses system files, or registry keys, to track changes by an intruder.