SlideShare a Scribd company logo
Intrusion Devices
IDS & IPS Ver1.0
Created : 06 March 2015
Agenda
 Understand Intrusion detection and Purpose
 Detecting and Prevention system
 Understand Products
 Implementation Models
 Type of detections and Signature tuning
Intrusion!!!!
 Intrusion !
 Who know where is value data || (APT, Spearfishing)
 Security = visibility + control || (CIA)
 Active visibility >>Visibility is paramount to decision making
 Store information, Analysis and Reporting as retro prospective
 Mitigating the Risk: Defense in Depth
 Firewall Vs Deep packet Inspection Vs IPS
Intrusion Detection is the art of detecting inappropriate, incorrect, or anomalous activity.
Among other tools, an Intrusion Detection System can be used to determine if a computer
network or server has experienced an unauthorized intrusion.
Intrusion Detection System
 IDS || IPS
 Network Sensors - Network Based – NIDS & NIPS
 Host Agents - Host based IDS & IPS - HIPS& HIDS
 Management Consoles
 Where to place
 SIEM
 Incident Management Process
 Risk management
4
Terminologies
 Signatures explicitly define what activity should be considered malicious
 Simple pattern matching
 Protocol decode-based analysis
 Anomaly detection involves defining “normal” activity and looking for deviations
from this baseline
 False Alarms: State in which the ID system mistakenly reports a benign activity as
being malicious
 False Negative: State in which the ID system does not detect and report actual
malicious activity even though it is monitored
 IBM - PAM : X-Force Protocol Analysis Module (PAM)
Host Vs Network IDS
Cons
Network-
Based
Host-
Based
Pros
• Can verify success or failure
of attack
• Generally not impacted by
bandwidth or encryption
• Understands host context and
may be able to stop attack
• Impacts host resources
• Operating system dependent
• Scalability—Requires one
agent per host
• Protects all hosts on
monitored network
• No host impact
• Can detect network probes
and denial of service attacks
• Switched environments pose
challenges
• Monitoring >100Mbps is
currently challenging
• Generally can’t proactively
stop attacks
Promiscuous / TAP
mode: Here we can only
put the agent in
Detection mode only
even its IPS support
Inline mode: Here we can
put the agent in
Detection / Prevention
mode according to device
capability or design wise.
7
Understand products
 IBM – Proventia Hardware (G/GX) / Software- ISS have two line of product
Proventia (IPS) and real sensor (IDS), Proventia have Software version for
Linux & windows serves and Desktop along with Appliance (HW + customized
OS + Application) GX series.
 Cisco FirePower hardware and VM model , IDSM Module
 Checkpoint – IPS Blades
 Juniper – IDP Module
 McAcfee –Intrushield
 Soucrefire (Snort IDS)
Create or Edit Signature !
Concerns…
 Return on investment based on visibility, control, and uptime.
 Greatest risk comes from insider threats. Disgruntled employees, curious
employees, outsourced services, and the trends of greater volumes of
contracted services provide a higher level of vulnerability from within the
network
 a known fact is that current IDS implementations have a tendency to drop
packets due to the high throughput of today’s high bandwidth network
devices
 most IDS solutions do not have the ability to decrypt packets inbound or
outbound and this blinds security administrators
What’s next – NG!
 “Real-time Network Awareness (RNA)” - RNA enables organizations to more confidently
protect their networks through a unique patent pending combination of passive network
discovery, behavioral profiling, and integrated vulnerability analysis to deliver the
benefits of real-time network profiling and change management without the drawbacks of
traditional approaches to identifying network assets and vulnerabilities
 Certifications
 Test C2150-561: IBM Security Network Intrusion Prevention System V4.3 Implementation
 McAfee Certified Product Specialist — HIPs; The MCPS — HIPs certification validates
knowledge and experience in working with the McAfee Host Intrusion Prevention system.
 Cisco CCNA Sec- Implementing Cisco Threat Control Solutions; IPS , FW , Cloud and Email
Security
 References
 SANS Documents
 Cisco docs
Why and Where IDP
Any IP
Allowed
10.1.1.1:*
Allowed
10.1.1.1:80
From Internet
will hit all
types of
request from
various subnets
Interne
t
Router will drop all other IP
subnets, allowed inside only
10.* subnet as Rule specified.
But still its pass all port in
that 10.* subnet.
*Router can only limited port
level rule
Router
Firewall will default drop all
request, unless any allowed
rule presents in it.
Example on IP 10.1.1.1, its
allow HTTP(80) traffic but
may block SMTP(25)
Firewall IDP
We can place IDP any where as required, in simple network its place after the firewall as below.
• Network level (May be one or multiple if network is huge)
• Host level (for critical servers)
1.Router will allow only internal IP address traffic to inside from internet
2.Firewall will allow only specified protocols / ports to inside, even Its Internal IP address
3.IDP will check what is inside that traffic payload in specified protocol/port.
Demo & Practice
 Untangle Administrator Login : demo.untangle.com
 Go to IDS module and go through Settings where can find all IDS related options
, include signatures , policies, etc.
 This will provide most security technologies demo (FW, AntiSpam..), not
limited to IDS.
 To practice real one, please use GNS3 and original IOS from Cisco in your
laptop.
QA & Thank you
Finto Thomas, CISSP

More Related Content

What's hot

Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection Systemjohnb0118
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
samis
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
Girija Sankar Dash
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
davebrosnan
 
Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityPass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network Security
Hecrocro
 
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
Subrata Kumer Paul
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewallsSapna Kumari
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
Patten John
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
TayabaZahid
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)
Digital Bond
 
Firewall Basing
Firewall BasingFirewall Basing
Firewall Basing
Pina Parmar
 
Android Firewall project
Android Firewall projectAndroid Firewall project
Android Firewall project
Karunakar Singh Thakur
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
Jainam Shah
 
Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies
sushmil123
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
EnergySec
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS Communications
Digital Bond
 
IoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignIoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control Design
Priyanka Aash
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
Lancope, Inc.
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
Md Shihab
 

What's hot (20)

Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection System
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
 
Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityPass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network Security
 
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)
 
Firewall Basing
Firewall BasingFirewall Basing
Firewall Basing
 
Android Firewall project
Android Firewall projectAndroid Firewall project
Android Firewall project
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS Communications
 
IoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignIoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control Design
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
 

Similar to Idps technology starter v2.0

Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
 
Day4
Day4Day4
Day4
Jai4uk
 
ids.ppt
ids.pptids.ppt
ids.ppt
Agostinho9
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniLoay Elbasyouni
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemSweta Sharma
 
Cours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptxCours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptx
ssuserc517ee1
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
Christopher Gerritz
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overviewali raza
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
laonap166
 
Ingenieria de Software Real Academia Española
Ingenieria de Software Real Academia EspañolaIngenieria de Software Real Academia Española
Ingenieria de Software Real Academia Española
pkalckbh
 
IDS VS IPS.pptx
IDS VS IPS.pptxIDS VS IPS.pptx
IDS VS IPS.pptx
Tapan Khilar
 
Intrusion detection and prevention
Intrusion detection and preventionIntrusion detection and prevention
Intrusion detection and preventionNicholas Davis
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And PreventionNicholas Davis
 
Aensis idps 1000 v ext_eng
Aensis idps 1000  v ext_engAensis idps 1000  v ext_eng
Aensis idps 1000 v ext_eng
Jose Luis Garcia Rodriguez
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
Haltdos
 
Ids vs ips
Ids vs ipsIds vs ips
Ids vs ips
Tapan Khilar
 

Similar to Idps technology starter v2.0 (20)

Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Day4
Day4Day4
Day4
 
ids.ppt
ids.pptids.ppt
ids.ppt
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Cours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptxCours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptx
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overview
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Ingenieria de Software Real Academia Española
Ingenieria de Software Real Academia EspañolaIngenieria de Software Real Academia Española
Ingenieria de Software Real Academia Española
 
IDS VS IPS.pptx
IDS VS IPS.pptxIDS VS IPS.pptx
IDS VS IPS.pptx
 
Intrusion detection and prevention
Intrusion detection and preventionIntrusion detection and prevention
Intrusion detection and prevention
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And Prevention
 
Aensis idps 1000 v ext_eng
Aensis idps 1000  v ext_engAensis idps 1000  v ext_eng
Aensis idps 1000 v ext_eng
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
OSSIM Overview
OSSIM OverviewOSSIM Overview
OSSIM Overview
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
Ids vs ips
Ids vs ipsIds vs ips
Ids vs ips
 
CCNP Security-IPS
CCNP Security-IPSCCNP Security-IPS
CCNP Security-IPS
 

More from Finto Thomas , CISSP, TOGAF, CCSP, ITIL. JNCIS

Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Threathunting v0.1
Threathunting v0.1Threathunting v0.1
Vulnerability manager v1.0
Vulnerability manager v1.0Vulnerability manager v1.0
Network & security startup
Network & security startupNetwork & security startup
Network & security startup
Finto Thomas , CISSP, TOGAF, CCSP, ITIL. JNCIS
 
Data lake protection ft 3119 -ver1.0
Data lake protection   ft 3119 -ver1.0Data lake protection   ft 3119 -ver1.0
Data lake protection ft 3119 -ver1.0
Finto Thomas , CISSP, TOGAF, CCSP, ITIL. JNCIS
 
Virtualization & tipping point
Virtualization & tipping pointVirtualization & tipping point
Virtualization & tipping point
Finto Thomas , CISSP, TOGAF, CCSP, ITIL. JNCIS
 

More from Finto Thomas , CISSP, TOGAF, CCSP, ITIL. JNCIS (9)

Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Benefits of DevSecOps
 
Gdpr brief and controls ver2.0
Gdpr brief and controls ver2.0Gdpr brief and controls ver2.0
Gdpr brief and controls ver2.0
 
Deception ey
Deception ey Deception ey
Deception ey
 
Threathunting v0.1
Threathunting v0.1Threathunting v0.1
Threathunting v0.1
 
Vulnerability manager v1.0
Vulnerability manager v1.0Vulnerability manager v1.0
Vulnerability manager v1.0
 
Network & security startup
Network & security startupNetwork & security startup
Network & security startup
 
Data lake protection ft 3119 -ver1.0
Data lake protection   ft 3119 -ver1.0Data lake protection   ft 3119 -ver1.0
Data lake protection ft 3119 -ver1.0
 
Virtualization & tipping point
Virtualization & tipping pointVirtualization & tipping point
Virtualization & tipping point
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 

Idps technology starter v2.0

  • 1. Intrusion Devices IDS & IPS Ver1.0 Created : 06 March 2015
  • 2. Agenda  Understand Intrusion detection and Purpose  Detecting and Prevention system  Understand Products  Implementation Models  Type of detections and Signature tuning
  • 3. Intrusion!!!!  Intrusion !  Who know where is value data || (APT, Spearfishing)  Security = visibility + control || (CIA)  Active visibility >>Visibility is paramount to decision making  Store information, Analysis and Reporting as retro prospective  Mitigating the Risk: Defense in Depth  Firewall Vs Deep packet Inspection Vs IPS Intrusion Detection is the art of detecting inappropriate, incorrect, or anomalous activity. Among other tools, an Intrusion Detection System can be used to determine if a computer network or server has experienced an unauthorized intrusion.
  • 4. Intrusion Detection System  IDS || IPS  Network Sensors - Network Based – NIDS & NIPS  Host Agents - Host based IDS & IPS - HIPS& HIDS  Management Consoles  Where to place  SIEM  Incident Management Process  Risk management 4
  • 5. Terminologies  Signatures explicitly define what activity should be considered malicious  Simple pattern matching  Protocol decode-based analysis  Anomaly detection involves defining “normal” activity and looking for deviations from this baseline  False Alarms: State in which the ID system mistakenly reports a benign activity as being malicious  False Negative: State in which the ID system does not detect and report actual malicious activity even though it is monitored  IBM - PAM : X-Force Protocol Analysis Module (PAM)
  • 6. Host Vs Network IDS Cons Network- Based Host- Based Pros • Can verify success or failure of attack • Generally not impacted by bandwidth or encryption • Understands host context and may be able to stop attack • Impacts host resources • Operating system dependent • Scalability—Requires one agent per host • Protects all hosts on monitored network • No host impact • Can detect network probes and denial of service attacks • Switched environments pose challenges • Monitoring >100Mbps is currently challenging • Generally can’t proactively stop attacks
  • 7. Promiscuous / TAP mode: Here we can only put the agent in Detection mode only even its IPS support Inline mode: Here we can put the agent in Detection / Prevention mode according to device capability or design wise. 7
  • 8. Understand products  IBM – Proventia Hardware (G/GX) / Software- ISS have two line of product Proventia (IPS) and real sensor (IDS), Proventia have Software version for Linux & windows serves and Desktop along with Appliance (HW + customized OS + Application) GX series.  Cisco FirePower hardware and VM model , IDSM Module  Checkpoint – IPS Blades  Juniper – IDP Module  McAcfee –Intrushield  Soucrefire (Snort IDS)
  • 9.
  • 10. Create or Edit Signature !
  • 11. Concerns…  Return on investment based on visibility, control, and uptime.  Greatest risk comes from insider threats. Disgruntled employees, curious employees, outsourced services, and the trends of greater volumes of contracted services provide a higher level of vulnerability from within the network  a known fact is that current IDS implementations have a tendency to drop packets due to the high throughput of today’s high bandwidth network devices  most IDS solutions do not have the ability to decrypt packets inbound or outbound and this blinds security administrators
  • 12. What’s next – NG!  “Real-time Network Awareness (RNA)” - RNA enables organizations to more confidently protect their networks through a unique patent pending combination of passive network discovery, behavioral profiling, and integrated vulnerability analysis to deliver the benefits of real-time network profiling and change management without the drawbacks of traditional approaches to identifying network assets and vulnerabilities  Certifications  Test C2150-561: IBM Security Network Intrusion Prevention System V4.3 Implementation  McAfee Certified Product Specialist — HIPs; The MCPS — HIPs certification validates knowledge and experience in working with the McAfee Host Intrusion Prevention system.  Cisco CCNA Sec- Implementing Cisco Threat Control Solutions; IPS , FW , Cloud and Email Security  References  SANS Documents  Cisco docs
  • 13. Why and Where IDP Any IP Allowed 10.1.1.1:* Allowed 10.1.1.1:80 From Internet will hit all types of request from various subnets Interne t Router will drop all other IP subnets, allowed inside only 10.* subnet as Rule specified. But still its pass all port in that 10.* subnet. *Router can only limited port level rule Router Firewall will default drop all request, unless any allowed rule presents in it. Example on IP 10.1.1.1, its allow HTTP(80) traffic but may block SMTP(25) Firewall IDP We can place IDP any where as required, in simple network its place after the firewall as below. • Network level (May be one or multiple if network is huge) • Host level (for critical servers) 1.Router will allow only internal IP address traffic to inside from internet 2.Firewall will allow only specified protocols / ports to inside, even Its Internal IP address 3.IDP will check what is inside that traffic payload in specified protocol/port.
  • 14. Demo & Practice  Untangle Administrator Login : demo.untangle.com  Go to IDS module and go through Settings where can find all IDS related options , include signatures , policies, etc.  This will provide most security technologies demo (FW, AntiSpam..), not limited to IDS.  To practice real one, please use GNS3 and original IOS from Cisco in your laptop.
  • 15. QA & Thank you Finto Thomas, CISSP