SlideShare a Scribd company logo
IDS/IPS

          Santosh Khadsare
What is an Intrusion?
An intrusion is somebody attempting to break into or
misuse your system. The word “misuse” can reflect
something severe as stealing confidential data to something
minor such as misusing your email system for spam.

Intrusion can be defined as any set of actions that attempt
to compromise the integrity, confidentiality or availability of
 resource.

In the context of info systems, intrusion refers to any
unauthorized access, unauthorized attempt to access or
damage or malicious use of info resources.
WHO ARE INTRUDERS?
• Outsiders.    Intruders from outside the
  network. They may attempt to go around
  the firewall to attack machines on the
  internal network.

• Insiders.    Intruders that legitimately
  use your internal network. These include
  users who misuse privileges or who
  impersonate higher privileged users.
HOW DO INTRUDERS GET INTO
      THE SYSTEM?

     • Physical intrusion.

     • System intrusion.

     • Remote intrusion.
WHAT IS AN INTRUSION
    DETECTION SYSTEM?

• The main function of an IDS is to warn
  about suspicious activity taking place, but
  not to prevent them.

• An IDS specifically looks for suspicious
  activity and events that might be the result
  of a virus, worm or hacker.
Intrusion Detection Systems (IDS)

IDS designed to detect security breaches.

IDS designed to aid in mitigating damage caused by hacking.

Basic intent behind IDS: spot something suspicious on
NW/system and sound alarm.

May look for data bits that indicate questionable activity or
monitor system logs.

Events that sound alarm – may not be an intrusion; any
abnormal activity may trigger, depending on configuration.
Intrusion Detection Systems (IDS)

All IDS have three things in common:

   Sensors: collect tfc and user activity data and sends to
   analyzer.

   Analyzer: Looks for suspicious activity.

   Administrator Interface: If analyzer detects suspicious
   activity, sends an alert to the Admin Interface.
Intrusion Detection Systems (IDS)
Why use an IDS:
To detect attacks and other security violations that are not
prevented by other security measures,
To detect and deal with the preambles to attacks (commonly
experienced as network probes and other “doorknob rattling”
activities),
To document the existing threat to an organization
To act as quality control for security design and administration,
especially of large and complex enterprises
To provide useful information about intrusions that do take
place, allowing improved diagnosis, recovery, and correction of
causative factors.
Intrusion Detection Systems (IDS)
IDS can be configured for:
   Watch for attacks
   Parse audit logs
   Terminate a connection
   Alert an admin as attacks are happening
   Protect system files
   Expose a hacker’s techniques
   Throw up vulnerabilities that need to be addressed
   Possibly help to track down hackers


Two main type of IDS:
  NIDS
  HIDS
Network Intrusion Detection Systems (NIDS)

Uses sensors to monitor all NW tfc

Cannot see the activities within the computer itself.
Host based Intrusion Detection Systems (HIDS)

Installed on indl workstns / servers

Watches for abnormal activity

NIDs understands and monitors NW tfc, HIDs monitors the
computer only on which it is installed.

Gen, HIDS installed on critical servers only due to administrative
overheads.
Types of HIDS/NIDS

Signature based
  Pattern matching
  Stateful matching

Anomaly based
  Statistical anomaly based
  Protocol anomaly based
  Tfc anomaly based

Rule based
Types of HIDS/NIDS

Knowledge or Signature based IDS
Knowledge is gained by sensors about how specific attacks are
carried out.

Each identified attack has a signature

Eg of a signature:
A pkt having the same source and destination address (Land
Attack)
A TCP header of a pkt in which all values are set to 1s (xmas
attack).

Once these type of attack discovered, vendors wrote signatures
that looks specially for pkts with same source and destination
addresses or with TCP headers flag set to all 1s.
Types of HIDS/NIDS

Knowledge or Signature based IDS
Most popular IDS today.

Effectiveness depends on regularly updating signature database.

May not be able to uncover new types of attacks.
Types of HIDS/NIDS
State based IDS
What is a state?
Every change that an OS experiences (user log on, opening of
aplns, user data input, etc), is a state transition.

Gen happens continuously in any system.

So again, what is a state?
A snapshot of an OS’s values in volatile and non-volatile memory
locations.

In a state based IDS:
Initial state is the state prior to attack execution.
Compromised state is the state after successful penetration.
The IDS has rules as to which state transitions should trigger
alarm.
Types of HIDS/NIDS
An example of State based IDS
   •A remote user connects to a system

   •Sends data to an apln (data exceeds alloted buffer for this
   empty variable).

   •The data is executed and overwrites the buffer and possibly
   other memory segments.

   •A malicious code executes.


State based IDS looks for activity between initial and
compromised state and sends alert if any state transition
sequence matches its preconfigured rules.
Requires frequent signature updates.
Types of HIDS/NIDS
Statistical Anomaly based IDS
A behavior based system (also called heuristic IDS).

Does not use a signature database.

Initially put in a learning mode wherein the IDS learns the `normal’
NW activities.

The longer it is in learning mode, more accurate profile of a
normal state is built up.

After a profile is built, all future activities are compared to this
`normal’ profile.

If an activity exceeds a predefined `normal’ threshold, the alert is
triggered.
Types of HIDS/NIDS
Statistical Anomaly based IDS - Benefits
Can react to 0 day attacks
Also capable of detecting the low and slow attacks


Statistical Anomaly based IDS – Problems
May provide overwhelming number of false positives.
If an attacker discovers an IDS on a NW, will try to detect type so
that he can circumvent it.
With a behavior based IDS, attacker will try to integrate activities
in the `normal’ NW usage.
If an attack was underway when the IDS was in learning mode,
an attack will never be detected.
Sends generic alerts compared to specific alerts thrown up by
signature based IDS.
Types of HIDS/NIDS
Statistical Anomaly based IDS
Strength of this IDS lies in determining actual thresholds of normal
activity.

Once an attack is iden, the IDS can:
  Send an alert to the admin’s console.
  Send an email to a preconfigured address.
  Kill the connection of the detected attack
  Reconfigure a router/firewall to stop any further similar
  attacks.
Types of HIDS/NIDS
Protocol Anomaly based IDS
These IDS have specific knowledge of each protocol they will
monitor.

A protocol anomaly pertains to the format and behavior of a
protocol..

The IDS builds a model of each protocol’s `normal’ usage

Eg of protocol anomaly:
Data Link Layer: ARP attack where bogus data is inserted in an
ARP table.

NW Layer: ICMP can be used in a Loki Attack to move data from
one place to another.
Types of HIDS/NIDS
Traffic Anomaly based IDS
Detects changes in NW tfc patterns

Tfc patterns may change during DoS attacks or when a new
service is introduced on the NW.

The IDS learns the normal tfc pattern and sets a threshold.

0 day attacks can be detected.
Types of HIDS/NIDS
Rule based IDS
A signature based IDS is very straightforward –
if a pkt has same source/destination address, send alert.

A statistical anomaly based IDS is also straightforward –
X logs in his system at 8 AM and logs off at 5 PM everyday. If he
logs on at 10 PM, it is an anomaly and an alert is sent.

Rule based       IDS   gen   used   in   expert   systems   (Artificial
Intelligence).

An expert system has:
A knowledge base
An inference engine
Rule based programming.
Types of HIDS/NIDS
Rule based IDS
Rule based programming refers to - IF situation THEN action.

The rules are applied to facts (data that comes in from a sensor).

Rule based IDS gathers data from sensors/logs, the inference
engine uses its pre-programmed rules on it. If characteristics of
the rule is met – an alert is triggered.

Eg of a rule based IDS:
IF a root user creates file1 AND creates file2 SUCH THAT they are in the
same directory AND the root user opens tool1 TRIGGER send alert.
IDS
Placement of sensors
Outside the FW- detect attacks
Inside the FW – to detect actual intrusions
Highly sensitive subnets
DMZs


NW Tfc:
Every vendor’s IDS product has a threshold.
If NW tfc exceeds the threshold, all pkts may not be examined
and attacks may go unnoticed.
In high tfc environments multiple sensors reqd to be placed to
ensure all pkts are investigated.
WHAT IS IPS?
• Intrusion Prevention System (IPS) is any
  device (hardware or software) that has the
  ability to detect attacks, both known and
  unknown, and prevent the attack from being
  successful.
Intrusion Prevention Systems (IPS)

The bad guys are always one step ahead of the security
professionals.

Security professionals try and come up with innovative means to
detect and prevent attacks.

IPS is a preventive device rather than a detective device (IDS).

An IPS combines the prevent action of a FW with the in depth
pkt analysis function of an IDS.
CLASSIFICATION OF IPS

• Broadly classified into two categories

  – Host IPS (HIPS)

  – Network IPS (NIPS)
HOST-IPS
• HIPS is installed directly on the system
  being protected

• It binds closely with the operating system
  kernel and services, it monitors and
  intercepts system calls to the kernel in
  order to prevent attacks as well as log
  them.

• It prevents the system from generic
  attacks for which no “signature” yet
  exists.
NETWORK-IPS
• Has two network interfaces, one designated
  as internal and one as external.

• Packets passed through both interfaces and
   they determined whether the packet being
  examined poses a threat.

• If it detects a malicious packet, an alert is
  raised,    the   packets    are   discarded
  immediately. Legitimate packets are passed
  through to the second interface and on to
  their intended destination.
TYPES OF IPS
• Inline network intrusion protection
  systems.

• Layer seven switches.

• Application firewalls.

• Hybrid switches.

• Deceptive applications.
INLINE NETWORK IPS

• It is configured with two NICs,           one   for
  management and one for detection.

• NIC that is configured for detection usually does
  not have an IP address assigned .

• It works by sitting between the systems that need
  to be protected and the rest of the network.

• It inspects the packet for any vulnerabilities that
  it is configured to look for.
INLINE NETWORK IPS




PKT SCRUBBING
LAYER SEVEN SWITCHES
• Placing these devices in front of your
  firewalls would give protection for the entire
  network.

• However the drawbacks are that they can
  only stop attacks that they know about.

• The only attack they can stop that most
  others IPS can’t are the DoS attacks.
LAYER SEVEN SWITCHES
APPLICATION FIREWALLS
• These IPSs are loaded on each server that is to be
  protected.

• These types of IPSs are customizable to each
  application that they are to protect.

• It profiles a system before protecting it. During the
  profiling it watches the user’s interaction with the
  application and the applications interaction with the
  operating system to determine what legitimate
  interaction looks like.

• The drawback is that when the application is updated
  it might have to be profiled again so that it does not
  block legitimate use.
HYBRID SWITCHES
• They inspect specific traffic for malicious
  content as has been configured .

• Hybrid switch works in similar manner to layer
  seven switch, but has detailed knowledge of the
  web server and the application that sits on top
  of the web server.

• It also fails , if the user’s request does not
  match any of the permitted requests.
HYBRID SWITCHES
DECEPTIVE APPLICATIONS
• It watches all your network traffic and figures out
  what is good traffic.

• When an attacker attempts to connect to services
  that do not exist, it will send back a response to
  the attacker

• The response will be “marked” with some bogus
  data. When the attacker comes back again and
  tries to exploit the server the IPS will see the
  “marked” data and stop all traffic coming from the
  attacker.
Honeypots

A system set up as a sacrificial lamb on a NW.

Not locked down.

Modified operational data kept on system to lure hackers to this
system rather than going to an actual operational system.

Enables admin to know what types of attacks are occurring.

May also help to track down an intruder.

More the time spent by the hacker on a honeypot, more info can
be gained about his techniques.
Honeypots

Legal issues with a honeypot
Enticement versus entrapment.
THANK YOU

More Related Content

What's hot

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Roshan Ranabhat
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Mohit Belwal
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemSweta Sharma
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
gaurav koriya
 
IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPS
Minhaz A V
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
Ankita Ganguly
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
OECLIB Odisha Electronics Control Library
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Aparna Bhadran
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Firewall
FirewallFirewall
Firewall
nayakslideshare
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
lalithambiga kamaraj
 
Introduction to Snort
Introduction to SnortIntroduction to Snort
Introduction to Snort
Hossein Yavari
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
Disha Bedi
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech
 
Dos attack
Dos attackDos attack
Dos attack
Manjushree Mashal
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
Mustafash79
 

What's hot (20)

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPS
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Network Security
Network SecurityNetwork Security
Network Security
 
Firewall
FirewallFirewall
Firewall
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Introduction to Snort
Introduction to SnortIntroduction to Snort
Introduction to Snort
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Dos attack
Dos attackDos attack
Dos attack
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
 

Viewers also liked

Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
samis
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
david rom
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
Savvius, Inc
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
shraddha_b
 
Ids ips detection
Ids  ips detectionIds  ips detection
Ids ips detection
Tensor
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS security
Clarejenson
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
Netwax Lab
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
Nishanth Kumar Pathi
 
HP ArcSight
HP ArcSight HP ArcSight
HP ArcSight
Mohamed Zohair
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
k33a
 
Agricultural investment in Turkey
Agricultural investment  in TurkeyAgricultural investment  in Turkey
Agricultural investment in Turkey
Emin Divitci
 
Latihan bahas inggris kls 9
Latihan bahas inggris kls 9Latihan bahas inggris kls 9
Latihan bahas inggris kls 9
Bibit Supriyati
 
Back to the future - cyber security, privacy and visions of the future
Back to the future - cyber security, privacy and visions of the futureBack to the future - cyber security, privacy and visions of the future
Back to the future - cyber security, privacy and visions of the future
b coatesworth
 
IPS Product Comparison of Cisco 4255 & TippingPoint 5000E
IPS Product Comparison of Cisco 4255 & TippingPoint 5000EIPS Product Comparison of Cisco 4255 & TippingPoint 5000E
IPS Product Comparison of Cisco 4255 & TippingPoint 5000E
allengalvan
 
215610229 seguranca-de-redes
215610229 seguranca-de-redes215610229 seguranca-de-redes
215610229 seguranca-de-redesMarco Guimarães
 

Viewers also liked (19)

Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
 
Ids & ips
Ids & ipsIds & ips
Ids & ips
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Ids ips detection
Ids  ips detectionIds  ips detection
Ids ips detection
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS security
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
HP ArcSight
HP ArcSight HP ArcSight
HP ArcSight
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Strategic Investment Prioritisation in Investment Banking IT division.
Strategic Investment Prioritisation in Investment Banking IT division.Strategic Investment Prioritisation in Investment Banking IT division.
Strategic Investment Prioritisation in Investment Banking IT division.
 
Agricultural investment in Turkey
Agricultural investment  in TurkeyAgricultural investment  in Turkey
Agricultural investment in Turkey
 
Latihan bahas inggris kls 9
Latihan bahas inggris kls 9Latihan bahas inggris kls 9
Latihan bahas inggris kls 9
 
Back to the future - cyber security, privacy and visions of the future
Back to the future - cyber security, privacy and visions of the futureBack to the future - cyber security, privacy and visions of the future
Back to the future - cyber security, privacy and visions of the future
 
Session 5.2: Gamble
Session 5.2: GambleSession 5.2: Gamble
Session 5.2: Gamble
 
Ips and ids
Ips and idsIps and ids
Ips and ids
 
IPS Product Comparison of Cisco 4255 & TippingPoint 5000E
IPS Product Comparison of Cisco 4255 & TippingPoint 5000EIPS Product Comparison of Cisco 4255 & TippingPoint 5000E
IPS Product Comparison of Cisco 4255 & TippingPoint 5000E
 
215610229 seguranca-de-redes
215610229 seguranca-de-redes215610229 seguranca-de-redes
215610229 seguranca-de-redes
 

Similar to IDS and IPS

Ids vs ips
Ids vs ipsIds vs ips
Ids vs ips
Tapan Khilar
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
Netwax Lab
 
IDS VS IPS.pptx
IDS VS IPS.pptxIDS VS IPS.pptx
IDS VS IPS.pptx
Tapan Khilar
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptx
AnonymousEImkf6RGdQ
 
Ids
IdsIds
Information Security.pptx
Information Security.pptxInformation Security.pptx
Information Security.pptx
DrRajapraveen
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Preshan Pradeepa
 
What are the Different Types of Intrusion Detection Systems
What are the Different Types of Intrusion Detection SystemsWhat are the Different Types of Intrusion Detection Systems
What are the Different Types of Intrusion Detection Systems
GeekTek IT Services
 
Intrusion dDetection
Intrusion dDetectionIntrusion dDetection
Intrusion dDetection
Aayush Khandelwal
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention
MohammedAlmuhaimeed
 
Ips and-ids
Ips and-idsIps and-ids
Ips and-ids
Adam Viet
 
idps
idpsidps
idps
iskrene
 
Intrusion detection system and intrusion prevention system
Intrusion detection system and intrusion prevention systemIntrusion detection system and intrusion prevention system
Intrusion detection system and intrusion prevention system
salutiontechnology
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniLoay Elbasyouni
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
Zara Nawaz
 
Intrusion .ppt
Intrusion .pptIntrusion .ppt
Intrusion .ppt
MuhammadRehan856177
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
researchinventy
 
Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systemsvamsi_xmen
 
IDS n IPS
IDS n IPSIDS n IPS
IS-Types of IDPSs.pptx
IS-Types of IDPSs.pptxIS-Types of IDPSs.pptx
IS-Types of IDPSs.pptx
V.V.Vanniaperumal College for Women
 

Similar to IDS and IPS (20)

Ids vs ips
Ids vs ipsIds vs ips
Ids vs ips
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
 
IDS VS IPS.pptx
IDS VS IPS.pptxIDS VS IPS.pptx
IDS VS IPS.pptx
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptx
 
Ids
IdsIds
Ids
 
Information Security.pptx
Information Security.pptxInformation Security.pptx
Information Security.pptx
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
What are the Different Types of Intrusion Detection Systems
What are the Different Types of Intrusion Detection SystemsWhat are the Different Types of Intrusion Detection Systems
What are the Different Types of Intrusion Detection Systems
 
Intrusion dDetection
Intrusion dDetectionIntrusion dDetection
Intrusion dDetection
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention
 
Ips and-ids
Ips and-idsIps and-ids
Ips and-ids
 
idps
idpsidps
idps
 
Intrusion detection system and intrusion prevention system
Intrusion detection system and intrusion prevention systemIntrusion detection system and intrusion prevention system
Intrusion detection system and intrusion prevention system
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
 
Intrusion .ppt
Intrusion .pptIntrusion .ppt
Intrusion .ppt
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
 
Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
 
IDS n IPS
IDS n IPSIDS n IPS
IDS n IPS
 
IS-Types of IDPSs.pptx
IS-Types of IDPSs.pptxIS-Types of IDPSs.pptx
IS-Types of IDPSs.pptx
 

More from Santosh Khadsare

Cyber fraud (netflix)
Cyber fraud (netflix)Cyber fraud (netflix)
Cyber fraud (netflix)
Santosh Khadsare
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
Santosh Khadsare
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
Santosh Khadsare
 
Smart card
Smart cardSmart card
Smart card
Santosh Khadsare
 
Webmail
WebmailWebmail
Linux Forensics
Linux ForensicsLinux Forensics
Linux Forensics
Santosh Khadsare
 
Web server
Web serverWeb server
Web server
Santosh Khadsare
 
Samba server
Samba serverSamba server
Samba server
Santosh Khadsare
 
Firewall(linux)
Firewall(linux)Firewall(linux)
Firewall(linux)
Santosh Khadsare
 
Securitytips
SecuritytipsSecuritytips
Securitytips
Santosh Khadsare
 
Linuxfilesys
LinuxfilesysLinuxfilesys
Linuxfilesys
Santosh Khadsare
 
Linuxconcepts
LinuxconceptsLinuxconcepts
Linuxconcepts
Santosh Khadsare
 
Introtolinux
IntrotolinuxIntrotolinux
Introtolinux
Santosh Khadsare
 
New internet
New internetNew internet
New internet
Santosh Khadsare
 

More from Santosh Khadsare (20)

Cyber fraud (netflix)
Cyber fraud (netflix)Cyber fraud (netflix)
Cyber fraud (netflix)
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
Lec 1 apln security(4pd)
Lec  1 apln security(4pd)Lec  1 apln security(4pd)
Lec 1 apln security(4pd)
 
Smart card
Smart cardSmart card
Smart card
 
Guassvirus
GuassvirusGuassvirus
Guassvirus
 
Webmail
WebmailWebmail
Webmail
 
Linux Forensics
Linux ForensicsLinux Forensics
Linux Forensics
 
Web server
Web serverWeb server
Web server
 
Samba server
Samba serverSamba server
Samba server
 
Firewall(linux)
Firewall(linux)Firewall(linux)
Firewall(linux)
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Linux basics
Linux basicsLinux basics
Linux basics
 
Linuxfilesys
LinuxfilesysLinuxfilesys
Linuxfilesys
 
Linuxconcepts
LinuxconceptsLinuxconcepts
Linuxconcepts
 
Introtolinux
IntrotolinuxIntrotolinux
Introtolinux
 
New internet
New internetNew internet
New internet
 

Recently uploaded

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 

Recently uploaded (20)

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 

IDS and IPS

  • 1. IDS/IPS Santosh Khadsare
  • 2. What is an Intrusion? An intrusion is somebody attempting to break into or misuse your system. The word “misuse” can reflect something severe as stealing confidential data to something minor such as misusing your email system for spam. Intrusion can be defined as any set of actions that attempt to compromise the integrity, confidentiality or availability of resource. In the context of info systems, intrusion refers to any unauthorized access, unauthorized attempt to access or damage or malicious use of info resources.
  • 3. WHO ARE INTRUDERS? • Outsiders. Intruders from outside the network. They may attempt to go around the firewall to attack machines on the internal network. • Insiders. Intruders that legitimately use your internal network. These include users who misuse privileges or who impersonate higher privileged users.
  • 4. HOW DO INTRUDERS GET INTO THE SYSTEM? • Physical intrusion. • System intrusion. • Remote intrusion.
  • 5. WHAT IS AN INTRUSION DETECTION SYSTEM? • The main function of an IDS is to warn about suspicious activity taking place, but not to prevent them. • An IDS specifically looks for suspicious activity and events that might be the result of a virus, worm or hacker.
  • 6. Intrusion Detection Systems (IDS) IDS designed to detect security breaches. IDS designed to aid in mitigating damage caused by hacking. Basic intent behind IDS: spot something suspicious on NW/system and sound alarm. May look for data bits that indicate questionable activity or monitor system logs. Events that sound alarm – may not be an intrusion; any abnormal activity may trigger, depending on configuration.
  • 7. Intrusion Detection Systems (IDS) All IDS have three things in common: Sensors: collect tfc and user activity data and sends to analyzer. Analyzer: Looks for suspicious activity. Administrator Interface: If analyzer detects suspicious activity, sends an alert to the Admin Interface.
  • 8. Intrusion Detection Systems (IDS) Why use an IDS: To detect attacks and other security violations that are not prevented by other security measures, To detect and deal with the preambles to attacks (commonly experienced as network probes and other “doorknob rattling” activities), To document the existing threat to an organization To act as quality control for security design and administration, especially of large and complex enterprises To provide useful information about intrusions that do take place, allowing improved diagnosis, recovery, and correction of causative factors.
  • 9. Intrusion Detection Systems (IDS) IDS can be configured for: Watch for attacks Parse audit logs Terminate a connection Alert an admin as attacks are happening Protect system files Expose a hacker’s techniques Throw up vulnerabilities that need to be addressed Possibly help to track down hackers Two main type of IDS: NIDS HIDS
  • 10. Network Intrusion Detection Systems (NIDS) Uses sensors to monitor all NW tfc Cannot see the activities within the computer itself.
  • 11. Host based Intrusion Detection Systems (HIDS) Installed on indl workstns / servers Watches for abnormal activity NIDs understands and monitors NW tfc, HIDs monitors the computer only on which it is installed. Gen, HIDS installed on critical servers only due to administrative overheads.
  • 12. Types of HIDS/NIDS Signature based Pattern matching Stateful matching Anomaly based Statistical anomaly based Protocol anomaly based Tfc anomaly based Rule based
  • 13. Types of HIDS/NIDS Knowledge or Signature based IDS Knowledge is gained by sensors about how specific attacks are carried out. Each identified attack has a signature Eg of a signature: A pkt having the same source and destination address (Land Attack) A TCP header of a pkt in which all values are set to 1s (xmas attack). Once these type of attack discovered, vendors wrote signatures that looks specially for pkts with same source and destination addresses or with TCP headers flag set to all 1s.
  • 14. Types of HIDS/NIDS Knowledge or Signature based IDS Most popular IDS today. Effectiveness depends on regularly updating signature database. May not be able to uncover new types of attacks.
  • 15. Types of HIDS/NIDS State based IDS What is a state? Every change that an OS experiences (user log on, opening of aplns, user data input, etc), is a state transition. Gen happens continuously in any system. So again, what is a state? A snapshot of an OS’s values in volatile and non-volatile memory locations. In a state based IDS: Initial state is the state prior to attack execution. Compromised state is the state after successful penetration. The IDS has rules as to which state transitions should trigger alarm.
  • 16. Types of HIDS/NIDS An example of State based IDS •A remote user connects to a system •Sends data to an apln (data exceeds alloted buffer for this empty variable). •The data is executed and overwrites the buffer and possibly other memory segments. •A malicious code executes. State based IDS looks for activity between initial and compromised state and sends alert if any state transition sequence matches its preconfigured rules. Requires frequent signature updates.
  • 17. Types of HIDS/NIDS Statistical Anomaly based IDS A behavior based system (also called heuristic IDS). Does not use a signature database. Initially put in a learning mode wherein the IDS learns the `normal’ NW activities. The longer it is in learning mode, more accurate profile of a normal state is built up. After a profile is built, all future activities are compared to this `normal’ profile. If an activity exceeds a predefined `normal’ threshold, the alert is triggered.
  • 18. Types of HIDS/NIDS Statistical Anomaly based IDS - Benefits Can react to 0 day attacks Also capable of detecting the low and slow attacks Statistical Anomaly based IDS – Problems May provide overwhelming number of false positives. If an attacker discovers an IDS on a NW, will try to detect type so that he can circumvent it. With a behavior based IDS, attacker will try to integrate activities in the `normal’ NW usage. If an attack was underway when the IDS was in learning mode, an attack will never be detected. Sends generic alerts compared to specific alerts thrown up by signature based IDS.
  • 19. Types of HIDS/NIDS Statistical Anomaly based IDS Strength of this IDS lies in determining actual thresholds of normal activity. Once an attack is iden, the IDS can: Send an alert to the admin’s console. Send an email to a preconfigured address. Kill the connection of the detected attack Reconfigure a router/firewall to stop any further similar attacks.
  • 20. Types of HIDS/NIDS Protocol Anomaly based IDS These IDS have specific knowledge of each protocol they will monitor. A protocol anomaly pertains to the format and behavior of a protocol.. The IDS builds a model of each protocol’s `normal’ usage Eg of protocol anomaly: Data Link Layer: ARP attack where bogus data is inserted in an ARP table. NW Layer: ICMP can be used in a Loki Attack to move data from one place to another.
  • 21. Types of HIDS/NIDS Traffic Anomaly based IDS Detects changes in NW tfc patterns Tfc patterns may change during DoS attacks or when a new service is introduced on the NW. The IDS learns the normal tfc pattern and sets a threshold. 0 day attacks can be detected.
  • 22. Types of HIDS/NIDS Rule based IDS A signature based IDS is very straightforward – if a pkt has same source/destination address, send alert. A statistical anomaly based IDS is also straightforward – X logs in his system at 8 AM and logs off at 5 PM everyday. If he logs on at 10 PM, it is an anomaly and an alert is sent. Rule based IDS gen used in expert systems (Artificial Intelligence). An expert system has: A knowledge base An inference engine Rule based programming.
  • 23. Types of HIDS/NIDS Rule based IDS Rule based programming refers to - IF situation THEN action. The rules are applied to facts (data that comes in from a sensor). Rule based IDS gathers data from sensors/logs, the inference engine uses its pre-programmed rules on it. If characteristics of the rule is met – an alert is triggered. Eg of a rule based IDS: IF a root user creates file1 AND creates file2 SUCH THAT they are in the same directory AND the root user opens tool1 TRIGGER send alert.
  • 24. IDS Placement of sensors Outside the FW- detect attacks Inside the FW – to detect actual intrusions Highly sensitive subnets DMZs NW Tfc: Every vendor’s IDS product has a threshold. If NW tfc exceeds the threshold, all pkts may not be examined and attacks may go unnoticed. In high tfc environments multiple sensors reqd to be placed to ensure all pkts are investigated.
  • 25. WHAT IS IPS? • Intrusion Prevention System (IPS) is any device (hardware or software) that has the ability to detect attacks, both known and unknown, and prevent the attack from being successful.
  • 26. Intrusion Prevention Systems (IPS) The bad guys are always one step ahead of the security professionals. Security professionals try and come up with innovative means to detect and prevent attacks. IPS is a preventive device rather than a detective device (IDS). An IPS combines the prevent action of a FW with the in depth pkt analysis function of an IDS.
  • 27. CLASSIFICATION OF IPS • Broadly classified into two categories – Host IPS (HIPS) – Network IPS (NIPS)
  • 28. HOST-IPS • HIPS is installed directly on the system being protected • It binds closely with the operating system kernel and services, it monitors and intercepts system calls to the kernel in order to prevent attacks as well as log them. • It prevents the system from generic attacks for which no “signature” yet exists.
  • 29. NETWORK-IPS • Has two network interfaces, one designated as internal and one as external. • Packets passed through both interfaces and they determined whether the packet being examined poses a threat. • If it detects a malicious packet, an alert is raised, the packets are discarded immediately. Legitimate packets are passed through to the second interface and on to their intended destination.
  • 30. TYPES OF IPS • Inline network intrusion protection systems. • Layer seven switches. • Application firewalls. • Hybrid switches. • Deceptive applications.
  • 31. INLINE NETWORK IPS • It is configured with two NICs, one for management and one for detection. • NIC that is configured for detection usually does not have an IP address assigned . • It works by sitting between the systems that need to be protected and the rest of the network. • It inspects the packet for any vulnerabilities that it is configured to look for.
  • 33. LAYER SEVEN SWITCHES • Placing these devices in front of your firewalls would give protection for the entire network. • However the drawbacks are that they can only stop attacks that they know about. • The only attack they can stop that most others IPS can’t are the DoS attacks.
  • 35. APPLICATION FIREWALLS • These IPSs are loaded on each server that is to be protected. • These types of IPSs are customizable to each application that they are to protect. • It profiles a system before protecting it. During the profiling it watches the user’s interaction with the application and the applications interaction with the operating system to determine what legitimate interaction looks like. • The drawback is that when the application is updated it might have to be profiled again so that it does not block legitimate use.
  • 36. HYBRID SWITCHES • They inspect specific traffic for malicious content as has been configured . • Hybrid switch works in similar manner to layer seven switch, but has detailed knowledge of the web server and the application that sits on top of the web server. • It also fails , if the user’s request does not match any of the permitted requests.
  • 38. DECEPTIVE APPLICATIONS • It watches all your network traffic and figures out what is good traffic. • When an attacker attempts to connect to services that do not exist, it will send back a response to the attacker • The response will be “marked” with some bogus data. When the attacker comes back again and tries to exploit the server the IPS will see the “marked” data and stop all traffic coming from the attacker.
  • 39. Honeypots A system set up as a sacrificial lamb on a NW. Not locked down. Modified operational data kept on system to lure hackers to this system rather than going to an actual operational system. Enables admin to know what types of attacks are occurring. May also help to track down an intruder. More the time spent by the hacker on a honeypot, more info can be gained about his techniques.
  • 40. Honeypots Legal issues with a honeypot Enticement versus entrapment.