SlideShare a Scribd company logo
1
Intrusion Detection Systems
PRESENTED BYPRESENTED BY
Mohit Chandra BelwalMohit Chandra Belwal
2
Agenda
 Background and Necessity
 Firewalls
 Intrusion Detection Systems (IDS)
 Introduction and Benefits
 Difference between Firewall and IDS
 Types of IDS
 Intrusion Detection Techniques
 Unrealistic Expectations
3
Historical Facts
 May 1996, 10 major agencies, comprising 98% of Federal
Budget were attacked with 64%64% of attack success rate
 Feb 2000, DOSDOS attacks against world’s largest commercial
web sites including yahoo.com and amazon.com.
 July 2001, Code RedCode Red virus sweeps across the whole world
infecting 150,000150,000 computers in just 1414 hours.
 Sept 2001, NIMDANIMDA virus expands itself to computers all
across US, lasts for days and attacks over 80,00080,000 computers
4
Points to Ponder
 Typical businesses spend only about 0.15% of annual sales
on the security needs of their corporate network [1]
This amount is even less than most of these companiesThis amount is even less than most of these companies
spend on coffee for the staffspend on coffee for the staff
 60% of firms do not have a clue about how much these
security breaches are costing them [2]
Approximately 70 percent of all cyber attacks onApproximately 70 percent of all cyber attacks on
enterprise systems are believed to beenterprise systems are believed to be
perpetrated by trusted insidersperpetrated by trusted insiders
5
Hackers’ Side Of the Picture
6
Typical Network Architecture
7
First Line of Defense:
The Firewall
 Primary means of securing a private network against
penetration from a public network
 An access control device, performing perimeter security by
deciding which packets are allowed or denied, and which
must be modified before passing
 Core of enterprise’s comprehensive security policy
 Can monitor all traffic entering and leaving the private
network, and alert the IT staff to any attempts to circumvent
security or patterns of inappropriate use
8
Network Firewall Concept
Firewall
System
Your
DomainLegitimate Activity
Violations
9
Types Of Firewall
 Basic Router Security;Basic Router Security; includes Access control Lists (ACLs) and
Network Address Translation (NAT)
 Packet Filtering;Packet Filtering; includes inspection of data packets based on header
information, source and destination addresses and ports and message
protocol type etc
 Stateful Inspections;Stateful Inspections; includes packet inspections based on sessions
and tracking of individual connections. Packets are allowed to pass only
if associated with a valid session initiated from within the network.
 Application Level Gateways;Application Level Gateways; (Proxy servers) protect specific
network services by restricting the features and commands that can be
accessed from outside the network. Presents reduced feature sets to
external users
10
Introduction to IDS
 IDSs prepare for and deal with attacks by collecting
information from a variety of system and network sources,
then analyzing the symptoms of security problems
 IDSs serve three essential security functions; monitormonitor, detectdetect
and respondrespond to unauthorized activity
 IDS can also response automatically (in real-time) to a
security breach event such as logging off a user, disabling a
user account and launching of some scripts
11
Some of the benefits of IDS
 monitors the operation of firewalls, routers, key management servers
and files critical to other security mechanisms
 allows administrator to tune, organize and comprehend often
incomprehensible operating system audit trails and other logs
 can make the security management of systems by non-expert staff
possible by providing nice user friendly interface
 comes with extensive attack signature database against which
information from the customers system can be matched
 can recognize and report alterations to data files
12
FIREWALLS VS IDSs
13
FIREWALL VS IDS (cont)
 Firewall cannot detect security breaches associated with
traffic that does not pass through it. Only IDS is aware of
traffic in the internal network
 Not all access to the Internet occurs through the firewall.
 Firewall does not inspect the content of the permitted traffic
 Firewall is more likely to be attacked more often than IDS
 Firewall is usually helpless against tunneling attacks
 IDS is capable of monitoring messages from other pieces of
security infrastructure
14
TYPES OF IDS
1. HOST – BASED (HIDS)
2. NETWORK – BASED (NIDS)
3. HYBRID
15
HIDS
 works in switched network environments
 operates in encrypted environments
 detects and collects the most relevant information in
the quickest possible manner
 tracks behavior changes associated with misuse.
 requires the use of the resources of a host server –
disk space, RAM and CPU time
 Does not protect entire infrastructure
16
NIDS
PASSIVE Interface to Network Traffic
17
NIDS (cont)
Sensor Placement
18
NIDS (cont)
Advantages
 NIDS uses a passive interface to capture network packets for
analyzing.
 NIDS sensors placed around the globe can be configured to
report back to a central site, enabling a small team of
security experts to support a large enterprise.
 NIDS systems scale well for network protection because the
number of actual workstations, servers, or user systems on
the network is not critical – the amount of traffic is what
matters
 Most network-based IDSs are OS-Independent
 Provide better security against DOS attacks
19
NIDS (cont)
Disadvantages
 Cannot scan protocols or content if network traffic is
encrypted
 Intrusion detection becomes more difficult on modern
switched networks
 Current network-based monitoring approaches cannot
efficiently handle high-speed networks
 Most of Network-based systems are based on predefined
attack signatures--signatures that will always be a step
behind the latest underground exploits
20
HYBRID
 Although the two types of Intrusion Detection Systems
differ significantly from each other, but they also
complement each other.
 Such a system can target activity at any or all levels
 It is easier to see patterns of attacks over time and across the
network space
 No proven industry standards with regards to
interoperability of intrusion detection components
 Hybrid systems are difficult to manage and deploy
21
INTRUSION DETECTION
TECHNIQUES
 MISUSE DETECTION (SIGNATUREMISUSE DETECTION (SIGNATURE
ANALYSIS)ANALYSIS)
1. PATTERN MATCHING
2. STATEFUL PATTERN MATCHING
3. PROTOCOL DECODE BASED ANALYSIS
4. HEURISTIC BASED ANALYSIS
 TARGET MONITORINGTARGET MONITORING
22
INTRUSION DETECTION
TECHNIQUES (cont)
 ANOMALY DETECTIONANOMALY DETECTION
1. STATISTICAL APPROACH
2. PREDICTIVE PATTERN GENERATION
3. NEURAL NETWORKS
 STEALTH PROBESSTEALTH PROBES
23
IDS is not a SILVER BULLETSILVER BULLET
 cannot conduct investigations of attacks without
human intervention
 cannot intuit the contents of your organizational
security policy
 cannot compensate for weaknesses in network
protocols
 cannot compensate for weak identification and
authentication mechanisms
 capable of monitoring network traffic but to a
certain extent of traffic level
24
Bibliography
[1] “Inoculating The Network”
By Mathias Thurman
EBSCO HOST Research Databases
[2] National Strategy To Secure Cyberspace
Draft September 2002
www.securecyberspace.gov
[3] An Introduction to Intrusion Detection / Assessment
By Rebecca Bace
http://www.icsalabs.com
[4] White paper on “The Science Of Intrusion Detection System
– Attack Identification”
http://www.cisco.com

More Related Content

What's hot

Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
whitehat 'People'
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
LJ PROJECTS
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemSweta Sharma
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
AAKASH S
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
Cleverence Kombe
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
gaurav koriya
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Jowin John Chemban
 
IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPS
Minhaz A V
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
lalithambiga kamaraj
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysisBikrant Gautam
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
Netwax Lab
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
OECLIB Odisha Electronics Control Library
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
k33a
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
David Sweigert
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
Vikram Khanna
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 

What's hot (20)

Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
 
IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPS
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysis
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 

Viewers also liked

Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
shraddha_b
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMApoorv Pandey
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
Paul Green
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
amiable_indian
 
Firewall
Firewall Firewall
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemCodero
 
Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection Systemjohnb0118
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
Trinity Dwarka
 
Intrusion detection systems
Intrusion detection systemsIntrusion detection systems
Intrusion detection systemsSeraphic Nazir
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
Savvius, Inc
 
Encoding Techniques
Encoding TechniquesEncoding Techniques
Encoding Techniques
Goriha Naveed
 
Intrusion Detection System for Applications using Linux Containers
Intrusion Detection System for Applications using Linux ContainersIntrusion Detection System for Applications using Linux Containers
Intrusion Detection System for Applications using Linux Containers
Amr Abed
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networksguest1b5f71
 
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Hassan EL ALLOUSSI
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
Pratik Poddar
 
Intrusion Detection System (IDS) & Disaster Recovery Plan (DRP)
Intrusion Detection System (IDS) & Disaster Recovery Plan (DRP)Intrusion Detection System (IDS) & Disaster Recovery Plan (DRP)
Intrusion Detection System (IDS) & Disaster Recovery Plan (DRP)
VR Talsaniya
 

Viewers also liked (20)

Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
 
Firewall
Firewall Firewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection System
 
PPT
PPTPPT
PPT
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 
Intrusion detection systems
Intrusion detection systemsIntrusion detection systems
Intrusion detection systems
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
 
Encoding Techniques
Encoding TechniquesEncoding Techniques
Encoding Techniques
 
Intrusion Detection System for Applications using Linux Containers
Intrusion Detection System for Applications using Linux ContainersIntrusion Detection System for Applications using Linux Containers
Intrusion Detection System for Applications using Linux Containers
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networks
 
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Intrusion Detection System (IDS) & Disaster Recovery Plan (DRP)
Intrusion Detection System (IDS) & Disaster Recovery Plan (DRP)Intrusion Detection System (IDS) & Disaster Recovery Plan (DRP)
Intrusion Detection System (IDS) & Disaster Recovery Plan (DRP)
 

Similar to Intrusion Detection System

Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detection
editor1knowledgecuddle
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
Eswar Publications
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
researchinventy
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
IOSR Journals
 
Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...
Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...
Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...
IRJET Journal
 
Intrusion dDetection
Intrusion dDetectionIntrusion dDetection
Intrusion dDetection
Aayush Khandelwal
 
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
IIJSRJournal
 
Ijnsa050208
Ijnsa050208Ijnsa050208
Ijnsa050208
IJNSA Journal
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
Education
 
Intrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIntrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring System
IJERA Editor
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013
ijcsbi
 
A STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTIONA STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTION
IAEME Publication
 
A STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTIONA STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTION
IAEME Publication
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
IJNSA Journal
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
ijctet
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
IJNSA Journal
 
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEMNETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
IJORCS
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
ijtsrd
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection System
IOSR Journals
 

Similar to Intrusion Detection System (20)

Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detection
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...
Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...
Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...
 
Intrusion dDetection
Intrusion dDetectionIntrusion dDetection
Intrusion dDetection
 
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
 
Ijnsa050208
Ijnsa050208Ijnsa050208
Ijnsa050208
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Intrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIntrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring System
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013
 
A STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTIONA STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTION
 
A STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTIONA STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTION
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
 
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEMNETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection System
 

Recently uploaded

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 

Recently uploaded (20)

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 

Intrusion Detection System

  • 1. 1 Intrusion Detection Systems PRESENTED BYPRESENTED BY Mohit Chandra BelwalMohit Chandra Belwal
  • 2. 2 Agenda  Background and Necessity  Firewalls  Intrusion Detection Systems (IDS)  Introduction and Benefits  Difference between Firewall and IDS  Types of IDS  Intrusion Detection Techniques  Unrealistic Expectations
  • 3. 3 Historical Facts  May 1996, 10 major agencies, comprising 98% of Federal Budget were attacked with 64%64% of attack success rate  Feb 2000, DOSDOS attacks against world’s largest commercial web sites including yahoo.com and amazon.com.  July 2001, Code RedCode Red virus sweeps across the whole world infecting 150,000150,000 computers in just 1414 hours.  Sept 2001, NIMDANIMDA virus expands itself to computers all across US, lasts for days and attacks over 80,00080,000 computers
  • 4. 4 Points to Ponder  Typical businesses spend only about 0.15% of annual sales on the security needs of their corporate network [1] This amount is even less than most of these companiesThis amount is even less than most of these companies spend on coffee for the staffspend on coffee for the staff  60% of firms do not have a clue about how much these security breaches are costing them [2] Approximately 70 percent of all cyber attacks onApproximately 70 percent of all cyber attacks on enterprise systems are believed to beenterprise systems are believed to be perpetrated by trusted insidersperpetrated by trusted insiders
  • 5. 5 Hackers’ Side Of the Picture
  • 7. 7 First Line of Defense: The Firewall  Primary means of securing a private network against penetration from a public network  An access control device, performing perimeter security by deciding which packets are allowed or denied, and which must be modified before passing  Core of enterprise’s comprehensive security policy  Can monitor all traffic entering and leaving the private network, and alert the IT staff to any attempts to circumvent security or patterns of inappropriate use
  • 9. 9 Types Of Firewall  Basic Router Security;Basic Router Security; includes Access control Lists (ACLs) and Network Address Translation (NAT)  Packet Filtering;Packet Filtering; includes inspection of data packets based on header information, source and destination addresses and ports and message protocol type etc  Stateful Inspections;Stateful Inspections; includes packet inspections based on sessions and tracking of individual connections. Packets are allowed to pass only if associated with a valid session initiated from within the network.  Application Level Gateways;Application Level Gateways; (Proxy servers) protect specific network services by restricting the features and commands that can be accessed from outside the network. Presents reduced feature sets to external users
  • 10. 10 Introduction to IDS  IDSs prepare for and deal with attacks by collecting information from a variety of system and network sources, then analyzing the symptoms of security problems  IDSs serve three essential security functions; monitormonitor, detectdetect and respondrespond to unauthorized activity  IDS can also response automatically (in real-time) to a security breach event such as logging off a user, disabling a user account and launching of some scripts
  • 11. 11 Some of the benefits of IDS  monitors the operation of firewalls, routers, key management servers and files critical to other security mechanisms  allows administrator to tune, organize and comprehend often incomprehensible operating system audit trails and other logs  can make the security management of systems by non-expert staff possible by providing nice user friendly interface  comes with extensive attack signature database against which information from the customers system can be matched  can recognize and report alterations to data files
  • 13. 13 FIREWALL VS IDS (cont)  Firewall cannot detect security breaches associated with traffic that does not pass through it. Only IDS is aware of traffic in the internal network  Not all access to the Internet occurs through the firewall.  Firewall does not inspect the content of the permitted traffic  Firewall is more likely to be attacked more often than IDS  Firewall is usually helpless against tunneling attacks  IDS is capable of monitoring messages from other pieces of security infrastructure
  • 14. 14 TYPES OF IDS 1. HOST – BASED (HIDS) 2. NETWORK – BASED (NIDS) 3. HYBRID
  • 15. 15 HIDS  works in switched network environments  operates in encrypted environments  detects and collects the most relevant information in the quickest possible manner  tracks behavior changes associated with misuse.  requires the use of the resources of a host server – disk space, RAM and CPU time  Does not protect entire infrastructure
  • 16. 16 NIDS PASSIVE Interface to Network Traffic
  • 18. 18 NIDS (cont) Advantages  NIDS uses a passive interface to capture network packets for analyzing.  NIDS sensors placed around the globe can be configured to report back to a central site, enabling a small team of security experts to support a large enterprise.  NIDS systems scale well for network protection because the number of actual workstations, servers, or user systems on the network is not critical – the amount of traffic is what matters  Most network-based IDSs are OS-Independent  Provide better security against DOS attacks
  • 19. 19 NIDS (cont) Disadvantages  Cannot scan protocols or content if network traffic is encrypted  Intrusion detection becomes more difficult on modern switched networks  Current network-based monitoring approaches cannot efficiently handle high-speed networks  Most of Network-based systems are based on predefined attack signatures--signatures that will always be a step behind the latest underground exploits
  • 20. 20 HYBRID  Although the two types of Intrusion Detection Systems differ significantly from each other, but they also complement each other.  Such a system can target activity at any or all levels  It is easier to see patterns of attacks over time and across the network space  No proven industry standards with regards to interoperability of intrusion detection components  Hybrid systems are difficult to manage and deploy
  • 21. 21 INTRUSION DETECTION TECHNIQUES  MISUSE DETECTION (SIGNATUREMISUSE DETECTION (SIGNATURE ANALYSIS)ANALYSIS) 1. PATTERN MATCHING 2. STATEFUL PATTERN MATCHING 3. PROTOCOL DECODE BASED ANALYSIS 4. HEURISTIC BASED ANALYSIS  TARGET MONITORINGTARGET MONITORING
  • 22. 22 INTRUSION DETECTION TECHNIQUES (cont)  ANOMALY DETECTIONANOMALY DETECTION 1. STATISTICAL APPROACH 2. PREDICTIVE PATTERN GENERATION 3. NEURAL NETWORKS  STEALTH PROBESSTEALTH PROBES
  • 23. 23 IDS is not a SILVER BULLETSILVER BULLET  cannot conduct investigations of attacks without human intervention  cannot intuit the contents of your organizational security policy  cannot compensate for weaknesses in network protocols  cannot compensate for weak identification and authentication mechanisms  capable of monitoring network traffic but to a certain extent of traffic level
  • 24. 24 Bibliography [1] “Inoculating The Network” By Mathias Thurman EBSCO HOST Research Databases [2] National Strategy To Secure Cyberspace Draft September 2002 www.securecyberspace.gov [3] An Introduction to Intrusion Detection / Assessment By Rebecca Bace http://www.icsalabs.com [4] White paper on “The Science Of Intrusion Detection System – Attack Identification” http://www.cisco.com