SlideShare a Scribd company logo
1 of 21
Principles of Information Security,
Fifth Edition
Chapter 7
Security Technology: Intrusion
Detection and Prevention Systems,
and Other Security Tools
Do not wait; the time will never be just right. Start where you stand and
work with whatever tools you may have at your command, and better
tools will be found as you go along.
NAPOLEON HILL (1883–1970) FOUNDER OF THE SCIENCE of SUCCESS
Lesson 2
- IDPS
Learning Objectives
• Upon completion of this material, you should be
able to:
– Identify and describe the categories and models of
intrusion detection and prevention systems
– Describe the detection approaches employed by
modern intrusion detection and prevention systems
– Define and describe honeypots, honeynets, and
padded cell systems
– List and define the major categories of scanning and
analysis tools, and describe the specific tools used
within each category
Principles of Information Security, Fifth Edition 2
IDPS Detection Methods
• Signature-based detection
– Examines network traffic in search of patterns that
match known signatures
– Widely used because many attacks have clear and
distinct signatures
– Problem with this approach is that new attack
patterns must continually be added to IDPS’s
database of signatures.
• Slow, methodical attack involving multiple events
might escape detection.
Principles of Information Security, Fifth Edition 3
IDPS Detection Methods (cont’d)
• Anomaly-based detection
– Anomaly-based detection (or behavior-based
detection) collects statistical summaries by
observing traffic known to be normal.
– When measured activity is outside baseline
parameters or clipping level, IDPS sends alert to
administrator.
– IDPS can detect new types of attacks.
– Requires much more overhead and processing
capacity than signature-based detection
– May generate many false positives
Principles of Information Security, Fifth Edition 4
IDPS Detection Methods (cont’d)
• Stateful protocol analysis
– SPA: process of comparing known normal/benign
protocol profiles against observed traffic
– Stores and uses relevant data detected in a session to
identify intrusions involving multiple requests
/responses; allows IDPS to better detect specialized,
multisession attacks (also called deep packet
inspection)
– Drawbacks: analytical complexity; heavy processing
overhead; may fail to detect intrusion unless protocol
violates fundamental behavior; may interfere with
normal operations of protocol
Principles of Information Security, Fifth Edition 5
IDPS Detection Methods (cont’d)
• Log file monitors
– Log file monitor (LFM) similar to NIDPS
– Reviews log files generated by servers, network
devices, and even other IDPSs for patterns and
signatures
– Patterns that signify attack may be much easier to
identify when entire network and its systems are
viewed as a whole
– Requires considerable resources since it involves
the collection, movement, storage, and analysis of
large quantities of log data
Principles of Information Security, Fifth Edition 6
IDPS Response Behavior
• IDPS response to external stimulation depends on the
configuration and function; many response options are
available.
• IDPS responses can be classified as active or passive.
– Active response: collecting additional information about the
intrusion, modifying the network environment, taking action
against the intrusion
– Passive response: setting off alarms or notifications, collecting
passive data through SNMP traps
• Many IDPSs can generate routine reports and other
detailed documents.
• Failsafe features protect IDPS from being
circumvented.
Principles of Information Security, Fifth Edition 7
Selecting IDPS Approaches and
Products
• Technical and policy considerations
– What is your systems environment?
– What are your security goals and objectives?
– What is your existing security policy?
• Organizational requirements and constraints
– What requirements are levied from outside the
organization?
– What are your organization’s resource constraints?
Principles of Information Security, Fifth Edition 8
Selecting IDPS Approaches and
Products (cont’d)
• IDPSs product features and quality
– Is the product sufficiently scalable for your
environment?
– How has the product been tested?
– What user level of expertise is targeted by the
product?
– Is the product designed to evolve as the organization
grows?
– What are the support provisions for the product?
Principles of Information Security, Fifth Edition 9
Strengths and Limitations of IDPSs
• IDPSs perform the following functions well:
– Monitoring and analysis of system events and user
behaviors
– Testing security states of system configurations
– Baselining security state of system and tracking
changes
– Recognizing patterns of system events
corresponding to known attacks
– Recognizing activity patterns that vary from normal
activity
Principles of Information Security, Fifth Edition 10
Strengths and Limitations of IDPSs
(cont’d)
• IDPSs perform the following functions well: (cont’d)
– Managing OS audit and logging mechanisms and
data they generate
– Alerting appropriate staff when attacks are detected
– Measuring enforcement of security policies encoded
in analysis engine
– Providing default information on security policies
– Allowing non-security experts to perform important
security monitoring functions
Principles of Information Security, Fifth Edition 11
Strengths and Limitations of IDPSs
(cont’d)
• IDPSs cannot perform the following functions:
– Compensating for weak/missing security
mechanisms in protection infrastructure
– Instantaneously detecting, reporting, responding to
attack when there is heavy network or processing
load
– Detecting new attacks or variants of existing attacks
– Effectively responding to attacks by sophisticated
attackers
– Automatically investigating attacks without human
intervention
Principles of Information Security, Fifth Edition 12
Strengths and Limitations of IDPSs
(cont’d)
• IDPSs cannot perform the following functions
(cont’d):
– Resisting attacks intended to defeat or circumvent
them
– Compensating for problems with fidelity of
information sources
– Dealing effectively with switched networks
Principles of Information Security, Fifth Edition 13
Deployment and Implementation of an
IDPS
• An IDPS can be implemented via one of three
basic control strategies:
– Centralized: All IDPS control functions are
implemented and managed in a central location.
– Fully distributed: All control functions are applied at
the physical location of each IDPS component.
– Partially distributed: Combines the two; while
individual agents can still analyze and respond to
local threats, they report to a hierarchical central
facility to enable organization to detect widespread
attacks.
Principles of Information Security, Fifth Edition 14
Principles of Information Security, Fifth Edition 15
Principles of Information Security, Fifth Edition 16
Principles of Information Security, Fifth Edition 17
Deployment and Implementation of an
IDPS (cont’d)
• IDPS deployment
– Great care must be taken when deciding where to
locate components.
– Planners must select deployment strategy that is
based on careful analysis of organization’s
information security requirements and causes
minimal impact.
– NIDPS and HIDPS can be used in tandem to cover
individual systems that connect to an organization’s
network and networks themselves.
Principles of Information Security, Fifth Edition 18
Deployment and Implementation of an
IDPS (cont’d)
• Deploying network-based IDPSs
– NIST recommends four locations for NIDPS sensors
• Location 1: Behind each external firewall, in the
network DMZ
• Location 2: Outside an external firewall
• Location 3: On major network backbones
• Location 4: On critical subnets
Principles of Information Security, Fifth Edition 19
Principles of Information Security, Fifth Edition 20
Deployment and Implementation of an
IDPS (cont’d)
• Deploying host-based IDPSs
– Proper implementation of HIDPSs can be a
painstaking and time-consuming task.
– Deployment begins with implementing most critical
systems first.
– Installation continues until either all systems are
installed or the organization reaches planned degree
of coverage it will accept.
Principles of Information Security, Fifth Edition 21

More Related Content

What's hot

Computer forensics
Computer forensicsComputer forensics
Computer forensics
Hiren Selani
 
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
Lecture 4,5, 6 comp forensics 19 9-2018 basic securityLecture 4,5, 6 comp forensics 19 9-2018 basic security
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
Alchemist095
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Sundas Kayani
 

What's hot (20)

Soc
SocSoc
Soc
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
Lecture 4,5, 6 comp forensics 19 9-2018 basic securityLecture 4,5, 6 comp forensics 19 9-2018 basic security
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
 
CNIT 152 12 Investigating Windows Systems (Part 1 of 3)
CNIT 152 12 Investigating Windows Systems (Part 1 of 3)CNIT 152 12 Investigating Windows Systems (Part 1 of 3)
CNIT 152 12 Investigating Windows Systems (Part 1 of 3)
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
Process injection - Malware style
Process injection - Malware styleProcess injection - Malware style
Process injection - Malware style
 
The information security audit
The information security auditThe information security audit
The information security audit
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
CNIT 152: 1 Real-World Incidents
CNIT 152: 1 Real-World IncidentsCNIT 152: 1 Real-World Incidents
CNIT 152: 1 Real-World Incidents
 
CISSP - Software Development Security
CISSP - Software Development SecurityCISSP - Software Development Security
CISSP - Software Development Security
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
 

Similar to Lesson 2

FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.pptFALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
useonlyfortech140
 
FALLSEM2023-24_CSE3501_ETH_VL2023240102981_2023-09-04_Reference-Material-I.pdf
FALLSEM2023-24_CSE3501_ETH_VL2023240102981_2023-09-04_Reference-Material-I.pdfFALLSEM2023-24_CSE3501_ETH_VL2023240102981_2023-09-04_Reference-Material-I.pdf
FALLSEM2023-24_CSE3501_ETH_VL2023240102981_2023-09-04_Reference-Material-I.pdf
thilakrajc
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
Nuuko, Inc.
 
Why Use an IDPSSolutionPurpose and ScopeThis publication se.pdf
Why Use an IDPSSolutionPurpose and ScopeThis publication se.pdfWhy Use an IDPSSolutionPurpose and ScopeThis publication se.pdf
Why Use an IDPSSolutionPurpose and ScopeThis publication se.pdf
expressionnoveltiesk
 

Similar to Lesson 2 (20)

Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Computer Security: Principles of Information Security
Computer Security: Principles of Information SecurityComputer Security: Principles of Information Security
Computer Security: Principles of Information Security
 
Lesson 1- Intrusion Detection
Lesson 1- Intrusion DetectionLesson 1- Intrusion Detection
Lesson 1- Intrusion Detection
 
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.pptFALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
 
FALLSEM2023-24_CSE3501_ETH_VL2023240102981_2023-09-04_Reference-Material-I.pdf
FALLSEM2023-24_CSE3501_ETH_VL2023240102981_2023-09-04_Reference-Material-I.pdfFALLSEM2023-24_CSE3501_ETH_VL2023240102981_2023-09-04_Reference-Material-I.pdf
FALLSEM2023-24_CSE3501_ETH_VL2023240102981_2023-09-04_Reference-Material-I.pdf
 
Intrusion .ppt
Intrusion .pptIntrusion .ppt
Intrusion .ppt
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solution
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
ch03.pptx
ch03.pptxch03.pptx
ch03.pptx
 
Intrusion detection and prevention systems.pdf
Intrusion detection and prevention systems.pdfIntrusion detection and prevention systems.pdf
Intrusion detection and prevention systems.pdf
 
9780840024220 ppt ch06
9780840024220 ppt ch069780840024220 ppt ch06
9780840024220 ppt ch06
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
Idps
IdpsIdps
Idps
 
A Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemA Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection System
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
 
Why Use an IDPSSolutionPurpose and ScopeThis publication se.pdf
Why Use an IDPSSolutionPurpose and ScopeThis publication se.pdfWhy Use an IDPSSolutionPurpose and ScopeThis publication se.pdf
Why Use an IDPSSolutionPurpose and ScopeThis publication se.pdf
 

More from MLG College of Learning, Inc (20)

PC111.Lesson2
PC111.Lesson2PC111.Lesson2
PC111.Lesson2
 
PC111.Lesson1
PC111.Lesson1PC111.Lesson1
PC111.Lesson1
 
PC111-lesson1.pptx
PC111-lesson1.pptxPC111-lesson1.pptx
PC111-lesson1.pptx
 
PC LEESOON 6.pptx
PC LEESOON 6.pptxPC LEESOON 6.pptx
PC LEESOON 6.pptx
 
PC 106 PPT-09.pptx
PC 106 PPT-09.pptxPC 106 PPT-09.pptx
PC 106 PPT-09.pptx
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
PC 106 PPT-01
PC 106 PPT-01PC 106 PPT-01
PC 106 PPT-01
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
PC 106 PPT-05
PC 106 PPT-05PC 106 PPT-05
PC 106 PPT-05
 
PC 106 Slide 04
PC 106 Slide 04PC 106 Slide 04
PC 106 Slide 04
 
PC 106 Slide no.02
PC 106 Slide no.02PC 106 Slide no.02
PC 106 Slide no.02
 
pc-106-slide-3
pc-106-slide-3pc-106-slide-3
pc-106-slide-3
 
PC 106 Slide 2
PC 106 Slide 2PC 106 Slide 2
PC 106 Slide 2
 
PC 106 Slide 1.pptx
PC 106 Slide 1.pptxPC 106 Slide 1.pptx
PC 106 Slide 1.pptx
 
Db2 characteristics of db ms
Db2 characteristics of db msDb2 characteristics of db ms
Db2 characteristics of db ms
 
Db1 introduction
Db1 introductionDb1 introduction
Db1 introduction
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
Lesson 3.1
Lesson 3.1Lesson 3.1
Lesson 3.1
 
Lesson 1.6
Lesson 1.6Lesson 1.6
Lesson 1.6
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Lesson 2

  • 1. Principles of Information Security, Fifth Edition Chapter 7 Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools Do not wait; the time will never be just right. Start where you stand and work with whatever tools you may have at your command, and better tools will be found as you go along. NAPOLEON HILL (1883–1970) FOUNDER OF THE SCIENCE of SUCCESS Lesson 2 - IDPS
  • 2. Learning Objectives • Upon completion of this material, you should be able to: – Identify and describe the categories and models of intrusion detection and prevention systems – Describe the detection approaches employed by modern intrusion detection and prevention systems – Define and describe honeypots, honeynets, and padded cell systems – List and define the major categories of scanning and analysis tools, and describe the specific tools used within each category Principles of Information Security, Fifth Edition 2
  • 3. IDPS Detection Methods • Signature-based detection – Examines network traffic in search of patterns that match known signatures – Widely used because many attacks have clear and distinct signatures – Problem with this approach is that new attack patterns must continually be added to IDPS’s database of signatures. • Slow, methodical attack involving multiple events might escape detection. Principles of Information Security, Fifth Edition 3
  • 4. IDPS Detection Methods (cont’d) • Anomaly-based detection – Anomaly-based detection (or behavior-based detection) collects statistical summaries by observing traffic known to be normal. – When measured activity is outside baseline parameters or clipping level, IDPS sends alert to administrator. – IDPS can detect new types of attacks. – Requires much more overhead and processing capacity than signature-based detection – May generate many false positives Principles of Information Security, Fifth Edition 4
  • 5. IDPS Detection Methods (cont’d) • Stateful protocol analysis – SPA: process of comparing known normal/benign protocol profiles against observed traffic – Stores and uses relevant data detected in a session to identify intrusions involving multiple requests /responses; allows IDPS to better detect specialized, multisession attacks (also called deep packet inspection) – Drawbacks: analytical complexity; heavy processing overhead; may fail to detect intrusion unless protocol violates fundamental behavior; may interfere with normal operations of protocol Principles of Information Security, Fifth Edition 5
  • 6. IDPS Detection Methods (cont’d) • Log file monitors – Log file monitor (LFM) similar to NIDPS – Reviews log files generated by servers, network devices, and even other IDPSs for patterns and signatures – Patterns that signify attack may be much easier to identify when entire network and its systems are viewed as a whole – Requires considerable resources since it involves the collection, movement, storage, and analysis of large quantities of log data Principles of Information Security, Fifth Edition 6
  • 7. IDPS Response Behavior • IDPS response to external stimulation depends on the configuration and function; many response options are available. • IDPS responses can be classified as active or passive. – Active response: collecting additional information about the intrusion, modifying the network environment, taking action against the intrusion – Passive response: setting off alarms or notifications, collecting passive data through SNMP traps • Many IDPSs can generate routine reports and other detailed documents. • Failsafe features protect IDPS from being circumvented. Principles of Information Security, Fifth Edition 7
  • 8. Selecting IDPS Approaches and Products • Technical and policy considerations – What is your systems environment? – What are your security goals and objectives? – What is your existing security policy? • Organizational requirements and constraints – What requirements are levied from outside the organization? – What are your organization’s resource constraints? Principles of Information Security, Fifth Edition 8
  • 9. Selecting IDPS Approaches and Products (cont’d) • IDPSs product features and quality – Is the product sufficiently scalable for your environment? – How has the product been tested? – What user level of expertise is targeted by the product? – Is the product designed to evolve as the organization grows? – What are the support provisions for the product? Principles of Information Security, Fifth Edition 9
  • 10. Strengths and Limitations of IDPSs • IDPSs perform the following functions well: – Monitoring and analysis of system events and user behaviors – Testing security states of system configurations – Baselining security state of system and tracking changes – Recognizing patterns of system events corresponding to known attacks – Recognizing activity patterns that vary from normal activity Principles of Information Security, Fifth Edition 10
  • 11. Strengths and Limitations of IDPSs (cont’d) • IDPSs perform the following functions well: (cont’d) – Managing OS audit and logging mechanisms and data they generate – Alerting appropriate staff when attacks are detected – Measuring enforcement of security policies encoded in analysis engine – Providing default information on security policies – Allowing non-security experts to perform important security monitoring functions Principles of Information Security, Fifth Edition 11
  • 12. Strengths and Limitations of IDPSs (cont’d) • IDPSs cannot perform the following functions: – Compensating for weak/missing security mechanisms in protection infrastructure – Instantaneously detecting, reporting, responding to attack when there is heavy network or processing load – Detecting new attacks or variants of existing attacks – Effectively responding to attacks by sophisticated attackers – Automatically investigating attacks without human intervention Principles of Information Security, Fifth Edition 12
  • 13. Strengths and Limitations of IDPSs (cont’d) • IDPSs cannot perform the following functions (cont’d): – Resisting attacks intended to defeat or circumvent them – Compensating for problems with fidelity of information sources – Dealing effectively with switched networks Principles of Information Security, Fifth Edition 13
  • 14. Deployment and Implementation of an IDPS • An IDPS can be implemented via one of three basic control strategies: – Centralized: All IDPS control functions are implemented and managed in a central location. – Fully distributed: All control functions are applied at the physical location of each IDPS component. – Partially distributed: Combines the two; while individual agents can still analyze and respond to local threats, they report to a hierarchical central facility to enable organization to detect widespread attacks. Principles of Information Security, Fifth Edition 14
  • 15. Principles of Information Security, Fifth Edition 15
  • 16. Principles of Information Security, Fifth Edition 16
  • 17. Principles of Information Security, Fifth Edition 17
  • 18. Deployment and Implementation of an IDPS (cont’d) • IDPS deployment – Great care must be taken when deciding where to locate components. – Planners must select deployment strategy that is based on careful analysis of organization’s information security requirements and causes minimal impact. – NIDPS and HIDPS can be used in tandem to cover individual systems that connect to an organization’s network and networks themselves. Principles of Information Security, Fifth Edition 18
  • 19. Deployment and Implementation of an IDPS (cont’d) • Deploying network-based IDPSs – NIST recommends four locations for NIDPS sensors • Location 1: Behind each external firewall, in the network DMZ • Location 2: Outside an external firewall • Location 3: On major network backbones • Location 4: On critical subnets Principles of Information Security, Fifth Edition 19
  • 20. Principles of Information Security, Fifth Edition 20
  • 21. Deployment and Implementation of an IDPS (cont’d) • Deploying host-based IDPSs – Proper implementation of HIDPSs can be a painstaking and time-consuming task. – Deployment begins with implementing most critical systems first. – Installation continues until either all systems are installed or the organization reaches planned degree of coverage it will accept. Principles of Information Security, Fifth Edition 21