SlideShare a Scribd company logo
Presented by: Tufail(130228)
2Central University of kashmir
In early study of Intrusion Anderson identified three
classes of Intruders:
Masqueraders: An individual who is not authorized to
use the computer & who penetrates a systems access
controls to exploit a legitimate user’s account.
Misfeasor: A legitimate user who accesses data programs
or resources for which such access is not authorized , or
who is authorized for such access but misuses his/her
privileges.
Clandestine User: An individual who seizes supervisory
control of the system & uses this control to evade auditing
& access controls or to suppress audit actions.
3Central University of kashmir
Central University of kashmir 4
Intrusion detection: is the process of monitoring the events
occurring in a computer system or network and analyzing them
for signs of possible intrusions (incidents).
Intrusion detection system (IDS): is software that automates
the intrusion detection process. The primary responsibility of
an IDS is to detect unwanted and malicious activities.
Intrusion prevention system (IPS): is software that has all the
capabilities of an intrusion detection system and can also
attempt to stop possible incidents.
Intrusion Detection & prevention System (IDPS): evaluates a
suspected intrusion once it has taken place ,signals an alarm&
makes attempts to stop it. It watches for activities specifically
designed to be overlooked by Firewall’s filtering rules.
5Central University of kashmir
Unauthorized access to the resources
Password cracking
Spoofing e.g. DNS spoofing
Scanning ports & services
Network packet listening
Stealing information
Unauthorized network access
Uses of IT resources for private purpose
Unauthorized alternation of resources
Falsification of identity
Information altering and deletion
Unauthorized transmission and creation of data
Configuration changes to systems and n/w services
6Central University of kashmir
Denial of Service
Flooding
Ping flood
Mail flood
Compromising system
Buffer overflow
Remote system shutdown
Web application attack
“Most attacks are not a single attack but a series of
individual events developed in coordinated manner”
7Central University of kashmir
Central University of kashmir 8
Central University of kashmir 9
10Central University of kashmir
Audit Data
Preprocessor
Audit Records
Activity Data
Detection
Models
Detection Engine
Alarms
Decision
Table
Decision Engine
Action/Report
system activities aresystem activities are
observableobservable
normal and intrusivenormal and intrusive
activities have distinctactivities have distinct
evidenceevidence
These are three models of intrusion detection
mechanisms:
• Anomaly detection (statistical based)
• Misuse Detection (Signature-based)
• Hybrid detection.
12Central University of kashmir
1)Misuse Detection: The misuse detection concept assumes that
each intrusive activity is representable by a unique pattern
or a signature so that slight variations of the same activity
produce a new signature and therefore can also be detected.
They work by looking for a specific signature on a system.
Identification engines perform well by monitoring these
patterns of known misuse of system resources.
 Examples:
A telnet attempt with a username of “root”, which is a violation of an
organization’s security policy
An e-mail with a subject of “Free pictures!” and an attachment
filename of “freepics.exe”, which are characteristics of a known form
of malware
13Central University of kashmir
2)Anomaly detection: monitors network traffic and
compare it against an established baseline. The
baseline will identify what is “normal” for that
network- what sort of bandwidth is generally used,
what protocols are used, what ports and devices
generally connect to each other- and alert the
administrator or user when traffic is detected which is
anomalous, or significantly different, than the
baseline. The issue is that it may raise a False Positive
alarm for a legitimate use of bandwidth if the
baselines are not intelligently configured.
14Central University of kashmir
True Positive: : Attack - Alert
False Positive: : No attack - Alert
False Negative: : Attack - No Alert
True Negative: : No attack - No Alert
15Central University of kashmir
IDPS  are  classified  based  on  their  monitoring 
scope. They are:
1) network-based intrusion detection and
2) host-based detections. 
Network-Based  Intrusion  Detection    Systems 
(NIDSs)/NDPS
NIDSs  have  the  whole  network  as  the  monitoring 
scope.  They    monitor  the  traffic  on  the  network  to 
detect    intrusions.   They  are  responsible  for  detecting 
anomalous,  inappropriate,  or  other  data  that  may  be 
considered  unauthorized   and  harmful occurring  on a 
network. 
16Central University of kashmir
17Central University of kashmir
misuse is not confirmed only to  the “bad” outsiders but 
the problem is more rampart within organizations.  To 
tackle  this  problem,  security  experts  have  turned  to 
inspection of systems within an organization network. 
This  local  inspection  of systems  is  called      host-based 
intrusion detection  systems (HIDS). 
Host-based  intrusion  detection  is  the  technique  of 
detecting malicious activities on a single computer. 
18Central University of kashmir
A  HIDS,  is  therefore,  deployed  on  a  single  target 
computer and it  uses software that monitors operating 
system  specific  logs    including  system,  event,  and 
security  logs on Windows  systems and syslog in Unix 
environments to monitor sudden changes in these logs. 
When  a  change  is  detected  in  any  of  these  files,  the 
HIDS  compares  the  new  log  entry  with  its  configured 
attack signatures to see if there is a match. If a match is 
detected  then  this  signals  the  presence  of  an 
illegitimate activity. 
19Central University of kashmir
20Central University of kashmir
A honeypot is a system designed to look like something 
that an intruder can hack. 
 to deceive attackers  and learn  about their tools and 
methods. 
Honeypots are  also add-on/tools  that are not strictly 
sniffer-based intrusion detection systems like HIDS and 
NIDS. However, they are good deception systems that  
protect  the    network  in  much  the  same  way  as  HIDS 
and NIDS.  
Since  the  goal  for  a  honeypot  is  to  deceive  intruders 
and  learn  from  them  without  compromising  the 
security of the network, then it is important to find a 
strategic place for the honeypot. In the DMZ for those 
networks with DMZs or behind the network firewall  if 
the private network does not have a DMZ.
21Central University of kashmir
22Central University of kashmir
A honey pot is a system that is deliberately named
and configured so as to invite attack
swift-terminal.bigbank.com
www-transact.site.com
source-r-us.company.com
admincenter.noc.company.net
23Central University of kashmir
24Central University of kashmir
25Central University of kashmir
26Central University of kashmir

More Related Content

What's hot

intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
Aj Maurya
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
Gaurang Rathod
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
Dr Raghu Khimani
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
Sam Bowne
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
Ramiro Cid
 
Network forensic
Network forensicNetwork forensic
Network forensic
Manjushree Mashal
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7limsh
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
gaurav koriya
 
Security models
Security models Security models
Security models
LJ PROJECTS
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipher
Vaibhav Khanna
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
Papun Papun
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
Denial of service
Denial of serviceDenial of service
Denial of service
garishma bhatia
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
ANIKETKUMARSHARMA3
 
Access Controls
Access ControlsAccess Controls
Access Controls
primeteacher32
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
BharathiKrishna6
 

What's hot (20)

intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
Reconnaissance
ReconnaissanceReconnaissance
Reconnaissance
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Security models
Security models Security models
Security models
 
Firewalls
FirewallsFirewalls
Firewalls
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipher
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Access Controls
Access ControlsAccess Controls
Access Controls
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 

Viewers also liked

Intruders
IntrudersIntruders
Intruderstechn
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9koolkampus
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
rajakhurram
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
Khaleel Assadi
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
Khaleel Assadi
 
Virus detection system
Virus detection systemVirus detection system
Virus detection system
Akshay Surve
 
Secret sharing schemes
Secret sharing schemesSecret sharing schemes
Secret sharing schemeswonloser
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
Animesh Shaw
 
Intruders GOD
Intruders GODIntruders GOD
Intruders GOD
Margaux MONGILLON
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
Smart card
Smart cardSmart card
Smart card
Santosh Khadsare
 

Viewers also liked (18)

Intruders
IntrudersIntruders
Intruders
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Intruders
IntrudersIntruders
Intruders
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Virus detection system
Virus detection systemVirus detection system
Virus detection system
 
Secret sharing schemes
Secret sharing schemesSecret sharing schemes
Secret sharing schemes
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
biometrics
biometricsbiometrics
biometrics
 
Smart cards
Smart cards Smart cards
Smart cards
 
Intruders GOD
Intruders GODIntruders GOD
Intruders GOD
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
Ppt Smart Card
Ppt Smart CardPpt Smart Card
Ppt Smart Card
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Smart card
Smart cardSmart card
Smart card
 

Similar to intruders types ,detection & prevention

Intrusiond and detection
Intrusiond and detectionIntrusiond and detection
Intrusiond and detection
Piyu Karande
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
IJMER
 
Autonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer NetworksAutonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer Networks
ijsrd.com
 
idps
idpsidps
idps
iskrene
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
IJERA Editor
 
Detecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkDetecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian Network
IOSR Journals
 
A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And Techniques
Kelly Taylor
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logicijdpsjournal
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
IJNSA Journal
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
IJNSA Journal
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
ieijjournal
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
ieijjournal1
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
ijcsit
 
An introduction to intrusion detection systems
An introduction to intrusion detection systemsAn introduction to intrusion detection systems
An introduction to intrusion detection systemsUltraUploader
 
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
IRJET Journal
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
IJNSA Journal
 
Idps
IdpsIdps
Idps
iskrena
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
IJERA Editor
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
IJERA Editor
 
A Study of Intrusion Detection System Methods in Computer Networks
A Study of Intrusion Detection System Methods in Computer NetworksA Study of Intrusion Detection System Methods in Computer Networks
A Study of Intrusion Detection System Methods in Computer Networks
Editor IJCATR
 

Similar to intruders types ,detection & prevention (20)

Intrusiond and detection
Intrusiond and detectionIntrusiond and detection
Intrusiond and detection
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
 
Autonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer NetworksAutonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer Networks
 
idps
idpsidps
idps
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
 
Detecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkDetecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian Network
 
A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And Techniques
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
 
An introduction to intrusion detection systems
An introduction to intrusion detection systemsAn introduction to intrusion detection systems
An introduction to intrusion detection systems
 
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
 
Idps
IdpsIdps
Idps
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
A Study of Intrusion Detection System Methods in Computer Networks
A Study of Intrusion Detection System Methods in Computer NetworksA Study of Intrusion Detection System Methods in Computer Networks
A Study of Intrusion Detection System Methods in Computer Networks
 

intruders types ,detection & prevention

  • 3. In early study of Intrusion Anderson identified three classes of Intruders: Masqueraders: An individual who is not authorized to use the computer & who penetrates a systems access controls to exploit a legitimate user’s account. Misfeasor: A legitimate user who accesses data programs or resources for which such access is not authorized , or who is authorized for such access but misuses his/her privileges. Clandestine User: An individual who seizes supervisory control of the system & uses this control to evade auditing & access controls or to suppress audit actions. 3Central University of kashmir
  • 5. Intrusion detection: is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible intrusions (incidents). Intrusion detection system (IDS): is software that automates the intrusion detection process. The primary responsibility of an IDS is to detect unwanted and malicious activities. Intrusion prevention system (IPS): is software that has all the capabilities of an intrusion detection system and can also attempt to stop possible incidents. Intrusion Detection & prevention System (IDPS): evaluates a suspected intrusion once it has taken place ,signals an alarm& makes attempts to stop it. It watches for activities specifically designed to be overlooked by Firewall’s filtering rules. 5Central University of kashmir
  • 6. Unauthorized access to the resources Password cracking Spoofing e.g. DNS spoofing Scanning ports & services Network packet listening Stealing information Unauthorized network access Uses of IT resources for private purpose Unauthorized alternation of resources Falsification of identity Information altering and deletion Unauthorized transmission and creation of data Configuration changes to systems and n/w services 6Central University of kashmir
  • 7. Denial of Service Flooding Ping flood Mail flood Compromising system Buffer overflow Remote system shutdown Web application attack “Most attacks are not a single attack but a series of individual events developed in coordinated manner” 7Central University of kashmir
  • 11. Audit Data Preprocessor Audit Records Activity Data Detection Models Detection Engine Alarms Decision Table Decision Engine Action/Report system activities aresystem activities are observableobservable normal and intrusivenormal and intrusive activities have distinctactivities have distinct evidenceevidence
  • 12. These are three models of intrusion detection mechanisms: • Anomaly detection (statistical based) • Misuse Detection (Signature-based) • Hybrid detection. 12Central University of kashmir
  • 13. 1)Misuse Detection: The misuse detection concept assumes that each intrusive activity is representable by a unique pattern or a signature so that slight variations of the same activity produce a new signature and therefore can also be detected. They work by looking for a specific signature on a system. Identification engines perform well by monitoring these patterns of known misuse of system resources.  Examples: A telnet attempt with a username of “root”, which is a violation of an organization’s security policy An e-mail with a subject of “Free pictures!” and an attachment filename of “freepics.exe”, which are characteristics of a known form of malware 13Central University of kashmir
  • 14. 2)Anomaly detection: monitors network traffic and compare it against an established baseline. The baseline will identify what is “normal” for that network- what sort of bandwidth is generally used, what protocols are used, what ports and devices generally connect to each other- and alert the administrator or user when traffic is detected which is anomalous, or significantly different, than the baseline. The issue is that it may raise a False Positive alarm for a legitimate use of bandwidth if the baselines are not intelligently configured. 14Central University of kashmir
  • 15. True Positive: : Attack - Alert False Positive: : No attack - Alert False Negative: : Attack - No Alert True Negative: : No attack - No Alert 15Central University of kashmir
  • 16. IDPS  are  classified  based  on  their  monitoring  scope. They are: 1) network-based intrusion detection and 2) host-based detections.  Network-Based  Intrusion  Detection    Systems  (NIDSs)/NDPS NIDSs  have  the  whole  network  as  the  monitoring  scope.  They    monitor  the  traffic  on  the  network  to  detect    intrusions.   They  are  responsible  for  detecting  anomalous,  inappropriate,  or  other  data  that  may  be  considered  unauthorized   and  harmful occurring  on a  network.  16Central University of kashmir
  • 18. misuse is not confirmed only to  the “bad” outsiders but  the problem is more rampart within organizations.  To  tackle  this  problem,  security  experts  have  turned  to  inspection of systems within an organization network.  This  local  inspection  of systems  is  called      host-based  intrusion detection  systems (HIDS).  Host-based  intrusion  detection  is  the  technique  of  detecting malicious activities on a single computer.  18Central University of kashmir
  • 19. A  HIDS,  is  therefore,  deployed  on  a  single  target  computer and it  uses software that monitors operating  system  specific  logs    including  system,  event,  and  security  logs on Windows  systems and syslog in Unix  environments to monitor sudden changes in these logs.  When  a  change  is  detected  in  any  of  these  files,  the  HIDS  compares  the  new  log  entry  with  its  configured  attack signatures to see if there is a match. If a match is  detected  then  this  signals  the  presence  of  an  illegitimate activity.  19Central University of kashmir
  • 21. A honeypot is a system designed to look like something  that an intruder can hack.   to deceive attackers  and learn  about their tools and  methods.  Honeypots are  also add-on/tools  that are not strictly  sniffer-based intrusion detection systems like HIDS and  NIDS. However, they are good deception systems that   protect  the    network  in  much  the  same  way  as  HIDS  and NIDS.   Since  the  goal  for  a  honeypot  is  to  deceive  intruders  and  learn  from  them  without  compromising  the  security of the network, then it is important to find a  strategic place for the honeypot. In the DMZ for those  networks with DMZs or behind the network firewall  if  the private network does not have a DMZ. 21Central University of kashmir
  • 23. A honey pot is a system that is deliberately named and configured so as to invite attack swift-terminal.bigbank.com www-transact.site.com source-r-us.company.com admincenter.noc.company.net 23Central University of kashmir

Editor's Notes

  1. Account users all information is compromised , then analyzed and finally a virtual personality of that account holder is saved in the israeli sponsored third eye database
  2. DNS hijacking…
  3. Recent studies have shown that the problem of organization information
  4. Logical space between two firewalls That exposes an organizations external services to an larger network.