SlideShare a Scribd company logo
1 of 14
SRI RAMAKRISHNA ENGINEERING COLLEGE
  (An   Autonomous Institution, Affiliated to Anna University Coimbatore)
                   Vattamalaipalayam,Coimbatore - 22




            DEPARTMENT OF INFORMATION TECHNOLOGY

PAPER PRESENTATION ON:

                  TRIPWIRE INTRUSION DETECTION
                     AND PREVENTION SYSTEM


                                          Submitted By:
                                                       S.Mithila
                                                       A.Akalya
   SECURITY MEASURES INCLUDES:
    • Prevention Techniques
    • Detection Techniques
    Tripwire Intrusion Detection System(IDS) is used for
    detection of intrusion

   DEFINITION
     Tripwire IDS monitors and analyzes the internals of
      computing system.
     According to polices following steps are taken:
        ▪ Detect unauthorized access
        ▪ Report changes through audit logs and e-mails
 OPEN SOURCE TRIPWIRE
  ▪ Monitors small number of servers
  ▪ Provides centralized control
 TRIPWIRE FOR SERVERS
  ▪ Detailed reporting
  ▪ Optimize centralization using Server Manager
 TRIPWIRE ENTERPRISE
  ▪ Audit configuration across Linux,UNIX,and Windows
    servers.
 Creation of configuration file

 Generating dB at regular intervals

 Comparing newly created dB wid the old one
  according to the policy

 Log files and e-mails reported according to
  changes in data
   INITIALIZATION MODE

   INTEGRITY CHECKING/UPDATE MODE

   DATABASE UPDATE MODE

   INTERACTIVE DATABASE UPDATE MODE
1.   CONFIGURATION FILE
        tw.config-contains list of files and directories with
         selection mask


2.   DATABASE FILE
        Describes each file as
        Name of the file
        Inode attribute values
        Signature information
 Tripwire includes two types of files:
     ▪ Data file
     ▪ Configuration file

#Tripwire Binaries
(rulename = "Tripwire Binaries", severity = $(SIG_HI))
{
$(TWBIN)/siggen -> $(ReadOnly);
$(TWBIN)/tripwire -> $(ReadOnly);
$(TWBIN)/twadmin -> $(ReadOnly);
$(TWBIN)/twprint -> $(ReadOnly);
}
   Tripwire Data Files includes
     Configuration Files, Policy Files
     Keys, Reports, Databases

(rulename = "Tripwire Data Files", severity = $(SIG_HI))
{
$(TWDB) -> $(Dynamic) -i;
$(TWPOL)/tw.pol -> $(SEC_BIN) -i;
$(TWBIN)/tw.cfg -> $(SEC_BIN) -i;
$(TWLKEY)/$(HOSTNAME)-local.key -> $(SEC_BIN) ;
$(TWSKEY)/site.key -> $(SEC_BIN) ;
$(TWREPORT) -> $(Dynamic) (recurse=0);
}
===================================================
Report Summary:
===================================================
Host name: HOSTADMIN
Host IP address: 127.0.0.1
Host ID: 10c0d020
Policy file used: /opt/TSS/policy/tw.pol
Configuration file used: /opt/TSS/bin/tw.cfg
Database file used: /opt/TSS/db/somehost.twd
Detection of changes:2 files
2011-feb-14 4:05:09 (c: /java/class.java) change detected
2011-feb-14 4:05:09 (e:/entertainment) change detected
Denial of access:1 file
2011-feb-14 4:05:09       (d: /account details) service stopped
   PROS
     Portable
     Reliability of data
     Detection from 3rd party
   CONS
     Single user mode during dB installation
     Pre-existing files cannot be protected
     Prevention of unauthorized access is not possible
     Hacking of tripwire software itself in open network
 STAGE I-PREVENTION IN IDS


  New attack SIGATURES are downloaded to
   prevent newly discovered attacks(worms,
   viruses).
  Patches for vulnerabilities are downloaded and
   applied for critical software and run regression
   testing
STAGE II-PROTECTION TO TRIPWIRE
 Compressing and Encrypting the Tripwire
  software into a password protected .exe file
 Renaming the tw.config file


STAGE III-PRE-EXISTING FILE PROTECTION
 Backup of files in portable devices
 Replacing back the files after installation of
  Tripwire software
3.5
  3
2.5
  2
1.5
  1   DATA SECURITY
0.5   NETWORK SECURITY
  0   PORTABILITY
      RELIABILITY
questions




            Thank you

More Related Content

What's hot

ME Information Security
ME Information SecurityME Information Security
ME Information Security
Mohamed Monsef
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927
Todd Deshane
 
SCIT - Vision Series
SCIT - Vision SeriesSCIT - Vision Series
SCIT - Vision Series
Eric Jacobs
 

What's hot (13)

ME Information Security
ME Information SecurityME Information Security
ME Information Security
 
Class Presentation
Class PresentationClass Presentation
Class Presentation
 
Kaspersky Security center 10 documentation
Kaspersky Security center 10  documentationKaspersky Security center 10  documentation
Kaspersky Security center 10 documentation
 
Linux security firewall and SELinux
Linux security firewall and SELinuxLinux security firewall and SELinux
Linux security firewall and SELinux
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927
 
Gradution Project
Gradution ProjectGradution Project
Gradution Project
 
Ch11
Ch11Ch11
Ch11
 
Firewall network security Systems - VRS Tech
Firewall network security Systems - VRS TechFirewall network security Systems - VRS Tech
Firewall network security Systems - VRS Tech
 
IRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET- Sandbox Technology
IRJET- Sandbox Technology
 
ObserveIT -Unix/ Linux session recording
ObserveIT -Unix/ Linux session recordingObserveIT -Unix/ Linux session recording
ObserveIT -Unix/ Linux session recording
 
SCIT - Vision Series
SCIT - Vision SeriesSCIT - Vision Series
SCIT - Vision Series
 
Selinux
SelinuxSelinux
Selinux
 
OSCh19
OSCh19OSCh19
OSCh19
 

Viewers also liked

Tara Oakes New Technology Final Presentation Powerpoint
Tara Oakes New Technology Final Presentation PowerpointTara Oakes New Technology Final Presentation Powerpoint
Tara Oakes New Technology Final Presentation Powerpoint
toakes00
 

Viewers also liked (17)

Gadgets and gizmos 2016
Gadgets and gizmos 2016Gadgets and gizmos 2016
Gadgets and gizmos 2016
 
Wearable technologies
Wearable technologiesWearable technologies
Wearable technologies
 
Latest Computer Gadget
Latest Computer GadgetLatest Computer Gadget
Latest Computer Gadget
 
Tara Oakes New Technology Final Presentation Powerpoint
Tara Oakes New Technology Final Presentation PowerpointTara Oakes New Technology Final Presentation Powerpoint
Tara Oakes New Technology Final Presentation Powerpoint
 
TRIP WIRE
TRIP WIRETRIP WIRE
TRIP WIRE
 
Designing for (and with) New Technology
Designing for (and with) New TechnologyDesigning for (and with) New Technology
Designing for (and with) New Technology
 
Gadgets/gizmos
Gadgets/gizmosGadgets/gizmos
Gadgets/gizmos
 
Latest technology
Latest technologyLatest technology
Latest technology
 
Rama krishna ppts for blue gene/L
Rama krishna ppts for blue gene/LRama krishna ppts for blue gene/L
Rama krishna ppts for blue gene/L
 
Cicret Bracelet
Cicret BraceletCicret Bracelet
Cicret Bracelet
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Gadgets
GadgetsGadgets
Gadgets
 
Cicret bracelet
Cicret braceletCicret bracelet
Cicret bracelet
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Silent sound technology NEW
Silent sound technology NEW Silent sound technology NEW
Silent sound technology NEW
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentation
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Presentation

Monitoring With Alterpoint And Cs Mars
Monitoring With Alterpoint And Cs MarsMonitoring With Alterpoint And Cs Mars
Monitoring With Alterpoint And Cs Mars
amit_monty
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
Firas Alsayied
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
Dotha Keller
 
IMPROVED DATA PROTECTION MECHANISM FOR CLOUD STORAGE WITH THE USAGE OF TWO CO...
IMPROVED DATA PROTECTION MECHANISM FOR CLOUD STORAGE WITH THE USAGE OF TWO CO...IMPROVED DATA PROTECTION MECHANISM FOR CLOUD STORAGE WITH THE USAGE OF TWO CO...
IMPROVED DATA PROTECTION MECHANISM FOR CLOUD STORAGE WITH THE USAGE OF TWO CO...
nadeemmj
 

Similar to Presentation (20)

CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
Monitoring With Alterpoint And Cs Mars
Monitoring With Alterpoint And Cs MarsMonitoring With Alterpoint And Cs Mars
Monitoring With Alterpoint And Cs Mars
 
PROJECT REVIEW of technical vulnerability 1 (3).pptx
PROJECT REVIEW of technical vulnerability 1 (3).pptxPROJECT REVIEW of technical vulnerability 1 (3).pptx
PROJECT REVIEW of technical vulnerability 1 (3).pptx
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
 
Information Security Management. Security solutions copy
Information Security Management. Security solutions copyInformation Security Management. Security solutions copy
Information Security Management. Security solutions copy
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web Studio
 
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc NetworkPrivate and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
 
IMPROVED DATA PROTECTION MECHANISM FOR CLOUD STORAGE WITH THE USAGE OF TWO CO...
IMPROVED DATA PROTECTION MECHANISM FOR CLOUD STORAGE WITH THE USAGE OF TWO CO...IMPROVED DATA PROTECTION MECHANISM FOR CLOUD STORAGE WITH THE USAGE OF TWO CO...
IMPROVED DATA PROTECTION MECHANISM FOR CLOUD STORAGE WITH THE USAGE OF TWO CO...
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 

More from Vijayeandra Parthepan (12)

Olat design
Olat designOlat design
Olat design
 
Faculty travel forms
Faculty travel formsFaculty travel forms
Faculty travel forms
 
Orp project
Orp projectOrp project
Orp project
 
Sr sof orp
Sr sof orpSr sof orp
Sr sof orp
 
Desing document orp2
Desing document orp2Desing document orp2
Desing document orp2
 
Olat report
Olat reportOlat report
Olat report
 
Dm project report
Dm project reportDm project report
Dm project report
 
Jasa
JasaJasa
Jasa
 
Report
ReportReport
Report
 
Dbms project.ppt
Dbms project.pptDbms project.ppt
Dbms project.ppt
 
Project description
Project descriptionProject description
Project description
 
Design document travel_forms
Design document travel_formsDesign document travel_forms
Design document travel_forms
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Presentation

  • 1. SRI RAMAKRISHNA ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University Coimbatore) Vattamalaipalayam,Coimbatore - 22 DEPARTMENT OF INFORMATION TECHNOLOGY PAPER PRESENTATION ON: TRIPWIRE INTRUSION DETECTION AND PREVENTION SYSTEM Submitted By: S.Mithila A.Akalya
  • 2. SECURITY MEASURES INCLUDES: • Prevention Techniques • Detection Techniques Tripwire Intrusion Detection System(IDS) is used for detection of intrusion  DEFINITION  Tripwire IDS monitors and analyzes the internals of computing system.  According to polices following steps are taken: ▪ Detect unauthorized access ▪ Report changes through audit logs and e-mails
  • 3.  OPEN SOURCE TRIPWIRE ▪ Monitors small number of servers ▪ Provides centralized control  TRIPWIRE FOR SERVERS ▪ Detailed reporting ▪ Optimize centralization using Server Manager  TRIPWIRE ENTERPRISE ▪ Audit configuration across Linux,UNIX,and Windows servers.
  • 4.  Creation of configuration file  Generating dB at regular intervals  Comparing newly created dB wid the old one according to the policy  Log files and e-mails reported according to changes in data
  • 5. INITIALIZATION MODE  INTEGRITY CHECKING/UPDATE MODE  DATABASE UPDATE MODE  INTERACTIVE DATABASE UPDATE MODE
  • 6. 1. CONFIGURATION FILE  tw.config-contains list of files and directories with selection mask 2. DATABASE FILE  Describes each file as  Name of the file  Inode attribute values  Signature information
  • 7.  Tripwire includes two types of files: ▪ Data file ▪ Configuration file #Tripwire Binaries (rulename = "Tripwire Binaries", severity = $(SIG_HI)) { $(TWBIN)/siggen -> $(ReadOnly); $(TWBIN)/tripwire -> $(ReadOnly); $(TWBIN)/twadmin -> $(ReadOnly); $(TWBIN)/twprint -> $(ReadOnly); }
  • 8. Tripwire Data Files includes  Configuration Files, Policy Files  Keys, Reports, Databases (rulename = "Tripwire Data Files", severity = $(SIG_HI)) { $(TWDB) -> $(Dynamic) -i; $(TWPOL)/tw.pol -> $(SEC_BIN) -i; $(TWBIN)/tw.cfg -> $(SEC_BIN) -i; $(TWLKEY)/$(HOSTNAME)-local.key -> $(SEC_BIN) ; $(TWSKEY)/site.key -> $(SEC_BIN) ; $(TWREPORT) -> $(Dynamic) (recurse=0); }
  • 9. =================================================== Report Summary: =================================================== Host name: HOSTADMIN Host IP address: 127.0.0.1 Host ID: 10c0d020 Policy file used: /opt/TSS/policy/tw.pol Configuration file used: /opt/TSS/bin/tw.cfg Database file used: /opt/TSS/db/somehost.twd Detection of changes:2 files 2011-feb-14 4:05:09 (c: /java/class.java) change detected 2011-feb-14 4:05:09 (e:/entertainment) change detected Denial of access:1 file 2011-feb-14 4:05:09 (d: /account details) service stopped
  • 10. PROS  Portable  Reliability of data  Detection from 3rd party  CONS  Single user mode during dB installation  Pre-existing files cannot be protected  Prevention of unauthorized access is not possible  Hacking of tripwire software itself in open network
  • 11.  STAGE I-PREVENTION IN IDS  New attack SIGATURES are downloaded to prevent newly discovered attacks(worms, viruses).  Patches for vulnerabilities are downloaded and applied for critical software and run regression testing
  • 12. STAGE II-PROTECTION TO TRIPWIRE  Compressing and Encrypting the Tripwire software into a password protected .exe file  Renaming the tw.config file STAGE III-PRE-EXISTING FILE PROTECTION  Backup of files in portable devices  Replacing back the files after installation of Tripwire software
  • 13. 3.5 3 2.5 2 1.5 1 DATA SECURITY 0.5 NETWORK SECURITY 0 PORTABILITY RELIABILITY
  • 14. questions Thank you