intrusion detection system

26
INTRUSION DETECTION SYSTEM

Upload: aparna-bhadran

Post on 02-Nov-2014

925 views

Category:

Engineering


2 download

DESCRIPTION

Its about intrusion detection system(IDS),types of IDS,different types of intrusion detection system.

TRANSCRIPT

Page 1: Intrusion detection system

INTRUSION DETECTION SYSTEM

Page 2: Intrusion detection system

INTRUDERS

• Many computer security incidents are caused -by insiders

• Who could not be blocked by firewalls.• So as a next level of defense – we are using Intrusion detection system.

Page 3: Intrusion detection system

INTRUSION DETECTION SYSTEM

• intrusion detection system (IDS) is a device• typically another separate computer, that

monitors – activity to identify malicious or suspicious events.

• An IDS is a sensor

Page 4: Intrusion detection system

FUNCTIONS

• Monitoring users and system activity• auditing system configuration for

vulnerabilities and misconfigurations• assessing the integrity of critical system and

data files• recognizing known attack patterns in system

activity

Page 5: Intrusion detection system

• identifying abnormal activity through statistical analysis

• correcting system configuration errors

Page 6: Intrusion detection system

TYPES

• Signature-based intrusion detection systems:– perform pattern-matching and – report situations that match a pattern

corresponding to a known attack type. • Heuristic intrusion detection

systems( anomaly based) build a – detection looks for behavior that is out of the

ordinary.

Page 7: Intrusion detection system

• Intrusion detection devices can be – network based or– host based. • network-based IDS is a

– stand-alone device attached to the network to monitor traffic throughout that network

• host-based IDS runs on a single workstation or client or host, to protect that one host.

Page 8: Intrusion detection system

Signature-Based Intrusion Detection

• The problem with signature-based detection is the signatures themselves.

• An attacker will try to modify a basic attack in such a way that it will not match the known signature of that attack.

• signature-based IDSs cannot detect a new attack for which a signature is not yet installed in the database

Page 9: Intrusion detection system

Heuristic Intrusion Detection

• heuristic intrusion detection looks for behavior that is out of the ordinary.

• Inference engine perform continuous analysis of the system

• Raising an alert when systems dirtiness increase the threshold.

• Inference engine works in 2 ways– State based intrusion detection system.– Model based intrusion detection system.

Page 10: Intrusion detection system

State based intrusion detection system:• see the system going through changes of

overall state or configuration.• They try to detect when the system moves to unsafe

stateModel based intrusion detection system:• Map current activity into model of unacceptable

activity• Raise an alarm when activity resembles the model.

Page 11: Intrusion detection system

Misuse intrusion detection:• intrusion detection can work from a model of

known bad activity.• All heuristic intrusion detection activity is

classified in one of three categories:– good/benign, – suspicious, – unknown.

• Over time, specific kinds of actions can move from one of these categories to another,

Page 12: Intrusion detection system

Stealth Mode

• An IDS is a network device .• Any network device is potentially vulnerable

to network attacks.• To counter those problems,:• most IDSs run in stealth mode.• an IDS has two network interfaces: – one for the network being monitored – to generate alerts

Page 13: Intrusion detection system

• The IDS uses the monitored interface as input only– it never sends packets out through that interface.

• If the IDS needs to generate an alert, – it uses only the alarm interface on a completely

separate control network

Page 14: Intrusion detection system

Goals for Intrusion Detection Systems

• an IDS should be – fast, – simple, – accurate, – while at the same time being complete. – It should detect all attacks with little performance

penalty

Page 15: Intrusion detection system

• An IDS could use some—or all—of the following design approaches:– filter on packet headers– filter on packet content– maintain connection state– use complex, multipacket signatures– use minimal number of signatures with maximum effect– filter in real time, online– hide its presence– use optimal sliding time window size to match signatures

Page 16: Intrusion detection system

Responding to Alarms

• Whatever the type, an intrusion detection system raises an alarm when it finds a match.

• The alarm can range from something modest, such as writing a note in an audit log, to something significant, such as paging the system security administrator.

Page 17: Intrusion detection system

• responses fall into three major categories:– monitor– protect– call a human

• Monitoring is appropriate for an attack of initial impact. • Perhaps the real goal is to watch the intruder,• to see :

– what resources are being accessed or – what attempted attacks are tried. – This approach should be invisible to the attacker.

Page 18: Intrusion detection system

• Protecting can mean– increasing access controls and – even making a resource unavailable

• In contrast to monitoring, protecting may be very visible to the attacker.

• calling a human allows individual discrimination. • The IDS can take an initial defensive action

immediately while also generating an alert to a human.

Page 19: Intrusion detection system

False Results

• Intrusion detection systems are not perfect.– and mistakes are their biggest problem.

• 2 main false result:– false positive-by raising an alarm for something that is not

really an attack – false negative- not raising an alarm for a real attack.

• Too many false positives means the administrator will be less confident of the IDS's warnings.

• But false negatives mean that real attacks are passing the IDS without action.

Page 20: Intrusion detection system

IDS Strengths and Limitations

• Strength:• IDSs detect an ever-growing number of

serious problems. – And as we learn more about problems, we can

add their signatures to the IDS model.– Thus, over time, IDSs continue to improve.

• becoming cheaper • easier to administer.

Page 21: Intrusion detection system

• Limitation:• avoiding an IDS is a first priority for successful

attackers. • An IDS that is not well defended is useless.• Similar IDS have identical vulnerabilities so – there selection criteria will miss similar attack.

• IDS is sensitive– Which is difficult to measure and adjust.

• An IDS does not run itself.• General:• IDS ARE EXCELLENT ADDITION TO NETWORK

SECURITY

Page 22: Intrusion detection system

SNORT

• It is a light weight open source network – intrusion prevention– Network intrusion detection system(NIDS)

• based on signature detection.• It has real time alarming capacity.

Page 23: Intrusion detection system

• When an attack has occurred the alert tells us:– Date and time the attack occurred.– Source and destination IP address with port

number.– Type of attack– Priority

Page 24: Intrusion detection system

LOCATION:• The snort have to be installed in those part of

the network that have to be protected.• The snort can be distributed to different parts

of network infrastructure and can send alarm to one central console.

• Snort network interface card(NIC) captures all network traffic that goes by its NIC.

Page 25: Intrusion detection system

TOOLS:• Snort Alert Monitor:– Java based console.– Will give a quick look at the Snort alert– Can be configured to send e-mail when Snort alerts to an

attempted exploit on your network.• Snortalog:– It is a Perl based Snort log analyser.– Allows to develop plaint text on HTML summery reports and

graph representation of top attack that has been detected by Snort Sensor

Page 26: Intrusion detection system

• SnortFW:– It analyses incoming Snort alerts and updates iptables firewall to

block the attacker.• IDSCenter:

– It is an all-in-one centralized graphical utility for managing• Snort• Alerts• Rules• Configuration files• Distributing updates• Generate reports• Email• Auditable/visual alarm notification.