NetworkSec - Advanced SecDevices - IDSs
[toc]
Intrusion detection system (IDS)
IDS basic
- software / hardware system
- detect signs of malicious activity on network or individual computer.
IDS is designed to detect:
- threats:
Masquerader 化装跳舞者: falsely using the identity/credentials of a legitimate user to gain access to computer system/network.Misfeasor违法行为者: legitimate user who performs actions he is not authorized to doClandestine 暗中地 user: user who tries to block/cover up his actions by deleting audit/system logs.
- automated attacks and threats:
port scans: information gathering, intended to determine which ports on a host are open for TCP connectionsDenial-of-service attacks: network attacks meant to overwhelm a host and shut out legitimate accessesMalware attacks: replicating malicious software attacks, like Trojan horses, computer worms, viruses, etc.ARP spoofing: redirect IP traffic in a local-area networkDNS cache poisoning: a pharming attack, changing a host’s DNS cache to create a falsified domain-name/IP-address association.
IDS components
- The functions of an IDS
IDS sensors:- collect real-time data about the functioning of network components and computers
IDS manager:- receives reports from sensors.
- compiles data from the IDS sensors to determine if an intrusion has occurred.
- This determination is usually based on a
set of site policies & rules and statistical conditionsthat define probable intrusions. - If detects an intrusion, it sounds an alarm to system administrators 

Network-Based and Host-Based Solutions
Network & Host IDS/IPS
NIDS – Network Intrusion Detection System
- Using a network tap, span port, or hub collects packets on the network
- Attempts to identify unauthorized, illicit, and anomalous behavior based on network traffic
- Methods:
- signature file comparisons,
- anomaly detection,
- stateful protocol analysis
- Using the captured data, the IDS system processes and flags any suspicious traffic
HIDS – Host Intrusion Detection System
- Generally involves an agent installed on each system, monitoring and alerting on local OS and application activity
- Attempts to identify unauthorized, illicit, and anomalous behavior on a specific device/OS
- The installed agent uses a combination of signatures, rules, and heuristics to identify unauthorized activity
.
This post is licensed under CC BY 4.0 by the author.
Comments powered by Disqus.