Transcript
Page 1: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Intrusion Detection Intrusion Detection SystemsSystems

Austen HayesCameron

Hinkel

Page 2: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Intrusion Detection Systems Intrusion Detection Systems (IDS)(IDS)Definition

Page 3: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Purpose of IDSPurpose of IDSMonitor Host/Network

Page 4: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Purpose of IDSPurpose of IDSMonitor Host/NetworkLog Suspicious Activity

Page 5: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Purpose of IDSPurpose of IDSMonitor Host/NetworkLog Suspicious ActivityDetect Potential Threats

Page 6: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Purpose of IDSPurpose of IDSMonitor Host/NetworkLog Suspicious ActivityDetect Potential Threats Alert System Administrator(s)

Page 7: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Purpose of IDSPurpose of IDSMonitor Host/NetworkLog Suspicious ActivityDetect Potential Threats Alert System Administrator(s)Generate Reports

Page 8: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Detection MethodsDetection MethodsStatistical Anomaly-Based

Page 9: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Detection MethodsDetection MethodsStatistical Anomaly-Based

◦Protocol Analysis

Page 10: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Detection MethodsDetection MethodsStatistical Anomaly-Based

◦Protocol Analysis◦Bandwidth

Page 11: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Detection MethodsDetection MethodsStatistical Anomaly-Based

◦Protocol Analysis◦Bandwidth◦Hardware Connections

Page 12: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Detection MethodsDetection MethodsStatistical Anomaly-Based

◦Protocol Analysis◦Bandwidth◦Hardware Connections

Signature-Based

Page 13: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Detection MethodsDetection MethodsStatistical Anomaly-Based

◦Protocol Analysis◦Bandwidth◦Hardware Connections

Signature-BasedStateful Protocol Analysis

Page 14: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Types of IDSTypes of IDSNetwork (NIDS)

NIDS

Firewall

Internet

Private Network

Page 15: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Types of IDSTypes of IDSHost-based (HIDS)

Firewall

Internet

Private Network

HIDS

Page 16: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Types of IDSTypes of IDSWireless

IDS

SensorAccess Point

Wireless Devices

Internet

Page 17: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Types of IDSTypes of IDSNetwork (NIDS)Host-based (HIDS)WirelessNetwork Behavior Analysis

Page 18: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Network IDSNetwork IDSInstallation Types

◦Hub/Switch

NIDS

Hub

Internet

Private Network

Page 19: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Network IDSNetwork IDSInstallation Types

◦Network Tap

NIDS

Hub

Internet

Private Network

Page 20: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Network IDSNetwork IDSInstallation Types

◦Inline

Internet NIDS

Hub

Private Network

Page 21: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Network IDSNetwork IDSExamples

◦“LaBrea Tarpit” Propagation of worms

Page 22: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Network IDSNetwork IDSExamples

◦“LaBrea Tarpit” Propagation of worms ARP request responses

Page 23: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Network IDSNetwork IDSExamples

◦Honey Pot Low-Interaction

Page 24: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Network IDSNetwork IDSExamples

◦Honey Pot Low-Interaction High-Interaction

Page 25: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Types of AttacksTypes of Attacks

Page 26: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Types of AttacksTypes of AttacksPort Scan

Page 27: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Types of AttacksTypes of AttacksPort ScanDOS Attack

Page 28: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Types of AttacksTypes of AttacksPort ScanDOS AttackICMP Flood

Page 29: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Types of AttacksTypes of AttacksPort ScanDOS AttackICMP FloodDistributed

Page 30: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Popular IDS SoftwarePopular IDS SoftwareSnort

◦Open source, Signature-based

Page 31: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Popular IDS SoftwarePopular IDS SoftwareSnort

◦Open source, Signature-basedAIDE

◦Advanced Intrusion Detection Environment

Page 32: Intrusion Detection Systems Austen Hayes Cameron Hinkel

Popular IDS SoftwarePopular IDS SoftwareSnort

◦Open source, Signature-basedAIDE

◦Advanced Intrusion Detection Environment

OSSEC HIDS

Page 33: Intrusion Detection Systems Austen Hayes Cameron Hinkel

ConclusionConclusionSecurity Integral to Sys. Admin

Job

Page 34: Intrusion Detection Systems Austen Hayes Cameron Hinkel

ConclusionConclusionSecurity Integral to Sys. Admin

JobComplexity of Securing A

System/Network

Page 35: Intrusion Detection Systems Austen Hayes Cameron Hinkel

ConclusionConclusionSecurity Integral to Sys. Admin

JobComplexity of Securing a

System/NetworkNumerous Tools Available To

Detect Threats


Recommended