Intrusion detection and prevention system pdf




















Layer 5: Session Layer The session layer controls the dialogues connections between computers. It establishes, manages and terminates the connections between the local and remote application. It provides for full-duplex, half-duplex, or simplex operation, and establishes checkpointing, adjournment, termination, and restart procedures.

The presentation layer transforms data into the form that the application accepts. This layer formats and encrypts data to be sent across a network. It is sometimes called the syntax layer.

Layer 7: Application Layer The application layer is the OSI layer closest to the end user, which means both the OSI application layer and the user interact directly with the software application. This layer interacts with software applications that implement a communicating component. Such application programs fall outside the scope of the OSI model.

Application-layer functions typically include identifying communication partners, determining resource availability, and synchronizing communication.

These threats take many forms, but all result in loss of privacy to some degree and possibly malicious destruction of information or resources that can lead to large monetary losses. Knowing which areas of the network are more susceptible to network intruders and who the common attacker is useful in protecting an enterprise network from attacks. It is important to place trust in the employees internal to the network and in authorized people trying to use internal network resources from outside the corporation.

However, trust must also be weighed with reality. According to some sources, at least 60 percent or more attacks are perpetrated by corporate insiders, and there is an increasing trend not to trust internal users and have stricter security measures in place. Wireless networks are becoming in more wide-spread use, and more stringent security considerations are often required in these instances.

Restricted use of network infrastructure equipment and critical resources is necessary. Limiting network access to only those who require access is a smart way to deter many threats that breach computer network security. These directly penetrate the computer memory, and the worm code is then activated.

An Internet worm is type of malicious software malware that self-replicates and distributes copies of itself to its network. Unlike Trojans or other viruses that require user intervention to spread, Internet worms can spread on their own. A computer virus is a malware program that, when executed, replicates by inserting copies of itself possibly modified into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".

Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes. A Trojan horse is a seemingly benign program that when activated, causes harm to a computer system. Some DoS attacks can be avoided by applying vendor patches to affected software.

For example, many vendors have patched their IP implementations to prevent intruders from taking advantage of the IP reassembly bugs.

A few DoS attacks cannot be stopped, but their scope of affected areas can be constrained. In this attack, multiple machines are used to launch a DoS attack. The handler is a compromised host with a special program running on it.

Each handler is capable of controlling multiple agents. An agent is a compromised host that is also running a special program. Each agent is responsible for generating a stream of packets that is directed toward the intended victim.

An intrusion prevention system IPS is software that has all the capabilities of an intrusion detection system and can also attempt to stop possible incidents [Bace01] IDS and IPS technologies offer many of the same capabilities, and administrators can usually disable prevention features in IPS products, causing them to function as IDSs.

Any exceptions are specifically noted. Some IDPSs are also able to change their security profile when a new threat is detected. For example, an IDPS might be able to collect more detailed information for a particular session after malicious activity is detected within that session.

An IDPS might also alter the settings for when certain alerts are triggered or what priority should be assigned to subsequent alerts after a particular threat is detected. The term sensor is typically used for IDPSs that monitor networks, including network-based, wireless, and network behavior analysis technologies. The term agent is typically used for host-based IDPS technologies. Some management servers perform analysis on the event information that the sensors or agents provide and can identify events that the individual sensors or agents cannot.

Console software is typically installed onto standard desktop or laptop computers. Some consoles are used for IDPS administration only, such as configuring sensors or agents and applying software updates, while other consoles, such as IDPSsystem software included with this project, are used strictly for monitoring and analysis.

Some IDPS consoles provide both administration and monitoring capabilities. If a management network is used, each sensor or agent host has an additional network interface known as a management interface that connects to the management network.

Also, each sensor or agent host is unable to pass any traffic between its management interface and any of its other network interfaces. The management servers, database servers, and consoles are attached to the management network only. This architecture effectively isolates the management network from the production networks. The benefits of doing this are to conceal the existence and identity of the IDPS from attackers; to protect the IDPS from attack; and to ensure that the IDPS has adequate bandwidth to function under adverse conditions e.

Disadvantages of using a management network include the additional costs in networking equipment and other hardware e. Recording information related to observed events: Information is usually recorded locally, and might also be sent to separate systems ii.

Notifying security administrators of important observed events: This notification, known as an alert, occurs through any of several methods, including the following: e-mails, pages, messages on the IDPS user interface, syslog messages, and user- defined programs and scripts.

A notification message typically includes only basic information regarding an event; administrators need to access the IDPS for additional information. Producing reports: Reports summarize the monitored events or provide details on particular events of interest. The IPS stops the attack itself: Examples of how this could be done are as follows: - Terminate the network connection or user session that is being used for the attack - Block access to the target or possibly other likely targets from the offending user account, IP address, or other attacker attribute - Block all access to the targeted host, service, application, or other resource.

Common examples are reconfiguring a network device e. A simple example is an IPS removing an infected file attachment from an e-mail and then permitting the cleaned email to reach its recipient. Another common attribute of IDPS technologies is that they cannot provide completely accurate detection.

When an IDPS incorrectly identifies benign activity as being malicious, a false positive has occurred. When an IDPS fails to identify malicious activity, a false negative has occurred. This publication discusses the following four types of IDPS technologies: i. Network-Based which monitors network traffic for particular network segments or devices and analyzes the network and application protocol activity to identify suspicious activity. Wireless, which monitors wireless network traffic and analyzes it to identify suspicious activity involving the wireless networking protocols themselves.

Network Behavior Analysis NBA , which examines network traffic to identify threats that generate unusual traffic flows, such as DDoS attacks, scanning, and certain forms of malware.

Host-Based, which monitors the characteristics of a single host and the events occurring within that host for suspicious activity. The primary classes of detection methodologies are as follows: i. Signature-based, which compares known threat signatures to observed events to identify incidents. A signature based IDPS maintains a collection of signatures, each of which characterizes the profile of a known security threat e.

Security signatures are classed into string signature, port signature and header condition signature. If these ports aren't being used by the network at a point in time, then the incoming packets directed to these ports are considered suspicious. In earlier version of Windows, this resulted in the "blue screen of death". Anomaly-based detection, which compares definitions of what activity is considered normal against observed events to identify significant deviations.

This method uses profiles that are developed by monitoring the characteristics of typical activity over a period of time.

The IDPS then compares the characteristics of current activity to thresholds related to the profile. It is highly subjective to decide what can be considered normal and what an anomaly, but a widely accepted rule of thumb is that, any incident which occurs on a frequency greater than two standard deviations from the statistical norm should be considered suspicious. An example of such behavior would be if a normal user logs on and off of a machine 20 times a day instead of the normal course of 1 or 2 times.

Anomaly-based detection methods can be very effective at detecting previously unknown threats. Stateful Protocol Analysis, which compares predetermined profiles of generally accepted definitions of benign protocol activity for each protocol state against observed events to identify deviations. Unlike anomaly-based detection, which uses host or network-specific profiles, stateful protocol analysis relies on vendor- developed universal profiles that specify how particular protocols should and should not be used.

It is capable of understanding and tracking the state of protocols that have a notion of state, which allows it to detect many attacks that other methods cannot.

Problems with signature-based detection include that it is often very difficult or impossible to develop completely accurate models of protocols, it is very resource-intensive, and it cannot detect attacks that do not violate the characteristics of generally acceptable protocol behavior. They can generally be divided into four categories: information gathering, logging, detection, and prevention.

Examples include identifying hosts and the operating systems and applications that they use, and identifying general characteristics of the network. This data can be used to confirm the validity of alerts, investigate incidents, and correlate events between the IDPS and other logging sources. Data fields commonly used by IDPSs include event date and time, event type, importance rating e. Most products use a combination of detection techniques, which generally supports more accurate detection and more flexibility in tuning and customization.

The types of events detected and the typical accuracy of detection vary greatly depending on the type of IDPS technology. Most IDPSs require at least some tuning and customization to improve their detection accuracy, usability, and effectiveness, such as setting the prevention actions to be performed for particular alerts.

Technologies vary widely in their tuning and customization capabilities. Organizations should carefully consider the tuning and customization capabilities of IDPS technologies when evaluating products. Thresholds are most often used for anomaly-based detection and signature-based detection. A blacklist is a list of discrete entities, such as hosts, TCP or UDP port numbers, ICMP types and codes, applications, usernames, URLs, filenames, or file extensions, that have been previously determined to be associated with malicious activity.

A whitelist is a list of discrete entities that are known to be benign. Examples of actions that can be performed on an alert type include the following: — Setting a default priority or severity level — Specifying what information should be recorded and what notification methods e. IDPSs usually allow administrators to specify the prevention capability configuration for each type of alert.

This usually includes enabling or disabling prevention, as well as specifying which type of prevention capability should be used. It can identify many different types of events of interest. It is most commonly deployed at a boundary between networks, such as in proximity to border firewalls or routers, virtual private network VPN servers, remote access servers, and wireless networks.

This section provides a detailed discussion of network-based IDPS technologies. It covers the major components of network-based IDPSs and explains the architectures typically used for deploying the components. It also examines the security capabilities of the technologies in depth, including the methodologies they use to identify suspicious activity.

All of these components are similar to other types of IDPS technologies, except for the sensors. A network-based IDPS sensor monitors and analyzes network activity on one or more network segments. The network interface cards that will be performing monitoring are placed into promiscuous mode, which means that they will accept all incoming packets that they see, regardless of their intended destinations. Most IDPS deployments use multiple sensors, with large deployments having hundreds of sensors.

NIDPS do not protect from layer 7 attacks. HIDPS may include: a firewall, exploit prevention module, application control, file integrity monitoring, log monitoring, policy enforcement, and antivirus signature scanner.

A kernel does not need to use CPU cycles to process network packets. This is called zero-copy ZC, 0-copy and helps improving performance of network traffic analysis. Click here to sign up. Download Free PDF. A short summary of this paper. Download Download PDF. Translate PDF. As maximum of the organizations are facing an network data. The main purpose of the intrusion detection and increasing number of threats every day in the form of viruses prevention system is to review, control, analyze and produce and attack etc.

Since many different mechanisms were opted reports from the system activates. Even though a lot of by organizations in the form of intrusion detection and research is done in this particular field still there are numbers prevention system to protect its organizations for these kinds of issues and challenges in the system.

The research of attacks, still there are many security breaches in every communities are working very hard but it is big research field organization. In order to understand the security risks and and thus needs more research attention. The researchers have IDPS, we will first survey about the common security generally categorized the attackers into three different breaches and then after discuss what are different categories - insider, outsider and unknown [10] [11].

Also opportunities and challenges in this particular field. Here in this and architectures of Intrusion Detection Systems in the paper, we are not going to propose or develop anything new literature. Finally we outline the present research challenges but we are going to identify the different kind of issues and and issue.

The paper consists of four Keywords sections , first section will give the introduction towards the Security, IDPS, Virus, Attack, Detection, System, intrusion detection systems as we have above, second section Architecture, Prevention, Risk, deployment, IDS, intrusion, will discuss the need of intrusion detection and prevention testing, challenges. In Section four, we suggest some remedies or proposals for resolving the issues and challenges 1. Thus it became very much property or data or information without proper access.

In websites or computer programs, this method of storing data order to have our network safe from these black hats, a new increases the security risks in huge quantity. According to field has emerged in computer science and information Symantec report , around 60, websites are available security we called that as Intrusion detection and prevention online, thus a person on longer need to be a gem in hacking, system.

An intrusion prevention system IPS is software that has all the capabilities of an IDS and can also attempt to stop possible incidents. Any exceptions are specifically noted. This chapter provides an overview of IDPS technologies.

It explains the key functions that IDPS technologies perform and the detection methodologies that they use. Next, it highlights the most important characteristics of each of the major classes of IDPS technologies. The chapter also discusses IDPS interoperability and complementary technologies. Unable to display preview. Download preview PDF. Skip to main content.



0コメント

  • 1000 / 1000