23
Intrusion Detection Intrusion Detection System(IDS) System(IDS) Presentation by: APOORV PANDEY B.Tech (CSE) BBDEC,Lucknow

AN INTRUSION DETECTION SYSTEM

Embed Size (px)

Citation preview

Page 1: AN INTRUSION DETECTION SYSTEM

Intrusion Detection Intrusion Detection System(IDS)System(IDS)

Presentation by: APOORV PANDEY B.Tech (CSE) BBDEC,Lucknow

Page 2: AN INTRUSION DETECTION SYSTEM

Contents:Contents:Introduction: Intrusion & its

detection.Ways of intrude.Diagram of IDS.Classification IDS.Drawbacks and strength of IDS.Future of IDS.Conclusion.References.

Page 3: AN INTRUSION DETECTION SYSTEM

Intrusion and Intrusion Intrusion and Intrusion DetectionDetectionIntrusion : Attempting to break

into or misuse your system.Intruders may be from outside

the network or legitimate users of the network.

Intrusion can be a physical, system or remote intrusion.

Page 4: AN INTRUSION DETECTION SYSTEM

Different ways to intrudeDifferent ways to intrude

Buffer overflows

Unexpected combinations

Unhandled input

Race conditions

Page 5: AN INTRUSION DETECTION SYSTEM

Intrusion Detection SystemIntrusion Detection System

KnowledgeBase

Response Model

Alert Data-base

Event Provider

Analysis Engine

Other machines

Page 6: AN INTRUSION DETECTION SYSTEM

Classifying an IDSClassifying an IDS

◦ anomaly detection◦ signature based misuse◦ host based◦ network based◦ Stack based

Page 7: AN INTRUSION DETECTION SYSTEM

Intrusion Detection Systems Intrusion Detection Systems (IDS)(IDS) Intrusion Detection Systems look

for attack signatures, which are

specificpatterns that usually indicate

malicious or suspicious intent.

Page 8: AN INTRUSION DETECTION SYSTEM

Anomaly based IDSAnomaly based IDSThis IDS models the normal usage

of the network as a noise characterization.

Anything distinct from the noise is assumed to be an intrusion activity.◦E.g flooding a host with lots of packet.

The primary strength is its ability to recognize novel attacks.

Page 9: AN INTRUSION DETECTION SYSTEM

Drawbacks of Anomaly Drawbacks of Anomaly detection IDSdetection IDS

Assumes that intrusions will be accompanied by manifestations that are sufficiently unusual so as to permit detection.

These generate many false alarms and hence compromise the effectiveness of the IDS.

Page 10: AN INTRUSION DETECTION SYSTEM

Signature based IDSSignature based IDSThis IDS possess an attacked

description that can be matched to sensed attack manifestations.4

The question of what information is relevant to an IDS depends upon what it is trying to detect.◦E.g DNS, FTP etc.

Page 11: AN INTRUSION DETECTION SYSTEM

Signature based IDS Signature based IDS (contd.)(contd.)ID system is programmed to

interpret a certain series of packets, or a certain piece of data contained in those packets,as an attack.

For example, an IDS that watches web

servers might be programmed to look

for the string “phf” as an indicator of a

CGI program attack.

Page 12: AN INTRUSION DETECTION SYSTEM

Signature based IDS Signature based IDS (contd.)(contd.)Most signature analysis systems

are based off of simple pattern matching algorithms. In most cases, the IDS simply looks for a sub string within a stream of data carried by network packets. When it finds this sub string (for example, the ``phf'' in ``GET /cgi-bin/phf?''), it identifies those network packets as vehicles of an attack.

Page 13: AN INTRUSION DETECTION SYSTEM

Drawbacks of Signature Drawbacks of Signature based IDSbased IDS

They are unable to detect novel attacks.

Suffer from false alarms

Have to programmed again for every new pattern to be detected.

Page 14: AN INTRUSION DETECTION SYSTEM

Host/Applications based Host/Applications based IDSIDSThe host operating system or the

application logs in the audit information.

These audit information includes events like the use of identification and authentication mechanisms (logins etc.) , file opens and program executions, admin activities etc.

This audit is then analyzed to detect trails of intrusion.

Page 15: AN INTRUSION DETECTION SYSTEM

Drawbacks of the host based Drawbacks of the host based IDSIDSThe kind of information needed

to be logged in is a matter of experience.

Unselective logging of messages may greatly increase the audit and analysis burdens.

Selective logging runs the risk that attack manifestations could be missed.

Page 16: AN INTRUSION DETECTION SYSTEM

Strengths of the host Strengths of the host based IDSbased IDSAttack verification.System specific activity.Encrypted and switch environments.Monitoring key components.Near Real-Time detection and response.No additional hardware.

Page 17: AN INTRUSION DETECTION SYSTEM

Stack based IDSStack based IDSThey are integrated closely with

the TCP/IP stack, allowing packets to be watched as they traverse their way up the OSI layers.

This allows the IDS to pull the packets from the stack before the OS or the application have a chance to process the packets.

Page 18: AN INTRUSION DETECTION SYSTEM

Network based IDSNetwork based IDSThis IDS looks for attack

signatures in network traffic via a promiscuous interface.

[

A filter is usually applied to determine which traffic will be discarded or passed on to an attack recognition module. This helps to filter out known un-malicious traffic.

Page 19: AN INTRUSION DETECTION SYSTEM

Strengths of Network Strengths of Network based IDSbased IDSCost of ownership reduced[

Packet analysisEvidence removalReal time detection and responseMalicious intent detectionComplement and verificationOperating system independence

Page 20: AN INTRUSION DETECTION SYSTEM

Future of IDSFuture of IDS

To integrate the network and host based IDS for better detection.

Developing IDS schemes for detecting novel attacks rather than individual instantiations.

Page 21: AN INTRUSION DETECTION SYSTEM

Application IDSApplication IDS

Multivector threat identification—Detailed inspection of Layer 2–7 traffic protects your network from policy violations, vulnerability exploitations, and anomalous activity.

Accurate prevention technologies—Cisco Systems’ innovative Risk Rating feature and Meta Event Generator provide the confidence to take preventive actions on a broader range of threats without the risk of dropping legitimate traffic.

Page 22: AN INTRUSION DETECTION SYSTEM

Conclusion:Conclusion:

Intrusion Detection Systems look for attack signatures, which are specificpatterns that usually indicate

malicious or suspicious intent. IDS schemes for detecting novel attacks rather than individual instantiations.

Page 23: AN INTRUSION DETECTION SYSTEM

Reference:Reference:

Book of Cisco IDS.Intrusion Detection system TMH.

Wikipedia.