Intrusion Detection and Prevention Systems (IDS/IPS) Good Practice Guide

Size: px
Start display at page:

Download "Intrusion Detection and Prevention Systems (IDS/IPS) Good Practice Guide"

Transcription

1 Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-INFR Prog. Director Mark Ferrar Status Approved Owner James Wood Version 2.0 Author Jason Alexander Version Date 31/09/2009 Intrusion Detection and Prevention Systems (IDS/IPS) Good Practice Guide Crown Copyright 2009

2 Version Date Amendment History 0.1 First draft for comment /12/2005 Format Updated /06/2006 Section 4 added, information updated to newest standards /7/2006 Comments from Malcolm McKeating and Phil Benn added /7/2006 Section 1 rewritten inline with existing GPG s /8/2006 Final version for approval /05/2009 Draft update /06/2009 Updated with initial team comments /06/2009 Updated with more team feedback /09/2009 Completed update Forecast Changes: Anticipated Change Amendment History: When Annual Review May 2010 Reviewers: This document must be reviewed by the following: Name Signature Title / Responsibility Date Version Infrastructure Security Team James Wood Head of IT Security 1.1 Approvals: This document must be approved by the following: Name Signature Title / Responsibility Date Version James Wood Head of IT Security 1.1 Distribution: NHS Connecting for Health Infrastructure Security Team Website Document Status: This is a controlled document. Whilst this document may be printed, the electronic version maintained in FileCM is the controlled copy. Any printed copies of the document are not controlled. Crown Copyright 2009 Page 2 of 30

3 Related Documents: These documents will provide additional information. Ref no Doc Reference Number Title Version 1 NPFIT-SHR-QMS-PRP-0015 Glossary of Terms Consolidated.doc 13 2 NPFIT-FNT-TO-INFR-SEC-0001 Glossary of Security Terms Latest Glossary of Terms: List any new terms created in this document. Mail the NPO Quality Manager to have these included in the master glossary above [1]. Crown Copyright 2009 Page 3 of 30

4 Contents 1 About this Document Purpose Audience Content Disclaimer Intrusion Detection and Prevention Principles Common Detection Methods Components and Architecture Typical Components Architecture Design Securing IDS/IPS components Network Based IDS/IPS Architecture and Sensor Locations Types of events detected Detection Accuracy Technology Limitations Wireless IDS/IPS Threats against WLANs Architecture and Sensor Locations Type of Events Detected Detection Accuracy Technology Limitations Network Behaviour Analysis (NBA) IDS/IPS Architecture and Sensor Locations Types of events detected Detection Accuracy Technology Limitations Host Based IDS/IPS Architecture and Agent Locations Types of events detected Detection Accuracy Technology Limitations IDS/IPS Technology Comparison Chart Crown Copyright 2009 Page 4 of 30

5 9 Configuration and Maintenance of IDS/IPS Tuning Staffing and Resourcing Configuration Management Resources and References Further helpful resources References Crown Copyright 2009 Page 5 of 30

6 1 About this Document 1.1 Purpose This GPG seeks to assist NHS organisations in understanding intrusion detection system (IDS) and intrusion prevention system (IPS) technologies and in designing, implementing, configuring, securing, monitoring, and maintaining intrusion detection and prevention systems. This guide does not deal specifically with any external processes for the management of these solutions as the particulars of implementation specific issues are outside the scope of this document. The purpose of this document is to advise technical personnel of the best practices when implementing IDS/IPS products to provide additional security to networks and systems. 1.2 Audience This document is written for readers with a technical background. A general familiarity with networking concepts and the nature of attacks directed at networks which IDS and IPS solutions attempt to address is assumed. Detailed knowledge of various vendor specific technologies is not required although a familiarity with the basic operation of these technologies will be useful. 1.3 Content Intrusion Detection and Prevention Principles Components and Architecture Network Based IDS/IPS Wireless IDS/IPS Network Behaviour Analysis (NBA) IDS/IPS Host Based IDS/IPS IDS/IPS Technology Comparison Chart Configuration and Maintenance of IDS/IPS Resources and References 1.4 Disclaimer Reference to any specific commercial product, process or service by trade name, trademark manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favouring by NHS Connecting for Health. The views and opinions of authors expressed within this document shall not be used for advertising or product endorsement purposes. Any party relying on or using any information contained in this document and/or relying on or using any system implemented based upon information contained in this document should do so only after performing a risk assessment. It is important to note that a risk assessment is a prerequisite for the design of effective security countermeasures. A correctly completed risk assessment enables an NHS organisation to demonstrate that a methodical process has been undertaken which Crown Copyright 2009 Page 6 of 30

7 can adequately describe the rationale behind any decisions made. Risk assessments should include the potential impact to live services of implementing changes. This means that changes implemented following this guidance are done so at the implementers risk. Misuse or inappropriate use of this information can only be the responsibility of the implementer. Crown Copyright 2009 Page 7 of 30

8 2 Intrusion Detection and Prevention Principles Intrusion Detection and Prevention has become a much marketed concept in IT security and has become a standard tool in the protection of the network and computer systems from both external and internal threats. The adoption of IDS/IPS technologies has demonstrated the complexity in implementing a solution which provides increased security within a manageable framework. Many implementations have suffered from lack of resource planning and continued maintenance which has reduced the effectiveness of these solutions and the return on investment. IDS/IPS technologies cannot provide complete accurate detection; they all generate false positives (incorrectly identifying benign activity as malicious) and false negatives (failing to identify malicious activity) Intrusion detection is the process of monitoring the events occurring either in a computer system or network and analysing them for signs of possible security incidents. Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible security incidents. Intrusion detection and prevention systems (IDS/IPS) are primarily focused on identifying possible security incidents, logging information about them, attempting to stop them, and reporting them to security administrators. Key functions of IDS/IPS technologies include: Logging information related to possible security events Notifying operational administrators of important security events Producing reports i.e. attempted external and internal attacks. Preventing a malicious attack (IPS) The fundamental difference between Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) is that IDS is generally a passive technology. An IDS usually alerts security administrators but does not take any preventative measures to stop the potential malicious activity. IPS on the other hand is a reactive technology. IPS can use multiple response techniques, such as reconfiguring the firewall or changing the attack content which stops the attack itself. Because of the proactive measures that an IPS takes to prevent malicious activity, a risk assessment should be undertaken to ascertain all risks in deploying this technology especially in the context of clinical safety. Considerations such as a fail open policy should also be risk assessed. Crown Copyright 2009 Page 8 of 30

9 2.1 Common Detection Methods IDS/IPS s operate as network or host based systems. A network based IDS/IPS is focused on detecting security events from monitoring network traffic. Two common subtypes of network based IDS/IPS are wireless and network behaviour analysis (NBA). A host based IDS/IPS usually resides on the actual device and monitors system behaviour as well as network traffic (to and from the host) to detect security events. This GPG will concentrate on the following types: Network-Based: This monitors network traffic and analyses the network and application protocol activity to identify suspicious activity. o Wireless: This monitors wireless network traffic and analyses it to identify suspicious activity. This is usually related to the wireless networking protocols themselves. o Network Behaviour Analysis (NBA): This examines network traffic to identify threats that generate unusual traffic flows, such as DDoS attacks, scanning, and certain forms of malware. Host-Based: This monitors the characteristics of a single host and the events occurring within that host for suspicious activity. Most IDS/IPS technologies use multiple detection methodologies to provide more broad and accurate detection. The primary methods of detection methodologies are as follows: Signature based: This method compares known threat signatures to observed events to identify security incidents. This method is very good for detecting known threats but largely ineffective at detecting unknown threats. As with antivirus, it is most important to ensure that signature updates are applied frequently from the vendor to maintain an effective defence 1. Anomaly based: This method uses profiles that are developed by monitoring the characteristics of typical activity over a period of time. The IDS/IPS then compares the characteristics of current activity to the profile. Anomaly based detection methods can be very effective at detecting previously unknown threats but are notorious for generating false positives. Stateful Protocol Analysis 2 : Unlike anomaly based detection, which uses host or network-specific profiles, stateful protocol analysis relies on vendordeveloped universal profiles that specify how particular protocols should and should not be used. It is capable of understanding and tracking the state of protocols that have a notion of state, which allows it to detect many attacks that other methods cannot. Problems with stateful protocol analysis include that it is often very difficult or impossible to develop completely accurate models of protocols, it is very resource-intensive, and it cannot detect attacks 1 More advanced organisations may have the capability to write their own signatures. 2 Some vendors use the term deep packet inspection to refer to performing some type of stateful protocol analysis, often combined with a firewall capability that can block communications determined to be malicious. Crown Copyright 2009 Page 9 of 30

10 that do not violate the characteristics of generally acceptable protocol behaviour. Unless the device is capable of running all detection modes without performance degradation a decision will have to be made on what to functionality should be turned on. This should be based on the factors such as the environment, type of detection methods supported and performance capability of the device. The IST would recommend that a minimum baseline requirement is deployed based on the previous factors. If performance is not affected then a staged approach to turning on and tuning of other detection methods should be taken. Crown Copyright 2009 Page 10 of 30

11 3 Components and Architecture 3.1 Typical Components The typical components of an IDS/IPS solution are as follows: Sensor or Agent: Sensors and agents monitor activity. The term sensor is typically used for IDS/IPS that monitor networks, including network based, wireless, and network behaviour analysis technologies. The term agent is typically used for host based IDS/IPS technologies. Management server: A management server is a centralised device that receives information from the sensors or agents and manages them 3. Some management servers perform analysis on the event information that the sensors or agents provide and can identify events that the individual sensors or agents cannot. Matching event information from multiple sensors or agents, such as finding events triggered by the same IP address, is known as correlation. Management servers are available as both appliance and software-only products. In larger IDS/IPS deployments, there are often multiple management servers. Database server: A database server is a repository for event information recorded by sensors, agents, and/or management servers. Many IDS/IPSs provide support for database servers. Console: A console is a program that provides an interface for the IDS/IPS s users and administrators. Console software is typically installed onto standard desktop or laptop computers. Some consoles are used for IDS/IPS administration only, such as configuring sensors or agents and applying software updates, while other consoles are used strictly for monitoring and analysis. Some IDS/IPS consoles provide both administration and monitoring capabilities. 3.2 Architecture Design A point of note is that network based IDS/IPS generally cannot inspect encrypted communications i.e. SSH, SSL and VPN traffic. This is a major consideration within the design stage and has a bearing on whether host based solutions should be used and the location of sensors. One of the first steps in IDS/IPS implementation is designing the architecture. Architectural considerations include the following: Where the sensors or agents should be placed within your environment. Is redundancy required? Having multiple sensors monitor the same activity in case a sensor fails, or using multiple management servers in case of failure. Which other systems the IDS/IPS needs to communicate with, including the following: 3 Some types of IDS/IPS sensors and agents can be deployed standalone, and managed and monitored directly by administrators without using a management server. Crown Copyright 2009 Page 11 of 30

12 Systems to which it provides data, such as security information and event management systems (SIEM) centralised logging servers, servers, and SMS services. In the case of Intrusion Prevention Systems (IPS) which initiates prevention responses e.g. firewall rule changes and router ACL changes 4. How all the components of the IDS/IPS solution will communicate i.e. via a dedicated management network Because a new deployment is likely to generate a large number of false positives until fully tuned, activating many sensors or agents at once might overwhelm the management servers and consoles, making it difficult for security administrators to perform tuning. 3.3 Securing IDS/IPS components Securing IDS/IPS infrastructure is very important because IDS/IPS are often targeted by attackers. If an attacker can compromise an IDS/IPS, it can be rendered useless in detecting and preventing (in the case of IPS) subsequent attacks against other networks and hosts. Also, IDS/IPS often contain sensitive information such as host configurations and known vulnerabilities that could be helpful in planning additional attacks. Comprehensive system hardening procedures should be employed to all components of the IDS/IPS infrastructure. This includes ensuring all components are fully up to date, removing default usernames and passwords and encrypting administrative communication channels 5. 4 This process will need integrating with the organisations current change management process. 5 See NHS Technology Office Infrastructure Security Team (IST) System Hardening Good Practice Guidance (GPG). This can be found at: Crown Copyright 2009 Page 12 of 30

13 4 Network Based IDS/IPS A network based IDS/IPS monitors network traffic and analyses the network and application protocol activity to identify suspicious activity. This section provides more detailed information relating to this type of IDS/IPS 4.1 Architecture and Sensor Locations NHS organisations should consider using dedicated physical management networks for their network based IDS/IPS deployments. If this is not possible then they should consider the use of a VLAN or at the very least ensure all administrative access is encrypted utilising methods such as SSH or SSL 6. In addition to choosing the appropriate network for the components management, IDS/IPS sensor locations need to be decided. Sensors can be deployed in one of two modes: Inline: An inline sensor is deployed so that the network traffic it is monitoring must pass through it. The primary reason for deploying IDS/IPS sensors inline is when utilising IPS functionality to enable them to stop attacks by blocking network traffic. Inline sensors are typically placed where network firewalls and other network security devices would be placed at the logical security borders between networks, such as connections with external networks and borders between different internal networks that should be segregated. Inline sensors are often deployed on the more secure side of a network division so that they have less traffic to process. Figure 1 shows such a deployment. Sensors can also be placed on the less secure side of a network division to provide protection for and reduce the load on the dividing device, such as a firewall although this is usually only done for research purposes as the amount of alerts can be enormous. 6 Please refer to the IST guidance on approved cryptographic standards which can be found here Crown Copyright 2009 Page 13 of 30

14 Figure 1: Inline network Based IDS/IPS Sensor Placement Passive: A passive sensor is deployed so that it monitors a copy of the actual network traffic; no traffic actually passes through the sensor. Passive sensors are typically deployed so that they can monitor key network locations, such as the boundaries between networks, and key network segments, such as activity on a demilitarized zone (DMZ) subnet. Passive sensors can monitor traffic through various methods, including the following: Spanning ports: These are commonly found on enterprise class network equipment such as managed switches. They can be configured in such a way that all other traffic on the switch is mirrored onto this port allowing the IDS/IPS sensor to monitor all traffic the switch deals with. Spanning ports do have some disadvantages, the configuration may be setup incorrectly which may mean missed traffic, in high load situations passing packets are given a higher priority than copying packets to the Spanning port thus some packets may not be copied. Spanning ports are restricted to the device that they are monitoring thus seeing other traffic on the network may require additional devices or a different sensor configuration. Note, SPAN ports are analogous to Roving Analysis Ports and Mirrored Ports Crown Copyright 2009 Page 14 of 30

15 Network Tap: Network Test Access Ports (TAP) are devices specifically designed to allow monitoring of network traffic passively between two devices. They typically consist of four ports into which the devices are connected and the second two ports are used to monitor the up and down stream traffic individually preserving the fullduplex nature of the traffic. Network Tap devices are generally specialist equipment and can be quite expensive to obtain. The specifics of their installation is beyond this document but should be carefully considered, including their operation upon power/hardware failure, before being integrated into an IDS/IPS solution IDS Load Balancer: Also known as Span expanders are a device that aggregates and directs network traffic to monitoring systems, including IDS/IPS sensors. A load balancer can receive copies of network traffic from one or more spanning ports or network taps and aggregate traffic from different networks. The load balancer then distributes copies of the traffic to one or more listening devices, including IDS/IPS sensors. Figure 2: Passive Network Based IDS/IPS Sensor Architecture Example 4.2 Types of events detected The types of events most commonly detected by network based IDS/IPS sensors include the following: Crown Copyright 2009 Page 15 of 30

16 Application layer reconnaissance and attacks: e.g. banner grabbing, buffer overflows, format string attacks, password guessing, malware transmission. Transport layer reconnaissance and attacks: e.g. port scanning, unusual packet fragmentation, SYN floods. Network layer reconnaissance and attacks: e.g. spoofed IP addresses, illegal IP header values. Unexpected application services: e.g. tunnelled protocols, backdoors and hosts running unauthorized application services. Policy violations: e.g. use of inappropriate Web sites, use of forbidden application protocols. 4.3 Detection Accuracy Historically, network based IDS/IPS have been associated with high rates of false positives and false negatives. Most of the early technologies relied primarily on signature based detection, which by itself is accurate only for detecting relatively simple well known threats. Newer technologies use a combination of detection methods to increase accuracy and generally the rates of false positives and false negatives have declined. Another common problem with network based IDS/IPS accuracy is that they typically require considerable tuning and customization to take into account the characteristics of the monitored environment. 4.4 Technology Limitations Although network based IDS/IPS offer extensive detection capabilities, they do have some limitations. Three of the most important are analyzing encrypted network traffic, handling high traffic loads, and withstanding attacks against the IDS/IPS themselves. Network based IDS/IPS cannot detect attacks within encrypted network traffic, including Virtual Private Network (VPN) connections, HTTP over SSL (HTTPS) and SSH sessions. It is a recommendation of the Information Security Team (IST) that NHS organisations when deploying network based IDS/IPS place them so that they can analyse traffic either before encryption or after decryption. Network based IDS/IPS solutions may be unable to perform appropriately under high loads. Attackers sometimes take advantage of this. It is essential that network throughput and load analysis is carried out prior to purchasing network based IDS/IPS solutions. IDS solutions may drop packets under high loads resulting in potentially missed security events. IPS solutions dropping packets could result in disruptions to the network. Crown Copyright 2009 Page 16 of 30

17 5 Wireless IDS/IPS A wireless IDS/IPS monitors wireless network traffic and analyses the wireless networking protocols to identify suspicious activity. This section provides more information relating to this type of IDS/IPS. Please note that the Information Security Team (IST) have produced a comprehensive GPG on Wireless LAN Technologies Threats against WLANs Although wireless and wired networks face the same general types of threats, the relative risk of some threats varies significantly. For example, wireless attacks typically require the attacker or a device placed by the attacker to be within close physical proximity to the wireless network. Most WLAN threats involve an attacker with access to the radio link between a wireless endpoint and a wireless access point. Many attacks rely on an attacker s ability to intercept network communications or inject additional messages into them. This highlights the most significant difference between protecting wireless and wired LANs: the relative ease of accessing and altering network communications. In a wired LAN, an attacker would have to gain physical access to the LAN or remotely compromise systems on the LAN; in a wireless LAN, an attacker simply needs to be within range of the WLAN infrastructure. 5.2 Architecture and Sensor Locations Wireless IDS/IPS components are typically connected to each other through a wired network, as shown in Figure 3. As with a network based IDS/IPS, a separate management network is recommended for wireless IDS/IPS component communications. Also, some wireless IDS/IPS sensors (particularly mobile ones) are used standalone and do not need wired network connectivity. It is a recommendation of the Information Security Team (IST) that there should be strictly controlled separation between the wireless and wired networks e.g. utilising firewall technology 7 Wireless LAN Technologies GPG can be found here Crown Copyright 2009 Page 17 of 30

18 Figure 3: Wireless IDS/IPS Architecture Choosing sensor locations for a wireless IDS/IPS deployment is a fundamentally different problem than choosing locations for any other type of IDS/IPS sensors. Organisations may also want to deploy sensors to monitor areas where there should be no WLAN activity, as well as channels and bands that the organisation s WLANs should not use, as a way of detecting rogue access points and ad hoc WLANs. Other considerations for selecting wireless sensor locations include the following: Physical Security: Sensors are often deployed into open locations e.g. corridors, ceilings and meeting rooms. Sensors are also sometimes deployed outdoors as well. Generally, sensors in open interior locations and external locations are more susceptible to physical threats than other sensors. If the physical threats are significant, it would be a recommendation of the IST that NHS organisations select sensors with anti tamper features or deploy sensors where they are less likely to be physically accessed e.g. within view of CCTV. Sensor Range: The actual range of a sensor varies based on the surrounding facilities e.g. walls and doors. Some wireless IDS/IPS vendors offer software that can help in the placement of sensors. Cost: In an ideal world an organisation would deploy sensors throughout its infrastructure to perform full wireless monitoring. However, the number of sensors needed to do so can be quite large, especially in wide open multi building trust sites. A risk assessment should be undertaken at the design stage to ensure a correct balance is achieved in regards sensor coverage, potential threats and the organisations risk appetite. Crown Copyright 2009 Page 18 of 30

19 5.3 Type of Events Detected The types of events most commonly detected by wireless IDS/IPS sensors include the following: Unauthorised WLANs and WLAN devices: Most wireless IDS/IPS sensors can detect rogue access points and unauthorised end points. Poorly secured WLAN devices: Most wireless IDS/IPS sensors can identify access points and end points that are not using proper security controls. This includes detecting misconfigured devices and the use of weak WLAN protocols. Unusual usage patterns: Some sensors can use anomaly based detection methods to detect unusual WLAN usage patterns. Denial of service (DoS) attacks: DoS attacks include logical attacks such as flooding, and physical attacks such as jamming. Impersonation and man-in-the-middle attacks: Some wireless IDS/IPS sensors can detect when a device is attempting to spoof the identity of another device. 5.4 Detection Accuracy Compared to other forms of IDS/IPS, wireless IDS/IPS is generally more accurate; this is largely due to its limited scope of monitoring wireless networking protocols. Although many alerts may occur based on benign activity, such as another organisation s WLAN being within range of the organisation s WLANs, these alerts are not truly false positives because they are accurately detecting an unknown WLAN within the organisation s facilities. In dense urban areas where wireless networks are prevalent it may prove to be a false economy to implement a Wireless IDS/IPS solution. 5.5 Technology Limitations Although wireless IDS/IPS offers robust detection capabilities, they do have some limitations. Three of the most important are being unable to detect certain wireless protocol attacks, being susceptible to evasion techniques, and being unable to withstand attacks against the IDS/IPSs themselves. Wireless IDS/IPS cannot detect passive attacks against wireless networks. For example an attacker can monitor wireless traffic and if weak security methods are being used e.g. WEP, the attacker can then perform offline processing of that collected traffic to find the encryption key used to provide security for the wireless traffic. The attacker can then passively capture and decrypt all wireless communications, undetected. Crown Copyright 2009 Page 19 of 30

20 6 Network Behaviour Analysis (NBA) IDS/IPS A network behaviour analysis (NBA) IDS/IPS examines network traffic to identify unusual traffic flows, such as distributed denial of service DDoS attacks, certain forms of malware (worms and Trojans) and policy violations ( client system providing network services to other systems) This section provides more information relating to this type of IDS/IPS. 6.1 Architecture and Sensor Locations Some NBA IDS/IPS sensors are similar to network based IDS/IPS sensors in that they sniff packets to monitor network activity on one or a number of network segments. Other NBA sensors do not monitor the networks directly, but instead rely on network flow information provided by networking devices (flow refers to a communication session occurring between hosts). There are many standards for flow data formats, e.g. NetFlow 8. As with a network based IDS/IPS, a separate management network is recommended for wireless IDS/IPS component communications. If sensors that collect network flow data from other devices are used, the entire NBA solution can be logically separated from the production network. Figure 4 shows an example of an NBA network architecture. 8 NetFlow is a network protocol developed by Cisco Systems to run on Cisco IOS enabled equipment for collecting IP traffic information. It's proprietary but supported by many other platforms and vendors. Crown Copyright 2009 Page 20 of 30

21 Figure 4: NBA Sensor Architecture Example In addition to choosing the appropriate network for the components, IDS/IPS sensor locations need to be decided. NBA IDS/IPS usually work in passive mode so utilising the same methods as passive network based IDS/IPS mentioned earlier in this document e.g. network taps and spanning ports is appropriate. Passive sensors that are performing direct network monitoring should be placed so that they can monitor key network locations, such as the boundaries between networks, and key network segments, such as a demilitarized zone (DMZ) subnet. 6.2 Types of events detected The types of security events most commonly detected by NBA IDS/IPS include the following: Denial of service (DoS) attacks: Including distributed denial of service DDoS attacks. Crown Copyright 2009 Page 21 of 30

22 Scanning: Scanning can be detected by typical flow patterns at the application layer (banner grabbing), transport layer (TCP and UDP port scanning), and network layer (ICMP scanning). Worms: Some worms propagate quickly and use large amounts of bandwidth. These are easily detected by NBA IDS/IPS. Unexpected application services: This includes tunnelled protocols, backdoors and use of forbidden application protocols. Since most NBA sensors can reconstruct a series of security events to determine the origin of a threat they are a great asset in the incident response process. 6.3 Detection Accuracy Because NBA IDS/IPS work primarily by detecting significant abnormalities, they are most accurate at detecting attacks that generate large amounts of network activity in a short period of time e.g. DDoS attacks and attacks that have unusual flow patterns e.g. worms. NBA IDS/IPS are less accurate at detecting small scale attacks, particularly if they are conducted slowly and within normal parameters. 6.4 Technology Limitations NBA IDS/IPS offer strong detection capabilities for certain types of threats, but they also have limitations. An important limitation is the delay in detecting attacks. Some delay is expected in anomaly detection methods that are based on deviations from a baseline, such as increased bandwidth usage or additional connection attempts. However, NBA technologies often have additional delay caused by their data sources, especially when they rely on flow data from other network devices. NBA IDS/IPS are normally passive in nature and usually depend on analysis of provided flow data from other devices. This can lead to delays in attack detection. Crown Copyright 2009 Page 22 of 30

23 7 Host Based IDS/IPS A host based IDS/IPS usually involves the installation of agents on the monitored host. These agents then monitor the host for security events occurring within that host. Examples of the types of characteristics a host based IDS/IPS might monitor are wired and wireless network traffic (only for that host), system logs, running processes, file access and modification, and system and application configuration changes. This section provides information for this type of IDS/IPS. 7.1 Architecture and Agent Locations The network architecture for host based IDS/IPS deployments is usually very simple. As the agents are deployed to existing hosts within the organisation, the components usually communicate over the production network instead of using a separate management network. Most products encrypt their communications, preventing eavesdroppers from accessing sensitive information on the wire. Figure 5 shows an example of a host based IDS/IPS infrastructure. A recommendation of the Information Security Team (IST) is that host based IDS/IPS communications are encrypted. The capability of the system to do this should be investigated prior to purchase. Host based IDS/IPS agents are commonly deployed to critical hosts such as publicly accessible servers and servers containing sensitive information. However, because agents are available for various server and desktop operating systems, organisations could potentially deploy agents to most of their infrastructure e.g. DMZ servers, internal servers and desktop computers. The use of host based IDS/IPS also allows organisations to monitor for security events that can t be detected by other technologies e.g. network based IDS/IPS inability to analyse encrypted traffic. Crown Copyright 2009 Page 23 of 30

24 Figure 5: A typical host based IDS/IPS infrastructure. 7.2 Types of events detected The types of security events detected by a host based IDS/IPS vary based primarily on the detection method that they use. Some host based IDS/IPS products offer several of these detection methods, while others focus on a few or just one. For example, some products only analyse network traffic, and other products only check the integrity of a hosts critical files. The types of events commonly detected by host based IDS/IPS include the following: Code Analysis: Code behaviour analysis, buffer overflow detection and system call monitoring are all types of code analysis methods. Agents might use one or more of the listed methods to identify malicious activity by analysing attempts to execute code. All of these methods are helpful at stopping malware and can also prevent other attacks, such as some that would permit unauthorised access, code execution, or escalation of privileges. Crown Copyright 2009 Page 24 of 30

25 Network Traffic Analysis: This is similar to what a network based IDS/IPS does; some products can analyse both wired and wireless network traffic. Host based IDS/IPS agents often include a host based firewall that can restrict incoming and outgoing traffic for each application on the system. File system Monitoring: File system monitoring can be performed using a few different methods, including file integrity checking, file attribute checking and file access attempts. File integrity checking involves periodically generating message digests or other cryptographic checksums for critical files, comparing them to a known value, and identifying differences. File integrity checking can only determine after the fact that a file has already been changed, such as a system binary being replaced by a Trojan or a rootkit. File attribute checking periodically checks the attributes of important files, such as ownership and permissions for changes. Like file integrity checking, it can only determine after the fact that a change has occurred. Scheduling frequent file checks should be balanced against the impact of system performance and the volume of logs which will be generated. Log Analysis: Some agents can monitor and analyse operating system and application logs to identify malicious activity. These logs may contain information on system events such as shutting down the system and starting a service; audit records, which contain security event information such as successful and failed log on attempts and application events, such as application start up and shutdown, application failures, and major application configuration changes. Network Configuration Monitoring: Some agents can monitor a host s current network configuration and detect changes to it. Examples of network configuration changes are network interfaces being placed in promiscuous mode.. Organisations should determine which aspects of a host need to be monitored and select IDS/IPS products that provide adequate monitoring and analysis for them. 7.3 Detection Accuracy Like other IDS/IPS technologies, host based IDS/IPS often cause false positives and false negatives. However, accuracy is more challenging for host based IDS/IPS because many of the possible detection methods, such as log analysis and file system monitoring, do not have knowledge of the context under which detected events occurred. For example, a host may be rebooted, a new application installed, or a system file replaced. These actions could be done by malicious activity, or they could be part of normal operation and maintenance. The events themselves are detected accurately, but their benign or malicious nature cannot always be determined without additional context. Some products, particularly those intended for Crown Copyright 2009 Page 25 of 30

26 desktops, prompt users to provide context. This in itself can be a problem if users are not educated to determine if the request is benign of malicious. It is a recommendation of the Information Security Team (IST) that host based IDS/IPS that utilises a combination of detection methods are used to achieve a more accurate detection rate. 7.4 Technology Limitations Like all IDS/IPS solutions host based IDS/IPS do have some limitations. The primary issues include centralised reporting delays, host resource usage and potential conflicts with existing security controls. Many host based IDS/IPS are intended to be used with a centralised management server where the agents send their data periodically. This can lead to delays in detecting malicious activity. Where possible and network bandwidth permits it is recommended that this delay is kept to a minimum to provide the best protection.. Crown Copyright 2009 Page 26 of 30

27 8 IDS/IPS Technology Comparison Chart Technology Type Network Based Types of Malicious Activity Detected Network, transport, and application TCP/IP layer activity Wireless Wireless protocol activity; unauthorised wireless local area networks (WLAN) in use NBA Network, transport, and application TCP/IP layer activity that causes anomalous network flows Host Based Host application and operating system (OS) activity; network, transport, and application TCP/IP layer activity Scope per Sensor or Agent Multiple network subnets and groups of hosts Multiple WLANs and groups of wireless clients Multiple network subnets and groups of hosts Individual host Strengths Able to analyse the widest range of application protocols; only IDS/IPS that can thoroughly analyse many of them Only IDS/IPS that can monitor wireless protocol activity Typically more effective than the others at identifying reconnaissance scanning and DoS attacks, and at reconstructing major malware infections Only IDS/IPS that can analyse activity that was transferred in endto-end encrypted communications The Information Security Team (IST) would recommend a blended approach to IDS/IPS solutions, using multiple types of IDS/IPS technologies to achieve a more comprehensive and accurate detection and prevention of malicious activity, Where possible, IDS/IPS products should provide interoperability through recognised standards to allow centralised management and integration of all aspects of the IDS/IPS solution. This will also enable the organisation to develop the maturity of the IDS/IPS solution in line with the NHS Infrastructure Maturity Model (NIMM) as well as enable changes in architecture as the organisations network and systems change over time. NHS organisations should use risk management techniques to identify the security controls necessary to mitigate risk to an acceptable level. Although it may be tempting to simply choose a product, using a risk management process to choose the most effective blend of controls enhances an organisation s security posture. Note: For further information on Risk Assessment within an NHS organisation refer to the Information Security Teams (IST) GPG Security General Principles Crown Copyright 2009 Page 27 of 30

28 9 Configuration and Maintenance of IDS/IPS 9.1 Tuning IDS/IPS cannot be considered as out of the box security solutions as they require specialised configuration and maintenance to ensure that false positives and false negatives are reduced. Tuning of an IDS is dependent upon the size and complexity of the installed system and the number of sensors used. This type of exercise should normally be carried out by a qualified engineer who can work with the customer to achieve the best protection from the system. In general the following steps are used to tune a system. 1. Determine optimum placement of sensors 2. Determine normal baselines and implement a basic configuration 3. Analyse the logs and alarms whilst normal operations are conducted 4. Filter out false positives through traffic analysis and system use and implement additional filtering as necessary 5. Determine responses to alert types 6. Apply new tuned configuration and return to step 2 as required This process can be used to fine tune the system to a point where the data being generated can be sufficiently analysed to provide the security required. Systems must be tuned to take account of the types of traffic being analysed and the resources available to respond to alerts. The basic process above can be refined and applied to all types of IDS/IPS devices. Typically, the more powerful a product s tuning and customisation capabilities are, the more its detection accuracy can be improved from the default configuration. Security administrators should review tuning and customisations periodically to ensure that they are still accurate. 9.2 Staffing and Resourcing All IDS/IPS require some human intervention at some stage and the levels of resourcing put in place to manage the alerts and incidents detected by the IDS/IPS should be in line with the value of the assets the system is protecting. The use of automated systems to handle the majority of alerts is encouraged and a properly tuned system should not require constant human monitoring for it to be effective. Staff should be put in place to monitor incidents and make the appropriate decisions based upon established policies and procedures. More mature organisations may also be able to integrate the alerting process of the IDS/IPS into the organisations current Incident Management Programme. Crown Copyright 2009 Page 28 of 30

29 IDS/IPS management and monitoring is a prime candidate for outsourcing especially in large deployments and should be considered. 9.3 Configuration Management Policy and procedure should be put in place to ensure that sensors deployed within the infrastructure can be updated with new configurations in a managed way. The extent of change management is dictated by the number of sensors deployed ranging from a single node with a manual update process to many sensors deployed in different environments which check a central repository for new configurations. Where possible: Group Sensors into as few groups as possible and define appropriate configurations for each group to ease management. Stagger updates to sensors to reduce the impact of mis-configurations leaving the network potentially vulnerable Separate the change management functions from the event monitoring systems to provide resilience Crown Copyright 2009 Page 29 of 30

30 10 Resources and References 10.1 Further helpful resources Evaluating IDS/IPS solutions: Intrusion Detection System Frequently Asked Questions: Wireless Intrusion Detection Systems: Anomaly Detection in IP Networks: Host-Based Intrusion Detection Systems: References Bejtlich, Richard, The Tao of Network Security Monitoring: Beyond Intrusion Detection, Addison- Wesley, Rash, Michael et al, Intrusion Prevention and Active Response: Deployment Network and Host IPS, Syngress, NIST, SP , Guide to Malware Incident Prevention and Handling NIST, SP , Guide to Intrusion Detection and Prevention Systems (IDS/IPS) Crown Copyright 2009 Page 30 of 30

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) ISCA Journal of Engineering Sciences ISCA J. Engineering Sci. Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) Abstract Tiwari Nitin, Solanki Rajdeep

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

Proxy Services: Good Practice Guidelines

Proxy Services: Good Practice Guidelines Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance Prog. Director Mark Ferrar Owner Tim Davis Version 1.0 Author James Wood Version Date 26/01/2006 Status APPROVED Proxy Services:

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

Taxonomy of Intrusion Detection System

Taxonomy of Intrusion Detection System Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use

More information

Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware

Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware 1 Corresponding Author: lawal5@yahoo.com 1 O.B. Lawal Computer Science Department,

More information

Network Address Translation (NAT) Good Practice Guideline

Network Address Translation (NAT) Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG-0011.06 Prog. Director Chris Wilber Status Approved Owner James Wood Version 2.0 Author Mike Farrell

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

TECHNICAL NOTE 10/03 DEPLOYMENT GUIDANCE FOR INTRUSION DETECTION SYSTEMS

TECHNICAL NOTE 10/03 DEPLOYMENT GUIDANCE FOR INTRUSION DETECTION SYSTEMS TECHNICAL NOTE 10/03 DEPLOYMENT GUIDANCE FOR INTRUSION DETECTION SYSTEMS 19 NOVEMBER 2003 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor

More information

IDS / IPS. James E. Thiel S.W.A.T.

IDS / IPS. James E. Thiel S.W.A.T. IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods

More information

Secure Use of the New NHS Network (N3): Good Practice Guidelines

Secure Use of the New NHS Network (N3): Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0003.01 Prog. Director Mark Ferrar Status Approved Owner Tim Davis Version 1.0 Author Phil Benn Version

More information

Use of tablet devices in NHS environments: Good Practice Guideline

Use of tablet devices in NHS environments: Good Practice Guideline Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

Introduction of Intrusion Detection Systems

Introduction of Intrusion Detection Systems Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:

More information

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the

More information

Site to Site Virtual Private Networks (VPNs):

Site to Site Virtual Private Networks (VPNs): Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0

More information

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow IDS 4.0 Roadshow Module 1- IDS Technology Overview Agenda Network Security Network Security Policy Management Protocols The Security Wheel IDS Terminology IDS Technology HIDS and NIDS IDS Communication

More information

Intrusion Detection System (IDS)

Intrusion Detection System (IDS) Intrusion Detection System (IDS) Characteristics Systems User, Process predictable actions describing process under that actions what pattern subvert actions attack of correspond the systems processes

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

IDS : Intrusion Detection System the Survey of Information Security

IDS : Intrusion Detection System the Survey of Information Security IDS : Intrusion Detection System the Survey of Information Security Sheetal Thakare 1, Pankaj Ingle 2, Dr. B.B. Meshram 3 1,2 Computer Technology Department, VJTI, Matunga,Mumbai 3 Head Of Computer TechnologyDepartment,

More information

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Name. Description. Rationale

Name. Description. Rationale Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.

More information

Guide to Intrusion Detection and Prevention Systems (IDPS) (Draft)

Guide to Intrusion Detection and Prevention Systems (IDPS) (Draft) Special Publication 800-94 Revision 1 (Draft) Guide to Intrusion Detection and Prevention Systems (IDPS) (Draft) Recommendations of the National Institute of Standards and Technology Karen Scarfone Peter

More information

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router

More information

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT WHAT S INSIDE: 1. GENERAL INFORMATION 1 2. EXECUTIVE SUMMARY 1 3. BACKGROUND 2 4. QUESTIONS FOR CONSIDERATION

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A What is NetFlow? Network protocol originally developed by Cisco

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)

More information

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

PCI Wireless Compliance with AirTight WIPS

PCI Wireless Compliance with AirTight WIPS A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Introduction Although [use

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

642 552 Securing Cisco Network Devices (SND)

642 552 Securing Cisco Network Devices (SND) 642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,

More information

Network- vs. Host-based Intrusion Detection

Network- vs. Host-based Intrusion Detection Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477

More information

Network Security Guidelines. e-governance

Network Security Guidelines. e-governance Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/

More information

Closing Wireless Loopholes for PCI Compliance and Security

Closing Wireless Loopholes for PCI Compliance and Security Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop

More information

Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details

Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details CYBER SECURITY OPERATIONS CENTRE 13/2011 21 July 2011 Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details INTRODUCTION 1. This document provides further information regarding DSD s list

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

Intrusion Detection and Prevention Systems in the Industrial Automation and Control Systems Environment

Intrusion Detection and Prevention Systems in the Industrial Automation and Control Systems Environment Intrusion Detection and Prevention Systems in the Industrial Automation and Control Systems Environment Chris Martin Senior Director Product Strategy Industrial Defender Inc. Agenda Overview of IDS/IPS

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann

More information

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

IntruPro TM IPS. Inline Intrusion Prevention. White Paper IntruPro TM IPS Inline Intrusion Prevention White Paper White Paper Inline Intrusion Prevention Introduction Enterprises are increasingly looking at tools that detect network security breaches and alert

More information

Guideline on Firewall

Guideline on Firewall CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June

More information

Network/Internet Forensic and Intrusion Log Analysis

Network/Internet Forensic and Intrusion Log Analysis Course Introduction Enterprises all over the globe are compromised remotely by malicious hackers each day. Credit card numbers, proprietary information, account usernames and passwords, and a wealth of

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc. Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim

More information

General Network Security

General Network Security 4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Intrusion Detection for Mobile Ad Hoc Networks

Intrusion Detection for Mobile Ad Hoc Networks Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering tchen@engr.smu.edu http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems

More information

COORDINATED THREAT CONTROL

COORDINATED THREAT CONTROL APPLICATION NOTE COORDINATED THREAT CONTROL Interoperability of Juniper Networks IDP Series Intrusion Detection and Prevention Appliances and SA Series SSL VPN Appliances Copyright 2010, Juniper Networks,

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..

More information

USM IT Security Council Guide for Security Event Logging. Version 1.1

USM IT Security Council Guide for Security Event Logging. Version 1.1 USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate

More information

Description: Objective: Attending students will learn:

Description: Objective: Attending students will learn: Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of

More information

Application Security Backgrounder

Application Security Backgrounder Essential Intrusion Prevention System (IPS) & DoS Protection Knowledge for IT Managers October 2006 North America Radware Inc. 575 Corporate Dr., Lobby 1 Mahwah, NJ 07430 Tel: (888) 234-5763 International

More information

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates

More information

Web Application Defence. Architecture Paper

Web Application Defence. Architecture Paper Web Application Defence Architecture Paper June 2014 Glossary BGP Botnet DDoS DMZ DoS HTTP HTTPS IDS IP IPS LOIC NFV NGFW SDN SQL SSL TCP TLS UTM WAF XSS Border Gateway Protocol A group of compromised

More information

INTRODUCTION TO FIREWALL SECURITY

INTRODUCTION TO FIREWALL SECURITY INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Technical Note. ForeScout CounterACT: Virtual Firewall

Technical Note. ForeScout CounterACT: Virtual Firewall ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...

More information

Using Ranch Networks for Internal LAN Security

Using Ranch Networks for Internal LAN Security Using Ranch Networks for Internal LAN Security The Need for Internal LAN Security Many companies have secured the perimeter of their network with Firewall and VPN devices. However many studies have shown

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Release: 1. ICANWK607A Design and implement wireless network security

Release: 1. ICANWK607A Design and implement wireless network security Release: 1 ICANWK607A Design and implement wireless network security ICANWK607A Design and implement wireless network security Modification History Release Release 1 Comments This Unit first released with

More information

Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware

Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware 1 Corresponding Author: lawal5@yahoo.com 1 O.B. Lawal Computer Science Department,

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers The Cisco Intrusion Prevention System Advanced Integration Module

More information

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) : Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh Written Exam in Network Security ANSWERS May 28, 2009. Allowed aid: Writing material. Name (in block letters)

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

The Ultra-Secure Network Architecture

The Ultra-Secure Network Architecture The Ultra-Secure Network Architecture You almost cannot open a newspaper, news magazine, a news Web site or your electronic mail without finding out that another company has suffer a security breach and

More information

How To Protect Your Network From Attack From Outside From Inside And Outside

How To Protect Your Network From Attack From Outside From Inside And Outside IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features

More information

Role of Anomaly IDS in Network

Role of Anomaly IDS in Network Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

Firewall Environments. Name

Firewall Environments. Name Complliiance Componentt DEEFFI INITION Description Rationale Firewall Environments Firewall Environment is a term used to describe the set of systems and components that are involved in providing or supporting

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

Chapter 8 Security Pt 2

Chapter 8 Security Pt 2 Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

Global Partner Management Notice

Global Partner Management Notice Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with

More information