A Survey of Intrusion Detection Systems
|
|
|
- Annice Shelton
- 9 years ago
- Views:
Transcription
1 A Survey of Intrusion Detection Systems Daniele Sgandurra 1 1 Istituto di Informatica e Telematica, CNR, Pisa, Italy 1/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
2 Outline 1 Introduction Attacks and Threats 2 Characteristics of 3 Static Analysis Run-Time Support 2/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
3 Attacks and Threats Broad New Hacking Attack Detected Wall Street Journal (18/02/2010): Hackers in Europe and China successfully broke into computers at nearly companies and government agencies over the last 18 months in a coordinated global attack that exposed vast amounts of personal and corporate secrets to theft. [...] infiltrating some computers and touching 196 countries. The highest concentrations of infected computers are in Egypt, Mexico, Saudi Arabia, Turkey and the U.S. 3/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
4 Attacks and Threats Broad New Hacking Attack Detected 4/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
5 Attacks and Threats Mariposa Botnet It is considered the largest botnet, consisting of 12,7 million hosts comprised of systems in businesses, universities, government agencies, and in homes of more than 190 countries. Now it s dead. The stolen data included bank account details, credit card numbers, user names, passwords, etc., belonging to more than users. 5/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
6 Attacks and Threats The Top Cyber Security Risks Featuring attack data from TippingPoint intrusion prevention systems protecting organizations. Vulnerability data from systems compiled by Qualys. Additional analysis and tutorial by the Internet Storm Center and key SANS faculty members. September /64 Daniele Sgandurra A Survey of Intrusion Detection Systems
7 Attacks and Threats The Top Cyber Security Risks Priority One: client-side software that remains unpatched. Priority Two: Internet-facing web sites that are vulnerable. Operating systems continue to have fewer remotely-exploitable vulnerabilities that lead to massive Internet worms. Rising numbers of zero-day vulnerabilities. 7/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
8 Attacks and Threats The Top Cyber Security Risks The number of vulnerabilities being discovered in applications is far greater than the number of vulnerabilities discovered in OS. 8/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
9 Attacks and Threats IBM s annual X-Force Trend and Risk Report The number of software vulnerabilities fell overall in 2009, but the number of bugs in document readers and multimedia applications increased by 50 %. Of the 5 most prevalent Web site exploits, 3 involved PDF files. The other two exploits involved Flash and an ActiveX control. 9/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
10 Attacks and Threats IBM s annual X-Force Trend and Risk Report Browsers had the most client-side vulnerabilities: Firefox had twice the number of critical/high vulnerabilities as IE. More than half of the critical/high client-side vulnerabilities affected just 4 vendors: Microsoft, Adobe, Mozilla and Apple: while on average most vendors patch 66 % of those outstanding vulnerabilities, Apple proved the worst, patching just 38%. 10/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
11 Attacks and Threats Targeted Attacks 2008/2009/ /64 Daniele Sgandurra A Survey of Intrusion Detection Systems
12 Attacks and Threats Application Patching is Much Slower than Operating System Patching 12/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
13 Attacks and Threats Key Predictions for 2010 and Beyond Trend Micro 2010 Annual Threat Roundup: No global outbreaks, but localized and targeted attacks. It s all about money, so cybercrime will not go away: mobile devices will become greater targets for cybercrime. Windows 7 will have an impact since it is less secure than Vista in the default configuration. Risk mitigation is not as viable an option anymore even with alternative browsers/alternative operating systems. 13/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
14 Attacks and Threats Key Predictions for 2010 and Beyond Malware is changing its shape every few hours. Drive-by infections are the norm: one Web visit is enough to get infected. New attack vectors will arise for virtualized/cloud environments. Bots cannot be stopped anymore, and will be around forever. Company/Social networks will continue to be shaken by data breaches. 14/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
15 Attacks and Threats Types of Threats Two types of threats: insider and outsider. Insider threat: hard to detect and quantify. Outsider threat: attacks from over the Internet: ubiquitous: background radiation: on average, hosts are probed every 90 sec. medium-size site: of remote scanners each day; what do they scan for? A wide and changing set of services/vulnerabilities, attacked via auto-rooters or worms; what are they after? They seek zombies for DDOS slaves, spamming, bots-for-sale,... 15/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
16 Definitions Introduction Characteristics of Intrusion: a set of actions aimed to compromise: integrity, confidentiality, or availability, of a computing and networking resource. Intrusion detection (ID): the process of identifying and responding to intrusion activities, i.e. entities attempting to subvert in-place security control: Intrusion Detection Systems () are SW and/or HW components that monitor the events in a computer or in a network and analyze the activities for signs of possible violations of computer security policies. Intrusion prevention: extension of ID with access control to protect computers from exploitation. Intrusion Detection and Prevention Systems (IDPS). 16/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
17 Intrusion Detection Introduction Characteristics of An intrusion detection system (IDS) finds anomalies. The IDS approach to security is based on the assumption that a system will not be secure, but that violations of security policy (intrusions) can be detected by monitoring and analyzing system behavior. (Forrest 98) The IDS requires: training the IDS (training); looking for anomalies (detection). 17/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
18 Intrusion Detection Systems Characteristics of A Network IDS (NIDS) attempts to identify unauthorized, illicit and anomalous behaviors based on network traffic A Host IDS (HIDS) attempts to identify violations of the security policies on a specific device. A signature-based IDS examines the activities for predetermined attack patterns known as signatures. An anomaly based-ids firstly builds a model of the normal usage of the monitored system and, based on this model, it then monitors the system s activities by classifying them as either normal or anomalous. 18/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
19 Characteristics of Characteristics of 19/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
20 Key Functions IDS Technologies Characteristics of Monitor and analyze events to identify incidents. Record information related to observed events. Notify security administrators of important observed events. Producing reports. IPS also attempt to prevent a threat from succeeding: stop the attack itself; change the security environment; change the attack content. 20/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
21 Network IDS (NIDS) Introduction Characteristics of Network IDS attempts to identify unauthorized, illicit, and anomalous behavior based solely on network traffic: using either a network tap, span port, or hub collects packets. Using the captured data, the IDS system processes and flags any suspicious traffic. The role of a network IDS is passive, only gathering, identifying, logging and alerting. 21/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
22 NIDS Placement Introduction Characteristics of 22/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
23 NIDS Example: SNORT Characteristics of Open source IDS. Snort rules. Sample: alert tcp any any -> / (content:" a5 "; msg: "mountd access";) Rule Header: Action, Protocol, Src+Port -> Dest+Port Rule Options: Alert messages and Packet Content 23/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
24 Host Based (HIDS) Introduction Characteristics of Host-based intrusion detection attempts to identify unauthorized, illicit, and anomalous behavior on a specific device. HIDS generally involves an agent installed on each system, monitoring and alerting on local OS and application activity. The installed agent uses a combination of signatures, rules, and heuristics to identify unauthorized activity. 24/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
25 HIDS Block Diagram Introduction Characteristics of 25/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
26 HIDS Example: OSSEC Characteristics of OSSEC is an Open Source Host-based IDS. Log analysis. File integrity checking. Policy monitoring. Rootkit detection. Real-time alerting. Active response. 26/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
27 OSSEC Example Logs Introduction Characteristics of SSH: May 21 20:22:28 slacker sshd[21487]: Failed password for root from port 1045 ssh2 ProFTPD: May 21 20:21:21 slacker proftpd[25530] proftpd.lab.ossec.net ( [ ]): no such user dcid-inv Bind: Aug 29 15:33:13 ns3 named[464]: client #32769: query (cache) denied Apache: [28/Jul/2006:10:27: ] "GET /hidden/ HTTP/1.0" Windows: Nov 2 17:23: security[failure] 529 NT AUTHORITY\SYSTEM Logon Failure: Reason:Unknown user name or bad password User Name:Jeremy Lee Domain:IBM17M Logon Type:2 Logon Process:User32 Authentication Package:Negotiate Workstation Name:IBM17M Cisco IOS: Sep 6 09:20:44 RouterName 86: Sep 6 14:20:35.991: %SYS-5-CONFIG_I: Configured from console by admin on vty0 ( ) 27/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
28 Host vs Network IDS Introduction Characteristics of 28/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
29 Physical (Physical IDS) Introduction Characteristics of Physical intrusion detection is the act of identifying threats to physical systems. Examples of: security Guards; security Cameras; access control systems (card, biometric); firewalls; man traps; motion sensors. 29/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
30 Network Behavior Analysis (NBA) Characteristics of Network Behavior Analysis (NBA) examines network traffic to identify threats that generate unusual traffic flows: distributed denial of service (DDoS) attacks; certain forms of malware (e.g., worms, backdoors); policy violations (e.g., a client system providing network services to other systems). Monitor flows on an organization s internal networks. Monitor flows between internal networks and external networks. 30/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
31 NBA Sensor Architecture Example Characteristics of 31/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
32 Wireless IDS Introduction Characteristics of Wireless IDS monitors wireless network traffic and analyzes its protocols to identify suspicious activity in the protocols. It cannot identify suspicious activity in the application or higher-layer network protocols (e.g., TCP) that the wireless traffic is transferring. Deployed within range of an organization s wireless network, but also to locations where unauthorized wireless networking could occur. 32/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
33 Wireless IDS Placement Characteristics of 33/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
34 Characteristics of Comparison of IDPS Technology Types 34/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
35 Honeypot Introduction Characteristics of Honeypot Systems are decoy servers or systems setup to gather information regarding an attacker or intruder into your system. Can be setup outside or in the DMZ although they are most often deployed inside of a firewall for control purposes. In a sense, they are variants of standard IDS but with more of a focus on information gathering and deception. 35/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
36 Honeypot Introduction Characteristics of 36/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
37 Honeypot Introduction Characteristics of 1 Learn how intruders probe and attempt to gain access to your systems: gain insight into attack methodologies to better protect your real production systems. 2 Gather forensic information to aid in the prosecution of intruders: to provide law enforcement officials with the details to prosecute. 37/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
38 Signature-Based Detection Characteristics of A signature is a pattern that corresponds to a known threat. Signature-Based Detection is the process of comparing signatures against observed events to identify possible incidents. Examples: a telnet attempt with a username of root, which is a violation of an organization s security policy an with a subject of Free pictures! and an attachment filename of freepics.exe, which are characteristics of a malware an operating system log entry with a status code value of 645, which indicates that the host s auditing has been disabled. 38/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
39 Signature-Based Detection Characteristics of Very effective at detecting known threats but largely ineffective at: detecting previously unknown threats, threats disguised by the use of evasion techniques, variants of known threats. If an attacker modified the previous malware to attach freepics2.exe, a signature looking for freepics.exe would not match it. 39/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
40 Anomaly-Based Detection Characteristics of Anomaly-based detection is the process of comparing definitions of what activity is considered normal against observed events to identify significant deviations. An IDS using anomaly-based detection has profiles that represent the normal behavior. The profiles are developed by monitoring the characteristics of typical activity over a period of time. 40/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
41 Anomaly-Based Detection Characteristics of The IDS uses statistical methods to compare the characteristics of current activity to thresholds related to a profile. They can be very effective at detecting previously unknown threats. An initial profile is generated over a period of time (training). Ex.: user Joe only logs in from host ABC, usually at night. 41/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
42 Specification-Based Detection Characteristics of Core idea: codify a specification of what a sites policy permits; look for patterns of activity that deviate. Example: user Joe is only allowed to log in from host ABC. Pro: Con: potentially detects wide range of attacks, including novel; framework can accommodate signatures, anomalies; directly supports implementing a site s policy. specifications require significant development & maintenance; hard to construct attack libraries. 42/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
43 Stateful Protocol Analysis Characteristics of Stateful protocol analysis is the process of comparing predetermined profiles of generally accepted definitions of benign protocol activity for each protocol state against observed events to identify deviations. Relies on vendor-developed universal profiles that specify how particular protocols should and should not be used. The stateful in stateful protocol analysis means that the IDS is capable of understanding and tracking the state of network, transport, and application protocols that have a notion of state. 43/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
44 Sensor or Agent Introduction Characteristics of Sensors and agents monitor and analyze activities. The term sensor is typically used for that monitor networks, including network-based, wireless, and network behavior analysis technologies. The term agent is typically used for host-based IDS technologies 44/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
45 Management Server Introduction Characteristics of A management server is a centralized device that receives information from the sensors or agents and manages them. Sometimes perform analysis on the events provided by sensors/agents to identify events that the individual sensors or agents cannot: matching event information from multiple sensors/agents, such as finding events triggered by the same IP, is known as correlation. 45/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
46 Database Server and Console Characteristics of A database server is a repository for event information recorded by sensors, agents, and/or management servers. A console is a program that provides an interface for the IDS s users and administrators. 46/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
47 False Positives/Negatives Characteristics of All suffer from the twin problems of false positives and false negatives: not minor, but an Achilles heel. False positives occur when the IDS erroneously detects a problem with benign traffic. False negatives occur when unwanted traffic is undetected. Both create problems for security administrators and may require that the system be calibrated. False positives can burden administrator with cumbersome amounts of data. False negatives do not afford administrators an opportunity to review the data. 47/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
48 Base-rate Fallacy Introduction Characteristics of Suppose that your doctor performs a test that is 99% accurate: when the test was administered to a test population all of whom had the disease, 99% of the tests indicated disease; when the test population was known to be 100% free of the disease, 99% of the test results were negative. Upon visiting your doctor to learn the results he has good and bad news: the bad news is that you tested positive for the disease; the good news is that out of the entire population the rate of incidence is only 1/ (only 1 in people have this ailment). What is the probability of you having the disease? 48/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
49 Base-rate Fallacy Introduction Characteristics of If S denotes Sick and S denotes healthy and P denotes a positive test results and P a negative test results, we have P(P S) = 0, 99, P( P S) = 0, 99, P(S) = 1/ P(S P) =? Since P(A B) = then P(S P) = P(A) P(B A) P ni=1 P(A i ) P(B A i ) P(S) P(P S) P(S) P(P S)+P( S) P(P S) and P(P S) = 1 P( P S) = 1% and P( S) = 1 P(S) then P(S P) = 1/ ,99 = 0, % 1/ ,99+(1 1/10.000) 0,01 49/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
50 The Problem of Evasion Characteristics of Consider the following attack URL: Easy enough to scan for cmd.exe, right? What if you consider: Okay, we need to handle % escapes. What about: 50/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
51 The Problem of Evasion Characteristics of Consider passive measurement: scanning traffic for a particular string ( USER root ) Easiest: scan for the text in each packet: not good: text might be split across multiple packets. Okay, remember text from previous packet: not good: out-of-order delivery. Okay, fully reassemble byte stream: costs state and still evadable. 51/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
52 Characteristics of Evading Detection Via Ambiguous TCP Retransmission 52/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
53 List of Host Introduction Characteristics of AIDE-Advanced Intrusion Detection Environment CSP Alert-Plus eeye Retina eeye SecureIIS Web Server Protection GFI EventsManager Hewlett Packard-Unix (HP-UX) 11i Host Intrusion Detection System (HIDS) IBM RealSecure Server Sensor integrit Lumension Application Control McAfee Host Intrusion Prevention NetIQ Security Manager iseries Osiris OSSEC HIDS PivX preempt Samhain Tripwire Enterprise Tripwire for Servers 53/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
54 List of Network Introduction Characteristics of Arbor Networks Peakflow ArcSight Bro Check Point IPS Software Blade Check Point VPN-1 Power Check Point VPN-1 Power VSX Cisco ASA 5500 Series IPS Edition Cisco Catalyst 6500 Series Intrusion Detection System Services Module (IDSM-2) Cisco Guard XT Cisco Intrusion Detection System Appliance IDS-4200 Cisco IOS IPS Cisco Security Agent Enterasys Dragon Network Defense ForeScout CounterAct Edge IBM Proventia SiteProtector Imperva SecureSphere Intrusion SecureNet IDS/IPS ipolicy Intrusion Prevention Firewall Family 54/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
55 List of Network (cont.) Characteristics of Juniper Networks IDP Lancope StealthWatch McAfee IntruShield Network IPS Appliances NIKSUN NetDetector NitroSecurity NitroGuard Intrusion Prevention System PreludeIDS Technologies Q1 Labs QRadar Radware DefensePro SecurityMetrics Appliance Snort snort_inline Sourcefire 3D Sensor Sourcefire Intrusion Prevention System StillSecure Strata Guard Symantec Critical System Protection TippingPoint Intrusion Prevention System Top Layer IPS Webscreen 55/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
56 List of Wireless Introduction Characteristics of AirMagnet AirSnare AirTight Networks SpectraGuard Enterprise Aruba Wireless Intrusion Detection & Prevention (WIDP) Kismet Motorola AirDefense Enterprise Newbury Networks WiFi Watchdog 56/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
57 Standard Introduction Characteristics of The Internet Engineering Task Force (IETF) has a working group to develop a common format for IDS alerts: the design involves sending XML based alerts over an HTTP like communications format; a lot of attention has been paid to the needs of IDS analysis, and to making the protocol work through firewalls. Intrusion Detection Exchange Format Working Group (IDWG) Intrusion Detection Message Exchange Format (IDMEF) Intrusion Detection Exchange Protocol (IDXP) 57/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
58 Static Analysis Run-Time Support Static Analysis An example of a HIDS based on the expected behavior of the program (static analysis) and virtualization (run-time monitoring): Process self: valid sequences of system calls (traces) and invariants for the process executing the program to be protected: traces are statically deduced from the program. invariant on program variables at system call invocations are inferred from the semantics of the program. 58/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
59 Static Analysis Run-Time Support Grammar of System Call Sequences A tool computes a context-free grammar that models the legal system call traces that the process can issue: the tool automatically generates the grammar by linearly scanning each function defined in the program s source code. At run-time, a sequence of system calls is valid only if it is a prefix of at least one string generated by the grammar. 59/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
60 Static Analysis Run-Time Support Run-Time Architecture Exploiting virtual machines (VMs): transparency; visibility; robustness. 60/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
61 Static Analysis Run-Time Support Run-Time Architecture The Monitored VM executes the process to be monitored; The Introspection VM monitors the protected process through introspection: stream-oriented parser; assertion checker; introspection library. 61/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
62 Static Analysis Run-Time Support Run-Time Checks Each time the monitored process invokes a system call, the Monitored VM is suspended. The Introspection VM checks that: 1 the system call trace is coherent with the grammar; 2 the assertions paired with the system call are verified. If the trace is not coherent with the grammar, or an assertion is false attack. 62/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
63 Static Analysis Run-Time Support Example of Invariant Evaluation 63/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
64 Static Analysis Run-Time Support Questions? 64/64 Daniele Sgandurra A Survey of Intrusion Detection Systems
Tools. Intrusion Detection Systems. Information Assurance Tools Report. Sixth Edition September 25, 2009. Distribution Statement A E XC E L L E NC E
Tools Information Assurance Tools Report Sixth Edition September 25, 2009 Intrusion Detection Systems Distribution Statement A E XC E L L E NC E IN INF OR MAT I ON I C E S E R V Approved for public release;
How To Protect A Network From Attack From A Hacker (Hbss)
Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
IDS : Intrusion Detection System the Survey of Information Security
IDS : Intrusion Detection System the Survey of Information Security Sheetal Thakare 1, Pankaj Ingle 2, Dr. B.B. Meshram 3 1,2 Computer Technology Department, VJTI, Matunga,Mumbai 3 Head Of Computer TechnologyDepartment,
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC
Intrusion Detection and Intrusion Prevention Ed Sale VP of Security Pivot Group, LLC Presentation Goals Describe IDS and IPS Why They Are Important Deployment and Use Major Players The IT Security Camera
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at www.visa.
Global Partner Management Notice Subject: Visa Data Security Alert Malicious Software and Internet Protocol Addresses Dated: April 10, 2009 Announcement: The protection of account information is a responsibility
Modular Network Security. Tyler Carter, McAfee Network Security
Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
A Proposed Architecture of Intrusion Detection Systems for Internet Banking
A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India [email protected]
Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of
Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)
ISCA Journal of Engineering Sciences ISCA J. Engineering Sci. Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) Abstract Tiwari Nitin, Solanki Rajdeep
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware
Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware 1 Corresponding Author: [email protected] 1 O.B. Lawal Computer Science Department,
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
Intrusion Detection Systems
Intrusion Detection Systems Advanced Computer Networks 2007 Reinhard Wallner [email protected] Outline Introduction Types of IDS How works an IDS Attacks to IDS Intrusion Prevention Systems
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
Network Security Forensics
Network Security Forensics As hacking and security threats grow in complexity and organizations face stringent requirements to document access to private data on the network, organizations require a new
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
Guide to Intrusion Detection and Prevention Systems (IDPS) (Draft)
Special Publication 800-94 Revision 1 (Draft) Guide to Intrusion Detection and Prevention Systems (IDPS) (Draft) Recommendations of the National Institute of Standards and Technology Karen Scarfone Peter
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT
WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT WHAT S INSIDE: 1. GENERAL INFORMATION 1 2. EXECUTIVE SUMMARY 1 3. BACKGROUND 2 4. QUESTIONS FOR CONSIDERATION
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Next Generation IPS and Reputation Services
Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.
Our Security Ways we protect our valuables: By Edith Butler Fall 2008 Locks Security Alarm Video Surveillance, etc. History about IDS It began in 1980, with James Anderson's paper: History of IDS Cont
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
Intrusion Detection Systems
Intrusion Detection Systems Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM INTRUSION DETECTION AND PREVENTION using SAX 2.0 and WIRESHARK Cain & Abel 4.9.35 Supervisor Dr. Akshai Kumar Aggarwal Director School of Computer Sciences University of Windsor
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Intruders and viruses. 8: Network Security 8-1
Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
End to End Security do Endpoint ao Datacenter
do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014
Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability 7 Jul 2014 1 Purpose This document is intended to provide insight on the types of tools and technologies that
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Who am I? BlackHat RSA
Intrusion Detection Who am I? Informal Security Education CS - Colby College Honors work in Static Analysis Fortify Software Engineer Architect Product Management HP AlienVault Products BlackHat RSA What
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
The Base Rate Fallacy and its Implications for the Difficulty of Intrusion Detection
The Base Rate Fallacy and its Implications for the Difficulty of Intrusion Detection Stefan Axelsson Presented by Kiran Kashalkar Agenda 1. 1. General Overview of of IDS 2. 2. Bayes Theorem and Base-Rate
ArcSight Supports a Wide Range of Security Relevant Products
ArcSight Supports a Wide Range of Security Relevant Products ArcSight s data collection capabilities are the most versatile in the industry and run the gamut from a centralized collection point on the
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Security Intrusion & Detection. Intrusion Detection Systems (IDSs)
Security Intrusion & Detection Security Intrusion One or combination of security events in which an intruder gains (or attempts) to gain access to a system without having authorization to do so Intrusion
Passive Logging. Intrusion Detection System (IDS): Software that automates this process
Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
Symantec Security Information Manager Version 4.7
Version 4.7 Agenda What are the challenges? What is Security Information Manager? How does Security Information Manager work? Why? 2 Security Management Challenges 3 Managing IT Security PREVENT INFORM
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
How To Protect Your Network From Attack From A Hacker On A University Server
Network Security: A New Perspective NIKSUN Inc. Security: State of the Industry Case Study: Hacker University Questions Dave Supinski VP of Regional Sales [email protected] Cell Phone 215-292-4473 www.niksun.com
Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.
Running head: UNIT 3 RESEARCH PROJECT 1 Unit 3 Research Project Eddie S. Jackson Kaplan University IT540: Management of Information Security Kenneth L. Flick, Ph.D. 10/07/2014 UNIT 3 RESEARCH PROJECT 2
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Your Security Challenges Defending the Dynamic Network! Dynamic threats 䕬 䕬 䕬 䕬 Many threats
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
Glasnost or Tyranny? You Can Have Secure and Open Networks!
AT&T is a proud sponsor of StaySafe Online Glasnost or Tyranny? You Can Have Secure and Open Networks! Steven Hurst CISSP Director - AT&T Security Services and Technology AT&T Chief Security Office 2009
GUIDANCE SOFTWARE EnCase Cybersecurity Complement Guide. EnCase Cybersecurity. Complement Guide
GUIDANCE SOFTWARE EnCase Cybersecurity Complement Guide EnCase Cybersecurity Complement Guide GUIDANCE SOFTWARE EnCase Cybersecurity Complement Guide To truly secure an enterprise, a comprehensive approach
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.
Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
AT&T Real-Time Network Security Overview
AT&T Real-Time Network Security Overview Dan Solero Director of Security Technology, AT&T Know Your Enemy: Security Threats Extend Beyond Viruses & Worms Distributed Denial of Service Spam for Hire Social
