Intrusion Detection Systems vs. Intrusion Prevention Systems. Sohkyoung (Michelle) Cho ACC 626

Size: px
Start display at page:

Download "Intrusion Detection Systems vs. Intrusion Prevention Systems. Sohkyoung (Michelle) Cho ACC 626"

Transcription

1 Intrusion Detection Systems vs. Intrusion Prevention Systems Sohkyoung (Michelle) Cho ACC 626

2 1.0 INTRODUCTION An increasing number of organizations use information systems to conduct their core business activities. As a result, the frequency and magnitude of intrusion incidents have increased significantly. Intrusion attacks have many causes, such as malware (e.g., worms, spyware), unauthorized access to systems and misuse of privileges or attempt to gain additional privileges 1. While some incidents are malicious in nature, others are not. To reduce the exposure to both types of intrusion threats, organizations need intrusion detection systems (IDS) and intrusion prevention systems (IPS). Although 72 percent of companies already use IDS and IPS, the number of entities experiencing intrusion incidents has grown from 58 percent in 2000 to 65 percent in This indicates that it is important to know the different types of security technologies that are available and the effectiveness of each type in reducing the risk of intrusion threats to implement a security system that best suits the needs of the organization. This report discusses the need for intrusion detection and prevention; different types of IDS and IPS; and implementation of IDS and IPS. 2.0 ANALYSIS 2.1 Emerging Need for Intrusion Detection and Prevention The number of information security incidents and the magnitude of computer crime losses due to intrusion incidents have increased significantly. In addition, there are various business, regulatory and information technology (IT) drivers that trigger entities to pay close attention to their network intrusion detection and prevention. The drivers include the following: 1) Strategic business changes many organizations have initiatives to further their competitiveness in the market through increased web presence, e-commerce, integration with business partners, mergers and acquisitions, etc. 2) Legal and regulatory requirements various legal and regulatory requirements have evolved in today s electronic environment and yet, more are anticipated to be developed as use of information systems increases. The regulations that were introduced recently are 1 Mell, P., & Scarfone, K. Guide to Intrusion Detection and Prevention Systems. NIST Special Publication NIST. 9 June < 2 Birdi, T., & Jansen, K. Network Intrusion Detection: Know What You Do (Not) Need. Information Systems Control Journal June < (JOnline).htm>. 1 of 10

3 Sarbanes-Oxley and Bill 198 (accounting regulations), the Health Insurance Portability and Accountability Act and the Personal Information Protection and Electronic Documents Act (privacy legislations). 3) Managing public and stakeholder expectations computer incidents have resulted in exposure of confidential information, unavailability of systems and unreliable information. 4) Dependency on information systems as organizations dependence on information systems have increased, the cost of an outage has also increased. Thus, timely detection of and response to an outage are needed to save considerable amounts of money. 5) The increased number and sophistication of network threats network-based threats have increased significantly due to system vulnerabilities or human errors. Such threats include viruses, hacking, Trojan horses, unauthorized system changes, denial of service, brute force, social engineering, spyware and spam 3. Since these drivers have dramatically increased the risk exposure, organizations should re-evaluate their control environment to adapt to the new electronic environment. They should also develop an intrusion detection and prevention strategy that best meets their needs. In order to avoid a strategy that is too narrowly focused or that will not result in effective monitoring, the organizations should first have a thorough understanding of different types of IDS and IPS. A comprehensive intrusion detection and prevention program encompasses a wide variety of threats that may leverage weaknesses in different technology layers (e.g., business applications, operating systems and network), people (e.g., awareness regarding social engineering) and processes (e.g., incident identification and response processes) Intrusion Detection Systems An intrusion detection system is software that automates the process of monitoring the events occurring in a computer system or network analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use 3 Birdi, T., & Jansen, K. Network Intrusion Detection: Know What You Do (Not) Need. Information Systems Control Journal June < (JOnline).htm>. 4 Idem. 2 of 10

4 policies or standard security practices 5. The primary purpose of IDS is to help prevent the consequences of undetected intrusions by monitoring network and system activities in real time and identifying and responding to unauthorized activities 6. The real-time detection requires a watchdog system that sits in the background and monitors all activities, distinguishes various types of incidents and diagnoses actual attacks 7. IDS also allow analysis of current activity in comparison to past activity to identify unusual trends and problems. Most IDS take one of the two principal approaches: network-based approach and host-based approach. Both types look for attack signatures, specific patterns that usually indicate malicious intent or suspicious activity 8. In addition, intrusion detection system with identification capability was recently introduced Network-based Intrusion Detection Systems Network-based IDS are directed toward network-based attacks that come from outside and inside the organization 9 and use network adapters running in promiscuous mode to monitor network activities in real time. Promiscuous mode makes it very difficult for attackers to detect and locate it. The advantages of network-based IDS are: 1) they provide stealth; 2) they can be implemented with no impact on existing systems and infrastructure; and 3) they can be used by anyone, independent of their operating system type. The disadvantages of network-based IDS include: 1) network-based IDS are not scalable; 2) they are based on predefined attack signatures that will always be a step behind; and 3) signatures are not updated as frequently as antivirus; IDS vendors are not caught up with all attacks 10. There are two common techniques employed by network-based IDS to recognize attack signatures: anomaly-based and pattern-matching (signature-based). In addition, recently introduced techniques include hybrid IDS and received-signal-strength-based IDS. 5 Mell, P., & Scarfone, K. Guide to Intrusion Detection and Prevention Systems. NIST Special Publication NIST. 9 June < 6 Information Systems Audit and Control Association. IS Auditing Procedure Intrusion Detection System (IDS) Review June < sion_detection_system_(ids)_review.htm>. 7 Idem. 8 Idem. 9 Birdi, T., & Jansen, K. Network Intrusion Detection: Know What You Do (Not) Need. Information Systems Control Journal June < (JOnline).htm>. 10 Information Systems Audit and Control Association. IS Auditing Procedure Intrusion Detection System (IDS) Review June < sion_detection_system_(ids)_review.htm>. 3 of 10

5 Anomaly-based Intrusion Detection Systems Statistical anomaly detection model identifies intrusions by monitoring for activities that deviate from a user's normal behaviour. Baselines of normal behaviour are established through profiling particular users or network connections and then the IDS looks for activities that are different from the baseline. The primary advantage of such IDS is that they can detect attacks that have never been seen before because they look for unusual behaviour. Anomaly IDS disadvantages include: 1) they generate a large volume of false positives as a result of unpredictable nature of behaviour of users and networks; 2) they often require extensive training systems and event records to identify normal behaviour patterns; and 3) careful hackers can disable such detection systems Pattern-matching (or Signature-based) Intrusion Detection Systems Pattern-matching (or signature-based) IDS examine network traffic and look for documented patters of attack. The system examines every packet on the network segment for a defined pattern of activity that indicates an attempt to access a vulnerable script on a web server 12. The advantages of pattern-matching IDS are: 1) implementation of patter-matching IDS takes a shorter period of time than anomaly IDS, provided that there is a pattern-matching engine; 2) it is easy to implement, deploy, update and understand pattern-matching IDS; and 3) they produce less false positives than do anomaly-based IDS. The disadvantages include: 1) they are vulnerable to hacking; 2) they cannot detect unknown attacks; 3) constant updating is required; and 4) they are easier to fool by sending fragmented packets across the network Hybrid Intrusion Detection Systems A new hybrid intrusion detection system combines the advantages of low false-positive rate of a signature-based IDS and the ability of an anomaly-based IDS to detect novel unknown attacks 14. The hybrid system extracts signatures from the output of the anomaly-based system and adds them to the signature database for accurate and efficient intrusion detection. It was shown that the hybrid IDS had a 60 percent detection rate in comparison to 30 percent and Information Systems Audit and Control Association. IS Auditing Procedure Intrusion Detection System (IDS) Review June < sion_detection_system_(ids)_review.htm>. 12 Idem. 13 Idem. 14 Cai, M., Chen, M. Q., Chen, Y., & Hwang, K. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes. IEEE Transactions on Dependable and Secure Computing. 4(1) (2007): of 10

6 percent for SNORT and Bro systems, respectively. This was obtained with less than 3 percent false alarms. This method thus achieves a higher detection accuracy, lower false alarms, and, thus, a raised level of cybertrust through the automated data mining and signature generation process over Internet connection episodes Received-signal-strength-based Intrusion Detection Systems A wireless network is not as secure as a wired network due to unprotected medium access control (MAC) management messages. Li (2008) designed a received signal strength (RSS)-based network-based IDS framework for MAC layer attack detection because RSS value of a received packet is strongly related to the sender s location 16. To reduce the error rate, an enhancement method was designed based on signal prints which are vectors containing RSS values reported by multiple monitors 17. A primary advantage of RRS-based IDS is that they are sensitive for all identity-based attacks in WiFi/ and WiFi/802.11i networks since they detect suspicious activities based on physical location of network nodes. Moreover, signalprints are hard to manipulate since they are built on the RSS values that are measured by multiple monitors and the factors determining RSS values are unique for each monitor. With the localization model, the user can localize the authorized clients and pinpoint where an attack occurred. This capability can assist in developing an effective disaster recovery mechanism Host-Based Intrusion Detection Systems Host-based IDS use automated audit logs to monitor systems, events and security logs for changes in files. When changes are detected, the IDS compare the new log with attack signatures. If there are any matches, the system triggers administrator alerts. Although host-based IDS are generally slower than network-based IDS, they offer a number of advantages. The advantages include: 1) they verify whether an attack was successful or not whereas network-based IDS provide an early warning; 2) they monitor specific system activities in such detail that cannot be provided by a network-based system; 3) they can detect attacks that cannot be identified by network-based IDS such as attacks from a keyboard inside a network; 4) they are more suitable for encrypted and switched environments than are network-based systems; 5) they have near 15 Cai, M., Chen, M. Q., Chen, Y., & Hwang, K. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes. IEEE Transactions on Dependable and Secure Computing. 4(1) (2007): Li, Chen Guang. A framework for signal strength based intrusion detection system for link layer attacks in wireless network M.Sc. dissertation, Carleton University. 9 June Idem. 5 of 10

7 real-time attack detection and response; 6) they reside on existing network and no additional hardware is required; and 7) they have a lower entry-level costs. Despite all these advantages, host-based IDS have limitations such as: 1) their capabilities are compromised as soon as the host machine becomes compromised; 2) they are specific to application; 3) they must be able to translate between Windows NT, UNIX, VMS and other mainframe operating system languages; 4) since a portion of the system resides on the host, the IDS may be attacked and disabled by an attacker when the host is attacked; 5) they are not suitable for detecting scans of all hosts on a network because the IDS on a host only see the network packets that its host receives; 6) they often cannot detect and operate during denial-of-service attacks; and 7) they utilize the computing resources of the host Kernel-based Intrusion Detection Systems Paliwal, Pujari and Sharma (2007) discussed a host-based IDS that is kernel-based using a classification scheme, knn 19. This utilizes the text processing techniques method; it treats each system call as a word and a collection of system calls during process execution as a document. It was found that the kernel-based IDS generate a significantly low false positive rate Intrusion Detection System with Identification Capability Most IDS do not consider the role of security auditors who perform test methods with hacking tools that are similar to those used by hackers. This causes IDS to produce many false alarms. Chen and Laih (2008) introduced an intrusion detection system with identification capability (IDSIC) which separates security auditors and hackers through use of fingerprints 20. The system consists of two components: the fingerprint adder and the fingerprint checker. The fingerprint adder generates fingerprints and the fingerprint checker validates them. Since the identification capability is independent of the application platform, it can be extended to both network- and host-based IDS. With this identification capability, IDS will be able to distinguish auditors from hackers as well as detect computer abuse. Although the generation of fingerprints add additional costs, there costs are minimal and IDSIC require lower overall consequential costs than current 18 Information Systems Audit and Control Association. IS Auditing Procedure Intrusion Detection System (IDS) Review June < sion_detection_system_(ids)_review.htm>. 19 Paliwal K. K., Pujari, A.K., & Sharma, A. Intrusion detection using text processing techniques with a kernel based similarity measure. Computers & Security. 26(7/8). (2007): Chen, P., & Laih, C. IDSIC: an intrusion detection system with identification Capability. International Journal of Information Security. 7(3) (2008): of 10

8 IDS 21. Therefore, IDSIC appear more suitable for an organization that requires security testing on a continuous basis. 2.3 Intrusion Prevention Systems An intrusion prevention system is software that has all the capabilities of an intrusion detection system and can also attempt to stop possible incidents 1. IPS have the same two major categories as IDS: network-based and host-based systems Network-based Intrusion Prevention Systems Network-based IPS perform packet sniffing and analyze network traffic to identify and stop suspicious activity 22. They add to the functions of network-based IDS with the capability to block packets that match a particular signature or behaviour 23. To make this more effective, network-based IPS sit inline and act like a network firewall. They use both attack signatures and analysis of network and application protocols in comparing network activity of frequently attacked applications against expected behaviour to identify suspicious activity. They are designed to detect attacks on the network before they reach their intended targets. Network-based systems are highly customizable, making it very easy for administrators to simultaneously implement attack signature for new malware threats; they can block new malware threats much before antivirus signatures become available. While network-based IPS are effective at blocking specific known threats, such as network service worms, and borne worms and viruses with easily recognizable characteristics, they are usually incapable of stopping malicious mobile code or Trojan horses 24. However, network-based IPS may be able to block some unknown threats using application protocol analysis Host-based Intrusion Prevention Systems Host-based IPS are similar to network-based IPS in principle and purpose, except that host-based IPS monitor the characteristics of a single host and the events occurring within that host Chen, P., & Laih, C. IDSIC: an intrusion detection system with identification Capability. International Journal of Information Security. 7(3) (2008): Kent, K., Mell, P., & Nusbaum, J. Guide to Malware Incident Prevention and Handling NIST Special Publication June < 23 Berge, Matthew. What are the differences between Network Intrusion Detection and Network Intrusion Prevention? June < 24 Kent, K., Mell, P., & Nusbaum, J. Guide to Malware Incident Prevention and Handling NIST Special Publication June < 25 Idem. 7 of 10

9 They are also different from host-based IDS in that they can block or reject specific applications, behaviours and changes to the local system configuration 26. Host-based IPS monitor activities such as network traffic, system logs, running processes, file access and modification and system and application configuration changes How to Implement Intrusion Detection and Prevention Systems IDS and IPS have different pros and cons. The advantages of intrusion detection include the following: 1) it can detect external hackers and internal network-based attacks; 2) it scales easily to provide protection for the entire network; 3) it offers centralized management for correlation of distributed attacks; 4) it provides defence in depth; 5) it gives systems administrators the ability to quantify attacks; and 5) it provides and additional layer of protection. Its drawbacks include: 1) it generates false positives and negatives; 2) it reacts to attacks rather than preventing them; 3) it requires full-time monitoring; 4) it requires a complex incident-response process; 5) it cannot monitor traffic at higher transmission rates; 6) it generates an enormous amount of data to be analyzed; 7) it is susceptible to low and slow attacks; 8) it requires highly skilled staff dedicated to interpreting the data; 9) it cannot deal with encrypted network traffic; and 10) it is expensive. On the other hand, IPS have the following benefits: 1) they protect at the application layer; 2) they prevent attacks rather than simply reacting to them; 3) they can use a behavioural approach; 4) they provide defence in depth; 5) they permit real-time event correlation; and 6) they permit real-time event correlation. The cons of IPS are: 1) they generate false positives that can create serious problems if automated responses are used; 2) they create network bottlenecks; and 3) IPS is a new technology and is expensive 28. Since IPS and IDS have different advantages and disadvantages, an entity should use both systems so that they would complement each other. Similarly, an entity should consider using multiple types of both IPS and IDS since each type offers advantages over the other, such as detecting some events that the others cannot, or detecting with significantly greater accuracy than the other technologies. Then, the entity will achieve more comprehensive and accurate detection and prevention of malicious activity, with 26 Berge, Matthew. What are the differences between Network Intrusion Detection and Network Intrusion Prevention? June < 27 Kent, K., Mell, P., & Nusbaum, J. Guide to Malware Incident Prevention and Handling NIST Special Publication June < 28 Endorf, C., Schultz, E., & Mellander, J. Intrusion Detection & Prevention. Emeryville: McGraw-Hill/Osborne, of 10

10 lower rates of false positives and false negatives Selection of Intrusion Detection and Prevention Products Before selecting products, the organization should first define the general requirements that the products should meet: The organization should: 1) understand the characteristics of its system, network environments and plans for near-term changes to choose the products that will be compatible with them; 2) articulate its goals and objectives; 3) review its existing security and other IT policies; and 4) understand resource constraints. Then, the entity should define specific requirements criteria: 1) security capabilities, including information gathering, logging, detection, and prevention; 2) performance including maximum capacity and performance features; 3) management, including design and implementation, operation and maintenance, and training, documentation, and technical support; 4) life cycle costs, both initial and maintenance costs 30. After collecting requirements and selecting criteria, the organization should obtain information about the products to make a more informed decision. They can obtain information from lab or real-world product testing, vendor-provided information, third-party product reviews, or previous experience from individuals within the organization and trusted individuals at other organizations Integration of Intrusion Detection and Prevention Products When using different products, integration is very important to maximize effectiveness. If the products are not integrated properly, data cannot be shared by different products, and it will take more effort for the users and administrators to monitor and manage multiple sets of products. The organization should decide whether to integrate multiple IDS and IPS products directly or indirectly Direct Integration IDS and IPS can be directly integrated so that one product feeds alert data to another. This type of integration is most suitable if the products are from one vendor. The vendor may provide a single console to manage and monitor different types of products, which provides significant time savings to users and administrators and users by streamlining their work. Some products also share data, speeding up the analysis process. However, when a fully integrated solution is 29 Mell, P., & Scarfone, K. Guide to Intrusion Detection and Prevention Systems. NIST Special Publication NIST. 9 June < 30 Idem. 9 of 10

11 used, a failure could jeopardize all the intrusion detection and prevention technologies that are part of the integrated solution Indirect Integration IPS and IDS can be integrated indirectly so that all the products feed alert data into a security information and event management (SIEM) system which imports information from various security-related logs and correlates events among them 32. SIEM software can identify misuse and inappropriate use of systems and networks as well as malicious activities. SIEM can complement IDS and IPS in the following manner: 1) it can identify certain types of activities that an individual product cannot because it can correlate events; 2) users can access data from many sources through one interface; 3) it can link each alert to supporting data so that users can easily verify the accuracy of alerts. On the other hand, SIEM software has the following limitations: 1) there is a lag between the time that an event occurs and the time that the SIEM sees the log data so that prevention is less timely; 2) SIEM only transfers some data fields from the original logs and errors can occur during the log normalization process that converts data fields to a standard format; 3) the administrator may have to write custom agents to transfer IPS and IDS data to the SIEM servers since SIEM does not offer agents for all products CONCLUSIONS As most organizations use complex information systems that are vulnerable to intrusion, the need for proper intrusion detection and prevention has increased significantly. To implement effective intrusion detection and prevention systems, it is important for the organization to know what types of systems are available. The major two technology types are network-based and hostbased although a number of new technologies have been introduced recently. An example of such a new system is intrusion detection system with identification capability. Comparing each type s advantages and disadvantages and assessing its suitability to its current and future needs, the organization can design the optimal intrusion detection and prevention infrastructure. The organization should not forget to consider utilizing multiple types to complement one another and properly integrate them to maximize effectiveness. 31 Mell, P., & Scarfone, K. Guide to Intrusion Detection and Prevention Systems. NIST Special Publication NIST. 9 June < 32 Idem. 33 Idem. 10 of 10

Taxonomy of Intrusion Detection System

Taxonomy of Intrusion Detection System Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use

More information

Network- vs. Host-based Intrusion Detection

Network- vs. Host-based Intrusion Detection Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Intrusion Prevention and Detection No: Effective: OSC-12 5/21/09 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

How To Protect A Network From Attack From A Hacker (Hbss)

How To Protect A Network From Attack From A Hacker (Hbss) Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Intrusion Detection for Mobile Ad Hoc Networks

Intrusion Detection for Mobile Ad Hoc Networks Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering tchen@engr.smu.edu http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science A Seminar report On Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org

More information

B database Security - A Case Study

B database Security - A Case Study WHITE PAPER: ENTERPRISE SECURITY Strengthening Database Security White Paper: Enterprise Security Strengthening Database Security Contents Introduction........................................................................4

More information

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions

More information

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

A Proposed Architecture of Intrusion Detection Systems for Internet Banking A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India Mehra_priti@yahoo.com

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

IDS : Intrusion Detection System the Survey of Information Security

IDS : Intrusion Detection System the Survey of Information Security IDS : Intrusion Detection System the Survey of Information Security Sheetal Thakare 1, Pankaj Ingle 2, Dr. B.B. Meshram 3 1,2 Computer Technology Department, VJTI, Matunga,Mumbai 3 Head Of Computer TechnologyDepartment,

More information

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection

More information

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose

More information

Host-based Intrusion Prevention System (HIPS)

Host-based Intrusion Prevention System (HIPS) Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics

More information

IDS / IPS. James E. Thiel S.W.A.T.

IDS / IPS. James E. Thiel S.W.A.T. IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods

More information

Role of Anomaly IDS in Network

Role of Anomaly IDS in Network Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,

More information

How To Prevent Hacker Attacks With Network Behavior Analysis

How To Prevent Hacker Attacks With Network Behavior Analysis E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal

More information

Performance Evaluation of Intrusion Detection Systems

Performance Evaluation of Intrusion Detection Systems Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection

More information

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) ISCA Journal of Engineering Sciences ISCA J. Engineering Sci. Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) Abstract Tiwari Nitin, Solanki Rajdeep

More information

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

State of Vermont. Intrusion Detection and Prevention Policy. Date: 11-02-10 Approved by: Tom Pelham Policy Number:

State of Vermont. Intrusion Detection and Prevention Policy. Date: 11-02-10 Approved by: Tom Pelham Policy Number: State of Vermont Intrusion Detection and Prevention Policy Date: 11-02-10 Approved by: Tom Pelham Policy Number: 1 Table of Contents 1.0 Introduction... 3 1.1 Authority... 3 1.2 Purpose... 3 1.3 Scope...

More information

Name. Description. Rationale

Name. Description. Rationale Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Information Technology Policy

Information Technology Policy Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review RA-ITCentral@pa.gov

More information

CSCI 4250/6250 Fall 2015 Computer and Networks Security

CSCI 4250/6250 Fall 2015 Computer and Networks Security CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP

More information

IS AUDITING PROCEDURE INTRUSION DETECTION SYSTEM (IDS) REVIEW DOCUMENT P3

IS AUDITING PROCEDURE INTRUSION DETECTION SYSTEM (IDS) REVIEW DOCUMENT P3 Introduction The specialised nature of information systems (IS) auditing, and the skills necessary to perform such audits, require standards that apply specifically to IS auditing. One of the goals of

More information

Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of

Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY

More information

Global Partner Management Notice

Global Partner Management Notice Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features

More information

Best Practices For Department Server and Enterprise System Checklist

Best Practices For Department Server and Enterprise System Checklist Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)

More information

SURVEY OF INTRUSION DETECTION SYSTEM

SURVEY OF INTRUSION DETECTION SYSTEM SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT

More information

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background: 1. Do you implement virus controls and filtering on all systems? Anti-Virus anti-virus software packages look for patterns in files or memory that indicate the possible presence of a known virus. Anti-virus

More information

Intrusion Detections Systems

Intrusion Detections Systems Intrusion Detections Systems 2009-03-04 Secure Computer Systems Poia Samoudi Asli Davor Sutic Contents Intrusion Detections Systems... 1 Contents... 2 Abstract... 2 Introduction... 3 IDS importance...

More information

Network and Host-based Vulnerability Assessment

Network and Host-based Vulnerability Assessment Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Chapter-3 Intruder Detection and Intruder Identification

Chapter-3 Intruder Detection and Intruder Identification Chapter-3 Intruder Detection and Intruder Identification Development of Protocols and Algorithms to Secure Integration of Ad hoc Network and Wired Network 3.1 Introduction 3.1.1 1998 DARPA Intrusion Detection

More information

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT WHAT S INSIDE: 1. GENERAL INFORMATION 1 2. EXECUTIVE SUMMARY 1 3. BACKGROUND 2 4. QUESTIONS FOR CONSIDERATION

More information

Intruders and viruses. 8: Network Security 8-1

Intruders and viruses. 8: Network Security 8-1 Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Protect the data that drives our customers business. Data Security. Imperva s mission is simple: The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent

More information

Fundamentals of Network Security - Theory and Practice-

Fundamentals of Network Security - Theory and Practice- Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring

More information

USM IT Security Council Guide for Security Event Logging. Version 1.1

USM IT Security Council Guide for Security Event Logging. Version 1.1 USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate

More information

Achieving SOX Compliance with Masergy Security Professional Services

Achieving SOX Compliance with Masergy Security Professional Services Achieving SOX Compliance with Masergy Security Professional Services The Sarbanes-Oxley (SOX) Act, also known as the Public Company Accounting Reform and Investor Protection Act of 2002 (and commonly called

More information

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion

More information

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target

More information

From Network Security To Content Filtering

From Network Security To Content Filtering Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals

More information

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management Log Management How to Develop the Right Strategy for Business and Compliance An Allstream / Dell SecureWorks White Paper 1 Table of contents Executive Summary 1 Current State of Log Monitoring 2 Five Steps

More information

INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH

INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH INTRODUCTION: WHO S IN YOUR NETWORK? The days when cyber security could focus on protecting your organisation s perimeter

More information

A Review on Network Intrusion Detection System Using Open Source Snort

A Review on Network Intrusion Detection System Using Open Source Snort , pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India Sharmasakshi1009@gmail.com,

More information

Firewall and UTM Solutions Guide

Firewall and UTM Solutions Guide Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions

File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions File Integrity Monitoring Challenges and Solutions Introduction (TOC page) A key component to any information security program is awareness of data breaches, and yet every day, hackers are using malware

More information

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION 18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK

More information

Intrusion Detection System (IDS)

Intrusion Detection System (IDS) Intrusion Detection System (IDS) Characteristics Systems User, Process predictable actions describing process under that actions what pattern subvert actions attack of correspond the systems processes

More information

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES SOX COMPLIANCE Achieving SOX Compliance with Professional Services The Sarbanes-Oxley (SOX)

More information

Critical Security Controls

Critical Security Controls Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter The Critical Security Controls The Critical Security

More information

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Effective Threat Management. Building a complete lifecycle to manage enterprise threats. Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive

More information

Guide to Intrusion Detection and Prevention Systems (IDPS) (Draft)

Guide to Intrusion Detection and Prevention Systems (IDPS) (Draft) Special Publication 800-94 Revision 1 (Draft) Guide to Intrusion Detection and Prevention Systems (IDPS) (Draft) Recommendations of the National Institute of Standards and Technology Karen Scarfone Peter

More information

An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing

An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing Partha Ghosh, Ria Ghosh, Ruma Dutta Abstract: The massive jumps in technology led to the expansion of Cloud Computing

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2. Intrusion Detection and Prevention Systems

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2. Intrusion Detection and Prevention Systems FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 13 Intrusion Detection and Prevention Systems By Whitman, Mattord, & Austin 2008 Course Technology Learning Objectives Describe

More information

Observation and Findings

Observation and Findings Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Student Tech Security Training. ITS Security Office

Student Tech Security Training. ITS Security Office Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with

More information

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding

More information

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph 0925910 I MCA

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph 0925910 I MCA INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph 0925910 I MCA OVERVIEW Introduction Overview The IDS Puzzle Current State of IDS Threats I have a good firewall, why do I need an IDS? Expectations

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI

THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI Introduction. I. VULNERABILITIES AND TECHNOLOGIES. 1. Hackers and Threats. Contending with Vulnerability Realizing Value in Security

More information

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) 1 of 8 3/25/2005 9:45 AM Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Intrusion Detection systems fall into two broad categories and a single new one. All categories

More information

Smarter Security for Smarter Local Government. Craig Sargent, Solutions Specialist

Smarter Security for Smarter Local Government. Craig Sargent, Solutions Specialist Smarter Security for Smarter Local Government Craig Sargent, Solutions Specialist SUMMARY 1 Trustwave and SpiderLabs 2 Penetration Testing 3 Web Application Firewall (WAF) 4 Security Information & Event

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security

More information

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the

More information

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM The Benefits of Integrating File Integrity Monitoring with SIEM Security Information and Event Management (SIEM) is designed to provide continuous IT monitoring, actionable intelligence, incident response,

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D. Running head: UNIT 3 RESEARCH PROJECT 1 Unit 3 Research Project Eddie S. Jackson Kaplan University IT540: Management of Information Security Kenneth L. Flick, Ph.D. 10/07/2014 UNIT 3 RESEARCH PROJECT 2

More information

Chapter 7 Information System Security and Control

Chapter 7 Information System Security and Control Chapter 7 Information System Security and Control Essay Questions: 1. Hackers and their companion viruses are an increasing problem, especially on the Internet. What can a digital company do to protect

More information

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International. www.radware.

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International. www.radware. Radware s Smart IDS Management FireProof and Intrusion Detection Systems Deployment and ROI North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Advanced Computer Networks 2007 Reinhard Wallner reinhard.wallner@student.tugraz.at Outline Introduction Types of IDS How works an IDS Attacks to IDS Intrusion Prevention Systems

More information

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society

More information