Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of



Similar documents
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

IDS / IPS. James E. Thiel S.W.A.T.

Network Based Intrusion Detection Using Honey pot Deception

Intruders and viruses. 8: Network Security 8-1

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

Taxonomy of Intrusion Detection System

INTRUSION DETECTION SYSTEMS and Network Security

Network- vs. Host-based Intrusion Detection

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Intrusion Detection Systems

CSCI 4250/6250 Fall 2015 Computer and Networks Security

IDS : Intrusion Detection System the Survey of Information Security

Intrusion Detection for Mobile Ad Hoc Networks

Firewalls, Tunnels, and Network Intrusion Detection

Computer Networks & Computer Security

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

Hackers: Detection and Prevention

The Truth about False Positives

Introduction of Intrusion Detection Systems

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

PROFESSIONAL SECURITY SYSTEMS

Network Instruments white paper

How To Protect Your Network From Attack From A Hacker On A University Server

Chapter 9 Firewalls and Intrusion Prevention Systems

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

Intrusion Detections Systems

How To Protect A Network From Attack From A Hacker (Hbss)

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

Banking Security using Honeypot

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

INTRUSION DETECTION SYSTEM

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Role of Anomaly IDS in Network

Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs

Second-generation (GenII) honeypots

An Inspection on Intrusion Detection and Prevention Mechanisms

Intrusion Detection Systems

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Intrusion Detection Systems

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

HONEYPOT SECURITY. February The Government of the Hong Kong Special Administrative Region

GFI White Paper PCI-DSS compliance and GFI Software products

Segurança Redes e Dados

Firewall Firewall August, 2003

Intruders & Intrusion Hackers Criminal groups Insiders. Detection and IDS Techniques Detection Principles Requirements Host-based Network-based

Name. Description. Rationale

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Best Practices For Department Server and Enterprise System Checklist

Securing the system using honeypot in cloud computing environment

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Common Cyber Threats. Common cyber threats include:

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Network Incident Report

AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN Siskiyou Boulevard Ashland OR 97520

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing

End-user Security Analytics Strengthens Protection with ArcSight

Intrusion Detection Systems. Darren R. Davis Student Computing Labs

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Architecture Overview

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

The Essentials Series. PCI Compliance. sponsored by. by Rebecca Herold


Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002

Science Park Research Journal

Network and Host-based Vulnerability Assessment

Performance Evaluation of Intrusion Detection Systems

Intrusion Detection Systems

Ohio Supercomputer Center

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Data Security Incident Response Plan. [Insert Organization Name]

SURVEY OF INTRUSION DETECTION SYSTEM

Global Partner Management Notice

Intrusion Detection System (IDS)

Cyber Security: Beginners Guide to Firewalls

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors

Radware s Behavioral Server Cracking Protection

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Dragon solution. Zdeněk Pala. ECIE certified engineer ECI certified instructor There is nothing more important than our customers

IDS or IPS? Pocket E-Guide

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Network-Based and Host- Based Intrusion Detection. Harley Kozushko. Graduate Seminar

Network Monitoring and Forensics

C. Universal Threat Management C.4. Defenses

Intrusion Detection Systems

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Security Event Management. February 7, 2007 (Revision 5)

Firewalls, IDS and IPS

Transcription:

Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code can cause great damage. In order to have computer systems be more secure, there are three main types of defenses against attacks: antivirus software, firewalls, and intrusion detection systems. This paper will discuss this third kind of defense: intrusion detection systems (IDS). This paper will look at different kinds of intrusion detection systems, different ways of detecting intrusions, and system response after detection. II. Introduction An intrusion detection system is a defense mechanism whose goal is to detect when a system or network is being used inappropriately or without correct authorization 1. Work on this began in 1980 with James Anderson who introduced a surveillance system that could detect malicious activity using event tracking records or audit logs. In 1985, Dorothy Denning and Peter Neumann provided a model on an intrusion detection expert system. Beginning with these researches, intrusion detection systems (IDS) were born. They are needed because the other two major kinds of defenses, antivirus software and firewalls, are not adequate to cover all kinds of attacks. Antivirus software 1

protects only against malicious programs such as viruses, but not against hackers and many other kinds of threats. Firewalls limit the kind of traffic that can flow in and out of a system so that they do not allow unauthorized access to important information. But these do not protect entirely. The traffic left to flow freely can be harmful. Intrusion detection systems are needed because they can sense a variety of unusual activities, and notify the proper authorities and prevent further attacks. IDS adds to system security, especially when they are used in addition to antiviruses and firewalls. Intrusion detection systems fall into three major categories depending on what kind of system they monitor. Though each has benefits and limitations, an IDS that can monitor the largest number of machines is the best. This paper will explain why this is so. It will also discuss a variety of detection methods and compare and contrast them. Lastly, this paper will look at how an IDS responds to an attack. Work related to IDSes are intrusion prevention systems, which improve upon how IDSes respond to attacks. This paper will not cover all information related to intrusion detection systems, but will examine most of the major issues. III. Main Body Components It is important to discuss, first of all, the basic components of an intrusion detection system. Almost all intrusion detection systems have audit logs. These keep track of what is happening on a system. The logs generated are sent to the management portion of an IDS for analysis to detect intrusions. Most detection systems have sensors that examine traffic and keep records of the packets they view flowing in and out of a 2

host or network system. The third major component is the afore mentioned management system, which analyzes data from logs and generates alerts when intrusions are detected. IDSes can be software or hardware. When used on a network, they are usually placed behind a firewall. Kinds of Intrusion Detection Systems An intrusion detection system can be divided into several kinds. The type of detection system is determined by what type of system is being monitored. What is monitored can be a host, a network, or a large portion of the internet. A host-based system keeps and examines audit records about a host. It checks the integrity of system files, watches for suspicious processes, looks at communication traffic in and out of the computer. A network-based system looks at packets on a network. These typically use sensors to log all the activity on a network segment and a console to collect and analyze the logs for suspicious activity. The main difference between host and network systems is that a host monitors its own system whereas a network detection system monitors the segment of the network it is attached to. A host-based intrusion detection system or HIDS is able to detect insider attacks by checking its own files and processes, and outsider attacks by watching incoming and outgoing traffic of the host. A network intrusion detection system or NIDS looks at every packet on a segment of a network, and thereby can get more of an idea of traffic flow to and from the machines in the network. However, NIDS must keep up with the speed of the packets on the LAN. If too many packets are going by too fast, a network detection system will not be able look at all of them. 3

An organization can choose to use host-based or network-based solution. If it decides to use host-based systems, it must install a host-based IDS on every host to get a better view of the network. If it uses a network-based system, it may run the risk of missing packets, but it can monitor traffic among more than one machine without having to install many systems. A third solution is distributed intrusion detection systems (DIDS). Distributed systems can better handle a problem that neither host nor network systems are able to deal with very well. For example, a system administrator may see something unusual happen to a host or a portion of the network they are monitoring. They wonder whether other hosts or networks are receiving the same unusual traffic. If they are, this traffic may be part of a concerted attack that spans a large section of the internet. Neither HIDS or NIDS can see a large part of the internet. If there is a way to see other hosts and networks that are not part of the local network that a system administrator may be monitoring, then such an attack can be detected early and wide area epidemics can be prevented. Distributed systems offer this kind of protection. They can have three components. A host agent module generates logs about a single host and sends them across the internet to a central manager module. A LAN monitor agent module generates logs about traffic on the local area network that it is monitoring. It also sends its logs to the central manager module. The central agent module collects these data, and data from other LANs and hosts 2. Thus, it checks for intrusion on a larger scale. DIDS provide for more accurate attack detection and quicker response because administrators can see more network activity. 4

DIDS can have modular components like the one described. Some can also support host-based and network-based IDSes that send their log files to the distributed system. Therefore, by using this kind of DIDS, one can have the benefit of HIDS and NIDS also. Someone using HIDS and DIDS can get an idea of host events while also seeing what is happening to other systems in the internet. People using NIDS and DIDS can see traffic on their local network while also knowing about major events happening on the internet. DIDS offer a multi-level way of monitoring systems. They can see what is going on at the host, network, and global level. This is better than looking at possible intrusions only on a host or only on a network. Information about insider attacks (people misusing a host system), outsider attacks (people trying to attack a particular network), and attacks on other hosts and networks can all be viewed. Seeing what is going on at multiple levels is the key to a better detection system. Methods of Intrusion Detection There are several different kinds of approaches to actually detecting intrusions. These include statistical anomaly detection, rule-based anomaly detection, and rule-based penetration identification. Statistical anomaly detection uses statistics formed from audit logs to detect anomalies from normal user behavior. Most statistical anomaly systems rely on learning about past behavior of users. Analysis of audit logs over time determine what behavior is normal for users. Any deviations generate alerts. Tests for determining 5

normal behavior include mean and standard deviation. This test examines data from logs to see if they fall into the range of average behavior and how much the data points vary from one another. The multivariate test looks at correlation between two or more variables, such as login frequency and time between sessions. If these two variables taken together exceed what is normal, then an alert will be generated. The Markov process examines transition probabilities between certain states. For example, it can look at the transitions between commands to see if they fit normal usage. The time series test determines whether something happens too quickly or too slowly. Finally, the operational test suspects intrusion if the number of occurrences of an event surpasses a predetermined limit. These tests can be used together to determine deviations, because each test measures different aspects of a single event. Another approach is rule-based anomaly detection. In this approach, the system analyzes data from audit logs and automatically develops a set of rules to describe normal behavior. While statistical anomaly detection inputs data into statistical tests to see whether this data falls into previously learned statistics, rule-based anomaly detection relies on the rules generated from previous statistics. So data about each new event is tested against the rules to see whether it is normal. Because rules are generated from statistics, a large database of rules is needed for rule-based anomaly systems to work well. The number of rules could reach 10000 or even 1 million. Nevertheless, the rulebased anomaly approach is as effective and strong as the statistical anomaly approach 3. despite the large volume of rules. Intrusion Detection Expert System (IDES) is an example of an statistical anomaly system and Wisdom and Sense (W&S) is an example of a system with rule-based anomaly detection. 6

An important advantage of anomaly intrusion detection systems is that they can catch new intrusion attempts, which are anomalous behavior. The disadvantage is that if what is normal is abnormal traffic (like during the time of the Code Red worm), then the system will not generate appropriate alerts. Therefore, an anomaly IDS needs to be placed on a network or used in a host system for a long period of time to learn what is normal. This is because the longer it gets a chance to learn, the more accurate are the alerts. A third way of detecting intrusions is rule-based signature or penetration identification. This method is often used along with anomaly systems. In this method, rules are not set up based on analysis of audit logs. Rules can be set up by defining known intrusions and by defining suspicious activity. The usual procedure is to collect information from system administrators and security analysts. Based on this information, one can set up some heuristics. For example, users should not be able to open other users personal directories. They should not write to other users files. They should not copy system programs. They should not be able to log in several times to the same system 4. Besides these rules that are set up against suspicious activity, a signature system also includes rules against known intrusions. Alerts are generated if an event or sequence of events matches the way known intrusions were launched--that is, they match signatures of known intrusions. Usually, vendors provide about 500 to 1500 rules for their products 5. As new intrusions are discovered, a system administrator must update his system with new signatures. The obvious disadvantage of a signature rule-based system is that a system administrator must constantly update his intrusion detection system whenever new 7

intrusions are discovered and new signatures are available. This constant updating can be a hassle, and if one does not do it in time an intrusion can occur. Another disadvantage is that this system cannot detect new intrusions because new intrusions do not follow any known patterns. An anomaly based system does not have these disadvantages. It can serve to complement signature detection s weaknesses. On the other hand, the signature based model is able to quickly detect misuse and known ways of intrusion more accurately than anomaly systems. In anomaly based systems, alerts may be generated by small, non-critical deviations, thereby creating many false alarms (or false positives). Similarly, if a network often has a large volume of abnormal traffic, actual harmful packets may escape detection, thereby creating false negatives. By using signature based systems to detect known intrusions, the accuracy of detection increases because signatures are designed to catch known intrusions whereas anomaly systems can either miss the intrusion or create so many false positives that the true positive is overlooked. Therefore, signature detection and anomaly detection serve well to complement each other. A rule of thumb is to use systems together. Operating together, they become a stronger system and their weaknesses can be covered by one another s strengths. NetScreen Intrusion Detection and Prevention: an example It is worthwhile to learn more about an intrusion detection system by looking at an actual IDS product. This paper will look at an intrusion detection product called NetScreen Intrusion Detection and Prevention (IDP). IDP is a network-based system that utilizes several different mechanisms to maximize the number and types of attacks that 8

can be detected. These mechanisms include stateful signature, protocol anomaly, traffic anomaly, backdoor detection, network honeypot, among others. IDP, like many other detection products, employs both anomaly and signature detection. Let us see how these methods are used in a real IDS product. IDP s signature detection is unlike other products on the market. Other products compares every packet to signatures of known attacks to see if there is a match. So this kind of packet signature detection processes unnecessary information, because it applies the mechanism to all traffic even when attacks cannot be generated at that point. However, stateful signature detection looks only at relevant traffic where attacks can be generated. For example, in order to determine whether a user is trying to login to a server as a root user, stateful signature detection would not look for the word root in all transactions. It would look for it only in the login sequence 6. Thus, precious resources are not wasted; a system administrator can look at packets that are of genuine concern. IDP s anomaly detection chooses to focus on the usage of communication protocols and traffic flow rather than other kinds of system usage. IDP s protocol anomaly detection analyzes traffic, comparing them with normal traffic that follows protocols. Usually, abnormal traffic is ambiguous, that is, it does not follow protocol specifications so that they can avoid detection. But normal packets are unambiguous. Thus this mechanism tests traffic to see whether it deviates from how normal traffic follows protocol specifications. Those packets that deviate are flagged with alerts. The effectiveness of protocol anomaly depends on the number of protocols the detection system recognizes. Abnormal packets that use a protocol not supported by the detection system may successfully escape detection. Therefore, the greater number of protocols a 9

system supports, the better. Some example protocols that IDP supports are IP, TCP, ICMP, ECHO, FINGER, DNS, POP3, IMAP, and many others 7. IDP also supports traffic anomaly detection. This kind of anomaly detection detects attacks that continue throughout a number of sessions. For example, an attack could begin by gathering some information (port scanning). Later, an attacker can penetrate through an open port that his earlier port scan discovered. Traffic anomaly detection would recognize port scanning as abnormal traffic, because port scans deviate from most normal traffic patterns. Thus, traffic anomaly detection that focuses on analyzing traffic patterns can detect port scans and other kinds of probes. After detection, the victim of the potential attack can close the vulnerable port and watch out for future activity from the attacker s IP address. IDP has another mechanism, which may protect against backdoor attacks. Backdoor attacks are those that enter the system through another program without the user s knowledge. While a user executes one program, a hidden program may also be running. By running this program that the user does not see, an attacker gains control of the system. An example of a backdoor attack is a Trojan horse. After the user opens the Trojan, for example a singing birthday card, the Trojan downloads the malicious code. The attacker interacts with the malicious program and gains control of the system. IDP detects backdoor attacks by searching for interactive traffic such as that between the attacker and the program in the compromised system. Upon finding such traffic, IDP tests this against what is defined by the administrator to be allowed. This is similar to comparing current traffic to a set of rules or heuristics. Unexpected interactive traffic that violates these rules generate alarms. 10

Another way to detect intrusions is through a network honeypot, which IDP uses. A network honeypot is a system that impersonates real services. When an attacker scans ports and finds such a system, the system sends fake information to the attacker so that the attacker would try to access these false services. Since legitimate users only access services through ports that they know offer real services, whoever tries to access services of honeypots are not legitimate users. They have done a port scan and found the honeypot; they can be assumed to be attackers. Since honeypots make it difficult for attackers to use them to compromise other systems, catching attackers this way spares other systems of potential attacks by these hackers. After looking at some of the detection mechanisms that Netscreen s IDP offers, one can see how each of them work together to maximize detection of attacks. Signature and anomaly detections can catch known and new attacks. Together they can also detect any type of abnormal and wrong use of the system. Backdoor intrusions like Trojans can be handled by IDP s backdoor detection. Honeypots can get an idea of what the attacker wants to do, such as the services he wants to access as he plans to take over a system. Honeypots also notify the IDP of these port scanning attackers, and proper responses can be taken to watch out for traffic from these attackers. Used by themselves, only some attacks may be detected. Anomaly detections used alone may not catch everything or may generate many false positives. Signature and honeypot detections help lower false positives, because traffic that match signatures and people who access honeypots are usually guilty of attacking a system. In this example, we have seen a variety of methods in a real intrusion detection system. The reason for these methods to be employed in one 11

IDS is to catch a wide variety of attacks. Many methods are better than one in detecting intrusions. Response after Detection There are many methods of intrusion detection. But what happens after an attack is detected? The rest of this paper will discuss some ways intrusion detection systems can respond to detected attacks. Usually, all suspected packets can be displayed on screen. So an administrator can analyze suspected packets and respond to attacks personally. For example, he or she can close a vulnerable port or disconnect an affected system. However, it would be too much for a security professional to respond to each alarm. Automated responses are necessary. One type of automated response is called session sniping. Session sniping is performed on TCP connections. Two systems, communicating through TCP, must establish a connection through handshaking before any data can flow between them. When users want to terminate the session, they must close the connection. In order to stop illegitimate traffic, an IDS can knock down this connection so that the attack can be stopped. An IDS that uses session sniping sends packets to the attacker and the victim with the TCP reset bit set to 1. When they receive these packets, the connection would stop. Another way to respond to attacks is to signal the firewall or router. After detection, an IDS tells the firewall or router to block future packets from the intruder s IP address. 12

But these responses have drawbacks. They are too late to stop the effects of an attack. Before a TCP connection can be dropped, some malicious packets may have already entered the system. Firewalls and routers only block malicious packets in the future. Those that already got through the firewalls and routers can still have an effect on the system. Unfortunately, most intrusion detection systems rely on these response mechanisms. Because of this, intrusion detection systems usually do not have adequate prevention. Some security professionals are turning to intrusion prevention systems (IPS) to overcome this problem. IPS is a new development, whose goal is to prevent attacks from affecting a system at all. IPS usually drops malicious packets as they are detected. So a system does not have to recover from an attack since they will not be affected in the first place. IV. Summary This paper has covered some of the major topics related to understanding an intrusion detection system. The best intrusion detection system, which can accurately detect a variety of attacks, is one that detects intrusions at different levels and applies a multi-method approach. Host-based and network-based detection systems have their benefits and limitations. A distributed system may be better because it can know what is going on at the host, network, and global level. A multi-method approach, using signature, anomaly, honeypot, backdoor defense, etc., increases the chances of catching all kinds of attacks. 13

The way to a secure system is not through a cure-all that could detect and prevent all intrusions. No such system exists. Indeed, the approach to intrusion detection is to use many methods instead of one. The way to securing a system is to use many products instead of one. Anti-virus software and firewalls should preferably be used along with intrusion detection systems. An able and attentive system administrator is also needed. The reason for such an army is that attacks come in various forms. No single method can stop them. While good IDSes are able to detect many intrusions, most IDSes cannot prevent attacks effectively. The focus in the future will probably be on intrusion prevention systems that both effectively detect and prevent attacks. 14

References Carr, Jim. Intrusion Detection Systems: Back to Front? Network Magazine. 5 Sep. 2001. URL: http://www.networkmagazine.com/article/nmg20010823s0007/3. Farshchi, Jamil. Statistical based approach to Intrusion Detection. URL: http://www.sans.org/resources/idfaq/statistic_ids.php. Hawrylkiw, Dan. Network Intrusion and use of automated responses. URL: http://www.sans.org/resources/idfaq/auto_res.php. Hrivnak, Allison. Host Based Intrusion Detection: An Overview of Tripwire and Intruder Alert. 29 Jan. 2002. URL: http://www.sans.org/rr/intrusion/hids.php. Kemmerer, Richard A. Computer Security. URL: http://www.cse.scu.edu/~jholliday/coen150sp03/kemm.pdf. Netscreen.com. Products. URL: http://www.netscreen.com/products/idp/security. Sans.org. What is host-based intrusion detection? URL: http://www.sans.org/resources/idfaq/host_based.php Sans.org. What is network based intrusion detection? URL: http://www.sans.org/resources/idfaq/network_based.php Sink, Michael. The Use of Honeypots and Packet Sniffers for Intrusion Detection. 15 April 2001. URL: http://www.sans.org/rr/intrusion/honey_pack.php. Spafford, Eugene, and Diego Zamboni. Data collection mechanisms for intrusion detection systems. 2 June 2000. URL: http://www.cerias.purdue.edu/homes/zamboni/pubs/2000-08.pdf. Spitzner, Lance. Honeypots: Tracking Hackers. San Francisco: Pearson Education, Inc., 2003. Stallings, William. Network Security Essentials: Applications and Standards. New Jersey: Prentice Hall, Inc., 2000. Zuver, Robert. A Thousand Heads Are Better Than One The Present and Future of Distributed Intrusion Detection. 30 April 2002. URL: http://www.sans.org/rr/intrusion/thousand.php. 15

Endnotes 1. Hrivnak. 2. Stallings, p. 301. 3. Ibid, p. 298. 4. Ibid, p. 300. 5. Farshchi. 6. Netscreen.com. 7. Ibid. 16