Name. Description. Rationale



Similar documents
Firewall Environments. Name

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Introduction of Intrusion Detection Systems

Network- vs. Host-based Intrusion Detection

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Architecture Overview

Taxonomy of Intrusion Detection System

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Intrusion Detection Systems

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Network Security Policy: Best Practices White Paper

INTRUSION DETECTION SYSTEMS and Network Security

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Basics of Internet Security

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

PROFESSIONAL SECURITY SYSTEMS

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?

Firewalls and Intrusion Detection

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

Data Security Incident Response Plan. [Insert Organization Name]

SANS Top 20 Critical Controls for Effective Cyber Defense

IDS : Intrusion Detection System the Survey of Information Security

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Performance Evaluation of Intrusion Detection Systems

Banking Security using Honeypot

Fifty Critical Alerts for Monitoring Windows Servers Best practices

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

CMS Operational Policy for Firewall Administration

CS5008: Internet Computing

Intrusion Detection Systems

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

74% 96 Action Items. Compliance

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

PCI Security Scan Procedures. Version 1.0 December 2004

State of Vermont. Intrusion Detection and Prevention Policy. Date: Approved by: Tom Pelham Policy Number:

Protecting Critical Infrastructure

Network Based Intrusion Detection Using Honey pot Deception

Wireless Network Security

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

IDS / IPS. James E. Thiel S.W.A.T.

Payment Card Industry (PCI) Data Security Standard

Tk20 Network Infrastructure

Intrusion Detection System (IDS)

Firewalls: An Effective Solution for Internet Security E. Eugene Schultz Payoff

Chapter 9 Firewalls and Intrusion Prevention Systems

CERT-In. Indian Computer Emergency Response Team. Handling Computer Security Incidents. IDS Intrusion Detection System

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

GFI White Paper PCI-DSS compliance and GFI Software products

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International.

Network Security Policy

LogRhythm and PCI Compliance

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

FISMA / NIST REVISION 3 COMPLIANCE

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

How To Protect A Network From Attack From A Hacker (Hbss)

Introduction p. 2. Introduction to Information Security p. 1. Introduction

Global Partner Management Notice

Network Defense Tools

Intruders & Intrusion Hackers Criminal groups Insiders. Detection and IDS Techniques Detection Principles Requirements Host-based Network-based

Comparison of Firewall and Intrusion Detection System

By David G. Holmberg, Ph.D., Member ASHRAE

A Review on Network Intrusion Detection System Using Open Source Snort

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

SECURITY ADVISORY FROM PATTON ELECTRONICS

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2. Intrusion Detection and Prevention Systems

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

Secure Software Programming and Vulnerability Analysis

Intrusion Detection Systems (IDS)

Course Title: Penetration Testing: Security Analysis

Critical Controls for Cyber Security.

March

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

USM IT Security Council Guide for Security Event Logging. Version 1.1

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:

Determine if the expectations/goals/strategies of the firewall have been identified and are sound.

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Transcription:

Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic. NIDS are dedicated software or hardware systems that sit on a network and analyze network packets. NIDS often consist of a set of single-purpose sensors placed at various points in a network. These sensors monitor network traffic, performing local analysis of that traffic and reporting attacks to a centralized console. Rationale Benefits List the Domain List the Discipline List the Technology Area List Product Component Document the Compliance Component Type Component Sub-type State the Guideline, Standard or Legislation The first step in delivering an efficient and secure network intrusion protection strategy is accurately detecting all possible threats. To achieve this goal, multiple detection methods should be employed to ensure comprehensive coverage. The failure to secure State of Missouri networks with NIDS puts agencies at a much greater risk of loss. A single attack can cost millions of dollars in time spent recovering from the attack and liability for compromised data and hardware. The damage from an attack to State of Missouri services can also include inconvenience to citizens and the loss of public confidence. NIDS identify and prevent security threats from compromising secure networks. The deployment of NIDS has little impact on network performance. NIDS are usually passive devices that listen on a network without interfering with the normal operation of a network. NIDS can be made very secure against attack and even made invisible to many attackers. ASSSSOCI IATEED ARCHITEECTUREE LLEEVEELLSS Security Technical Controls Intrusion Detection Systems Guideline COMPPLLI IANCEE COMPPONEENT TYPPEE COMPPLLI IANCEE DEETAI ILL General NIDS Requirements Administrators shall be trained on the IDS before implementation. Despite vendor claims of ease of use, training and/or experience are

necessary to manage any IDS. It is preferred to have the NIDS controlled directly from a central location(s). However, the NIDS may be agent-based where response decisions are made at the agent. IDS administrators shall be able to create or change policies easily. NIDS Deployment Requirements NIDS shall be deployed in conjunction with Host-Based IDS to fully protect the system. It is recommended that organizations install the NIDS first on critical networks. Once administrators are familiar with the NIDS, it may be installed on the remainder of the organization s networks. NIDS shall be installed on any Network where sensitive or critical information is transmitted. It is preferred to install IDS Management software on a dedicated system in the target networks being monitored. It is preferred to have the NIDS use an agent-manager (server) architecture, where policy is created and modified on the manager and automatically distributed to all agents. It is preferred that Server agents poll the manager at periodic intervals for policy changes or new software updates. NIDS Analysis Requirements NIDS shall utilize information from operating system audit trails and system logs. NIDS shall have easy-to-use tools to analyze the logs. NIDS shall detect, and preferably prevent, the following: System scanning (probing the target with different kinds of packets to garner information about the system, such as topology, active systems, operating systems and software in use), Denial of Service (DoS) (slow or shut down targeted systems or hosts), and Penetration (unauthorized acquisition and/or alteration of system privileges, resources, or data). NIDS shall use Misuse Detection methods (matching a predefined pattern of events describing an attack) and may include Anomaly Detection (abnormal, unusual behavior) components. Administrators shall follow a schedule for checking the results of the NIDS to ensure attackers have not modified the system. NIDS Response Requirements NIDS shall respond in real-time. It is preferred that IDS provide active responses to intrusions by: Collecting additional information:

Turning up the number of events logged, or Capturing all packets, not just those targeting a particular port or system. Changing the environment: Terminating the connection, or Reconfiguring routers and firewalls to: Block packets from the intruder s IP address, Block network ports, protocols or services, or Sever all connections that use certain network interfaces. NIDS administrators shall work closely with router and firewall administrators when creating rules for routers and firewalls to ensure intruders cannot abuse the feature to deny access to legitimate users. NIDS may provide passive responses requiring subsequent human action to intrusions by: Generating alarms and notifications with popup windows, cellular phones, pagers and email, or Reporting alarms and alerts using SNMP traps and plug-ins to central network management consoles. All NIDS communications shall be secure and use encrypted tunnels or other cryptographic measures. NIDS shall create output with the following information for each intrusion detected: Time/date Sensor IP address Specific attack name Source and destination IP addresses Source and destination port numbers Network protocol used Description of the attack type Attack severity level Type of loss expected Type of vulnerability exploited Input validation (buffer overflow or boundary condition) Access validation (faulty access control mechanism) Exceptional condition Environmental (unexpected interaction with an application and the operating system or between two applications) Server Configuration Race (delay between the time a system checks to see if an operation is allowed and the time it performs the operation)

Design Software types and versions vulnerable Patch information to counter the attack References to advisories about the attack or vulnerability It is preferred that NIDS reports combine redundant attack entries and make attacks of highest importance stand out. NIST SP 800-31 (www.csrc.nist.gov/publications/nistpubs) Intrusion Detection Systems (IDS), Document Source Reference # NIST SP 800-18 (www.csrc.nist.gov/publications/nistpubs) CERT Guide to System and Network Security Practices (www.cert.org/security-improvement/) Contact Information Contact Information Standard Organization Website Government Body National Institute of Standards and Technology (NIST), Computer Website Security Resource Center (CSRC) inquiries@nist.gov http://csrc.nist.gov/ KEEYWORDSS Honey Pot, intrusion, cracker, buffer overflows, passwords, sniffing, List all Keywords exploit, denial-of-service, Java, ActiveX, SMURF, DNS, probes COMPPONEENT CLLASSSSI IFFI ICATION Provide the Classification Emerging Current Twilight Sunset Document the Rationale for Component Classification Document the Conditional Use Restrictions Document the Migration Strategy Document the Position Statement on Impact Rationale for Component Classification Conditional Use Restrictions Migration Strategy Impact Position Statement

CURREENT SSTATUSS Provide the Current Status) In Development Under Review Approved Rejected AUDIT TRAILL Creation Date 04/03/2003 Date Accepted / Rejected 5/14/2003 Reason for Rejection Last Date Reviewed Reason for Update Last Date Updated