SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
INTRUSION DETECTION
By : Umesh Dhital
udh001@latech.edu
PRESENTATION OUTLINE
 Introduction
 What ?
 Why ?
 History
 Typical Intrusion Scenario
 Types of Attacks
 What IDS does ?
 Types of IDS
 Based on detection approach
 Advantages/ Disadvantages
 Based on protected system
 Network / Host based detection
 Evaluation of IDS
 Commercially available IDS
 Snort
 References
 Q/A
1/31/2015
2
INTRUSIONDETECTION
WHAT IS INTRUSION DETECTION SYSTEM?
1/31/2015
3
INTRUSIONDETECTION
 Intrusion
 Any unauthorized access, not permitted attempt to
access/damage or malicious use of information resources
 Intrusion Detection
 Detection of break-ins and break-in attempts via
automated software systems
 Intrusion Detection Systems(IDS)
 Defense systems, which detect and possibly prevent
intrusion detection activities
WHAT IS NOT AN IDS ?
 Network logging systems
 Security Scanners
 vulnerability assessment tools to check flaws in OS,N/W
 Antivirus products
 Security/Cryptographic systems
 E.g. VPN,SSL, Kerbose
 Firewalls
1/31/2015INTRUSIONDETECTION
4
WHY IDS ?
1/31/2015
5
INTRUSIONDETECTION
Straight Forward Reason
to protect data and system integrity.
Fact :
can not be done with ordinary password and file security
Misconception :
 A network firewall will keep the bad guys off my network, right?
 My anti-virus will recognize and get rid of any virus I might catch, right?
 And my password-protected access control will stop the office cleaner
trawling through my network after I've gone home, right?
So that's it – “I'm fully protected”
 Anti-virus systems are only good at detecting viruses they
already know about
 Passwords can be hacked or stolen or changed by other
 Firewalls DO NOT recognize attacks and block them
 Simply a fence around your network
 no capacity to detect someone is trying to break-in(digging a
hole underneath it)
 Can’t determine whether somebody coming through gate is
allowed to enter or not.
 Roughly 80% of financial losses occur hacking from inside the
network
“BEWARE OF INTERNAL INTRUDERS”
 Example :
In April 1999, many sites were hacked via a bug in ColdFusion. All had firewalls
to block other access except port 80. But it was the Web Server that was hacked.
HERE IS THE REALITY
1/31/2015
6
INTRUSIONDETECTION
ID- A BRIEF HISTORY
 1980 - James Anderson Paper Computer Security
Threat Monitoring and Surveillance
 Concept of “detecting” misuse and specific user events
emerged
 1984 - Dr. Dorothy Denning and SRI developed first
model for intrusion detection, Intrusion Detection Expert
System developed
 1988 – HayStack Project at University of California Lab,
released intrusion detection system for US Air force
 1989 – Commercial company HayStack Labs released
Stalker
 1990 – UC’s Todd Heberlein introduced idea of Network
Detection System”
 Developed Network Security Monitor
 SAIC developed Computer Misuse Detection System
1/31/2015
7
INTRUSIONDETECTION
HISTORY – CONTD..
 US Air force developed Automated Security
Measurement System
 ID Market gain popularity around 1997
 1998 ISS developed RealSecure
 Cisco purchased Wheel Group
 First host-based detection company Centrax
Corporation emerged
 Currently IDS is the top selling security technology
1/31/2015
8
INTRUSIONDETECTION
Source : www.symantic.com/connect/articles/evolution-detection-systems
TYPICAL INTRUSION SCENARIO
1/31/2015
9
INTRUSIONDETECTION
Information Gathering
Further Information Gathering
Attack !
Successful Intrusion
Fun and Profit
-Find as much as info. As possible
-whois lookup and DNS Zone transfers
-Normal browsing ; gather important info.
-ping sweeps, port scanning
-web server vulnerabilities
-version of application/services
-start trying out different attacks
- UNICODE attack if has IIS installed
-try to find misconfigured running services
-Passive Attack / Active Attack
-install own backdoors and delete log files
-replace existing services with own Trojen
horses that have backdoor passwords or
create own user accounts
- Steal confidential information
- Use compromised host to lunch further
attacks
- Change the web-site for FUN
1/31/2015
10
INTRUSIONDETECTION
TYPES OF ATTACK
 Unauthorized access to the resources
 Password cracking
 Spoofing e.g. DNS spoofing
 Scanning ports & services
 Network packet listening
 Stealing information
 Unauthorized network access
 Uses of IT resources for private purpose
 Unauthorized alternation of resources
 Falsification of identity
 Information altering and deletion
 Unauthorized transmission and creation of data
 Configuration changes to systems and n/w services
1/31/2015
11
INTRUSIONDETECTION
TYPES OF ATTACK CONTD..
 Denial of Service
 Flooding
 Ping flood
 Mail flood
 Compromising system
 Buffer overflow
 Remote system shutdown
 Web application attack
“Most attacks are not a single attack but a series of
individual events developed in coordinated manner”
1/31/2015
12
INTRUSIONDETECTION
1/31/2015
13
INTRUSIONDETECTION
Source : http://members.autobahn.mb.ca/~het/terror_war/evote.html
WHAT AN IDEAL IDS IS SUPPOSED TO DO ?
 Identify possible incidents
 detect an attacker has compromised system
 Report administrator
 Log information
 keep log of suspicious activities
 Can be configured to
 Recognize violations of security policies
 Monitor file transfers
 Copying a large database onto a user’s laptop
 Identify reconnaissance activity
 Attack tools and worms perform reconnaissance activity
like : host and port scans
1/31/2015
14
INTRUSIONDETECTION
IDS CLASSIFICATION
1/31/2015
15
INTRUSIONDETECTION
Source : http://www.windowsecurity.com/articles/IDS-Part2-Classification-methods-techniques.html
IDS TYPES : BASED ON DETECTION APPROACH
 Knowledge-based or Signature-based
 Behavior-based or Anomaly-based
 Knowledge-based
 Matching signature of well-known attacks against state-
change in systems or stream of packets flowing through
network
 Example of signatures :
 A telnet attempt with username “root” which is violation of an
organization’s security policy
 An e-mail with a subject “Free Pictures” and an attachment
“freepics.exe” -characteristics of a malware
1/31/2015
16
INTRUSIONDETECTION
ADVANTAGE / DISADVANTAGES OF KB-IDS
 Very few false alarm
 Very effective to detect previously known threats
 Ineffective to detect new threats
 Threats disguised by use of evasion techniques
 Compares a current unit of activity (e.g. a n/w packet or
a log entry) to a list of signatures using string
comparisons operations
 Little understanding of n/w or application protocol and
can’t track the state of complex communication
 e.g. can’t pair request with the corresponding response
 Cant remember a previous request while
processing the current request
1/31/2015
17
INTRUSIONDETECTION
BEHAVIOR-BASED IDS
 Compares normal event against observed events to
identify significant deviation
 Has profiles to represent normal behavior of
 Users, hosts, network connections or applications
 Developed by monitoring the characteristics of typical
activity over a period of time
 Profiles can be for behavioral attributes like:
 Number of email sent by a user, number of failed logins
for a host, level of processor usage etc.
 Example
A profile for a network might show that in an average, 13% of network
bandwidth are due to Web activities during typical workday hours. Then IDS can
use statistical methods to compare current Web activity bandwidth with expected
one and alert administrator if high bandwidth is being occupied by web activities
1/31/2015
18
INTRUSIONDETECTION
STATIC VS. DYNAMIC PROFILES
 Profiles are generated over a period of time (days
or sometimes weeks)
 Static profile is unchanged unless required to
generate new profile
 Change in systems and/or networks inaccurate
static profile (Generate Again)
 Dynamic profile defect : susceptible to evasion
attempts from attackers
 Frequently performing malicious activity
1/31/2015
19
INTRUSIONDETECTION
ADVANTAGES / DISADVANTAGES OF BBIDS
 Very effective to detect unknown threats
 Example :
Suppose computer is infected with a new type of malware. The malware
consumes large computer’s processor resources and send large number of
emails, initiating large number of network connections. This is definitely a
significantly different behavior from established profiles.
 High false alarm rate
 All activities excluded during training phase
 Making a profile is very challenging
1/31/2015
20
INTRUSIONDETECTION
NETWORK BASED INTRUSION DETECTION
 IDS are placed on the network, nearby system(s)
being monitored
 Monitors n/w traffic for particular n/w segments or
devices
 The network interface card placed in promiscuous
mode to capture all n/w traffic
 Sensors placed on n/w segment to check the
packets
 Primary types of signatures are
 String signature
 Port Signature
 Header Condition Signature
1/31/2015
21
INTRUSIONDETECTION
NETWORK BASED INTRUSION DETECTION
CONTD..
 String Signature
 Look text/string that may indicate possible attack
 Example: UNIX system “cat” “+ +” > /.rhosts”
 Port Signature
 Watch for connection attempts to well-known, frequently attacked ports
 Example : telnet (TCP port 23) , FTP (TCP port 21/20)
 Ports are not used but packets are coming that port.
 Header Signature
 Watch for dangerous or illogical combination of packet headers
 Example : TCP packet with both SYN and FIN flags set
 Request wished to start and stop the connection at the same time.
 Limitations
 Can not detect attacks on encrypted n/w traffic (E.g. HTPS, VPN)
 IDS sensors are susceptible to various attacks
 Large volume of traffic can crash IDS sensor itself
1/31/2015
22
INTRUSIONDETECTION
1/31/2015
23
INTRUSIONDETECTION
Source : WindowsSecurity.com
HOST BASED IDS
 Piece or pieces of software on the system to be
monitored
 Uses log files and network traffic in/out of that host
as data source
 Monitors:
 Incoming packets
 Login activities
 Root activities
 File systems
 Host based IDS might monitor
 Wired and wireless network traffic ;Systems logs
 Running process; file access/modification
1/31/2015
24
INTRUSIONDETECTION
1/31/2015
25
INTRUSIONDETECTION
Source : WindowsSecurity.com
EVALUATION OF IDS’S
1/31/2015
26
INTRUSIONDETECTION
Source : Iftikhar Ahmad , Azween B Abdullah and Abdullah S Alghamdi ,“Comparative Analysis of
Intrusion Detection Approaches”, 12th International Conference on Computer Modelling and
Simulation, 2010
CURRENTLY AVAILABLE IDSS
Network Based IDS Host Based IDS
Internet Security Systems Real
Secure
Internet Security Systems Real
Secure
Symantec Net Prowler Symantec Intruder Alert
Network Ice Black Ice Defender Tripwire
CyberSafe Centrax Cyber Safe Centrax
Detection Appliance
1/31/2015
27
INTRUSIONDETECTION
Snort, Fragroute /Fragrouter, OSSEC HIDS, are some of the most
popular Open Source IDS
SNORT
 Open source NIDS developed by Sourcefire
 It combines the benefits of signature based and
behavior based intrusion detection techniques
 It has 300,000 registered users
1/31/2015
28
INTRUSIONDETECTION
 How to install SNORT (in Linux)
http://www.youtube.com/watch?v=TZ0Hj0t5b5k&feature=related
 How to install and use SNORT (in XP)
http://www.youtube.com/watch?v=nAWN989WA0A&feature=related
 carbo.dll is the file that can be used to remotely view any file your
web server has permissions to view
1/31/2015
29
INTRUSIONDETECTION
REFERENCES
 Roman V. Yampolskiy and Venu Govindaraju, “Computer Security: a Survey of Methods
and Systems”, Journal of Computer Science 3 (7), 2007
 Iftikhar Ahamad, Azween B Abdullah and Abdullah S Alghamdi, “Comparative Analysis of
Intrusion Detection Approaches”, 12 th International Conference on Computer Modeling
and Simulation,2010
 David Elson, “Intrusion Detection, Theory and Practice”, www.symantec.com
 Karen Scarfone, Peter Mell, “Guide to Intrusion Detection and Prevention Systems
(IDPS)” , Special Publication 800-94
 ISS, “Network- vs. Host-based Intrusion Detection”, A Guide to Intrusion Detection
Technology
 FAQ's : http://www.sans.org/security-resources/idfaq/
 http://ids.nic.in/JCES%20TNL%20OCT%202008/IDS/IDS.htm
 http://sectools.org/ids.html
 http://www.snort.org/
 http://www.wikipedia.org
1/31/2015
30
INTRUSIONDETECTION
QUESTIONS / COMMENTS
1/31/2015
31
INTRUSIONDETECTION

Contenu connexe

Tendances

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)Papun Papun
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)shraddha_b
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)LJ PROJECTS
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network securityAPNIC
 
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS)Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS)Hachmdhmdzad
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention systemNikhil Raj
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemSweta Sharma
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
Intrusion detection systems
Intrusion detection systemsIntrusion detection systems
Intrusion detection systemsSeraphic Nazir
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortDisha Bedi
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysisBikrant Gautam
 

Tendances (20)

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Introduction IDS
Introduction IDSIntroduction IDS
Introduction IDS
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS)Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS)
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Reconnaissance
ReconnaissanceReconnaissance
Reconnaissance
 
Ids(final)
Ids(final)Ids(final)
Ids(final)
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Intro to Network Vapt
Intro to Network VaptIntro to Network Vapt
Intro to Network Vapt
 
Intrusion detection systems
Intrusion detection systemsIntrusion detection systems
Intrusion detection systems
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysis
 

En vedette

Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)david rom
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Securityprimeteacher32
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypotmmubashirkhan
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemDevil's Cafe
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortDisha Bedi
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distributionRiya Choudhary
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]SISA Information Security Pvt.Ltd
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection SolutionGreg Stone
 

En vedette (19)

Push N Pull
Push N PullPush N Pull
Push N Pull
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
 
Push & Pull
Push & PullPush & Pull
Push & Pull
 
Hcl
HclHcl
Hcl
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
Snort
SnortSnort
Snort
 
Snort ppt
Snort pptSnort ppt
Snort ppt
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypot
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
 
Snort IDS/IPS Basics
Snort IDS/IPS BasicsSnort IDS/IPS Basics
Snort IDS/IPS Basics
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
 
Key management
Key managementKey management
Key management
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection Solution
 
Wireshark
WiresharkWireshark
Wireshark
 

Similaire à Intrusion detection

Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...IIJSRJournal
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniLoay Elbasyouni
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection PresentationMustafash79
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionProgrammer
 
A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...csandit
 
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...cscpconf
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection amiable_indian
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsAlison Hall
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi SecurityIRJET Journal
 
The Security Of Information Security
The Security Of Information SecurityThe Security Of Information Security
The Security Of Information SecurityRachel Phillips
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Wail Hassan
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityEryk Budi Pratama
 

Similaire à Intrusion detection (20)

Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
 
1776 1779
1776 17791776 1779
1776 1779
 
1776 1779
1776 17791776 1779
1776 1779
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Euro mGov Securing Mobile Services
Euro mGov Securing Mobile ServicesEuro mGov Securing Mobile Services
Euro mGov Securing Mobile Services
 
A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...
 
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention Systems
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
The Security Of Information Security
The Security Of Information SecurityThe Security Of Information Security
The Security Of Information Security
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
IS - Firewall
IS - FirewallIS - Firewall
IS - Firewall
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
 
Network seurity
Network seurityNetwork seurity
Network seurity
 

Dernier

Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 

Dernier (20)

Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 

Intrusion detection

  • 1. INTRUSION DETECTION By : Umesh Dhital udh001@latech.edu
  • 2. PRESENTATION OUTLINE  Introduction  What ?  Why ?  History  Typical Intrusion Scenario  Types of Attacks  What IDS does ?  Types of IDS  Based on detection approach  Advantages/ Disadvantages  Based on protected system  Network / Host based detection  Evaluation of IDS  Commercially available IDS  Snort  References  Q/A 1/31/2015 2 INTRUSIONDETECTION
  • 3. WHAT IS INTRUSION DETECTION SYSTEM? 1/31/2015 3 INTRUSIONDETECTION  Intrusion  Any unauthorized access, not permitted attempt to access/damage or malicious use of information resources  Intrusion Detection  Detection of break-ins and break-in attempts via automated software systems  Intrusion Detection Systems(IDS)  Defense systems, which detect and possibly prevent intrusion detection activities
  • 4. WHAT IS NOT AN IDS ?  Network logging systems  Security Scanners  vulnerability assessment tools to check flaws in OS,N/W  Antivirus products  Security/Cryptographic systems  E.g. VPN,SSL, Kerbose  Firewalls 1/31/2015INTRUSIONDETECTION 4
  • 5. WHY IDS ? 1/31/2015 5 INTRUSIONDETECTION Straight Forward Reason to protect data and system integrity. Fact : can not be done with ordinary password and file security Misconception :  A network firewall will keep the bad guys off my network, right?  My anti-virus will recognize and get rid of any virus I might catch, right?  And my password-protected access control will stop the office cleaner trawling through my network after I've gone home, right? So that's it – “I'm fully protected”
  • 6.  Anti-virus systems are only good at detecting viruses they already know about  Passwords can be hacked or stolen or changed by other  Firewalls DO NOT recognize attacks and block them  Simply a fence around your network  no capacity to detect someone is trying to break-in(digging a hole underneath it)  Can’t determine whether somebody coming through gate is allowed to enter or not.  Roughly 80% of financial losses occur hacking from inside the network “BEWARE OF INTERNAL INTRUDERS”  Example : In April 1999, many sites were hacked via a bug in ColdFusion. All had firewalls to block other access except port 80. But it was the Web Server that was hacked. HERE IS THE REALITY 1/31/2015 6 INTRUSIONDETECTION
  • 7. ID- A BRIEF HISTORY  1980 - James Anderson Paper Computer Security Threat Monitoring and Surveillance  Concept of “detecting” misuse and specific user events emerged  1984 - Dr. Dorothy Denning and SRI developed first model for intrusion detection, Intrusion Detection Expert System developed  1988 – HayStack Project at University of California Lab, released intrusion detection system for US Air force  1989 – Commercial company HayStack Labs released Stalker  1990 – UC’s Todd Heberlein introduced idea of Network Detection System”  Developed Network Security Monitor  SAIC developed Computer Misuse Detection System 1/31/2015 7 INTRUSIONDETECTION
  • 8. HISTORY – CONTD..  US Air force developed Automated Security Measurement System  ID Market gain popularity around 1997  1998 ISS developed RealSecure  Cisco purchased Wheel Group  First host-based detection company Centrax Corporation emerged  Currently IDS is the top selling security technology 1/31/2015 8 INTRUSIONDETECTION Source : www.symantic.com/connect/articles/evolution-detection-systems
  • 9. TYPICAL INTRUSION SCENARIO 1/31/2015 9 INTRUSIONDETECTION Information Gathering Further Information Gathering Attack ! Successful Intrusion Fun and Profit -Find as much as info. As possible -whois lookup and DNS Zone transfers -Normal browsing ; gather important info. -ping sweeps, port scanning -web server vulnerabilities -version of application/services -start trying out different attacks - UNICODE attack if has IIS installed -try to find misconfigured running services -Passive Attack / Active Attack -install own backdoors and delete log files -replace existing services with own Trojen horses that have backdoor passwords or create own user accounts - Steal confidential information - Use compromised host to lunch further attacks - Change the web-site for FUN
  • 11. TYPES OF ATTACK  Unauthorized access to the resources  Password cracking  Spoofing e.g. DNS spoofing  Scanning ports & services  Network packet listening  Stealing information  Unauthorized network access  Uses of IT resources for private purpose  Unauthorized alternation of resources  Falsification of identity  Information altering and deletion  Unauthorized transmission and creation of data  Configuration changes to systems and n/w services 1/31/2015 11 INTRUSIONDETECTION
  • 12. TYPES OF ATTACK CONTD..  Denial of Service  Flooding  Ping flood  Mail flood  Compromising system  Buffer overflow  Remote system shutdown  Web application attack “Most attacks are not a single attack but a series of individual events developed in coordinated manner” 1/31/2015 12 INTRUSIONDETECTION
  • 14. WHAT AN IDEAL IDS IS SUPPOSED TO DO ?  Identify possible incidents  detect an attacker has compromised system  Report administrator  Log information  keep log of suspicious activities  Can be configured to  Recognize violations of security policies  Monitor file transfers  Copying a large database onto a user’s laptop  Identify reconnaissance activity  Attack tools and worms perform reconnaissance activity like : host and port scans 1/31/2015 14 INTRUSIONDETECTION
  • 15. IDS CLASSIFICATION 1/31/2015 15 INTRUSIONDETECTION Source : http://www.windowsecurity.com/articles/IDS-Part2-Classification-methods-techniques.html
  • 16. IDS TYPES : BASED ON DETECTION APPROACH  Knowledge-based or Signature-based  Behavior-based or Anomaly-based  Knowledge-based  Matching signature of well-known attacks against state- change in systems or stream of packets flowing through network  Example of signatures :  A telnet attempt with username “root” which is violation of an organization’s security policy  An e-mail with a subject “Free Pictures” and an attachment “freepics.exe” -characteristics of a malware 1/31/2015 16 INTRUSIONDETECTION
  • 17. ADVANTAGE / DISADVANTAGES OF KB-IDS  Very few false alarm  Very effective to detect previously known threats  Ineffective to detect new threats  Threats disguised by use of evasion techniques  Compares a current unit of activity (e.g. a n/w packet or a log entry) to a list of signatures using string comparisons operations  Little understanding of n/w or application protocol and can’t track the state of complex communication  e.g. can’t pair request with the corresponding response  Cant remember a previous request while processing the current request 1/31/2015 17 INTRUSIONDETECTION
  • 18. BEHAVIOR-BASED IDS  Compares normal event against observed events to identify significant deviation  Has profiles to represent normal behavior of  Users, hosts, network connections or applications  Developed by monitoring the characteristics of typical activity over a period of time  Profiles can be for behavioral attributes like:  Number of email sent by a user, number of failed logins for a host, level of processor usage etc.  Example A profile for a network might show that in an average, 13% of network bandwidth are due to Web activities during typical workday hours. Then IDS can use statistical methods to compare current Web activity bandwidth with expected one and alert administrator if high bandwidth is being occupied by web activities 1/31/2015 18 INTRUSIONDETECTION
  • 19. STATIC VS. DYNAMIC PROFILES  Profiles are generated over a period of time (days or sometimes weeks)  Static profile is unchanged unless required to generate new profile  Change in systems and/or networks inaccurate static profile (Generate Again)  Dynamic profile defect : susceptible to evasion attempts from attackers  Frequently performing malicious activity 1/31/2015 19 INTRUSIONDETECTION
  • 20. ADVANTAGES / DISADVANTAGES OF BBIDS  Very effective to detect unknown threats  Example : Suppose computer is infected with a new type of malware. The malware consumes large computer’s processor resources and send large number of emails, initiating large number of network connections. This is definitely a significantly different behavior from established profiles.  High false alarm rate  All activities excluded during training phase  Making a profile is very challenging 1/31/2015 20 INTRUSIONDETECTION
  • 21. NETWORK BASED INTRUSION DETECTION  IDS are placed on the network, nearby system(s) being monitored  Monitors n/w traffic for particular n/w segments or devices  The network interface card placed in promiscuous mode to capture all n/w traffic  Sensors placed on n/w segment to check the packets  Primary types of signatures are  String signature  Port Signature  Header Condition Signature 1/31/2015 21 INTRUSIONDETECTION
  • 22. NETWORK BASED INTRUSION DETECTION CONTD..  String Signature  Look text/string that may indicate possible attack  Example: UNIX system “cat” “+ +” > /.rhosts”  Port Signature  Watch for connection attempts to well-known, frequently attacked ports  Example : telnet (TCP port 23) , FTP (TCP port 21/20)  Ports are not used but packets are coming that port.  Header Signature  Watch for dangerous or illogical combination of packet headers  Example : TCP packet with both SYN and FIN flags set  Request wished to start and stop the connection at the same time.  Limitations  Can not detect attacks on encrypted n/w traffic (E.g. HTPS, VPN)  IDS sensors are susceptible to various attacks  Large volume of traffic can crash IDS sensor itself 1/31/2015 22 INTRUSIONDETECTION
  • 24. HOST BASED IDS  Piece or pieces of software on the system to be monitored  Uses log files and network traffic in/out of that host as data source  Monitors:  Incoming packets  Login activities  Root activities  File systems  Host based IDS might monitor  Wired and wireless network traffic ;Systems logs  Running process; file access/modification 1/31/2015 24 INTRUSIONDETECTION
  • 26. EVALUATION OF IDS’S 1/31/2015 26 INTRUSIONDETECTION Source : Iftikhar Ahmad , Azween B Abdullah and Abdullah S Alghamdi ,“Comparative Analysis of Intrusion Detection Approaches”, 12th International Conference on Computer Modelling and Simulation, 2010
  • 27. CURRENTLY AVAILABLE IDSS Network Based IDS Host Based IDS Internet Security Systems Real Secure Internet Security Systems Real Secure Symantec Net Prowler Symantec Intruder Alert Network Ice Black Ice Defender Tripwire CyberSafe Centrax Cyber Safe Centrax Detection Appliance 1/31/2015 27 INTRUSIONDETECTION Snort, Fragroute /Fragrouter, OSSEC HIDS, are some of the most popular Open Source IDS
  • 28. SNORT  Open source NIDS developed by Sourcefire  It combines the benefits of signature based and behavior based intrusion detection techniques  It has 300,000 registered users 1/31/2015 28 INTRUSIONDETECTION
  • 29.  How to install SNORT (in Linux) http://www.youtube.com/watch?v=TZ0Hj0t5b5k&feature=related  How to install and use SNORT (in XP) http://www.youtube.com/watch?v=nAWN989WA0A&feature=related  carbo.dll is the file that can be used to remotely view any file your web server has permissions to view 1/31/2015 29 INTRUSIONDETECTION
  • 30. REFERENCES  Roman V. Yampolskiy and Venu Govindaraju, “Computer Security: a Survey of Methods and Systems”, Journal of Computer Science 3 (7), 2007  Iftikhar Ahamad, Azween B Abdullah and Abdullah S Alghamdi, “Comparative Analysis of Intrusion Detection Approaches”, 12 th International Conference on Computer Modeling and Simulation,2010  David Elson, “Intrusion Detection, Theory and Practice”, www.symantec.com  Karen Scarfone, Peter Mell, “Guide to Intrusion Detection and Prevention Systems (IDPS)” , Special Publication 800-94  ISS, “Network- vs. Host-based Intrusion Detection”, A Guide to Intrusion Detection Technology  FAQ's : http://www.sans.org/security-resources/idfaq/  http://ids.nic.in/JCES%20TNL%20OCT%202008/IDS/IDS.htm  http://sectools.org/ids.html  http://www.snort.org/  http://www.wikipedia.org 1/31/2015 30 INTRUSIONDETECTION