SlideShare une entreprise Scribd logo
1  sur  30
INTRUSION DETECTION
AND
PREVENTION SYSTEMS
Mrs.G.Chandraprabha.,M.Sc.,M.Phil.,
Assistant Professor
Department of Information Technology,
V.V.Vanniaperumal College for Women,
Virudhunagar.
TYPES OF IDPS :
NETWORK-BASED SYSTEMS
HOST-BASED SYSTEMS
NETWORK-BASED SYSTEMS :
 A network-based IDPS is focused on protecting network
information assets.
 Two specialized subtypes of network-based IDPS are
Wireless IDPS
Network Behavior Analysis (NBA) IDPS.
A network-based IDPS (NIDPS) resides on a computer or appliance
connected to a segment of an organization’s network and monitors
network traffic on that network segment, looking for indications of
ongoing or successful attacks.
A NIDPS is installed at a specific place in the network (such as on the inside
of an edge router) from where it is possible to monitor the traffic going into
and out of a particular network segment.
When placed next to a hub, switch, or other key networking device, the
NIDPS may use that device’s monitoring port. The monitoring port also
known as a switched port analysis (SPAN) port or mirror port, is a specially
configured connection on a network device that is capable of viewing all of
the traffic that moves through the entire device.
This is accomplished by means of a special implementation of the TCP/IP
stack that reassembles the packets and applies
Protocol stack verification,
Application protocol verification,
 In the process of protocol stack verification, the NIDPSs look for invalid data
packets.
 The elements of these protocols (IP, TCP, UDP, and application layers such
as HTTP) are combined in a complete set called the protocol stack when the
software is implemented in an operating system or application.
 In application protocol verification, the higher-order protocols (HTTP,
FTP, and Telnet) are examined for unexpected packet behavior or improper
use.
 While the protocol stack verification looks for violations in the protocol
packet structure, the application protocol verification looks for violations in the
protocol packet’s use.
Advantages :
Monitor a large network.
No disruption to normal network operations.
NIDPSs are not usually susceptible to direct attack.
A NIDPS can become overwhelmed by network volume and fail to recognize
attacks
NIDPSs require access to all traffic to be monitored.
NIDPSs cannot analyze encrypted packets, making some of the network
traffic invisible to the process.
NIDPSs cannot reliably ascertain if an attack was successful or not.
Some forms of attack are not easily discerned by NIDPSs, specifically those
involving fragmented packets.
Disadvantages :
WIRELESS NIDPS :
A wireless IDPS monitors and analyzes wireless network traffic.
Wireless IDPSs cannot evaluate and diagnose issues with higher-
layer protocols like TCP and UDP.
Physical security
Sensor range
Access points
Cost
The wireless IDPS can also detect:
Unauthorized WLANs and WLAN devices
Poorly secured WLAN devices
Unusual usage patterns
The use of wireless network scanners
Denial of service (DoS) attacks and conditions
Impersonation and man-in-the-middle attacks7
NETWORK BEHAVIOR-ANALYSIS SYSTEM :
NBA systems examine network traffic in order to identify problems related to
the flow of traffic.
NBA IDPSs typically monitor internal networks but occasionally
monitor connections between internal and external networks.
Typical flow data particularly relevant to intrusion detection and prevention
includes:
Source and destination IP addresses.
Source and destination TCP or UDP ports or ICMP types and codes.
Number of packets and bytes transmitted in the session.
Starting and ending timestamps for the session.
The types of events most commonly detected by NBA sensors :
DoS attacks (including DDoS attacks)
Scanning
Worms
Unexpected application services (e.g., tunneled protocols, back
doors, use of forbidden application protocols)
Policy violations
NBA sensors offer various intrusion prevention capabilities :
 Passive only
 Inline only
 Both passive and inline
HOST-BASED IDPS :
A host-based IDPS (HIDPS) resides on a particular computer or server, known
as the host, and monitors activity only on that system.
An HIDPS has an advantage over an NIDPS in that it can access encrypted
information traveling over the network and use it to make decisions about
potential or actual attacks.
An HIDPS is also capable of monitoring system configuration databases, such
as Windows registries, in addition to stored configuration files like .ini, .cfg,
and .dat files.
An HIDPS classifies files into various categories and then sends notifications when
changes occur.
Advantages :
oAn HIDPS can detect local events on host systems.
oAn HIDPS functions on the host system, where encrypted traffic will have been decrypted
and is available for processing.
oThe use of switched network protocols does not affect an HIDPS.
Disadvantages :
oHIDPSs pose more management issues.
oAn HIDPS is vulnerable both to direct attacks and to attacks against the
host operating system.
oAn HIDPS is susceptible to some denial-of-service attacks.
oAn HIDPS can use large amounts of disk space.
Strengths of Intrusion Detection and Prevention Systems
Monitoring and analysis of system events and user behaviors
Testing the security states of system configurations
Baselining the security state of a system, then tracking any changes to that
baseline
Recognizing patterns of system events that correspond to known attacks
Recognizing patterns of activity that statistically vary from normal activity
Limitations of Intrusion Detection and Prevention Systems
Compensating for weak or missing security mechanisms in the protection
infrastructure, such as firewalls, identification and authentication systems,
link encryption systems, access control mechanisms, and virus detection and
eradication software.
Instantaneously detecting, reporting, and responding to an attack when
there is a heavy network or processing load.
Detecting newly published attacks or variants of existing attacks.
Effectively responding to attacks launched by sophisticated attackers.
Biometric Access Controls :
Biometric access control is based on the use of some measurable human
characteristic or trait to authenticate the identity of a proposed systems user
(a supplicant).
Biometric authentication technologies
Effectiveness of Biometrics
False Reject Rate
False Accept Rate
Crossover Error Rate (CER)
Acceptability of Biometrics
A balance must be struck between how acceptable a security system is to
its users and how effective it is in maintaining security.
IS-Types of IDPSs.pptx
IS-Types of IDPSs.pptx

Contenu connexe

Similaire à IS-Types of IDPSs.pptx

FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.pptFALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.pptuseonlyfortech140
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsPaul Green
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1whitehat 'People'
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention MohammedAlmuhaimeed
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)Netwax Lab
 
L5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxL5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxRebeccaMunasheChimhe
 
INTERNET SECURITY SYSTEM
INTERNET SECURITY SYSTEMINTERNET SECURITY SYSTEM
INTERNET SECURITY SYSTEMBhushan Gajare
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptxAnonymousEImkf6RGdQ
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)Papun Papun
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention systemNikhil Raj
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Wail Hassan
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAAKASH S
 
Security measures for networking
Security measures for networkingSecurity measures for networking
Security measures for networkingShyam Kumar Singh
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemEswar Publications
 

Similaire à IS-Types of IDPSs.pptx (20)

FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.pptFALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
 
Ids
IdsIds
Ids
 
N44096972
N44096972N44096972
N44096972
 
L5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxL5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptx
 
Snort IDS/IPS Basics
Snort IDS/IPS BasicsSnort IDS/IPS Basics
Snort IDS/IPS Basics
 
INTERNET SECURITY SYSTEM
INTERNET SECURITY SYSTEMINTERNET SECURITY SYSTEM
INTERNET SECURITY SYSTEM
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptx
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Security measures for networking
Security measures for networkingSecurity measures for networking
Security measures for networking
 
Ids vs ips
Ids vs ipsIds vs ips
Ids vs ips
 
idps
idpsidps
idps
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
 

Plus de V.V.Vanniaperumal College for Women

Plus de V.V.Vanniaperumal College for Women (20)

Control Memory.pptx
Control Memory.pptxControl Memory.pptx
Control Memory.pptx
 
ADDRESSING MODES.pptx
ADDRESSING MODES.pptxADDRESSING MODES.pptx
ADDRESSING MODES.pptx
 
Data_Transfer&Manupulation Instructions.pptx
Data_Transfer&Manupulation Instructions.pptxData_Transfer&Manupulation Instructions.pptx
Data_Transfer&Manupulation Instructions.pptx
 
Timing & Control.pptx
Timing & Control.pptxTiming & Control.pptx
Timing & Control.pptx
 
Human Rights - 1.pptx
Human Rights - 1.pptxHuman Rights - 1.pptx
Human Rights - 1.pptx
 
Registers.pptx
Registers.pptxRegisters.pptx
Registers.pptx
 
Instruction Codes.pptx
Instruction Codes.pptxInstruction Codes.pptx
Instruction Codes.pptx
 
Features of Java.pptx
Features of Java.pptxFeatures of Java.pptx
Features of Java.pptx
 
JVM.pptx
JVM.pptxJVM.pptx
JVM.pptx
 
Constructors in JAva.pptx
Constructors in JAva.pptxConstructors in JAva.pptx
Constructors in JAva.pptx
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Crypttools.pptx
 
IS-Delibrate software attacks.pptx
IS-Delibrate software attacks.pptxIS-Delibrate software attacks.pptx
IS-Delibrate software attacks.pptx
 
IS-Nature of forces.ppt
IS-Nature of forces.pptIS-Nature of forces.ppt
IS-Nature of forces.ppt
 
IS-cryptograpy algorithms.pptx
IS-cryptograpy algorithms.pptxIS-cryptograpy algorithms.pptx
IS-cryptograpy algorithms.pptx
 
IS-honeypot.pptx
IS-honeypot.pptxIS-honeypot.pptx
IS-honeypot.pptx
 
Sum of subset problem.pptx
Sum of subset problem.pptxSum of subset problem.pptx
Sum of subset problem.pptx
 
M-coloring.pptx
M-coloring.pptxM-coloring.pptx
M-coloring.pptx
 
storm.ppt
storm.pptstorm.ppt
storm.ppt
 
storm for RTA.pptx
storm for RTA.pptxstorm for RTA.pptx
storm for RTA.pptx
 
Yarn.ppt
Yarn.pptYarn.ppt
Yarn.ppt
 

Dernier

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Dernier (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

IS-Types of IDPSs.pptx

  • 1. INTRUSION DETECTION AND PREVENTION SYSTEMS Mrs.G.Chandraprabha.,M.Sc.,M.Phil., Assistant Professor Department of Information Technology, V.V.Vanniaperumal College for Women, Virudhunagar.
  • 2. TYPES OF IDPS : NETWORK-BASED SYSTEMS HOST-BASED SYSTEMS
  • 3.
  • 4. NETWORK-BASED SYSTEMS :  A network-based IDPS is focused on protecting network information assets.  Two specialized subtypes of network-based IDPS are Wireless IDPS Network Behavior Analysis (NBA) IDPS.
  • 5. A network-based IDPS (NIDPS) resides on a computer or appliance connected to a segment of an organization’s network and monitors network traffic on that network segment, looking for indications of ongoing or successful attacks.
  • 6. A NIDPS is installed at a specific place in the network (such as on the inside of an edge router) from where it is possible to monitor the traffic going into and out of a particular network segment. When placed next to a hub, switch, or other key networking device, the NIDPS may use that device’s monitoring port. The monitoring port also known as a switched port analysis (SPAN) port or mirror port, is a specially configured connection on a network device that is capable of viewing all of the traffic that moves through the entire device.
  • 7.
  • 8.
  • 9.
  • 10. This is accomplished by means of a special implementation of the TCP/IP stack that reassembles the packets and applies Protocol stack verification, Application protocol verification,
  • 11.  In the process of protocol stack verification, the NIDPSs look for invalid data packets.  The elements of these protocols (IP, TCP, UDP, and application layers such as HTTP) are combined in a complete set called the protocol stack when the software is implemented in an operating system or application.  In application protocol verification, the higher-order protocols (HTTP, FTP, and Telnet) are examined for unexpected packet behavior or improper use.  While the protocol stack verification looks for violations in the protocol packet structure, the application protocol verification looks for violations in the protocol packet’s use.
  • 12. Advantages : Monitor a large network. No disruption to normal network operations. NIDPSs are not usually susceptible to direct attack.
  • 13. A NIDPS can become overwhelmed by network volume and fail to recognize attacks NIDPSs require access to all traffic to be monitored. NIDPSs cannot analyze encrypted packets, making some of the network traffic invisible to the process. NIDPSs cannot reliably ascertain if an attack was successful or not. Some forms of attack are not easily discerned by NIDPSs, specifically those involving fragmented packets. Disadvantages :
  • 14. WIRELESS NIDPS : A wireless IDPS monitors and analyzes wireless network traffic. Wireless IDPSs cannot evaluate and diagnose issues with higher- layer protocols like TCP and UDP. Physical security
  • 16. The wireless IDPS can also detect: Unauthorized WLANs and WLAN devices Poorly secured WLAN devices Unusual usage patterns The use of wireless network scanners Denial of service (DoS) attacks and conditions Impersonation and man-in-the-middle attacks7
  • 17. NETWORK BEHAVIOR-ANALYSIS SYSTEM : NBA systems examine network traffic in order to identify problems related to the flow of traffic. NBA IDPSs typically monitor internal networks but occasionally monitor connections between internal and external networks. Typical flow data particularly relevant to intrusion detection and prevention includes: Source and destination IP addresses. Source and destination TCP or UDP ports or ICMP types and codes. Number of packets and bytes transmitted in the session. Starting and ending timestamps for the session.
  • 18. The types of events most commonly detected by NBA sensors : DoS attacks (including DDoS attacks) Scanning Worms Unexpected application services (e.g., tunneled protocols, back doors, use of forbidden application protocols) Policy violations
  • 19. NBA sensors offer various intrusion prevention capabilities :  Passive only  Inline only  Both passive and inline
  • 20. HOST-BASED IDPS : A host-based IDPS (HIDPS) resides on a particular computer or server, known as the host, and monitors activity only on that system. An HIDPS has an advantage over an NIDPS in that it can access encrypted information traveling over the network and use it to make decisions about potential or actual attacks. An HIDPS is also capable of monitoring system configuration databases, such as Windows registries, in addition to stored configuration files like .ini, .cfg, and .dat files.
  • 21. An HIDPS classifies files into various categories and then sends notifications when changes occur. Advantages : oAn HIDPS can detect local events on host systems. oAn HIDPS functions on the host system, where encrypted traffic will have been decrypted and is available for processing. oThe use of switched network protocols does not affect an HIDPS.
  • 22. Disadvantages : oHIDPSs pose more management issues. oAn HIDPS is vulnerable both to direct attacks and to attacks against the host operating system. oAn HIDPS is susceptible to some denial-of-service attacks. oAn HIDPS can use large amounts of disk space.
  • 23. Strengths of Intrusion Detection and Prevention Systems Monitoring and analysis of system events and user behaviors Testing the security states of system configurations Baselining the security state of a system, then tracking any changes to that baseline Recognizing patterns of system events that correspond to known attacks Recognizing patterns of activity that statistically vary from normal activity
  • 24. Limitations of Intrusion Detection and Prevention Systems Compensating for weak or missing security mechanisms in the protection infrastructure, such as firewalls, identification and authentication systems, link encryption systems, access control mechanisms, and virus detection and eradication software. Instantaneously detecting, reporting, and responding to an attack when there is a heavy network or processing load. Detecting newly published attacks or variants of existing attacks. Effectively responding to attacks launched by sophisticated attackers.
  • 25. Biometric Access Controls : Biometric access control is based on the use of some measurable human characteristic or trait to authenticate the identity of a proposed systems user (a supplicant). Biometric authentication technologies
  • 26.
  • 27.
  • 28. Effectiveness of Biometrics False Reject Rate False Accept Rate Crossover Error Rate (CER) Acceptability of Biometrics A balance must be struck between how acceptable a security system is to its users and how effective it is in maintaining security.