SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Network-Based Intrusion
     Detection Systems
        By: John Buckhorn
Introduction
 Security Threats on the Rise
Traditional Protection
  Antivirus
  Firewalls
History
• USAF – 1972
  – Noted vulnerabilities of computer security
• 1984
  – First Intrusion Detection System Prototype
  – Real Time Intrusion Detection
  – Would eventually evolve into modern NBIDS
IDS Features
•   Pattern matching
•   Data destruction
•   denial-of-service
•   Hostile code
•   Network or System Eavesdropping
•   System and Network Mapping
•   Unauthorized access
•   Anomaly Detection
Intrusion Detection Technologies
• Host-based Intrusion detection Systems
  (HIDS)
• Network-Based intrusion detection systems
  (NBIDS)
• File System Integrity checkers
• Honeypot Systems
• Security Information Management (SIM)
Network-Based Intrusion Detection
         System (NBIDS)
 • More network based attacks

 • Shift from host based to network based

 • An NBIDS is a system that monitors traffic
   at selected points on a network or
   interconnected set of networks
Types of Attacks
             (Internal)
• Insider Attacks
  – Not limited to an employee
• Examples
  – Internal Denial of Service (DoS)
  – Internal Privilege Escalation
  – Internal Super-User Privileges
Types of Attacks
             (External)
• External Threats
  – Companies systems are becoming more visible
  – International Threats
• Example
  – External Denial of Service (DoS)
  – External Privilege Escalations
NBIDS Benefits
• Trace activity
• Complements:
  – Firewalls
  – Antivirus Software
• System Management Competencies
  – Monitoring
  – Security Audits
  – Response
  – Attack Recognition
Types of NBIDS
• Promiscuous-Mode
  – Captures every packet


• Network-Node
  – VPN
NBIDS Issues
• Cannot reassemble all fragmented traffic
• Cannot compensate for low credential
  standards
• Cannot analyze all data or deal with packet-
  level issues
• Firewalls serve best
NBIDS Future
• Artificial Intelligence
• Combination of:
   – Anomaly Detection
   – Misuse Detection
• New Hybrid Model
Cost Effectiveness
• One Third of attacks originate inside the
  company
• Firewalls only prevent unauthorized access
  from outside the network
• Companies spent $3.8 Million/year
• Compared to $60,000 for a hardware-based
  Cisco® NBIDS
Available NBIDS
• Snort Intrusion Prevention – Software-
  based
  – Free
• AIDE – Software-Based
  – Free
• IBM RealSecure ISS – Software-Based
  – ~$12,000
• Cisco IPS 4270 – Harware-based
  – ~$50,000-$60,000
FAQ
• Why have a NBIDS if it cannot prevent a
  hack?

• When would it be necessary to use a Host-
  based Intrusion Detection System?

• What is a Signature?
Conclusion
• Goal:
  – To achieve a balance


• NBIDS is not preventative
  – Firewall
  – Antivirus
  – Host based IDS

Weitere ähnliche Inhalte

Was ist angesagt?

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
Umesh Dhital
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
Apoorv Pandey
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysis
Bikrant Gautam
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And Prevention
Nicholas Davis
 

Was ist angesagt? (19)

Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and DemeritsSignature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS security
 
Ids(final)
Ids(final)Ids(final)
Ids(final)
 
IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPS
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysis
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...NGIPS(Next Generation Intrusion Prevention System) in Network security presen...
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And Prevention
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
 

Ähnlich wie Network-Based Intrusion Detection System

Intrusion detection and prevention
Intrusion detection and preventionIntrusion detection and prevention
Intrusion detection and prevention
Nicholas Davis
 
FALLSEM2023-24_CSE3501_ETH_VL2023240102981_2023-09-04_Reference-Material-I.pdf
FALLSEM2023-24_CSE3501_ETH_VL2023240102981_2023-09-04_Reference-Material-I.pdfFALLSEM2023-24_CSE3501_ETH_VL2023240102981_2023-09-04_Reference-Material-I.pdf
FALLSEM2023-24_CSE3501_ETH_VL2023240102981_2023-09-04_Reference-Material-I.pdf
thilakrajc
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
Loay Elbasyouni
 
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.pptFALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
useonlyfortech140
 

Ähnlich wie Network-Based Intrusion Detection System (20)

Intrusion detection and prevention
Intrusion detection and preventionIntrusion detection and prevention
Intrusion detection and prevention
 
ch03.pptx
ch03.pptxch03.pptx
ch03.pptx
 
Cours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptxCours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptx
 
BOTNET
BOTNETBOTNET
BOTNET
 
Introduction to Snort
Introduction to SnortIntroduction to Snort
Introduction to Snort
 
Intrusion detection system and intrusion prevention system
Intrusion detection system and intrusion prevention systemIntrusion detection system and intrusion prevention system
Intrusion detection system and intrusion prevention system
 
INTRUSION_DETECTION_SYSTEM_PBL.pptx
INTRUSION_DETECTION_SYSTEM_PBL.pptxINTRUSION_DETECTION_SYSTEM_PBL.pptx
INTRUSION_DETECTION_SYSTEM_PBL.pptx
 
IDS n IPS
IDS n IPSIDS n IPS
IDS n IPS
 
012
012012
012
 
DoS Attack - Incident Handling
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident Handling
 
IT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysisIT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysis
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
 
Intrusion detection system.pptx
Intrusion detection system.pptxIntrusion detection system.pptx
Intrusion detection system.pptx
 
From liability to asset, the role you should be playing in your security arch...
From liability to asset, the role you should be playing in your security arch...From liability to asset, the role you should be playing in your security arch...
From liability to asset, the role you should be playing in your security arch...
 
FALLSEM2023-24_CSE3501_ETH_VL2023240102981_2023-09-04_Reference-Material-I.pdf
FALLSEM2023-24_CSE3501_ETH_VL2023240102981_2023-09-04_Reference-Material-I.pdfFALLSEM2023-24_CSE3501_ETH_VL2023240102981_2023-09-04_Reference-Material-I.pdf
FALLSEM2023-24_CSE3501_ETH_VL2023240102981_2023-09-04_Reference-Material-I.pdf
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.pptFALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Network-Based Intrusion Detection System

  • 1. Network-Based Intrusion Detection Systems By: John Buckhorn
  • 2. Introduction  Security Threats on the Rise Traditional Protection Antivirus Firewalls
  • 3. History • USAF – 1972 – Noted vulnerabilities of computer security • 1984 – First Intrusion Detection System Prototype – Real Time Intrusion Detection – Would eventually evolve into modern NBIDS
  • 4. IDS Features • Pattern matching • Data destruction • denial-of-service • Hostile code • Network or System Eavesdropping • System and Network Mapping • Unauthorized access • Anomaly Detection
  • 5. Intrusion Detection Technologies • Host-based Intrusion detection Systems (HIDS) • Network-Based intrusion detection systems (NBIDS) • File System Integrity checkers • Honeypot Systems • Security Information Management (SIM)
  • 6. Network-Based Intrusion Detection System (NBIDS) • More network based attacks • Shift from host based to network based • An NBIDS is a system that monitors traffic at selected points on a network or interconnected set of networks
  • 7. Types of Attacks (Internal) • Insider Attacks – Not limited to an employee • Examples – Internal Denial of Service (DoS) – Internal Privilege Escalation – Internal Super-User Privileges
  • 8. Types of Attacks (External) • External Threats – Companies systems are becoming more visible – International Threats • Example – External Denial of Service (DoS) – External Privilege Escalations
  • 9. NBIDS Benefits • Trace activity • Complements: – Firewalls – Antivirus Software • System Management Competencies – Monitoring – Security Audits – Response – Attack Recognition
  • 10. Types of NBIDS • Promiscuous-Mode – Captures every packet • Network-Node – VPN
  • 11. NBIDS Issues • Cannot reassemble all fragmented traffic • Cannot compensate for low credential standards • Cannot analyze all data or deal with packet- level issues • Firewalls serve best
  • 12. NBIDS Future • Artificial Intelligence • Combination of: – Anomaly Detection – Misuse Detection • New Hybrid Model
  • 13. Cost Effectiveness • One Third of attacks originate inside the company • Firewalls only prevent unauthorized access from outside the network • Companies spent $3.8 Million/year • Compared to $60,000 for a hardware-based Cisco® NBIDS
  • 14. Available NBIDS • Snort Intrusion Prevention – Software- based – Free • AIDE – Software-Based – Free • IBM RealSecure ISS – Software-Based – ~$12,000 • Cisco IPS 4270 – Harware-based – ~$50,000-$60,000
  • 15. FAQ • Why have a NBIDS if it cannot prevent a hack? • When would it be necessary to use a Host- based Intrusion Detection System? • What is a Signature?
  • 16. Conclusion • Goal: – To achieve a balance • NBIDS is not preventative – Firewall – Antivirus – Host based IDS