SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Intrusion DetectionIntrusion Detection
SystemSystem
Intrusion and IntrusionIntrusion and Intrusion
DetectionDetection
 Intrusion : Attempting to break into orIntrusion : Attempting to break into or
misuse your system.misuse your system.
 Intruders may be from outside theIntruders may be from outside the
network or legitimate users of thenetwork or legitimate users of the
network.network.
 Intrusion can be a physical, system orIntrusion can be a physical, system or
remote intrusion.remote intrusion.
Different ways to intrudeDifferent ways to intrude
 Buffer overflowsBuffer overflows
 Unexpected combinationsUnexpected combinations
 Unhandled inputUnhandled input
 Race conditionsRace conditions
Intrusion Detection SystemIntrusion Detection System
Knowledge
Base
Response
Model
Alert
Data-
base
Event
Provider
Analysis Engine
Other
machines
Intrusion DetectionIntrusion Detection
Systems (IDS)Systems (IDS)
 Different ways of classifying an IDSDifferent ways of classifying an IDS
IDS based onIDS based on
– anomaly detectionanomaly detection
– signature based misusesignature based misuse
– host basedhost based
– network basednetwork based
– Stack basedStack based
Intrusion DetectionIntrusion Detection
Systems (IDS)Systems (IDS)
Intrusion Detection Systems look forIntrusion Detection Systems look for
attack signatures, which are specificattack signatures, which are specific
patterns that usually indicate maliciouspatterns that usually indicate malicious
or suspicious intent.or suspicious intent.
Anomaly based IDSAnomaly based IDS
 This IDS models the normal usage ofThis IDS models the normal usage of
the network as a noisethe network as a noise
characterization.characterization.
 Anything distinct from the noise isAnything distinct from the noise is
assumed to be an intrusion activity.assumed to be an intrusion activity.
– E.g flooding a host with lots of packet.E.g flooding a host with lots of packet.
 The primary strength is its ability toThe primary strength is its ability to
recognize novel attacks.recognize novel attacks.
Drawbacks of AnomalyDrawbacks of Anomaly
detection IDSdetection IDS
 Assumes that intrusions will beAssumes that intrusions will be
accompanied by manifestations that areaccompanied by manifestations that are
sufficiently unusual so as to permitsufficiently unusual so as to permit
detection.detection.
 These generate many false alarms andThese generate many false alarms and
hence compromise the effectiveness of thehence compromise the effectiveness of the
IDS.IDS.
Signature based IDSSignature based IDS
 This IDS possess an attackedThis IDS possess an attacked
description that can be matched todescription that can be matched to
sensed attack manifestations.sensed attack manifestations.
 The question of what information isThe question of what information is
relevant to an IDS depends upon whatrelevant to an IDS depends upon what
it is trying to detect.it is trying to detect.
– E.g DNS, FTP etc.E.g DNS, FTP etc.
Signature based IDSSignature based IDS
(contd.)(contd.)
 ID system is programmed to interpret a certainID system is programmed to interpret a certain
series of packets, or a certain piece of dataseries of packets, or a certain piece of data
contained in those packets,as an attack. Forcontained in those packets,as an attack. For
example, an IDS that watches web servers mightexample, an IDS that watches web servers might
be programmed to look for the string “phf” as anbe programmed to look for the string “phf” as an
indicator of a CGI program attack.indicator of a CGI program attack.
 Most signature analysis systems are based off ofMost signature analysis systems are based off of
simple pattern matching algorithms. In most cases,simple pattern matching algorithms. In most cases,
the IDS simply looks for a sub string within a streamthe IDS simply looks for a sub string within a stream
of data carried by network packets. When it findsof data carried by network packets. When it finds
this sub string (for example, the ``phf'' in ``GET /cgi-this sub string (for example, the ``phf'' in ``GET /cgi-
bin/phf?''), it identifies those network packets asbin/phf?''), it identifies those network packets as
vehicles of an attack.vehicles of an attack.
Drawbacks of SignatureDrawbacks of Signature
based IDSbased IDS
 They are unable to detect novelThey are unable to detect novel
attacks.attacks.
 Suffer from false alarmsSuffer from false alarms
 Have to programmed again for everyHave to programmed again for every
new pattern to be detected.new pattern to be detected.
Host/Applications basedHost/Applications based
IDSIDS
 The host operating system or theThe host operating system or the
application logs in the auditapplication logs in the audit
information.information.
 These audit information includesThese audit information includes
events like the use of identification andevents like the use of identification and
authentication mechanisms (loginsauthentication mechanisms (logins
etc.) , file opens and programetc.) , file opens and program
executions, admin activities etc.executions, admin activities etc.
 This audit is then analyzed to detectThis audit is then analyzed to detect
trails of intrusion.trails of intrusion.
Drawbacks of the hostDrawbacks of the host
based IDSbased IDS
 The kind of information needed to beThe kind of information needed to be
logged in is a matter of experience.logged in is a matter of experience.
 Unselective logging of messages mayUnselective logging of messages may
greatly increase the audit and analysisgreatly increase the audit and analysis
burdens.burdens.
 Selective logging runs the risk thatSelective logging runs the risk that
attack manifestations could be missed.attack manifestations could be missed.
Strengths of the hostStrengths of the host
based IDSbased IDS
 Attack verificationAttack verification
 System specific activitySystem specific activity
 Encrypted and switch environmentsEncrypted and switch environments
 Monitoring key componentsMonitoring key components
 Near Real-Time detection andNear Real-Time detection and
response.response.
 No additional hardwareNo additional hardware
Stack based IDSStack based IDS
 They are integrated closely with theThey are integrated closely with the
TCP/IP stack, allowing packets to beTCP/IP stack, allowing packets to be
watched as they traverse their way upwatched as they traverse their way up
the OSI layers.the OSI layers.
 This allows the IDS to pull the packetsThis allows the IDS to pull the packets
from the stack before the OS or thefrom the stack before the OS or the
application have a chance to processapplication have a chance to process
the packets.the packets.
Network based IDSNetwork based IDS
 This IDS looks for attack signatures inThis IDS looks for attack signatures in
network traffic via a promiscuousnetwork traffic via a promiscuous
interface.interface.
 A filter is usually applied to determineA filter is usually applied to determine
which traffic will be discarded orwhich traffic will be discarded or
passed on to an attack recognitionpassed on to an attack recognition
module. This helps to filter out knownmodule. This helps to filter out known
un-malicious traffic.un-malicious traffic.
Strengths of NetworkStrengths of Network
based IDSbased IDS
 Cost of ownership reducedCost of ownership reduced
 Packet analysisPacket analysis
 Evidence removalEvidence removal
 Real time detection and responseReal time detection and response
 Malicious intent detectionMalicious intent detection
 Complement and verificationComplement and verification
 Operating system independenceOperating system independence
Future of IDSFuture of IDS
 To integrate the network and hostTo integrate the network and host
based IDS for better detection.based IDS for better detection.
 Developing IDS schemes for detectingDeveloping IDS schemes for detecting
novel attacks rather than individualnovel attacks rather than individual
instantiations.instantiations.

Weitere ähnliche Inhalte

Was ist angesagt?

Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemSweta Sharma
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTIONAnoop T
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemRoshan Ranabhat
 
User authentication
User authenticationUser authentication
User authenticationCAS
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing pptAnushakp9
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)Papun Papun
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distributionRiya Choudhary
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 
Types of firewall
Types of firewallTypes of firewall
Types of firewallPina Parmar
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 

Was ist angesagt? (20)

Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Ip address
Ip addressIp address
Ip address
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTION
 
Web Security
Web SecurityWeb Security
Web Security
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
User authentication
User authenticationUser authentication
User authentication
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Database security
Database securityDatabase security
Database security
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Cia security model
Cia security modelCia security model
Cia security model
 

Andere mochten auch

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAparna Bhadran
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)shraddha_b
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsPaul Green
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)david rom
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemDevil's Cafe
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Securityprimeteacher32
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortDisha Bedi
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]SISA Information Security Pvt.Ltd
 

Andere mochten auch (20)

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Push N Pull
Push N PullPush N Pull
Push N Pull
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Push & Pull
Push & PullPush & Pull
Push & Pull
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Key management
Key managementKey management
Key management
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Snort
SnortSnort
Snort
 
Snort IDS/IPS Basics
Snort IDS/IPS BasicsSnort IDS/IPS Basics
Snort IDS/IPS Basics
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Hcl
HclHcl
Hcl
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]
 

Ähnlich wie Intrusion detection system ppt

Chapter 3- Intrusion Detection.pdf
Chapter 3- Intrusion Detection.pdfChapter 3- Intrusion Detection.pdf
Chapter 3- Intrusion Detection.pdfAmanuelZewdie4
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMApoorv Pandey
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniLoay Elbasyouni
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)Netwax Lab
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1whitehat 'People'
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortDisha Bedi
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention MohammedAlmuhaimeed
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptxAnonymousEImkf6RGdQ
 
Intrusion Detection in WLANs
Intrusion Detection in WLANsIntrusion Detection in WLANs
Intrusion Detection in WLANsronrulzzz
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Wail Hassan
 
L5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxL5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxRebeccaMunasheChimhe
 
IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPSMinhaz A V
 
Intrusion detection system (ids)
Intrusion detection system (ids)Intrusion detection system (ids)
Intrusion detection system (ids)nishiyath
 
Information Security.pptx
Information Security.pptxInformation Security.pptx
Information Security.pptxDrRajapraveen
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionProgrammer
 

Ähnlich wie Intrusion detection system ppt (20)

Chapter 3- Intrusion Detection.pdf
Chapter 3- Intrusion Detection.pdfChapter 3- Intrusion Detection.pdf
Chapter 3- Intrusion Detection.pdf
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
Ips and-ids
Ips and-idsIps and-ids
Ips and-ids
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention
 
Ids vs ips
Ids vs ipsIds vs ips
Ids vs ips
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptx
 
Intrusion Detection in WLANs
Intrusion Detection in WLANsIntrusion Detection in WLANs
Intrusion Detection in WLANs
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
 
L5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxL5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptx
 
IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPS
 
Intrusion detection system (ids)
Intrusion detection system (ids)Intrusion detection system (ids)
Intrusion detection system (ids)
 
Information Security.pptx
Information Security.pptxInformation Security.pptx
Information Security.pptx
 
IS - Firewall
IS - FirewallIS - Firewall
IS - Firewall
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
IDS VS IPS.pptx
IDS VS IPS.pptxIDS VS IPS.pptx
IDS VS IPS.pptx
 

Mehr von Sheetal Verma (11)

Unit 3a
Unit 3aUnit 3a
Unit 3a
 
Unit 2aa
Unit 2aaUnit 2aa
Unit 2aa
 
Unit 1c
Unit 1cUnit 1c
Unit 1c
 
Unit 1 b
Unit 1 bUnit 1 b
Unit 1 b
 
Unit 1 a
Unit 1 aUnit 1 a
Unit 1 a
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
Extra unit 2
Extra unit 2Extra unit 2
Extra unit 2
 
Edi ppt
Edi pptEdi ppt
Edi ppt
 
Edi layer
Edi layerEdi layer
Edi layer
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Unit 4
Unit 4Unit 4
Unit 4
 

Kürzlich hochgeladen

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Kürzlich hochgeladen (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Intrusion detection system ppt

  • 2. Intrusion and IntrusionIntrusion and Intrusion DetectionDetection  Intrusion : Attempting to break into orIntrusion : Attempting to break into or misuse your system.misuse your system.  Intruders may be from outside theIntruders may be from outside the network or legitimate users of thenetwork or legitimate users of the network.network.  Intrusion can be a physical, system orIntrusion can be a physical, system or remote intrusion.remote intrusion.
  • 3. Different ways to intrudeDifferent ways to intrude  Buffer overflowsBuffer overflows  Unexpected combinationsUnexpected combinations  Unhandled inputUnhandled input  Race conditionsRace conditions
  • 4. Intrusion Detection SystemIntrusion Detection System Knowledge Base Response Model Alert Data- base Event Provider Analysis Engine Other machines
  • 5. Intrusion DetectionIntrusion Detection Systems (IDS)Systems (IDS)  Different ways of classifying an IDSDifferent ways of classifying an IDS IDS based onIDS based on – anomaly detectionanomaly detection – signature based misusesignature based misuse – host basedhost based – network basednetwork based – Stack basedStack based
  • 6. Intrusion DetectionIntrusion Detection Systems (IDS)Systems (IDS) Intrusion Detection Systems look forIntrusion Detection Systems look for attack signatures, which are specificattack signatures, which are specific patterns that usually indicate maliciouspatterns that usually indicate malicious or suspicious intent.or suspicious intent.
  • 7. Anomaly based IDSAnomaly based IDS  This IDS models the normal usage ofThis IDS models the normal usage of the network as a noisethe network as a noise characterization.characterization.  Anything distinct from the noise isAnything distinct from the noise is assumed to be an intrusion activity.assumed to be an intrusion activity. – E.g flooding a host with lots of packet.E.g flooding a host with lots of packet.  The primary strength is its ability toThe primary strength is its ability to recognize novel attacks.recognize novel attacks.
  • 8. Drawbacks of AnomalyDrawbacks of Anomaly detection IDSdetection IDS  Assumes that intrusions will beAssumes that intrusions will be accompanied by manifestations that areaccompanied by manifestations that are sufficiently unusual so as to permitsufficiently unusual so as to permit detection.detection.  These generate many false alarms andThese generate many false alarms and hence compromise the effectiveness of thehence compromise the effectiveness of the IDS.IDS.
  • 9. Signature based IDSSignature based IDS  This IDS possess an attackedThis IDS possess an attacked description that can be matched todescription that can be matched to sensed attack manifestations.sensed attack manifestations.  The question of what information isThe question of what information is relevant to an IDS depends upon whatrelevant to an IDS depends upon what it is trying to detect.it is trying to detect. – E.g DNS, FTP etc.E.g DNS, FTP etc.
  • 10. Signature based IDSSignature based IDS (contd.)(contd.)  ID system is programmed to interpret a certainID system is programmed to interpret a certain series of packets, or a certain piece of dataseries of packets, or a certain piece of data contained in those packets,as an attack. Forcontained in those packets,as an attack. For example, an IDS that watches web servers mightexample, an IDS that watches web servers might be programmed to look for the string “phf” as anbe programmed to look for the string “phf” as an indicator of a CGI program attack.indicator of a CGI program attack.  Most signature analysis systems are based off ofMost signature analysis systems are based off of simple pattern matching algorithms. In most cases,simple pattern matching algorithms. In most cases, the IDS simply looks for a sub string within a streamthe IDS simply looks for a sub string within a stream of data carried by network packets. When it findsof data carried by network packets. When it finds this sub string (for example, the ``phf'' in ``GET /cgi-this sub string (for example, the ``phf'' in ``GET /cgi- bin/phf?''), it identifies those network packets asbin/phf?''), it identifies those network packets as vehicles of an attack.vehicles of an attack.
  • 11. Drawbacks of SignatureDrawbacks of Signature based IDSbased IDS  They are unable to detect novelThey are unable to detect novel attacks.attacks.  Suffer from false alarmsSuffer from false alarms  Have to programmed again for everyHave to programmed again for every new pattern to be detected.new pattern to be detected.
  • 12. Host/Applications basedHost/Applications based IDSIDS  The host operating system or theThe host operating system or the application logs in the auditapplication logs in the audit information.information.  These audit information includesThese audit information includes events like the use of identification andevents like the use of identification and authentication mechanisms (loginsauthentication mechanisms (logins etc.) , file opens and programetc.) , file opens and program executions, admin activities etc.executions, admin activities etc.  This audit is then analyzed to detectThis audit is then analyzed to detect trails of intrusion.trails of intrusion.
  • 13. Drawbacks of the hostDrawbacks of the host based IDSbased IDS  The kind of information needed to beThe kind of information needed to be logged in is a matter of experience.logged in is a matter of experience.  Unselective logging of messages mayUnselective logging of messages may greatly increase the audit and analysisgreatly increase the audit and analysis burdens.burdens.  Selective logging runs the risk thatSelective logging runs the risk that attack manifestations could be missed.attack manifestations could be missed.
  • 14. Strengths of the hostStrengths of the host based IDSbased IDS  Attack verificationAttack verification  System specific activitySystem specific activity  Encrypted and switch environmentsEncrypted and switch environments  Monitoring key componentsMonitoring key components  Near Real-Time detection andNear Real-Time detection and response.response.  No additional hardwareNo additional hardware
  • 15. Stack based IDSStack based IDS  They are integrated closely with theThey are integrated closely with the TCP/IP stack, allowing packets to beTCP/IP stack, allowing packets to be watched as they traverse their way upwatched as they traverse their way up the OSI layers.the OSI layers.  This allows the IDS to pull the packetsThis allows the IDS to pull the packets from the stack before the OS or thefrom the stack before the OS or the application have a chance to processapplication have a chance to process the packets.the packets.
  • 16. Network based IDSNetwork based IDS  This IDS looks for attack signatures inThis IDS looks for attack signatures in network traffic via a promiscuousnetwork traffic via a promiscuous interface.interface.  A filter is usually applied to determineA filter is usually applied to determine which traffic will be discarded orwhich traffic will be discarded or passed on to an attack recognitionpassed on to an attack recognition module. This helps to filter out knownmodule. This helps to filter out known un-malicious traffic.un-malicious traffic.
  • 17. Strengths of NetworkStrengths of Network based IDSbased IDS  Cost of ownership reducedCost of ownership reduced  Packet analysisPacket analysis  Evidence removalEvidence removal  Real time detection and responseReal time detection and response  Malicious intent detectionMalicious intent detection  Complement and verificationComplement and verification  Operating system independenceOperating system independence
  • 18. Future of IDSFuture of IDS  To integrate the network and hostTo integrate the network and host based IDS for better detection.based IDS for better detection.  Developing IDS schemes for detectingDeveloping IDS schemes for detecting novel attacks rather than individualnovel attacks rather than individual instantiations.instantiations.