1.2k likes | 1.7k Views
Intrusion Detection System. SY4003FP Intrusion & Access Control. Prepared by Sandy Tay. Content. Introduction to Intrusion Detection System (IDS) 4 operations of IDS IDS terminologies Features of IDS Type of Detectors. What is Intrusion Detection System (IDS).
E N D
Intrusion Detection System SY4003FPIntrusion & Access Control Prepared by Sandy Tay Intrusion & Access Control
Content • Introduction to Intrusion Detection System (IDS) • 4 operations of IDS • IDS terminologies • Features of IDS • Type of Detectors Intrusion & Access Control
What is Intrusion Detection System (IDS) • A system that detects and alerts the presence of intruders into a protected area. • Consist of 3 major components: • Detection devices • Central processing device (control panel) • Alarm/ notification devices. • Key factors for IDS: • Accurate • Timely • Allow for assessment and verification of alarm conditions Intrusion & Access Control
Limitations of Electronic Detection (IDS) • Can’t provide instant alarm verification. • Small area detection • Once the detectors are mounted, unable to adjust detection area • Relatively high number of false alarms Intrusion & Access Control
IDS Operations • Detection • Analysis • Report • Response Intrusion & Access Control
IDS Operations • Detection • A detection device senses an event • Any change in their normal state (NO or NC) causes the control panel to issue an alarm Infrared motion sensor Intrusion & Access Control
IDS Operations • Analysis • Control Panel received information from detection device and respond when event occurs. 3 major parts of a control panel • Controller (password protection, history log ) • Alarm unit (drive the notification devices) • Communicator (with central monitoring station) Intrusion & Access Control
IDS Operations • Report • Local Visual or Audible reporting devices • Visual (Strobe light) • Audible (Siren/ buzzer) • Local command and control center • Remote Central Monitoring System • User via mobile services (SMS/email) Local Remote Intrusion & Access Control
IDS Operations • Response • Security officers • Police • Fire brigade, Civil Defence • Sprinkle system activated Intrusion & Access Control
IDS Terminologies Intrusion & Access Control
IDS Zones • Provides an exact and immediate location of the possible problem/ Danger • Zoning is required: • To identify the location of the intrusion. • To enable different types of action definition or security policy in different areas. • To enable partial alarming (of certain Zones). • For ease of maintenance and trouble shooting. Intrusion & Access Control
IDS Zones Intrusion & Access Control
Types of Zones Intrusion & Access Control
Types of Zones Intrusion & Access Control
Types of Special Zones Intrusion & Access Control
Zone Names • Naming the zones is important to localize the area • Typical zone names: Intrusion & Access Control
IDS components • Consists of Detection Devices, Control Panel and Signaling Devices Detection Devices Control Panel and Keypad Signaling Devices Glass Break Detector Indoor/ Outdoor Siren e.g. PowerMax Pro Motion Detector Intrusion & Access Control
Features of an IDS • Detection Devices • Intrusions from outside • Intrusions from internal Door contact Motion sensors Smoke Detector Intrusion & Access Control
Features of an IDS • Control Panel • Function • monitor the state of detection devices • respond when an event occurs • Feature • Store history of events • Operator control • turn the system on or off • identify the alarm state of the system • locates the zone or specific device causing an alarm condition • suspend an alarm condition • perform a system reset Intrusion & Access Control
Features of an IDS • Control Panel Intrusion & Access Control
Features of an IDS • Control Panel • Inputs Control • Controller decides if detector status should be translated into an alarm state. • Response Control • User can define how every event will be handled. • Control panel filters the alarms and transfers only the relevant ones • Outputs • Local alarm connects to either Siren, strobe light Intrusion & Access Control
Features of an IDS • Modes of Alerting • Audio (horn, sirens, bells) • Illuminated devices (strobes) • Central station monitoring • Local directed monitoring through • IP • PSTN • GPRS; • GSM Intrusion & Access Control
Types of IDS • Wired or Hard-wired (HIDS) • Wireless (WIDS) • Hybrid (HyIDS) • IP-enabled (IPIDS) Intrusion & Access Control
Types of IDS • Which type of IDS suitable for a project depends on • the customer constraints • the environment of building Intrusion & Access Control
Types of IDS • Wired or Hard-wired (HIDS) • System uses physical cables to connect all equipments used. • Acceptable for: • Smaller buildings where installation of cables is not a problem • Existing buildings where addition cables is not a problem • Lower cost (relative for equipments) Intrusion & Access Control
Types of IDS • Wireless (WIDS) • Uses wireless technology to connect all the detecting devices to radio transmitters. • Examples of wireless technology • RFID, UHF, microwave, Bluetooth • Government of a country needs to regulate the different frequencies used for different purposes Intrusion & Access Control
Types of IDS Wireless (WIDS) Power Supply Battery Saving mode After triggering the transmitter, it disarms itself Detector rearms itself automatically after 2 mins Repeater (Optional) Repeater and receiver use DC power supplies Battery Operated WirelessMotion Detector Receiver Wireless window sensor Protocol Intrusion & Access Control
Types of IDS • Wireless (WIDS) • Data Protocol • 12- Bit Code • Enables sending of only the identify of the transmitter. (system code + channel code) • Only information is : alarm or low battery • Battery require to check every 6 months • 36-bit code • 24-bit for identify + 12-bit for supervision (alarm, battery status, tampering, inactivity, periodical test) Note: Selected system code ensures that the central control receiver can only respond to transmitters set to the same code Intrusion & Access Control
Types of IDS Wireless (WIDS) Installation of Wireless IDS Points to consider Direct data transfer path among the equipment Area should be free from disturbances. Perform walk test with receiver and watch the red LED for reception. Flickers-> Constant disturbance. Remedy: Look for another area to install the receiver Light constantly Remedy: Do not install a wireless system. Propose alternative solution. Avoid direct sunlight on detectors and receivers Batteries in transmitters have to be changed periodically. Frequency of wireless devices must match the manufacturer of the control panel. Intrusion & Access Control
Types of IDS Wireless (WIDS) 1) Receiver Location • Place receiver in the geographical center of the transmitters. • Place the receiver (and antenna) at least the height recommended in the installation instruction. • When 2 receivers are used, place them at least 3m (10 feet) apart. • Check signal is good from sensor to receiver. • Do not install the wireless receiver in close proximity to sources that may cause interferences Intrusion & Access Control
Types of IDS Installation of WIDS (Receiver) Do not install the wireless receiver in close proximity to sources that may cause interferences Intrusion & Access Control
Types of IDS Wireless (WIDS) 2) Repeater Location • Install a repeater where there is good communication between the transmitters and the receiver or other repeaters. • Mount repeater and antenna at least the height recommended in the instructor manual. • Install it near a 230VAC source (for the chargeable battery). Intrusion & Access Control
Types of IDS Wireless (WIDS) 3) Transmitter Location • Perform the walk test to select best location for detection • if metal object is present, install transmitter at least 1m away from it. Intrusion & Access Control
Types of IDS • Wireless (WIDS) Intrusion & Access Control
Types of IDS • Hybrid (HyIDS) • Combine the better features of Wired and Wireless IDS. Intrusion & Access Control
Types of IDS • IP-enabled(IP- IDS) • allows user to use the existing network infrastructure to deploy IP-devices • Low startup costs • User can monitor activity on site real time • Possible to integrate with CCTV and access control system. Intrusion & Access Control
Types of IDS • IP-enabled(IP- IDS) • Benefits • Cost efficient • Flexible and scalable • Easy to integrate with other systems • Greater verification and response efficiency Intrusion & Access Control
Alarm Monitoring Center • 2 types • Centralized • Decentralized Intrusion & Access Control
Network IDS • Centralized IDS • Collects all data from the sensors to a Central management system for storage and processing Intrusion & Access Control
Network IDS • Decentralized IDS • 1 or more devices that perform both the data gathering, processing and reporting functions of the IDS. • Best suited for smaller WLANs due to cost and management issues. Intrusion & Access Control
Network IDS • Advantages Intrusion & Access Control
designed to generate an alarm condition in response to a deliberate action by the users detects intrusion, equipment malfunction, rate of temperature change smoke fire IDS Detectors Intrusion & Access Control
IDS Detectors 1. Interior detectors Detect intrusion into a building or facility Indoor use. Less susceptible to false and nuisance alarms 2. Perimeter detectors respond to outside intruders crossing a boundary higher false alarm rate often require the use of two or more sensors for effective detect Intrusion & Access Control
Detection Devices 1. Sensors Produce a signal in response to a stimulus within its detection zone. Detection method By: Infrared radiation Microwave radiation Ultrasonic frequencies, etc 2. Amplifying Unit To increase the signal received from the sensor Intrusion & Access Control
Detection Devices 3. Relay The relay activates any device that produces an alarm 4. Output Terminal Wiring connection between the device and the electrical circuit to the control unit Intrusion & Access Control
Detector Devices Features Light Emitting Diodes (LEDs) indicator The Tamper Switch Timer Anti Masking feature Intrusion & Access Control
Detector Devices 1. Light Emitting Diodes (LEDs) indicator Test light that turns itself on every time the sensor detects movement. used for walk-test LED selector Walk-test LED Intrusion & Access Control
Detector Devices 2. The Tamper Switch Detect attempts to remove some alarm components such as detector covers, switch covers 2 types of tamper switch: Internal tamper switch – detects cover removal External tamper switch – detects whole unit removal from the wall. Intrusion & Access Control
Detector Devices 3. Timer Controls the amount of time an element will remain activated before turning itself OFF. Examples: The timing for the LED light remains ON. The amount of time an alarm sounds. The amount of time a light-controller alarm remains activated. Intrusion & Access Control
Detector Devices 4. Anti-masking Effective protection from masking Cause detector to signal when there is attempt of masking. Technology used Short range active IR Detector sounds a short chirp every few minutes If the signal is sensed, possible masking condition is declared. Detector will emit an alert (visual, audio) until the trouble condition ends. Intrusion & Access Control