140 likes | 453 Views
Intrusion Detection Systems. Tristan Walters Rayce West. Overview. Definition – What is intrusion detection and intrusion detection systems(IDS) Characteristics of Intrusion Detection Systems Typical Components of Intrusion Detection Systems Types of Intrusion Detection Systems
E N D
Intrusion Detection Systems Tristan Walters Rayce West
Overview • Definition – What is intrusion detection and intrusion detection systems(IDS) • Characteristics of Intrusion Detection Systems • Typical Components of Intrusion Detection Systems • Types of Intrusion Detection Systems • Network-Based • Host-Based • Wireless • Conclusion
Definition • Intrusion Detection • The process of monitoring and analyzing a computer system or network for suspicious behavior or potential threats • Intrusion Detection Systems • The software and/or hardware that automate the process of monitoring events on a system or network and analyzing gathered information for intrusions
Characteristics • Information recording • Logging gathered information • Analyzing information • Notifying system administrators • Reports
Typical components • Sensors • Collect data from various sources. • Network packets, log files, etc • Management Servers • Analyze information collected by sensors • Can decide if an intrusion is occurring and take action • User Interface • Typically a software tool for system admins • Allows admin interaction with the IDS • Databases • Store sensor gathered data, logging information, etc
Network-based ids • Monitors computer networks for possible intruders • Analyzes network traffic and transport/application protocols • Primary component • Sensors - • Inline – sensors placed in direct network traffic flow • Passive – sensors connected to the network from the outside • Logging • Focuses on network information • IP addresses/MAC addresses, transportation protocols, etc
HOST-based IDS • Monitors events on a single host machine for attacks • Code analysis – malicious code, buffer overflows • Running applications • Changes in the host network settings • File system monitoring – access and integrity • Primary component • Agents – Software installed on the host that monitors and communicates with the management server • Logging • Focuses on application information, file paths and names, user information
Wireless Ids • Very similar to NIDS. Monitors wireless networks rather than physical • Analyzes wireless network protocols for suspicious activity • Primary Component • Sensors – samples frequency channels for malicious activities • Channel Scanning – constantly scans different channels in different frequency bands • Fixed sensors – a sensor placed in a fixed location • Mobile sensors – sensors that allow movement around a network • Logging • Channel numbers, sensor ID that observed a malicious event, source MAC address
Conclusion • There are a variety of different IDSs that contain a variety of components • IDSs are essential in any organization and institute that handle important data • Very helpful for system administrators