You are on page 1of 10

Intrusion Detection

Systems
Dj Gerena
What is an
Intrusion Detection System
• Hardware and/or software
• Attempts to detect Intrusions
• Heuristics /Statistics
• Signatures
• Gathers and reports incidents
• Sent to console
• Trigger a response
Composition of an IDS
• Components are added into an existing network
• Sensor
• Copy a record of all network activity and sends it to
the Collector
• Collector
• Determines if an attack is taking place
• IDS Manager
• Laptop/Desktop with IDS software
• Check for alerts
• Change settings
• Database
• Houses network baseline data or attack signatures
Anomaly Based vs. Signature Based IDS
• Anomaly Based
• Monitors network traffic
• Keeps track of patterns of traffic and information to
obtain baseline
• If deviation in network behavior is detected, IDS will
assume an attack
• Higher risk of false positive
• Signature Based
• Attack Signature database is maintained
• Compare traffic to the database
• If match is found, alert is sent
• Requires constant updates
Network-Based vs. Host-Based
IDS
• Network-Based
• Monitors all traffic on the network
• Useful for monitoring non critical systems.
• Host-Based
• IDS customized to a specific server
• Being closer to host allows for greater chance
of detection
• Prevents threats such as Trojans and backdoors
from being installed form within the network
Passive vs. Reactive
• Passive
• When an attack is detected an alarm or alter
will be triggered
• No further action is performed by the IDS
• Reactive
• Collector will send an alert
• Send instruction to firewall and router to block
activity from occurring on the network
• Response should be managed and assessed,
regardless of system being used.
Response to Attacks
• If an automatic response was not enacted
• Verify that an attack occurred
• Shutdown any necessary ports or processes
• Do a quick damage assessment
• Once response has been applied
• Patch/block vulnerabilities
• Verify if attack has ended
• Determine whether to lift blocks
Benefits of IDS
• Eliminate the need to shut down a
network when an attack occurs
• Allows user to observe the type of attack
and methods used by the attack to prevent
future attacks
• The security baseline defines the criteria
such as used bandwidth, protocols, ports,
and the types of devices that can be
connected to each-other.
Sources
• http://www.firewalls.com/blog/intrusion_detection/
• https://
www.sans.org/reading-room/whitepapers/detection/understa
nding-intrusion-detection-systems-337
• https://
www.sans.org/reading-room/whitepapers/detection/intrusion
-detection-systems-definition-challenges-343
• http://www.youtube.com/watch?v=O2Gz-v8WswQ

You might also like