Top Banner
Intrusion Detection Intrusion Detection Systems Systems Austen Hayes Cameron Hinkel
35

Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Dec 29, 2015

Download

Documents

Avice Byrd
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Intrusion Detection Intrusion Detection SystemsSystems

Austen HayesCameron

Hinkel

Page 2: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Intrusion Detection Systems Intrusion Detection Systems (IDS)(IDS)Definition

Page 3: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Purpose of IDSPurpose of IDSMonitor Host/Network

Page 4: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Purpose of IDSPurpose of IDSMonitor Host/NetworkLog Suspicious Activity

Page 5: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Purpose of IDSPurpose of IDSMonitor Host/NetworkLog Suspicious ActivityDetect Potential Threats

Page 6: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Purpose of IDSPurpose of IDSMonitor Host/NetworkLog Suspicious ActivityDetect Potential Threats Alert System Administrator(s)

Page 7: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Purpose of IDSPurpose of IDSMonitor Host/NetworkLog Suspicious ActivityDetect Potential Threats Alert System Administrator(s)Generate Reports

Page 8: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Detection MethodsDetection MethodsStatistical Anomaly-Based

Page 9: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Detection MethodsDetection MethodsStatistical Anomaly-Based

◦Protocol Analysis

Page 10: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Detection MethodsDetection MethodsStatistical Anomaly-Based

◦Protocol Analysis◦Bandwidth

Page 11: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Detection MethodsDetection MethodsStatistical Anomaly-Based

◦Protocol Analysis◦Bandwidth◦Hardware Connections

Page 12: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Detection MethodsDetection MethodsStatistical Anomaly-Based

◦Protocol Analysis◦Bandwidth◦Hardware Connections

Signature-Based

Page 13: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Detection MethodsDetection MethodsStatistical Anomaly-Based

◦Protocol Analysis◦Bandwidth◦Hardware Connections

Signature-BasedStateful Protocol Analysis

Page 14: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Types of IDSTypes of IDSNetwork (NIDS)

NIDS

Firewall

Internet

Private Network

Page 15: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Types of IDSTypes of IDSHost-based (HIDS)

Firewall

Internet

Private Network

HIDS

Page 16: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Types of IDSTypes of IDSWireless

IDS

SensorAccess Point

Wireless Devices

Internet

Page 17: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Types of IDSTypes of IDSNetwork (NIDS)Host-based (HIDS)WirelessNetwork Behavior Analysis

Page 18: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Network IDSNetwork IDSInstallation Types

◦Hub/Switch

NIDS

Hub

Internet

Private Network

Page 19: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Network IDSNetwork IDSInstallation Types

◦Network Tap

NIDS

Hub

Internet

Private Network

Page 20: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Network IDSNetwork IDSInstallation Types

◦Inline

Internet NIDS

Hub

Private Network

Page 21: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Network IDSNetwork IDSExamples

◦“LaBrea Tarpit” Propagation of worms

Page 22: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Network IDSNetwork IDSExamples

◦“LaBrea Tarpit” Propagation of worms ARP request responses

Page 23: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Network IDSNetwork IDSExamples

◦Honey Pot Low-Interaction

Page 24: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Network IDSNetwork IDSExamples

◦Honey Pot Low-Interaction High-Interaction

Page 25: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Types of AttacksTypes of Attacks

Page 26: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Types of AttacksTypes of AttacksPort Scan

Page 27: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Types of AttacksTypes of AttacksPort ScanDOS Attack

Page 28: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Types of AttacksTypes of AttacksPort ScanDOS AttackICMP Flood

Page 29: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Types of AttacksTypes of AttacksPort ScanDOS AttackICMP FloodDistributed

Page 30: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Popular IDS SoftwarePopular IDS SoftwareSnort

◦Open source, Signature-based

Page 31: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Popular IDS SoftwarePopular IDS SoftwareSnort

◦Open source, Signature-basedAIDE

◦Advanced Intrusion Detection Environment

Page 32: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

Popular IDS SoftwarePopular IDS SoftwareSnort

◦Open source, Signature-basedAIDE

◦Advanced Intrusion Detection Environment

OSSEC HIDS

Page 33: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

ConclusionConclusionSecurity Integral to Sys. Admin

Job

Page 34: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

ConclusionConclusionSecurity Integral to Sys. Admin

JobComplexity of Securing A

System/Network

Page 35: Intrusion Detection Systems Austen Hayes Cameron Hinkel.

ConclusionConclusionSecurity Integral to Sys. Admin

JobComplexity of Securing a

System/NetworkNumerous Tools Available To

Detect Threats