13
ids/ips
Last updated
ids/ips
Last updated
Detect vulnerability exploits/potential threats
Listen-only device
Monitors traffic
Detection/depth of analysis may not be performed quickly enough -> Speed of analysis/detection may not be able to keep pace with components on direct communication path of the network.
Types of IDS
Network-based intrusion detection system (NIDS)
Deployed across the infrastructure
Border of subnets
Any strategic points on the network infrastructure
Monitors all network security
Host-based intrusion detection system (HIDS)
Monitors computer infrastructure
Deployed on specific endpoint -> eg. Company Laptop
Types of IDS Detection
Signature
Looks for specific patterns and sequences that match known attack signatures
100% accurate, but scope only to known attacks
When 0-day attack occurs,
Anomaly-based
Machine learning is used to analyze the current network data and traffic
Machine then creates a baseline (model of normal activity) and uses it to identify anomalous behavior.
Very prone to false positives(false alarm)
To set heuristics, for vendor to fine tune.
Any IDS solution will have both signature-based and anomaly-based detection methods.
IDS Evasion Techniques
Fragmentation
Divides packet into smaller, fragmented packets.
Packets are later reconstructed by the recipient node at the IP layer.
Packet then becomes malicious
Flooding
Overwhelm the detector, triggering a failure of control mechanism.
Obfuscation
Altering program code in packet to keeps functionality indistinguishable - IDS unable to know
Encryption
Encrypting the program transfered in the packet means that IDS without encryption/decryption capabilities are unable to detect it.
Largely automated
Able to detect and take action on traffic
Functionality integrated into unified threat management ()
Now connected to cloud-based computing
IDS - out-of-line/out of band deployment IPS - inline deployment
Several actions IPS can do:
Send an alarm to the administrator (similar to IDS)
Drop malicious packets
Block traffic from a source address specified
Reset a connection
Configure firewall to prevent future attacks
Types of IPS and their detection methods
Similar to IDS, has:
Network based intrusion prevention system
Host intrusion prevention system
Detection methods for IPS are also signature based and anomaly based.
IDS + IPS = IDPS
IDPS
Allows administrator to control and configure what actions to be taken (eg. alert only like a traditional IDS, or take action on a packet like traditional IPS when a malicious packet is detected)
IPS and firewall technology may be integrated due to similarity in terms of having rule-based policy controls.
Firewall -> Allow/Deny traffic based on ports/source or destination IP addresses
IPS -> Compares traffic patterns to signatures and allows/drop packet based on signature matches found
Almost all NGFWs are with IPS capabilities *just in case not all are not having ips capabilities