Whitman Ch07
Whitman Ch07
Security Technology:
Intrusion Detection and
Prevention Systems, and
Other Security Tools
Learning Objectives
• Upon completion of this material, you should be able to:
• Advantages of NIDPSs
Good network design and placement of NIDPS can
enable an organization to monitor a large network
with few devices.
NIDPSs are usually passive and can be deployed into
existing networks with little disruption to normal
network operations.
NIDPSs are not usually susceptible to direct attack and
may not be detectable by attackers.
Types of IDPSs
• Disadvantages of NIDPSs
Can become overwhelmed by network volume and
fail to recognize attacks.
Require access to all traffic to be monitored.
Cannot analyze encrypted packets.
Cannot reliably ascertain if attack was successful or
not.
Some forms of attack are not easily discerned by
NIDPSs, specifically those involving fragmented
packets.
Types of IDPSs
2) Host-based IDPS (HIDPS)
Resides on a particular computer or server (host) and
monitors activity only on that system.
Benchmarks and monitors the status of key system files
and detects when intruder creates, modifies, or deletes
files.
Advantage over NIDPS: can access encrypted information
traveling over network and make decisions about
potential/actual attacks.
Most HIDPSs work on the principle of configuration or
change management.
Types of IDPSs
Advantages of HIDPSs
Can detect local events on host systems and detect
attacks that may elude a network-based IDPS.
Functions on host system, where encrypted traffic will
have been decrypted and is available for processing.
Not affected by use of switched network protocols.
Can detect inconsistencies in how applications and
systems programs were used by examining records
stored in audit logs.
Types of IDPSs
Disadvantages of HIDPSs
Pose more management issues.
Vulnerable both to direct attacks and attacks against host
operating system.
Does not detect multihost scanning, nor scanning of
non-host network devices.
Susceptible to some DoS attacks.
Can use large amounts of disk space.
Can inflict a performance overhead on its host systems.
IDPS Detection Methods
Signature-based detection
• Examines network traffic in search of patterns that
match known signatures.
• Widely used because many attacks have clear and
distinct signatures.
• Problem with this approach is that new attack patterns
must continually be added to IDPS’s database of
signatures.
– Slow, methodical attack involving multiple events might escape
detection.
IDPS Detection Methods(cont’d)
Anomaly-based detection
• Anomaly-based detection (or behavior-based detection)
collects statistical summaries by observing traffic known
to be normal.
• When measured activity is outside baseline parameters
or clipping level, IDPS sends alert to administrator.
• IDPS can detect new types of attacks.
• Requires much more overhead and processing capacity
than signature-based detection.
• May generate many false positives.
IDPS Detection Methods(cont’d)
Stateful protocol analysis
• SPA: process of comparing known normal/benign
protocol profiles against observed traffic.
• Stores and uses relevant data detected in a session to
identify intrusions involving multiple requests
/responses; allows IDPS to better detect specialized,
multisession attacks (also called deep packet inspection)
• Drawbacks: analytical complexity; heavy processing
overhead; may fail to detect intrusion unless protocol
violates fundamental behavior.
IDPS Detection Methods(cont’d)
Log file monitors
• Log file monitor (LFM) similar to NIDPS.
• Reviews log files generated by servers, network devices,
and even other IDPSs for patterns and signatures.
• Patterns that signify attack may be much easier to
identify when entire network and its systems are viewed
as a whole.
• Requires considerable resources since it involves the
collection, movement, storage, and analysis of large
quantities of log data.
Strengths and Limitations of IDPSs
• IDPSs perform the following functions well:
– Monitoring and analysis of system events and user
behaviors.
– Testing security states of system configurations.
– Baselining security state of system and tracking
changes.
– Recognizing patterns of system events corresponding
to known attacks.
– Recognizing activity patterns that vary from normal
activity.
Strengths and Limitations of IDPSs
(cont’d)
• IDPSs perform the following functions well:
– Managing OS audit and logging mechanisms and data
they generate.
–Alerting appropriate staff when attacks are detected.
– Measuring enforcement of security policies encoded in
analysis engine.
– Providing default information on security policies.
– Allowing non-security experts to perform important
security monitoring functions.
Strengths and Limitations of IDPSs
(cont’d)
• IDPSs cannot perform the following functions:
–Compensating for weak/missing security mechanisms
in protection infrastructure.
–Instantaneously detecting, reporting, responding to
attack when there is heavy network or processing load.
–Detecting new attacks or variants of existing attacks.
–Effectively responding to attacks by sophisticated
attackers.
–Automatically investigating attacks without human
intervention.
Strengths and Limitations of IDPSs
(cont’d)
• IDPSs cannot perform the following functions:
– Resisting attacks intended to defeat or circumvent
them.
– Compensating for problems with fidelity of
information sources.
– Dealing effectively with switched networks.
Implementation of an IDPS
• An IDPS can be implemented via one of three
basic control strategies:
–Centralized: All IDPS control functions are implemented
and managed in a central location.
–Fully distributed: All control functions are applied at
the physical location of each IDPS component.
–Partially distributed: Combines the two; while
individual agents can still analyze and respond to local
threats, they report to a hierarchical central facility to
enable organization to detect widespread attacks.
Implementation of an IDPS