Session 28 Ids
Session 28 Ids
Topic:
NAME OF THE TOPIC:INTRUSION DETECTION SYSTEM3
Session - 28
INSTRUCTIONAL OBJECTIVES
LEARNING OUTCOMES
At the end of this session, you should be able to know the Intrusion detection system
Intrusion Detection Systems do exactly as the name suggests, they detect possible intrusions.
An Intrusion Detection System (IDS) is a Hardware or software products that gather and analyze
information from various areas within a computer or a network for the purpose of finding, and
providing real-time or near-real-time warning of, attempts to access system resources in an
unauthorized manner
An IDS is a passive monitoring device that detects potential threats and generates alerts and will
not take any corrective action.
IDSs can be connected in line with the network traffic. However, it is recommended to connect IDS
through span or tap.
The figure shows the deployment of the IDS, IPS and firewall for better understanding :
• Components of an IDS
• Network-Based
• Monitors all traffic on the network
• Useful for monitoring non critical systems.
• Host-Based
• IDS customized to a specific server
• Being closer to host allows for greater chance of detection
• Prevents threats such as Trojans and backdoors from being installed form
within the network
• Passive
• Reactive
• Send instruction to firewall and router to block activity from occurring on the network
False Negatives
• When an IDS fails to detect an attack
• False negatives occur when the False Positives
pattern of traffic is not identified in • Described as a false alarm.
the signature database, such as new • When an IDS mistakenly reports
attack patterns. certain “normal” network activity as
• False negatives are deceptive because malicious.
you usually have no way of knowing if • Administrators have to fine tune the
and when they occurred. signatures or heuristics in order to
prevent this type of problem.
• You are most likely to identify false
negatives when an attack is successful
and wasn’t detected by the IDS.
• The ability to know when an intruder or attacker is engaged in reconnaissance or other malicious
activity can mean the difference between being compromised and not being compromised.
• An IDS can alert the administrator of a successful compromise, allowing them the opportunity to
• As Corporations and other Institutions are being legally compelled to disclose data breaches and
compromises to their affected customers, this can have profound effects upon a compromised
company, in the way of bad press, loss of customer trust, and the effects on their stock.
• As a network security expert you should know you cannot just rely on one or a few tools to secure your
network. You need to have a defense in depth mindset and layer your network defenses.
• Through the use of inside and outside firewalls, DMZs, Routers and Switches, an IDS is a great addition
to your security plan.
• You can use them to identify vulnerabilities and weaknesses in your perimeter protection devices, such
as: firewalls, switches and routers. The firewall rules and router access control lists can be verified
regularly for compliance.
• You can use IPSec to enforce security policies, such as: unauthorized Internet access, downloads of
executable files, use of file sharing programs like Kazza, or Instant Messenger use.
• Logs from an IDS can become an important part of computer forensics and incident handling efforts.
Advantages
• Can detect external hackers, as well as, internal network-based attacks
• Scales easily to provide protection for the entire network
• Offers centralized management for correlation of distributed attacks
• Provides defense in depth
• Gives administrators the ability to quantify attacks
• Provides an additional layer of protection the events generated can be a feed to SIEM in SoC
Disadvantages
• skilled staff dedicated to interpreting the data
• Requires a complex incident response process
• Cannot monitor traffic at higher network traffic rates
• Generates an enormous amount of data to be analyzed
• Cannot deal with encrypted network traffic
Reference Books:
1. Cryptography and Network Security Principles and Practice, by William Stallings, Pearson, 7th
edition, 2017.
2. Cryptography And Network Security by Behrouz A. Forouzan, Debdeep Mukhopadhyay,
TataMcGraw Hill Education Private Limited, Fourth edition 2015
3. William Stallings, “Network Security Essentials”, Pearson Education, 7th Edition, 2017.
Sites and Web links:
1. https://www.coursera.org/specializations/computer-network-security
2. https://www.coursera.org/learn/identifying-security-vulnerabilities