Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
26 views19 pages

Intrusion Detection System (Compatibility Mode)

Intrusions are attempts to bypass computer security, often by external attackers or authorized users misusing privileges. An Intrusion Detection System (IDS) monitors networks for malicious activity, employing various detection methods such as signature-based and anomaly-based systems. The document also discusses the limitations of traditional IDS tools and highlights Snort as a widely used network intrusion detection and prevention system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views19 pages

Intrusion Detection System (Compatibility Mode)

Intrusions are attempts to bypass computer security, often by external attackers or authorized users misusing privileges. An Intrusion Detection System (IDS) monitors networks for malicious activity, employing various detection methods such as signature-based and anomaly-based systems. The document also discusses the limitations of traditional IDS tools and highlights Snort as a widely used network intrusion detection and prevention system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

What are Intrusions?

 Intrusions are actions that attempt to bypass security


mechanisms of computer systems. They are usually caused
by:
 Attackers accessing the system from Internet
 Insider attackers - authorized users attempting to gain and misuse
non-authorized privileges
 Typical intrusion scenario

Scanning Computer
activity Network

Compromised
Machine with
Attacker Machine
vulnerability

1
Intrusion Detection System(IDS)

 An intrusion detection system (IDS) is a device or


software application that monitors a network for
malicious activity or policy violations.

 Any malicious activity or violation is typically


reported or collected centrally using a security
information and event management system.

2
IDS Detection Types

 Network intrusion detection systems (NIDS): A


system that analyzes incoming network traffic.

 Host-based intrusion detection systems (HIDS): A


system that monitors important operating system
files.

3
Subset of IDS types

 Signature-based IDS detects possible threats by


looking for specific patterns, such as byte
sequences in network traffic, or known malicious
instruction sequences used by malware.

 Although signature-based IDS can easily detect


known attacks, it is impossible to detect new
attacks, for which no pattern is available.

4
Subset of IDS types
 Anomaly-based: a newer technology designed to
detect and adapt to unknown attacks, primarily
due to the explosion of malware.
 This detection method uses machine learning to
create a defined model of trustworthy activity,
and then compare new behavior against this trust
model.
 While this approach enables the detection of
previously unknown attacks, it can suffer from
false positives: previously unknown legitimate
activity can accidentally be classified as
malicious..

5
Anomalies
 Anomaly detection refers to the problem of
finding patterns in data that do not conform to
expected behavior.
 Also referred to as outliers, exceptions,
peculiarities, surprise, etc.
 Anomaly detection techniques are applied in a
variety of domains, including credit card fraud
prevention, financial turbulence detection, virus or
system intrusion discovery, and network
monitoring, to name a few.

6
Real World Anomalies

 Credit Card Fraud


 An abnormally high purchase

made on a credit card

 Cyber Intrusions
 A web server involved in ftp

traffic

7
Simple Example
Y

 N1 and N2 are regions N1 o1


O3
of normal behavior
 Points o1 and o2 are
anomalies
 Points in region O3 o2

are anomalies N2

8
Point Anomalies
 An individual data instance is anomalous w.r.t.
the data
Y

N1 o1
O3

o2

N2

9
Contextual Anomalies
 An individual data instance is anomalous within a context
 Requires a notion of context
 Also referred to as conditional anomalies*

Anomal
Normal y

* Xiuyao Song, Mingxi Wu, Christopher Jermaine, Sanjay Ranka, Conditional Anomaly Detection, IEEE
Transactions on Data and Knowledge Engineering, 2006.

10
Collective Anomalies
 A collection of related data instances is anomalous
 Requires a relationship among data instances
 Sequential Data
 Spatial Data
 Graph Data
 The individual instances within a collective anomaly are
not anomalous by themselves

Anomalous Subsequence

11
Misuse Detection

 LAND Attack is a Layer 4 Denial of Service (DoS) attack in which,


the attacker sets the source and destination information of a TCP segment to be
the same.
 A vulnerable machine will crash or freeze due to the packet being repeatedly
processed by the TCP stack.

12
Problem: Anomaly Detection
 Anomaly Detection

13
Intrusion Detection

 Intrusion Detection System


– combination of software
and hardware that attempts
to perform intrusion detection
– raises the alarm when possible
intrusion happens

 Traditional intrusion detection system IDS tools (e.g. SNORT) are based
on signatures of known attacks www.snort.org
 Limitations
– Signature database has to be manually revised for each
new type of discovered intrusion
– They cannot detect emerging cyber threats
– Substantial latency in deployment of newly created
signatures across the computer system
• Data Mining can alleviate these limitations

14
Snort
 NIDS: A network intrusion detection system (NIDS) is an intrusion
detection system that tries to detect malicious activity such as denial of
service attacks, port scans or even attempts to crack into computers by
monitoring network traffic.

 Snort: an open source network intrusion prevention and detection system.


It uses a rule-based language combining signature, protocol and anomaly
inspection methods

 Snort: the most widely deployed intrusion detection and prevention


technology and it has become the de facto standard technology worldwide in
the industry.

15
Snort architecture

From: Nalneesh Gaur, Snort: Planning IDS for your enterprise,


http://www.linuxjournal.com/article/4668, 2001.

16
Rules
 In a single line
 Rules are created by known intrusion signatures.
 Usually place in snort.conf configuration file.

rule header rule options

17
Rule examples

destination ip address
Apply to all ip packets

Source ip address Destination port

Source port #
Rule options

Alert will be generated if criteria met

Rule header

18
Originally, the Simple Mail Transfer Protocol (SMTP) used port
25. Today, SMTP should instead use port 587 —

 Port used by any private mail system. 24

https://www.youtube.com/watch?v=R1mF7Mxfynk
19

19

You might also like