seminar on Intrusion detection system

22
seminar on Intrusion detection system By Suchismita Kar Regd No -0701209021 A

Transcript of seminar on Intrusion detection system

Page 1: seminar  on                                                           Intrusion  detection system

seminar on Intrusion detection system

By Suchismita Kar Regd No -0701209021 CS A

Page 2: seminar  on                                                           Intrusion  detection system

Topics to be covered…Overview of IDSProcess modelArchitectureInformation sourcesAnalysis techniquesStrengthsLimitationsConclusionReference

Page 3: seminar  on                                                           Intrusion  detection system

Overview of Intrusion Detection Systems:what are intrusions ?

What is intrusion detection ?

Functions of IDSMonitoring and analysis of user and system activity. Auditing of system configurations .Assessing the integrity of critical system and data files. Recognition of activity patterns reflecting known attacks Statistical analysis for abnormal activity patterns

Page 4: seminar  on                                                           Intrusion  detection system

Process model for Intrusion Detection:

Information sources:network ,host ,application

Analysis:misuse detection , anomaly detection

Response:active measures involving some automated

intervention on the part of the system, and passive measures involving reporting IDS findings to humans, who are then expected to take action based on those reports.

Page 5: seminar  on                                                           Intrusion  detection system

IDS Architecture

Audit Collection/Storage Unit

Processing Unit

Alarm/Response Unit

Page 6: seminar  on                                                           Intrusion  detection system

Information sourcesNetwork based IDSs:

Consist of a set of single-purpose sensors . These units monitor network traffic, performing local analysis of that traffic and reporting attacks to a central management console.

Host based IDSs:Operate on information collected from within anIndividual computer system.Operating system audit trails, and system logs

Application based IDSs: Special subset of host-based IDSs .The most common information sources used by these

IDSs are the application’s transaction log files.

Page 7: seminar  on                                                           Intrusion  detection system

IDS Analysis Techniques

Misuse detection

Anomaly detection

Specification based detection

Page 8: seminar  on                                                           Intrusion  detection system

Misuse detectionMisuse detectors analyze system activity,

looking for events or sets of events that match a predefined pattern of events that describe a known attack.

Page 9: seminar  on                                                           Intrusion  detection system

AdvantagesMisuse detectors are very effective at detecting

attacks without generating an overwhelming number of false alarms.

Misuse detectors can quickly and reliably diagnose the use of a specific attack tool or technique. This can help security managers prioritize corrective measures.

Misuse detectors can allow system managers, regardless of their level of security expertise, to track security problems on their systems, initiating incident handling procedures.

 

Page 10: seminar  on                                                           Intrusion  detection system

DisadvantagesMisuse detectors can only detect those

attacks they know about –therefore they must be constantly updated with signatures of new attacks.

Many misuse detectors are designed to use tightly defined signatures that prevent them from detecting variants of common attacks. State-based misuse detectors can overcome this limitation, but are not commonly used in commercial IDSs.

Page 11: seminar  on                                                           Intrusion  detection system

Anomaly detectionAnomaly detectors identify abnormal unusual

behavior (anomalies) on a host or network.

Page 12: seminar  on                                                           Intrusion  detection system

Advantages IDSs based on anomaly detection detect

unusual behavior and thus have the ability to detect symptoms of attacks without specific knowledge of details.

Anomaly detectors can produce information that can in turn be used to define signatures for misuse detectors

Page 13: seminar  on                                                           Intrusion  detection system

Disadvantages

Anomaly detection approaches usually produce a large number of false alarms due to the unpredictable behaviors of users and networks.

Anomaly detection approaches often require extensive “training sets” of system event records in order to characterize normal behavior patterns.

Page 14: seminar  on                                                           Intrusion  detection system

Specification based detection

They distinguished between normal and intrusive behaviour by monitoring the traces of system calls of the target processes. A specification that models the desired behaviour of a process tells the IDS whether the actual observed trace is part of an attack or not.

Page 15: seminar  on                                                           Intrusion  detection system

Advantages

More or less the same as for misuse detection. However these systems manage to detect some types/classes of novel attacks. Additionally, they are more resistant against subtle changes in attacks.

Page 16: seminar  on                                                           Intrusion  detection system

DisadvantagesUsually for every program that is monitored,

a specification has to be designed. Furthermore, the modelling process can be regarded as more difficult than the design of patterns for misuse detection systems. Additionally some classes of attacks are not detectable at all.

Their systems managed the detection by inspecting log files.

Page 17: seminar  on                                                           Intrusion  detection system

Strengths of IDS Testing the security states of system configurations Base lining the security state of a system, then tracking any changes to that Baseline Recognizing patterns of system events that correspond to known attacks Recognizing patterns of activity that statistically vary from normal activity Managing operating system audit and logging mechanisms and the data

they generate. Alerting appropriate staff by appropriate means when attacks are detected. Measuring enforcement of security policies encoded in the analysis engine Providing default information security policies Allowing non-security experts to perform important security monitoring Functions. Monitoring and analysis of system events and user behaviors

Page 18: seminar  on                                                           Intrusion  detection system

LimitationsCompensating for weak or missing security mechanisms in the

protection Infrastructure. Such mechanisms include firewalls, identification and authentication, link encryption, access control mechanisms, and virus detection and eradication. Instantaneously detecting, reporting, and responding to an attack,

when there is a heavy network or processing load.Detecting newly published attacks or variants of existing attacks.Effectively responding to attacks launched by sophisticated attackersResisting attacks that are intended to defeat or circumvent themCompensating for problems with the fidelity of information sourcesDealing effectively with switched networks.

Page 19: seminar  on                                                           Intrusion  detection system

ConclusionIDSs are here to stay, with billion dollar firms

supporting the development of commercial security products and driving hundreds of millions in annual sales. However, they remain difficult to configure and operate and often can’t be effectively used by the very novice security personnel who need to benefit from them most.

Page 20: seminar  on                                                           Intrusion  detection system

Referenceswww.google.comwww.wikipedia.comYi Hu, Brajendra Panda: A data mining

approach for database intrusion detection.Lee, V. C.S., Stankovic, J. A., Son, S. H.

Intrusion Detection in Real-time Database Systems Via Time Signatures

Page 21: seminar  on                                                           Intrusion  detection system

Any queries ?????????

Page 22: seminar  on                                                           Intrusion  detection system

THANK U