170 likes | 439 Vues
Intrusion detection system. Overview of intrusion detection system. What is intrusion? What is intrusion detection ? What is intrusion detection system Functions of IDS. Process models of intrusioin detection. Information sources Analysis Response. IDS Architecture.
E N D
Overview of intrusion detection system • What is intrusion? • What is intrusion detection ? • What is intrusion detection system • Functions of IDS
Process models of intrusioin detection • Information sources • Analysis • Response
IDS Architecture • Architecture collection/storage unit. • Processing unit. • Alarm/response units.
Information sources • NIDS(network based IDs) • HIDS(host based IDS) • Application based IDS.
IDS Analysis/Techniques • Misuse detection • Anomaly detection • Specification-based detection
Misuse detection • Analyzes system activity • Matches the patterns of activity of a system to that of an attack • Advantages • Disadvantages
Anomaly detection • Identifies abnormal usual behavior. • Matches the attack with normal pattern. • Advantages • Disadvantages
Specificationbaseddetection • Combines anomaly & misuse detection. • Advantages. • Disadvantages.
Deploying IDS • Deployment of NIDS. • Deployment of HIDS .
Deployment of NIDS • Figure • Location 1 • Location 2 • Location 3 • Location 4
Strength of IDS • Monitoring and analysis of system events and user behavior. • Testing the security states of system configuration. • Tracking any changes to the baseline of the security system. • Recognizing patterns of the system events that corresponding to known attacks • Recognizing patterns of normal activity.
Limitations • Detecting newly published attacks • Automatically investigating attacks without human interventions. • Detecting attacks in heavily loaded networks.
Challenges with IDS • Protecting IDS from attacks. • Too many false alarms. • Choosing grid IDS policy.