SlideShare a Scribd company logo
1 of 18
Intrusion DetectionIntrusion Detection
SystemSystem
Intrusion and IntrusionIntrusion and Intrusion
DetectionDetection
 Intrusion : Attempting to break into orIntrusion : Attempting to break into or
misuse your system.misuse your system.
 Intruders may be from outside theIntruders may be from outside the
network or legitimate users of thenetwork or legitimate users of the
network.network.
 Intrusion can be a physical, system orIntrusion can be a physical, system or
remote intrusion.remote intrusion.
Different ways to intrudeDifferent ways to intrude
 Buffer overflowsBuffer overflows
 Unexpected combinationsUnexpected combinations
 Unhandled inputUnhandled input
 Race conditionsRace conditions
Intrusion Detection SystemIntrusion Detection System
Knowledge
Base
Response
Model
Alert
Data-
base
Event
Provider
Analysis Engine
Other
machines
Intrusion DetectionIntrusion Detection
Systems (IDS)Systems (IDS)
 Different ways of classifying an IDSDifferent ways of classifying an IDS
IDS based onIDS based on
– anomaly detectionanomaly detection
– signature based misusesignature based misuse
– host basedhost based
– network basednetwork based
– Stack basedStack based
Intrusion DetectionIntrusion Detection
Systems (IDS)Systems (IDS)
Intrusion Detection Systems look forIntrusion Detection Systems look for
attack signatures, which are specificattack signatures, which are specific
patterns that usually indicate maliciouspatterns that usually indicate malicious
or suspicious intent.or suspicious intent.
Anomaly based IDSAnomaly based IDS
 This IDS models the normal usage ofThis IDS models the normal usage of
the network as a noisethe network as a noise
characterization.characterization.
 Anything distinct from the noise isAnything distinct from the noise is
assumed to be an intrusion activity.assumed to be an intrusion activity.
– E.g flooding a host with lots of packet.E.g flooding a host with lots of packet.
 The primary strength is its ability toThe primary strength is its ability to
recognize novel attacks.recognize novel attacks.
Drawbacks of AnomalyDrawbacks of Anomaly
detection IDSdetection IDS
 Assumes that intrusions will beAssumes that intrusions will be
accompanied by manifestations that areaccompanied by manifestations that are
sufficiently unusual so as to permitsufficiently unusual so as to permit
detection.detection.
 These generate many false alarms andThese generate many false alarms and
hence compromise the effectiveness of thehence compromise the effectiveness of the
IDS.IDS.
Signature based IDSSignature based IDS
 This IDS possess an attackedThis IDS possess an attacked
description that can be matched todescription that can be matched to
sensed attack manifestations.sensed attack manifestations.
 The question of what information isThe question of what information is
relevant to an IDS depends upon whatrelevant to an IDS depends upon what
it is trying to detect.it is trying to detect.
– E.g DNS, FTP etc.E.g DNS, FTP etc.
Signature based IDSSignature based IDS
(contd.)(contd.)
 ID system is programmed to interpret a certainID system is programmed to interpret a certain
series of packets, or a certain piece of dataseries of packets, or a certain piece of data
contained in those packets,as an attack. Forcontained in those packets,as an attack. For
example, an IDS that watches web servers mightexample, an IDS that watches web servers might
be programmed to look for the string “phf” as anbe programmed to look for the string “phf” as an
indicator of a CGI program attack.indicator of a CGI program attack.
 Most signature analysis systems are based off ofMost signature analysis systems are based off of
simple pattern matching algorithms. In most cases,simple pattern matching algorithms. In most cases,
the IDS simply looks for a sub string within a streamthe IDS simply looks for a sub string within a stream
of data carried by network packets. When it findsof data carried by network packets. When it finds
this sub string (for example, the ``phf'' in ``GET /cgi-this sub string (for example, the ``phf'' in ``GET /cgi-
bin/phf?''), it identifies those network packets asbin/phf?''), it identifies those network packets as
vehicles of an attack.vehicles of an attack.
Drawbacks of SignatureDrawbacks of Signature
based IDSbased IDS
 They are unable to detect novelThey are unable to detect novel
attacks.attacks.
 Suffer from false alarmsSuffer from false alarms
 Have to programmed again for everyHave to programmed again for every
new pattern to be detected.new pattern to be detected.
Host/Applications basedHost/Applications based
IDSIDS
 The host operating system or theThe host operating system or the
application logs in the auditapplication logs in the audit
information.information.
 These audit information includesThese audit information includes
events like the use of identification andevents like the use of identification and
authentication mechanisms (loginsauthentication mechanisms (logins
etc.) , file opens and programetc.) , file opens and program
executions, admin activities etc.executions, admin activities etc.
 This audit is then analyzed to detectThis audit is then analyzed to detect
trails of intrusion.trails of intrusion.
Drawbacks of the hostDrawbacks of the host
based IDSbased IDS
 The kind of information needed to beThe kind of information needed to be
logged in is a matter of experience.logged in is a matter of experience.
 Unselective logging of messages mayUnselective logging of messages may
greatly increase the audit and analysisgreatly increase the audit and analysis
burdens.burdens.
 Selective logging runs the risk thatSelective logging runs the risk that
attack manifestations could be missed.attack manifestations could be missed.
Strengths of the hostStrengths of the host
based IDSbased IDS
 Attack verificationAttack verification
 System specific activitySystem specific activity
 Encrypted and switch environmentsEncrypted and switch environments
 Monitoring key componentsMonitoring key components
 Near Real-Time detection andNear Real-Time detection and
response.response.
 No additional hardwareNo additional hardware
Stack based IDSStack based IDS
 They are integrated closely with theThey are integrated closely with the
TCP/IP stack, allowing packets to beTCP/IP stack, allowing packets to be
watched as they traverse their way upwatched as they traverse their way up
the OSI layers.the OSI layers.
 This allows the IDS to pull the packetsThis allows the IDS to pull the packets
from the stack before the OS or thefrom the stack before the OS or the
application have a chance to processapplication have a chance to process
the packets.the packets.
Network based IDSNetwork based IDS
 This IDS looks for attack signatures inThis IDS looks for attack signatures in
network traffic via a promiscuousnetwork traffic via a promiscuous
interface.interface.
 A filter is usually applied to determineA filter is usually applied to determine
which traffic will be discarded orwhich traffic will be discarded or
passed on to an attack recognitionpassed on to an attack recognition
module. This helps to filter out knownmodule. This helps to filter out known
un-malicious traffic.un-malicious traffic.
Strengths of NetworkStrengths of Network
based IDSbased IDS
 Cost of ownership reducedCost of ownership reduced
 Packet analysisPacket analysis
 Evidence removalEvidence removal
 Real time detection and responseReal time detection and response
 Malicious intent detectionMalicious intent detection
 Complement and verificationComplement and verification
 Operating system independenceOperating system independence
Future of IDSFuture of IDS
 To integrate the network and hostTo integrate the network and host
based IDS for better detection.based IDS for better detection.
 Developing IDS schemes for detectingDeveloping IDS schemes for detecting
novel attacks rather than individualnovel attacks rather than individual
instantiations.instantiations.

More Related Content

What's hot

Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAparna Bhadran
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)LJ PROJECTS
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing pptAnushakp9
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project ReportRaghav Bisht
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemMohit Belwal
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingNezar Alazzabi
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber securityKAMALI PRIYA P
 

What's hot (20)

IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
Network security
Network securityNetwork security
Network security
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Cia security model
Cia security modelCia security model
Cia security model
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 

Viewers also liked

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsPaul Green
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)david rom
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distributionRiya Choudhary
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemDevil's Cafe
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Securityprimeteacher32
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortDisha Bedi
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]SISA Information Security Pvt.Ltd
 

Viewers also liked (20)

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Push N Pull
Push N PullPush N Pull
Push N Pull
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Push & Pull
Push & PullPush & Pull
Push & Pull
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Key management
Key managementKey management
Key management
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Snort
SnortSnort
Snort
 
Snort IDS/IPS Basics
Snort IDS/IPS BasicsSnort IDS/IPS Basics
Snort IDS/IPS Basics
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Hcl
HclHcl
Hcl
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]
 

Similar to Intrusion detection system ppt

Chapter 3- Intrusion Detection.pdf
Chapter 3- Intrusion Detection.pdfChapter 3- Intrusion Detection.pdf
Chapter 3- Intrusion Detection.pdfAmanuelZewdie4
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMApoorv Pandey
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniLoay Elbasyouni
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemSweta Sharma
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)Netwax Lab
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1whitehat 'People'
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortDisha Bedi
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention MohammedAlmuhaimeed
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptxAnonymousEImkf6RGdQ
 
Intrusion Detection in WLANs
Intrusion Detection in WLANsIntrusion Detection in WLANs
Intrusion Detection in WLANsronrulzzz
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Wail Hassan
 
L5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxL5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxRebeccaMunasheChimhe
 
IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPSMinhaz A V
 
Intrusion detection system (ids)
Intrusion detection system (ids)Intrusion detection system (ids)
Intrusion detection system (ids)nishiyath
 
Information Security.pptx
Information Security.pptxInformation Security.pptx
Information Security.pptxDrRajapraveen
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionProgrammer
 

Similar to Intrusion detection system ppt (20)

Chapter 3- Intrusion Detection.pdf
Chapter 3- Intrusion Detection.pdfChapter 3- Intrusion Detection.pdf
Chapter 3- Intrusion Detection.pdf
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
Ips and-ids
Ips and-idsIps and-ids
Ips and-ids
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention
 
Ids vs ips
Ids vs ipsIds vs ips
Ids vs ips
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptx
 
Intrusion Detection in WLANs
Intrusion Detection in WLANsIntrusion Detection in WLANs
Intrusion Detection in WLANs
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
 
L5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxL5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptx
 
IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPS
 
Intrusion detection system (ids)
Intrusion detection system (ids)Intrusion detection system (ids)
Intrusion detection system (ids)
 
Information Security.pptx
Information Security.pptxInformation Security.pptx
Information Security.pptx
 
IS - Firewall
IS - FirewallIS - Firewall
IS - Firewall
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 

More from Sheetal Verma (11)

Unit 3a
Unit 3aUnit 3a
Unit 3a
 
Unit 2aa
Unit 2aaUnit 2aa
Unit 2aa
 
Unit 1c
Unit 1cUnit 1c
Unit 1c
 
Unit 1 b
Unit 1 bUnit 1 b
Unit 1 b
 
Unit 1 a
Unit 1 aUnit 1 a
Unit 1 a
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
Extra unit 2
Extra unit 2Extra unit 2
Extra unit 2
 
Edi ppt
Edi pptEdi ppt
Edi ppt
 
Edi layer
Edi layerEdi layer
Edi layer
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Unit 4
Unit 4Unit 4
Unit 4
 

Recently uploaded

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Intrusion detection system ppt

  • 2. Intrusion and IntrusionIntrusion and Intrusion DetectionDetection  Intrusion : Attempting to break into orIntrusion : Attempting to break into or misuse your system.misuse your system.  Intruders may be from outside theIntruders may be from outside the network or legitimate users of thenetwork or legitimate users of the network.network.  Intrusion can be a physical, system orIntrusion can be a physical, system or remote intrusion.remote intrusion.
  • 3. Different ways to intrudeDifferent ways to intrude  Buffer overflowsBuffer overflows  Unexpected combinationsUnexpected combinations  Unhandled inputUnhandled input  Race conditionsRace conditions
  • 4. Intrusion Detection SystemIntrusion Detection System Knowledge Base Response Model Alert Data- base Event Provider Analysis Engine Other machines
  • 5. Intrusion DetectionIntrusion Detection Systems (IDS)Systems (IDS)  Different ways of classifying an IDSDifferent ways of classifying an IDS IDS based onIDS based on – anomaly detectionanomaly detection – signature based misusesignature based misuse – host basedhost based – network basednetwork based – Stack basedStack based
  • 6. Intrusion DetectionIntrusion Detection Systems (IDS)Systems (IDS) Intrusion Detection Systems look forIntrusion Detection Systems look for attack signatures, which are specificattack signatures, which are specific patterns that usually indicate maliciouspatterns that usually indicate malicious or suspicious intent.or suspicious intent.
  • 7. Anomaly based IDSAnomaly based IDS  This IDS models the normal usage ofThis IDS models the normal usage of the network as a noisethe network as a noise characterization.characterization.  Anything distinct from the noise isAnything distinct from the noise is assumed to be an intrusion activity.assumed to be an intrusion activity. – E.g flooding a host with lots of packet.E.g flooding a host with lots of packet.  The primary strength is its ability toThe primary strength is its ability to recognize novel attacks.recognize novel attacks.
  • 8. Drawbacks of AnomalyDrawbacks of Anomaly detection IDSdetection IDS  Assumes that intrusions will beAssumes that intrusions will be accompanied by manifestations that areaccompanied by manifestations that are sufficiently unusual so as to permitsufficiently unusual so as to permit detection.detection.  These generate many false alarms andThese generate many false alarms and hence compromise the effectiveness of thehence compromise the effectiveness of the IDS.IDS.
  • 9. Signature based IDSSignature based IDS  This IDS possess an attackedThis IDS possess an attacked description that can be matched todescription that can be matched to sensed attack manifestations.sensed attack manifestations.  The question of what information isThe question of what information is relevant to an IDS depends upon whatrelevant to an IDS depends upon what it is trying to detect.it is trying to detect. – E.g DNS, FTP etc.E.g DNS, FTP etc.
  • 10. Signature based IDSSignature based IDS (contd.)(contd.)  ID system is programmed to interpret a certainID system is programmed to interpret a certain series of packets, or a certain piece of dataseries of packets, or a certain piece of data contained in those packets,as an attack. Forcontained in those packets,as an attack. For example, an IDS that watches web servers mightexample, an IDS that watches web servers might be programmed to look for the string “phf” as anbe programmed to look for the string “phf” as an indicator of a CGI program attack.indicator of a CGI program attack.  Most signature analysis systems are based off ofMost signature analysis systems are based off of simple pattern matching algorithms. In most cases,simple pattern matching algorithms. In most cases, the IDS simply looks for a sub string within a streamthe IDS simply looks for a sub string within a stream of data carried by network packets. When it findsof data carried by network packets. When it finds this sub string (for example, the ``phf'' in ``GET /cgi-this sub string (for example, the ``phf'' in ``GET /cgi- bin/phf?''), it identifies those network packets asbin/phf?''), it identifies those network packets as vehicles of an attack.vehicles of an attack.
  • 11. Drawbacks of SignatureDrawbacks of Signature based IDSbased IDS  They are unable to detect novelThey are unable to detect novel attacks.attacks.  Suffer from false alarmsSuffer from false alarms  Have to programmed again for everyHave to programmed again for every new pattern to be detected.new pattern to be detected.
  • 12. Host/Applications basedHost/Applications based IDSIDS  The host operating system or theThe host operating system or the application logs in the auditapplication logs in the audit information.information.  These audit information includesThese audit information includes events like the use of identification andevents like the use of identification and authentication mechanisms (loginsauthentication mechanisms (logins etc.) , file opens and programetc.) , file opens and program executions, admin activities etc.executions, admin activities etc.  This audit is then analyzed to detectThis audit is then analyzed to detect trails of intrusion.trails of intrusion.
  • 13. Drawbacks of the hostDrawbacks of the host based IDSbased IDS  The kind of information needed to beThe kind of information needed to be logged in is a matter of experience.logged in is a matter of experience.  Unselective logging of messages mayUnselective logging of messages may greatly increase the audit and analysisgreatly increase the audit and analysis burdens.burdens.  Selective logging runs the risk thatSelective logging runs the risk that attack manifestations could be missed.attack manifestations could be missed.
  • 14. Strengths of the hostStrengths of the host based IDSbased IDS  Attack verificationAttack verification  System specific activitySystem specific activity  Encrypted and switch environmentsEncrypted and switch environments  Monitoring key componentsMonitoring key components  Near Real-Time detection andNear Real-Time detection and response.response.  No additional hardwareNo additional hardware
  • 15. Stack based IDSStack based IDS  They are integrated closely with theThey are integrated closely with the TCP/IP stack, allowing packets to beTCP/IP stack, allowing packets to be watched as they traverse their way upwatched as they traverse their way up the OSI layers.the OSI layers.  This allows the IDS to pull the packetsThis allows the IDS to pull the packets from the stack before the OS or thefrom the stack before the OS or the application have a chance to processapplication have a chance to process the packets.the packets.
  • 16. Network based IDSNetwork based IDS  This IDS looks for attack signatures inThis IDS looks for attack signatures in network traffic via a promiscuousnetwork traffic via a promiscuous interface.interface.  A filter is usually applied to determineA filter is usually applied to determine which traffic will be discarded orwhich traffic will be discarded or passed on to an attack recognitionpassed on to an attack recognition module. This helps to filter out knownmodule. This helps to filter out known un-malicious traffic.un-malicious traffic.
  • 17. Strengths of NetworkStrengths of Network based IDSbased IDS  Cost of ownership reducedCost of ownership reduced  Packet analysisPacket analysis  Evidence removalEvidence removal  Real time detection and responseReal time detection and response  Malicious intent detectionMalicious intent detection  Complement and verificationComplement and verification  Operating system independenceOperating system independence
  • 18. Future of IDSFuture of IDS  To integrate the network and hostTo integrate the network and host based IDS for better detection.based IDS for better detection.  Developing IDS schemes for detectingDeveloping IDS schemes for detecting novel attacks rather than individualnovel attacks rather than individual instantiations.instantiations.