5.9: IDS and IPS (Doshi) Flashcards
What is an IDS?
Device or software application that monitors a network (network based IDS) or monitors a system (host based IDS) for intrusive activities
is IDS a substitute for firewall?
No, it complements the function of a firewall.
Monitoring activities : Network based IDS vs Host based IDS
Network based IDS monitors activities on identified network.
Host based IDS monitor activities on a particular single system or host
False positive rate : Network based IDS vs Host based IDS
The False positive rate (wrong alarm) is HIGH for network based IDS
False positive rate (wrong alarm) is LOW for hot based IDS
What does each IDS detect
Network based is better for detecting attack from outside
Host better for detecting attack from insider.
What do network based IDS check for
They check for attacks on irregular behavior by inspecting the contents and header information of all packets moving across the network
what do host based IDS check for
They can detect activity on host computer such as deletion of files, modification of program
Components of an IDS:
Sensors/ analyzers/Administrative console/ user interface
What does a sensor do?
Collects the data (in the form of network packets, log files) AND SEND IT TO ANALYZER
What does an anlayzer do?
It analyzes the data and determine the intrusive activity
User interface?
Enable user to view results and take necessary action
Administrative control:
To manage the IDS rules and functions
Types of IDS:
Signature based/ statistical based/ Neural network
Signature based IDS
Intrusion is identified based of known type of attacks. Such known patterns are stored in form of signature.
Statistical based
Determine (known and expected) behavior of the system. Any activity which falls outside the scope of normal behavior is flagged as intrusion