Chapter 15 - IPS/IDS Fundamentals Flashcards

1
Q

True or False: An Intrusion Prevention System (IPS) is always inline on a network?

A

True.

Because IPS is actively checking traffic and able to drop packets before letting them pass, it can actually prevent network attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does promiscious mode refer to when talking about Intrusion Detection Systems?

A

This is when an IDS is sitting outside the network flow and listening to all traffic mirrored to it from the main flow of traffic.

aka: Out of Band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between a false positive and a false negative?

A

False Positive: an alert is generated (or action taken) on traffic that is not malicious or “important” when it comes to the safety of the network.

False Negative: Is when there IS malicious or dangerous traffic on the network and for whatever reason it is not flagged or acted upon by the systems that are supposed to detect it (IDS / IPS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between a True Positive and a True Negative?

A

True Positive: There was malicious traffic and it was caught!

True Negative: normal non-malicous traffic on the network and no action was taken to stop / hinder its normal activitiy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How are signature sets used to stop threats in an IDS / IPS?

A

Cisco provides signatures (patterns or sets of rules) that attacks commonly use which can be identified in packets or in a stream of packets. These can the enabled / disabled / or customized to be looked for by sensors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is policy-based IPS / IDS?

A

If there is a set rule that certain traffic not be allowed on the network, a rule can be made to enforce this. The example in the book is no Telnet traffic. If traffic is found to be destined on port 23, IDS can report this activity, or an IPS can drop the packet (and report it too).

Technically this can be a customized “signature” so some policy-based filtering can be called signature based too.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Anomaly-based IPS/IDS?

A

An IPS / IDS will gather a baseline of activity for certain traffic. When it sees that a certain abnormal amount of this specific traffic hits the network countermeasures are put in place (reported / alerts generated / packets dropped).

Example is 30 half formed TCP requests per minute.

Traffic spikes to 500 half formed TCP requests / minute.

This is not normal operation (an Anomaly) and actions are taken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is reputation-based IDS/IPS?

A

Systems all over the globe participate in identifying dangerous activity from known IP blocks, domains, URLs, etc. These are reported to a cloud service that Cisco manages, is compiled, and can be delivered to IPS/IDS systems that have not been attacked yet to help prevent damage before it happens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does an Atomic signature micro-engine look at?

A

Can match signatures on a single packet, as opposed to a string of packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does a Service signature micro-engine look for?

A

These signatures examine applicaiton layer services, regardless of the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do string or multi-string signature micro-engines look for?

A

string or multi-string signature micro-engines look for patterns in packets. Sometimes called flexible pattern matching, also looks at sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the signature micro-engine group of Other look for in traffic?

A

These are miscellanous signatures that may not specifically fit into other categories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When calculating Risk Ratings, what is the Target Value Rating (TVR)?

A

Target Value Rating is the value that you as an admin assign to specific destination IP’s or subnets where critical devices reside.

TVR could be lower on a subnet of all printers.

TVR could be higher on a subnet of all webservers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When calculating Risk Ratings, what is Signature Fidelity Rating (SFR)?

A

Signature Fidelity Rating (SFR) is built into an IDS/IPS signature profile and is determined by the person who created the signature.

This is a numeric rating between 0 and 100.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When calculating Risk Ratings, what is the Attack Severity Rating (ASR)?

A

Attack Severity Rating (ASR) is how critical the attack is as determined by who created the signature. This rating of Inofrmational, Low, Medium, or High is built into the signture itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Attack Relevancy (AR)?

A

Attack Relevancy (AR) is a minor contributor to a total Risk Rating (RR). It detarmines how relevant a siganture is to the actual attack.

For example if the signature is for a windows based server attack and the destination of the malicious traffic is an actual window server, this may increase the overall Risk Rating (RR) slightly.

17
Q

On Cisco ISR routers, what is the realm-cisco.pub encryption key used for?

A

It is used to verify the digital signature of IPS signature files that are downloaded from Cisco.