Chapter 3iii Flashcards

1
Q

Why do we need IDS?

IDS = Intrusion Detection System

Most systems have vulnerabilities: what?
Attacks can be detected: how?
What do we want to detect?

A
  1. Vulnerabilities may be known or unknown, may potentially be used to carry out attacks
  2. Unusual or suspicious actions, unusual or suspicious alterations of information
  3. Intrusion preambles, Intrusion accesses from the outside, Abusive behaviours from the inside
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Intrusion & Intrusion Detection System

A

Intrusion
* Compromise of a defined Security Requirement
* Manifestation through e.g. unauthorised or abnormal activities or data

Intrusion Detection System
* Software that has the function to detect and identify intrusions
* Not all IDS take countermeasures
* IDS that also take countermeasures are IDPS (Intrusion Detection and Prevention System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Optional extension in IDS
Honeypot:
* Closely ..
* Allows for…
* Provides….
* Distracts …
* Can be used as origin for further attacks

A

monitored computing resource which is intended to be compromised

in-depth examination of conducted exploits

early-warning about new attack trends

adversaries from more valuable targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Classification of Intrusions

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is this? What’s the idea behind it?

A

Detection Method: Misuse Detection

  • Store signatures of attacks in a database
  • Monitor traffic for signatures
  • Frequently update signature database
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the difficulties associated with this method?

A

Diurnal patterns:
* Time of day (very few users at night)
* Day of week (very few users on weekends)
* Time of year (fewer users during semester break)
* Random events (public holidays, festivities…)
Long-term patterns:
* Number of users will grow over time

  • Real-word use typically limited to narrow edge cases
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Compare detection methods: misuse detection and anomaly detection.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Detection Delay
When is the information processed?
Real-time detection

A
  • Data and control flows are intercepted
  • Information processing while target system is running
  • Short detection time
  • Interferes with system performance
  • Information is logged
  • Processing and analysis conducted later
  • Longer detection time
  • Easily parallelized
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does the system react to an attack?
* Passive

* Active
..

A
  • Only detect and report the results
  • Logging and record creation
  • Response mechanism to the attacks
  • Close Connections: TCP RST
  • Perform system or operational modifications like reconfiguration of routers, firewalls, …
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Estimation: What is used in practice by large companies? (reaction to an attack)
  • They avoid …
  • Reasoning is that false/too strict reactions might —
    Example: Port scan detected, Firewall bans IP address range, production control cut off as well, etc.
  • Also: …(important for highly safety-relevant systems as an aircraft)
  • (Insights based on numerous discussions with industrial research partners)
A

automated responses! There is always a human in the loop.

cause more damage than the incident that triggered it

autonomous behavior is difficult to be certified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data source for IDS: network based vs host-based

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Intrusion Detection on end-to-end encrypted communication

How does an HIDS detect malicious data in encrypted traffic?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which attacks can different IDS detect?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How are incidents analyzed further? Individual vs Cooperative.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Real-life examples: SNORT vs OSSEC

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly