Chapter 8 (Intrusion Detection) Flashcards

1
Q

3 main classes of intruders

A

cyber criminals

activists

state sponsored organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are these examples of

A

intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are these examples of

A

intruder behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what does intrustion detection monitor and analuze to find warnings of an intrustion

A

system events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3 different types of intrusion detection systems

A

host based IDS (HIDS)

network based IDS (NIDS)

distributed/hybrid IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how does a host based ids work?

A

monitors characteristics of a single host for suspiscious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how does a network based ids work?

A

monitors network traffic and analyzes network,transport,and app protocols to identify suspicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how does a distributed/hybrid based ids work?

A

combines info from a number of sensors, both host and network based, and centrally analyzes for intrustion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

2 main approaches to analysis for intrustions

A

anomoly detection

signature/heuristic detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is anomoly detection

A

collects data relating to legit behavior over a period of time

current behavior is analyzed to determine whether it is intruder or legit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is signature/heuristic detection

A

scans for a set of known malicious data patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 primary purposes of a host based itrustion system

A

detect intrustions, log suspiscious events, send alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are data sources that host based IDS uses

A

system call traces

audit log records

file integrity checksums

registry access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how does a NIDS work

A

monitors traffic at selected points on network

examins traffic packet in real time

analyzes traffic patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is Stateful protocol analysis (SPA)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

key disadvantage of stateful protocol analysis (SPA)

A

high resource usage required

17
Q

what are these examples of?

A

typical information logged by a NIDS sensor

18
Q

what is a honeypot

A

decoy system designed to:

lure potentinal attacker away from critical sys

collect info about attackers activity

house fabricated information

19
Q

diff between low interaction honeypot and high interaction honeypot

A