IDS, Firewalls & Honeypots Flashcards

1
Q

How IDS Detects Intrusion

A

Signature Recognition, Anomaly Detection, Protocol Anomaly Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of IDS

A

Network-Based , Host-Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of IDS Alerts

A
True Positive (Attack - Alert)
False Positive (No Attack - Alert)
False Negative (Attack - No Alert)
True Negative (No Attack - No Alert)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firewall Technologies

A

Packet filtering, Circuit Level Gateways, Application Level Firewall, Stateful Multilayer inspection, Application proxies, VPN , NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall Architecture

A

Bastion Host, Screened Subnet, Multi-homed Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Type of Honeypots

A

Low-interaction Honeypot, Medium-interaction Honeypot, High-interaction Honeypots, Production Honeypot, Research Honeypots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewall

A

software- or hardware-based system located at the network gateway that protects the resources of a private network from unauthorized access of users on other networks. They are placed at the junction or gateway between the two networks, which is usually a private network and a public network such as the Internet. Firewalls examine all messages entering or leaving the Intranet and block those that do not meet the specified security criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Honeypots

A

systems that are only partially secure and thus serve as lures to attackers. Recent research reveals that a honeypot can imitate all aspects of a network, including its webservers, mail servers, and clients. Honeypots are intentionally set up with low security to gain the attention of the DDoS attackers. Honeypots serve as a means for gaining information about attackers, attack techniques, and tools by storing a record of the system activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An intrusion detection system (IDS)

A

Security software or hardware device used to monitor, detect, and protect networks or system from malicious activities; it alerts the concern security personnel immediately upon detecting intrusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DeMilitarized zone (DMZ)

A

an area that hosts computer(s) or a small subnetwork placed as a neutral zone between a particular company’s internal network and untrusted external network to prevent outsider access to a company’s private data. The DMZ serves as a buffer between the secure internal network and the insecure Internet, as it adds a layer of security to the corporate LAN, thus preventing direct access to other parts of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Port UDP 514

A

The syslog server gathers information sent over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Signature Recognition

A

Signature recognition, also known as misuse detection, tries to identify events that indicate an abuse of a system or network. This technique involves first creating models of possible intrusions and then comparing these models with incoming events to make a detection decision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Anomaly Detection

A

Anomaly detection consists of a database of anomalies. An anomaly can be detected when an event occurs outside the tolerance threshold of normal traffic. Therefore, any deviation from regular use is an attack. Anomaly detection detects the intrusion based on the fixed behavioral characteristics of the users and components in a computer system. Creating a model of normal use is the most challenging task in creating an anomaly detector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Protocol Anomaly Detection

A

Protocol anomaly detection depends on the anomalies specific to a protocol. It identifies particular flaws between how vendors deploy the TCP/IP protocol. Protocols designs according to RFC specifications, which dictate standard handshakes to permit universal communication. The protocol anomaly detector can identify new attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Obfuscating

A

Obfuscating is an IDS evasion technique used by attackers to encode the attack packet payload in such a way that the destination host can only decode the packet but not the IDS. An attacker manipulates the path referenced in the signature to fool the HIDS. Using the Unicode character, an attacker could encode attack packets that the IDS would not recognize, but an IIS web server would decode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

False Positive

A

No attack - Alert

17
Q

False Negative

A

Attack - No Alert

18
Q

True Positive

A

Attack - Alert

19
Q

True Negative

A

No attack - No Alert

20
Q

Session splicing

A

Evasion technique that exploits how some IDSs do not reconstruct sessions before pattern-matching the data. It is a network-level evasion method used to bypass IDS where an attacker splits the attack traffic in too many packets such that no single packet triggers the IDS