Intrusion Detection Flashcards
Are either individuals, usually working as insiders, or members of a larger group of outsider attackers, who are motivated by social or political causes
Aim of their attacks is often to promote and publicize their cause typically through:
Website defacement
DoS attacks
theft and distribution of data that results in negative publicity or compromise of their targets.
Activists
Individuals or members of an organized crime group with a goal of financial reward
Cyber Criminals
Groups of hackers sponsored by governments to conduct espionage or sabotage activities
State-Sponsored Organizations (APTs)
Hackers with minimal technical skill who primarily use existing attack toolkits
Apprentice
Hackers with sufficient technical skills to modify and extend attack toolkits to use newly discovered, or purchased, vulnerabilities
Journeyman
Hackers with high-level technical skills capable of discovering brand new categories of vulnerabilities
Master
What are the Intruder Skill Levels?
Apprentice
Journeyman
Master
What is Intruder Behavior
Target acquisition and information gathering Initial access Privilege escalation Information gathering or system exploit Maintaining access Covering tracks
A security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system (or system resource) without having authorization to do so.
Security Intrusion
A security service that monitors and analyzes system events for the purpose of finding, and providing real-time or near real-time warning of, attempts to access system resources in an unauthorized manner.
Intrusion Detection
What are the three logical components of the Intrusion Detection System (IDS)
- Sensors - collect data
- Analyzers - determine if intrusion has occurred
- User interface - view output or control system behavior
Monitors the characteristics of
a single host for suspicious activity
Host-based IDS (HIDS)
Monitors network traffic and
analyzes network, transport, and application protocols to identify suspicious activity
Network-based IDS (NIDS)
Combines information from a number of sensors, often both
host and network based, in a central analyzer that is able to
better identify and respond to intrusion activity
Distributed or hybrid IDS
Involves the collection of data relating to the behavior of legitimate users over a period of time
Current observed behavior is analyzed to determine whether this behavior is that of a legitimate user or that of an intruder
Anomaly detection