Intrusion Detection and Prevention Systems Flashcards

1
Q

What is a Intrusion Detection System

A

Wire tap between the internal and External network
Can detect wide variety of intrusions
Presents analysis in simple format
Aims to block intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is monitored?

A

Network traffic
Users Resources
Command and program execution
read/write - execute some cmds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 2 intrusion detection processes?

A

Signature Based approach

Anomaly Based approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Misuse Detection?

A

– What is bad, is known
– What is not bad, is good
Determines whether a sequence of instructions being executed is known to violate the security policy.
IDS matches data against a set of rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is signature based detection?

A

– What is good, is known

– What is not good, is bad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Vulnerability based signatures?

A

Once a new vulnerability is disclosed, researchers develop signatures that anticipate the nature of yet-to-be-created threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Specific based detection

A

what are good are included in the rules

If any deviations from the rules, IDS detects a potential intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Anomaly-based Approaches

A

– What is usual, is known

– What is unusual, is bad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Statistical Moments

A

Activity measures, CPU, I/O Process size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pros/ Cons on Anomaly based

A

May detect zero-day attacks

Usually higher false positive rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pros/ Cons on Signature-based

A

Usually lower false positive rate

May not detect zero-day attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a honey pot

A

A system deployed to lure attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly