Intrusion Detection Systems Flashcards

1
Q

What is the Aho-Corasick algorithm?

A

A multi-pattern search algorithm. The lecture suggests that this is a suitable algorithm for IDS/IPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the goto transition function in the Aho-Corasick algorithm?

A

A function that maps (state, input symbol) into a state or failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the failure transition function in the Aho-Corasick algorithm?

A

A function that is called when the goto function has no suitable state to go to. The failure function maps a state into a state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the output function in the Aho-Corasick algorithm?

A

A function that associates a set of patterns from the input set to any state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an IDS and what does it do? What is an IPS?

A

An IDS is a device that tries to detect and identify intrusion activities in a network.

An IPS combines detection with prevention. This is typically acomplished through combining and IDS and a firewall which is often implemented in hardware (ASIC) for greater performance. Other options are antivirus scanners and vulnerability scanners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the main components of an IDS?

A

Any IDS consist of three main parts:

  1. The data pre-processor which parses and normalizes incoming traffic/logs.
  2. A detection algorithm which employs several detection models for detecting intrusive activity.
  3. An alert filter which takes the output from the detection algorithm and a set of decision criteria to estimate a severity. The final action will depend on this severity score.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some of the main types of IDS?

A

There are four main types of IDS:

  1. Host-based
  2. Network-based
  3. Application-based
  4. Target-based (use hashes to detect changes to system objects, e.g., system files.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is misuse detection?

A

Misuse detection is centered around detecting behaviour deemed to be malicious or undesierable. It uses signatures of known intrusions to detect such activity. It is a reliable method for detecting known attacks and will often use pattern matching, i.e., search for detection. An example of such an algorithm is Aho-Corrasick.

Misuse is not capable of detecting new attacks, i.e., those for which no signature has been made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is anomaly detection?

A

Anomaly detection established profiles of normal/expected user behaviour. If the observed behaviour deviates from the expectations to a sufficient extent, then an alarm may trigger. A simple example may be a user login on to an organizations networks. If the user always logs on from the office with an IP address 123.123.123.0/24 but suddenly logs on from home with the address 90.202.11.34, then an anomaly has occurred and an alarm may be triggered.

Anomaly detection assumes that abnormal behavior signifies intrusion. This allows anomaly detection to detect new attacks, but it will generate many false positives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly