Intrusion Detection Systems Flashcards

1
Q

A network faces three types of intruders: masquerade, misfeasor and clandestine. What do these terms mean?

A

Masquerade: outsider in general. An unauthorised user who penetrates a system to exploit another’s account
Misfeasor: insider in general. Legitimate user who misuses their privileges.
Clandestine: can be both. An individual who seizes supervisory control to evade auditing and access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some design goals of intrusion detection systems?

A

Detect a wide variety of intrusions, detect intrusions in real time, ensure accuracy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Given the design goal “detect a wide variety of attacks”, how would this design goal be implemented?

A

Cover known and unknown attacks
Adapt to new attacks or changes in behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Given the design goal “detect intrusions in real time”, how would this design goal be implemented?

A

Analyse user activities efficiently
Report suspicious cases in a timely way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Given the design goal “ensure accuracy”, how would this design goal be implemented?

A

Minimise false positives and false negatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are three types of IDS models?

A

Signature based, Anomaly based and Heuristic based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a signature based IDS?

A

A signature based IDS detects known attack signatures correspondingly. A signature in this context is a string or pattern that matches a known threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some advantages and disadvantages of signature based IDS?

A

Advantage: effective at detecting known threats
Disadvantage: ineffective at detecting unknown threats and variants on known threats
Disadvantage: cannot detect attacks that consist of multiple events
Disadvantage: cannot track and understand the state of complex communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly