Intrusion Detection Systems Flashcards

1
Q

What is an Intrusion Detection System (IDS)?

A

A security mechanism designed to detect unauthorized access, misuse, or attacks on a network or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two main types of IDS?

A
  1. Host-Based IDS (HIDS): Monitors activity on individual devices.
  2. Network-Based IDS (NIDS): Monitors traffic across a network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the primary functions of IDS?

A

Detecting malicious activity.
Logging details of detected incidents.
Alerting administrators to take action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is signature-based detection in IDS?

A

Detecting attacks by matching traffic against known attack patterns (signatures).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is anomaly-based detection in IDS?

A

Identifying deviations from normal behavior to detect unknown attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does behavioral detection work in IDS?

A

Observes and profiles normal behavior patterns, triggering alerts when deviations occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do rule-based alerts work in IDS?

A

Predefined rules trigger alerts when conditions are met, such as specific packet content or protocol violations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Interpret the example rule:
alert ip $EXTERNAL_NET $SHELLCODE_PORTS -> $HOME_NET any
(msg:”SHELLCODE Linux shellcode”; content:”|90 90 90 E8 C0 FF FF FF|/bin/sh”; classtype:shellcode-detect; sid:652; rev:9;)

A

Detects Linux shellcode targeting the home network using a specific signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the main challenges faced by IDS?

A

High false-positive rates.
Inability to detect new threats without updated signatures.
Resource-intensive processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can attackers evade IDS?

A

Packet fragmentation.
Encryption to hide payloads.
Flooding IDS with benign traffic to mask attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a botnet?

A

A collection of compromised machines (bots) under the control of a botmaster, used for attacks like DDoS or spam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do botnets communicate?

A

Bots “phone home” to the C&C infrastructure for instructions and updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is domain fluxing in botnets?

A

A technique where bots generate random domain names to find their C&C server, making detection and blocking harder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can ethical actors perform botnet takeovers?

A

Predict and register future C&C domains, intercepting bot communication without sending harmful commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What ethical guidelines should be followed during a botnet takeover?

A

Do no harm.
Avoid altering bot configurations.
Collaborate with ISPs and law enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What data was collected during botnet monitoring?

A

Over 70GB of data in 10 days, providing insights into botnet operations.

17
Q

What are the benefits of using IDS in networks?

A

Early detection of attacks.
Comprehensive logging of suspicious activities.
Enhanced incident response capabilities.

18
Q

How can IDS be integrated with other security tools?

A

IDS can complement firewalls, antivirus software, and SIEM systems for holistic security.