M11 - Intrusion detection and network attacks - C11 Flashcards
What is an instrusion/incident?
M11 - Intrusion detection and network attacks - C11
an event on a host or network that violates
security policy, or is an imminent threat to put a system in an unauthorized state.
What is intrusion detection?
M11 - Intrusion detection and network attacks - C11
The process of monitoring and anlyze system event in order to identify and report intrusions.
What does a intrusion detection system (IDS) include?
M11 - Intrusion detection and network attacks - C11
systems to automate following processes:
- event monitoring
- logging
- means to support human analysis and repporting of events.
What is the difference between a intrusion detection system (IDS) and an intrusion prevention system (IPS)?
M11 - Intrusion detection and network attacks - C11
IDS is passive as it will detect and log events, but human interaction is required to metigate deteceted violations.
IPS on the other hand include active response to detected violations.
What does it mean that in IDS is network based (NIDS)?
M11 - Intrusion detection and network attacks - C11
The sensors that collect event streams are placed across a network, for example on a LAN and DMZ.
What does it mean that IDS is host-based (HIDS)?
M11 - Intrusion detection and network attacks - C11
The sensors that collect event streams are placed at the host (server, PC etc.).
What is the intrusion detection problem?
M11 - Intrusion detection and network attacks - C11
To rightfully determine whether an event is from a ligitimate distribution or a destribution of instruder behavior.
Why is high rate of false positives problematic?
M11 - Intrusion detection and network attacks - C11
- It takes up the analysts time.
- It makes it more likely that rightfully positives will be ignored.
What are the three philosophical approaches to intrusion detection?
M11 - Intrusion detection and network attacks - C11
- Signature based approach
- Specification based approach
- Anomaly-based approach
What characterizes the signature-based IDS approach
M11 - Intrusion detection and network attacks - C11
An expert defines malicious patterns based on known attacks.
Wat are the pros of a signature-based IDS approach?
M11 - Intrusion detection and network attacks - C11
- it is fast
- it is accurate (fewer false positive)
What characterizes a specification-based IDS approach?
M11 - Intrusion detection and network attacks - C11
Expert defines allowed actions.
When is the alarm set of with a specification-based IDS approach?
M11 - Intrusion detection and network attacks - C11
When events deviate from the, by expert, defined allowed (ligitimate) actions.
What characterizes an anomaly-based IDS approach?
M11 - Intrusion detection and network attacks - C11
A profile of normal behaviour is created as a base-line for expected event patterns.
For what ligitimate purposes may packet-sniffing be used?
M11 - Intrusion detection and network attacks - C11
Logging traffic-related details (packet sniffing) may support network management in case of:
- incidents
- late forensic investigations
- loss evaluations
- system recovery