M11 - Intrusion detection and network attacks - C11 Flashcards

1
Q

What is an instrusion/incident?

M11 - Intrusion detection and network attacks - C11

A

an event on a host or network that violates
security policy
, or is an imminent threat to put a system in an unauthorized state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is intrusion detection?

M11 - Intrusion detection and network attacks - C11

A

The process of monitoring and anlyze system event in order to identify and report intrusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a intrusion detection system (IDS) include?

M11 - Intrusion detection and network attacks - C11

A

systems to automate following processes:
- event monitoring
- logging
- means to support human analysis and repporting of events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between a intrusion detection system (IDS) and an intrusion prevention system (IPS)?

M11 - Intrusion detection and network attacks - C11

A

IDS is passive as it will detect and log events, but human interaction is required to metigate deteceted violations.

IPS on the other hand include active response to detected violations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does it mean that in IDS is network based (NIDS)?

M11 - Intrusion detection and network attacks - C11

A

The sensors that collect event streams are placed across a network, for example on a LAN and DMZ.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does it mean that IDS is host-based (HIDS)?

M11 - Intrusion detection and network attacks - C11

A

The sensors that collect event streams are placed at the host (server, PC etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the intrusion detection problem?

M11 - Intrusion detection and network attacks - C11

A

To rightfully determine whether an event is from a ligitimate distribution or a destribution of instruder behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is high rate of false positives problematic?

M11 - Intrusion detection and network attacks - C11

A
  • It takes up the analysts time.
  • It makes it more likely that rightfully positives will be ignored.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three philosophical approaches to intrusion detection?

M11 - Intrusion detection and network attacks - C11

A
  • Signature based approach
  • Specification based approach
  • Anomaly-based approach
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What characterizes the signature-based IDS approach

M11 - Intrusion detection and network attacks - C11

A

An expert defines malicious patterns based on known attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wat are the pros of a signature-based IDS approach?

M11 - Intrusion detection and network attacks - C11

A
  • it is fast
  • it is accurate (fewer false positive)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What characterizes a specification-based IDS approach?

M11 - Intrusion detection and network attacks - C11

A

Expert defines allowed actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When is the alarm set of with a specification-based IDS approach?

M11 - Intrusion detection and network attacks - C11

A

When events deviate from the, by expert, defined allowed (ligitimate) actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What characterizes an anomaly-based IDS approach?

M11 - Intrusion detection and network attacks - C11

A

A profile of normal behaviour is created as a base-line for expected event patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

For what ligitimate purposes may packet-sniffing be used?

M11 - Intrusion detection and network attacks - C11

A

Logging traffic-related details (packet sniffing) may support network management in case of:
- incidents
- late forensic investigations
- loss evaluations
- system recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Whata re the three categories of vulnerability assessment tools?

M11 - Intrusion detection and network attacks - C11

A
  • reconnaissance tools
  • vulnerability scanners
  • penetration testing tools
17
Q

What is the difference between intrusion detection tools and vulnerability detection tools?

M11 - Intrusion detection and network attacks - C11

A
  • Intrusion detection tools seek to detect/defend the system against currently happening intrusions.
  • Vulnerability detection tools seek to disclose weaknesses in your system in order to avoid future intrusions.
18
Q

What is a denial of service (DoS) attack?

M11 - Intrusion detection and network attacks - C11

A

Attacks denying legitimate users access to resources and services by intentional acts that severly degrade performance or cause outright failure.

18
Q

What are the two typical kinds of denial-of-service (DoS) attacks?

M11 - Intrusion detection and network attacks - C11

A
  • Buffer-overflow attacks
  • Flood attacks
19
Q

What is a buffer-overflow attack?

M11 - Intrusion detection and network attacks - C11

A

When an attacker exploit buffer overflow issues by overwriting the memory of an application.

20
Q

What is a flood-attack?

M11 - Intrusion detection and network attacks - C11

A

When an attacker overwhelms a server by sending a extensive amount of packets.

21
Q

What is th difference between denial-of-service (DoS) attacks and distributed-denial-of-service (DDoS) attacks?

M11 - Intrusion detection and network attacks - C11

A
  • In a DDoS the attacker uses a large number of devices (botnets) to flood the target.
  • In DoS the attacker sends the flooding packets from a single device.
22
Q

Why does an attacker often use a false source IP address (IP spofing) when performing a DoS attack?

M11 - Intrusion detection and network attacks - C11

A

So that the replies to the packets sent do not flood his own device, but instead some other (often random) IP.

23
Q

What is “dwell-times”?

M11 - Intrusion detection and network attacks - C11

A

The time an attacker has been on a system before they were detected.

24
Q

What is Nmap?

M11 - Intrusion detection and network attacks - C11

A

An open-source tool used for scanning networks in order to identify devices, open ports, services, and potential vulnerabilities.

25
Q

What is Snort?

M11 - Intrusion detection and network attacks - C11

A

A signature-based IDS, with which we can define specific events that should result in an alert.

26
Q

What are the typical steps of a scanning?

M11 - Intrusion detection and network attacks - C11

A
  • Find Live hosts and OS version
  • Find Open ports
  • Determine Version of Service
  • Identify Vulnerable services
27
Q

When will port scanning typically be characterized as abnormal (potential intrusion)?

M11 - Intrusion detection and network attacks - C11

A

When a port scanning is conducted on the inside of a closed network.

28
Q

What are indicators of compromise (IOC)?

M11 - Intrusion detection and network attacks - C11

A

Technical characteristics that identify a known threat. Making it possible for others to compare finds to formerly detected threats in order to determine if the find is malicious.

29
Q

What is OS fingerprinting?

M11 - Intrusion detection and network attacks - C11

A

OS fingerprinting is a technique used to identify the operating system of a device on a network. It involves analysing various characteristics of the device’s network behaviour and comparing them to a database of known operating system fingerprints to make an educated guess about what operating system the device is running.

30
Q

What is active OS fingerprinting?

M11 - Intrusion detection and network attacks - C11

A

When you actively send a number of packets (for instance pings) to target and analyze the replies in order to determine what OS the target device is running.

31
Q

What is passive OS fingerprinting?

M11 - Intrusion detection and network attacks - C11

A

When you analyze already received replies from a target device in order to determine what OS the target is running.