M11 - Intrusion detection and network attacks - C11 Flashcards

1
Q

What is an instrusion/incident?

A

an event on a host or network that violates
security policy
, or is an imminent threat to put a system in an unauthorized state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is intrusion detection?

A

The process of monitoring and anlyze system event in order to identify and report intrusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a intrusion detection system (IDS) include?

A

systems to automate following processes:
- event monitoring
- logging
- means to support human analysis and repporting of events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between a intrusion detection system (IDS) and an intrusion prevention system (IPS)?

A

IDS is passive as it will detect and log events, but human interaction is required to metigate deteceted violations.

IPS on the other hand include active response to detected violations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does it mean that in IDS is network based (NIDS)?

A

The sensors that collect event streams are placed across a network, for example on a LAN and DMZ.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does it mean that IDS is host-based (HIDS)?

A

The sensors that collect event streams are placed at the host (server, PC etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the intrusion detection problem?

A

To rightfully determine whether an event is from a ligitimate distribution or a destribution of instruder behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is high rate of false positives problematic?

A
  • It takes up the analysts time.
  • It makes it more likely that rightfully positives will be ignored.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three philosophical approaches to intrusion detection?

A
  • Signature based approach
  • Specification based approach
  • Anomaly-based approach
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What characterizes the signature-based IDS approach

A

An expert defines malicious patterns based on known attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wat are the pros of a signature-based IDS approach?

A
  • it is fast
  • it is accurate (fewer false positive)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What characterizes a specification-based IDS approach?

A

Expert defines allowed actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When is the alarm set of with a specification-based IDS approach?

A

When events deviate from the, by expert, defined allowed (ligitimate) actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What characterizes an anomaly-based IDS approach?

A

A profile of normal behaviour is created as a base-line for expected event patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

For what ligitimate purposes may packet-sniffing be used?

A

Logging traffic-related details (packet sniffing) may support network management in case of:
- incidents
- late forensic investigations
- loss evaluations
- system recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Whata re the three categories of vulnerability assessment tools?

A
  • reconnaissance tools
  • vulnerability scanners
  • penetration testing tools
17
Q

What is the difference between intrusion detection tools and vulnerability detection tools?

A
  • Intrusion detection tools seek to detect/defend the system against currently happening intrusions.
  • Vulnerability detection tools seek to disclose weaknesses in your system in order to avoid future intrusions.
18
Q

What is a denial of service (DoS) attack?

A

Attacks denying legitimate users access to resources and services by intentional acts that severly degrade performance or cause outright failure.

18
Q

What are the two typical kinds of denial-of-service (DoS) attacks?

A
  • Buffer-overflow attacks
  • Flood attacks
19
Q

What is a buffer-overflow attack?

A

When an attacker exploit buffer overflow issues by overwriting the memory of an application.

20
Q

What is a flood-attack?

A

When an attacker overwhelms a server by sending a extensive amount of packets.

21
Q

What is th difference between denial-of-service (DoS) attacks and distributed-denial-of-service (DDoS) attacks?

A
  • In a DDoS the attacker uses a large number of devices (botnets) to flood the target.
  • In DoS the attacker sends the flooding packets from a single device.
22
Q

Why does an attacker often use a false source IP address (IP spofing) when performing a DoS attack?

A

So that the replies to the packets sent do not flood his own device, but instead some other (often random) IP.

23
Q

What is “dwell-times”?

A

The time an attacker has been on a system before they were detected.

24
Q

What is Nmap?

A

An open-source tool used for scanning networks in order to identify devices, open ports, services, and potential vulnerabilities.

25
Q

What is Snort?

A

A signature-based IDS, with which we can define specific events that should result in an alert.

26
Q

What are the typical steps of a scanning?

A
  • Find Live hosts and OS version
  • Find Open ports
  • Determine Version of Service
  • Identify Vulnerable services
27
Q

When will port scanning typically be characterized as abnormal (potential intrusion)?

A

When a port scanning is conducted on the inside of a closed network.

28
Q

What are indicators of compromise (IOC)?

A

Technical characteristics that identify a known threat. Making it possible for others to compare finds to formerly detected threats in order to determine if the find is malicious.

29
Q

What is OS fingerprinting?

A

OS fingerprinting is a technique used to identify the operating system of a device on a network. It involves analysing various characteristics of the device’s network behaviour and comparing them to a database of known operating system fingerprints to make an educated guess about what operating system the device is running.

30
Q

What is active OS fingerprinting?

A

When you actively send a number of packets (for instance pings) to target and analyze the replies in order to determine what OS the target device is running.

31
Q

What is passive OS fingerprinting?

A

When you analyze already received replies from a target device in order to determine what OS the target is running.