Module 12 Flashcards
a ____ is a set of rules that an IDS and an IPS use to detect typical intrusion activity.
___ uniquely identify specific viruses, worms, protocol anomalies, and malicious traffic (e.g., a DoS attacks).
malicious traffic displays distinct characteristics or _____
signature
Signatures also have three distinctive attributes:
Type - Atomic or Composite
Trigger - Also called the alarm
Action - What the IPS will do
There are two types of signatures:
Atomic Signature -
Composite Signature -
This is the simplest type of signature because a single packet, activity, or event identifies an attack. The IPS does not need to maintain state information and traffic analysis can usually be performed very quickly and efficiently.
Atomic Signature -
Also called a stateful signature because the IPS requires several pieces of data to match an attack signature. The IPS must also maintain state information, which is referred to as the event horizon. The length of an event horizon varies from one signature to the next.
Composite Signature -
The heart of any IPS signature is the___ which is often referred to as the signature trigger.
signature alarm,
There are four general IPS signature trigger categories
Pattern-based detection
Anomaly-based detection
Policy-based detection
Honey Pot-Based detection
Also known as signature-based detection.
Simplest triggering mechanism as it searches for a specific and pre-defined atomic or composite pattern.
A IPS sensor compares the network traffic to a database of known attacks, and triggers an alarm or prevents communication if a match is found.
Pattern-based detection
Also known as profile-based detection.
Involves first defining a profile of what is considered normal network or host activity.
This normal profile is usually defined by monitoring traffic and establishing a baseline.
Once defined, any activity beyond a specified threshold in the normal profile will generate a signature trigger and action.
Anomaly-based detection
Also known as behavior-based detection.
Although similar to pattern-based detection, an administrator manually defines behaviors that are suspicious based on historical analysis.
The use of behaviors enables a single signature to cover an entire class of activities without having to specify each individual situation.
Policy-based detection
uses a server as a decoy server to attract attacks.
The purpose of a decoy server is to lure attacks away from production devices.
Allows administrators time to analyze incoming attacks and malicious traffic patterns to tune their sensor signatures.
Honey Pot-Based detection
Generate an alert
Produce alert
- The IPS sends events as alerts.
Produce verbose alert
- The IPS sends a detailed event alert.
Log the activity
Log attacker packets
- Logs packets from the attacker IP address and sends an alert.
Log pair packets
- Logs packets from the victim and attacker IP addresses and sends an alert.
Log victim packets
- Logs packets from the victim IP address and sends an alert.
Deny the activity
Deny packet inline
- Terminates the packet.
Deny connection inline
- Terminates the current packet and future packets on this TCP flow.
Deny attacker inline
- Terminates the current packet and future packets from this attacker address for a specified period of time.
Reset the TCP connection
Reset TCP connection
- Sends TCP resets to hijack and terminate the TCP flow.
Block future activity
Request block connection
- Sends a request to a blocking device to block this connection.
Request block host
- Sends a request to a blocking device to block this attacker host.
Request SNMP trap
- Sends a request to the notification application component of the sensor to perform SNMP notification.
are desirable and indicate the IPS is functioning properly.
True positives and true negatives
are undesirable and must be investigated.
False positives and false negatives
Alerts can be classified as follows:
True positive - (Desirable) This is used when the IPS generates an alarm because it detected known attack traffic. The alert has been verified to be an actual security incident and also indicates that the IPS rule worked correctly.
True negative - (Desirable) This is used when the system is performing as expected. No alerts are issued because the traffic that is passing through the system is clear of threats.
False positive - (Undesirable) This is used when an IPS generates an alarm after processing normal user traffic that should not have triggered an alarm. The IPS must be tuned to change these alarm types to true negatives. The alert does not indicate an actual security incident. Benign activity that results in a false positive is sometimes referred to as a benign trigger. False positives are costly because they must be investigated.
False negative - (Dangerous) This is used when an IPS fails to generate an alarm and known attacks are not being detected. This means that exploits are not being detected by the security systems that are in place. These incidents could go undetected for a long time, and ongoing data loss and damage could result. The goal is for these alarm types to generate true positive alarms.
The ____ action logs the attacker IP address and sends an alert.
log attacker packets
The ____ action drops a malicious packet only.
deny packet inline