Network Security Assignment: Submitted To: Ma'am Komal Name: Aiman Rizwan Roll No: Info-Tech 16010 BS-IT (8)
Network Security Assignment: Submitted To: Ma'am Komal Name: Aiman Rizwan Roll No: Info-Tech 16010 BS-IT (8)
What is Intrusion?
Anybody trying to gain unauthorized access to the network. Virus, Trojans and Worms
replicating in the network. Sending specially crafted packets to exploit any specific vulnerability.
Attacks that would make the services unresponsive even for legitimate clients.
An intrusion prevention system (IPS) is software that has all the capabilities of an intrusion
detection system and can also attempt to stop possible incidents. It live in the same area of the
network as a firewall, between the outside world and the internal network. IPS
proactively deny network traffic based on a security profile if that packet represents a known
security threat.
Intrusion Detection System Advantages
It allows administrator to tune, organize and comprehend often incomprehensible operating
system audit trails and other logs. It can make the security management of systems by non-
expert staff possible by providing user friendly interface can recognize and report alterations to
data files
IDS generate alarm and report to administrator that security is breaches and also react to
intruders by blocking them or blocking server. It provides time to time information, it recognize
attacker (intrusion) & report alteration to data files.
Report generation on detection of any malicious activity
Record any alteration in data files caused due to suspicious activity detected
Blocking intruders on detection of suspicious activity on the network
Analyzes the type of attacks and records its patterns which help strategize better security
protocols
Intrusion Detection
System (IDS)
Anomaly-Based Signature-Based
Detection Detection
Anomaly-Based Detection
Anomaly-based detection is the
process of comparing definitions of
what activity is considered normal
against observed events to identify
significant deviations. An IDPS using
anomaly-based detection has profiles
that represent the normal behavior of
such things as users, hosts, network
connections, or applications. The
major benefit of anomaly-based
detection methods is that they can be
very effective at detecting previously
unknown attacks.
Another problem with building profiles is that it can be very challenging in some cases to make
them accurate because computing activity is so complex. For example, if a particular
maintenance activity that performs large file transfers occurs only once a month, it might not be
observed during the training period; when the maintenance occurs, it is likely to be considered a
significant deviation from the profile. Anomaly-based IDPS products often produce many false
positives because of benign activity that deviates significantly from profiles, especially in more
diverse or dynamic environments. Another noteworthy problem with the use of anomaly-based
detection techniques is that it is often difficult for analysts to determine what triggered a
particular alert.