Module20
Module20
Structure of IDS/IPS
1. Sensors: Record and keep an eye on system or network activity.
Strategically placed on individual devices or at network entry
points.
2. Detection Engines: Analyse collected data using signature-
based, anomaly-based, or heuristic-based techniques. Identify
patterns or deviations indicative of potential security
threats.
3. Response Mechanisms (IPS): Automated reaction mechanisms in
IPS are activated in response to threats that are identified.
Firewall rules can be changed, malicious traffic can be
blocked, or other preventive measures can be put in place.
4. Management Console: The Management Console offers a
centralized interface for the IDS/IPS to be configured,
managed, and monitored. enables administrators to examine
warnings, adjust settings, and do report analysis.
5. Alerting System: Notifies administrators of possible security
incidents by creating alerts in real-time. Information
essential for quick and well-informed decision-making is
included in alerts.
Firewall IDS/IPS
Functionali Serves as a line of Tracks and examines system
ty defence between unreliable or network activity in
external networks and order to find and address
reliable internal security issues. can, in
networks. regulates all the case of an IPS,
traffic, both coming and actively prevent or block
going, according to pre- threats that are
set security criteria. discovered.
Deployment Located between network Installed on the network
segments or at network to track and examine both
perimeters. filters data inbound and outbound
according to predefined traffic. can be positioned
guidelines. on individual devices or
in different locations,
such as network edges.
Traffic Permits or prohibits Examines traffic patterns
Handling traffic according to pre- for indications of
established guidelines, potentially harmful
including IP addresses, activities.
ports, and protocols. creates notifications or
acts prophylactically in
real time.
Awareness Is not deeply aware of Actively searches for
particular anomalies or anomalous activity and
signatures of attacks. recognized attack patterns
primarily concerned with (based on signatures).
rule-based traffic
filtering.
Active Basically a passive system IPS actively blocks or
Response that uses rules to prevents malicious
determine whether to allow behaviour in response to
or prohibit traffic. It threats that are detected.
stops specific traffic in
response to threats
detected, but doesn't take
any further action.
Level of Examines network and Conducts more thorough
Inspection packet-level traffic. packet inspection, looking
concentrates on the for indications of
connection state and basic potential attacks in
header information. content and behaviour.
Granularity Based on broad rules, it Provides more detailed
offers more control over inspection and detection
traffic. It usually by focusing on particular
carries out network and behaviours or signatures.
transport layer policy
enforcement.
Role in The firewall is a An advanced security
Security fundamental element of incident detection and
network security that response technology.
regulates the flow of increases network security
traffic. It frequently by offering tools for
combined with additional preventing and detecting
security measures to intrusions.
provide a complete
protection.
Snort
Honeypots
One kind of Internet security tool called a honeypot is used to lure
in cybercriminals and trick them into lying when they attempt to
breach the network for any unauthorized purpose. These honeypots are
typically installed in order to monitor an attacker's activities
within the network and help the company develop more effective
preventative measures against such intrusions. Since the honeypot is
a fictitious proxy that aids in network traffic recording, it does
not contain any valuable data. Let’s take an example of two nmap
scan reviews of a system with and without the Honeypot active.
Types of Honeypots: