Intrusion Detection System
Intrusion Detection System
Topics to be covered…
Overview of IDS
Process model
Architecture
Information sources
Analysis techniques
Strengths
Limitations
Conclusion
Reference
Overview of Intrusion Detection Systems:
what are intrusions ?
Functions of IDS
Monitoring and analysis of user and system activity.
Auditing of system configurations .
Assessing the integrity of critical system and data files.
Recognition of activity patterns reflecting known
attacks
Statistical analysis for abnormal activity patterns
Process model for Intrusion Detection:
Information sources:
network ,host ,application
Analysis:
misuse detection , anomaly detection
Response:
active measures involving some automated
intervention on the part of the system, and passive
measures involving reporting IDS findings to humans,
who are then expected to take action based on those
reports.
IDS Architecture
Audit Collection/Storage Unit
Processing Unit
Alarm/Response Unit
Information sources
Network based IDSs:
Consist of a set of single-purpose sensors . These units
monitor network traffic, performing local analysis of that traffic
and reporting attacks to a central management console.
Host based IDSs:
Operate on information collected from within an
Individual computer system.
Operating system audit trails, and system logs
Application based IDSs:
Special subset of host-based IDSs .
The most common information sources used by these
IDSs are the application’s transaction log files.
IDS Analysis Techniques
Misuse detection
Anomaly detection