NIS UNIT 3
NIS UNIT 3
PART-1
Network attack
Need for Intrusion Detection Systems
IDS Types
Characteristics of ID
ID Methodology
Network Attack
1. Malware
2. Virus
3. Worm
4. Botnet
5. DoS (Denial of Service)
6. DDoS (Distributed DoS)
7. Packet sniffer
8. IP Spoofing
9. Man-in-the-Middle Attack
10. Compromised-Key Attack
11. Phishing
12. DNS spoofing
MALWARE
MALWARE
Malware, short for malicious software,
refers to any intrusive software developed
by cyber criminals (often called hackers) to
steal data and damage or destroy
computers and computer systems.
Malware
Malicious software which is specifically designed to
disrupt, damage, or gain authorized access to a
computer system.
Behavior Monitoring: the IDS continuously monitors network traffic, system logs, or
other data sources for deviations from the baseline.
Anomaly Detection: When the IDS identifies deviations or anomalies that exceed
predefined thresholds or criteria, it generates alerts.
Alert Analysis: Security analysts or administrators review the alerts generated by the anomaly-
based IDS
Response and Mitigation: organizations can take appropriate response actions to mitigate the
potential threat
SIGNATURE / ANOMALLY
Based on pattern based on behaviour
Session Tracking: The IDS tracks the state of network sessions by maintaining information
about active connections, including source and destination IP addresses, protocol types, and
other relevant data
Packet Inspection: As packets traverse the network, the IDS inspects them using stateful
protocol analysis techniques.
Protocol Parsing: The IDS parses the payload of network packets to understand the structure
and semantics protocols being used (e.g., HTTP, FTP, SMTP). This allows the IDS to extract
relevant information from the network traffic, such as URLs, file transfers, email content, and
other application-specific data
Stateful Protocol Analysis
Keeping Track of Conversations: Imagine your network is like a busy party with lots of people
talking (devices communicating). The IDS listens in on these conversations. But instead of just
hearing individual words (packets), it pays attention to the whole chat (session).
Understanding the Chatter: The IDS isn't just eavesdropping, it's also understanding what's
being said. It knows the different "languages" (protocols) people use to talk. For example, it
understands when someone's speaking "HTTP" (web browsing) or "SMTP" (email).
Spotting Strange Talk: Now, if someone starts saying weird things, like talking about breaking
into the house (malicious activity), the IDS notices. It's because it's paying attention to the whole
conversation, not just individual words.
Remembering Who's Who: The IDS doesn't just forget who's talking. It remembers who started
the conversation, who they're talking to, and what they're talking about. This helps it make sense
of what's normal and what's not.
Raising the Alarm: When the IDS hears something suspicious, like someone talking about
breaking in, it doesn't just ignore it. It raises the alarm (generates an alert) so that you, the
homeowner (network administrator), know something fishy might be going on
Taking Action: Finally, it's up to you, the homeowner, to decide what to do. Maybe you check it
out yourself (investigate) or call the police (take action to block or stop the suspicious activity).
Stateful Analysis: By maintaining state information about network sessions, the IDS can perform
stateful analysis to detect anomalies, deviations from expected behavior, and known attack
patterns.
Alert Generation: When the IDS detects suspicious or malicious activity through stateful protocol
analysis, it generates alerts .
Response and Mitigation: Based on the alerts generated by the IDS, security administrators
can take appropriate response actions.
Stateful Protocol Analysis
Stateful protocol analysis approaches:
Traffic rate monitoring-If IDPS detects sudden increase in traffic it can
stop and reset all traffic.
Signature-based detection
Statistical anomaly-based detection
Stateful protocol analysis detection
IPS System Configuration
Decide what to watch for
Create rules
Keep it updated
Keep records
Adjust as needed
IPS System Configuration
Define security policies: Identify security goals, threat types,
acceptable network behavior, and compliance needs.
Choose deployment mode: Decide if the IPS will actively
monitor in-line or passively analyze out-of-band network
traffic.
Configure blocking actions: Define actions for the IPS to take upon
detecting threats, such as blocking traffic or sending alerts.
Test and validate configuration: Thoroughly test the IPS in a controlled
environment to ensure effective threat detection without disrupting
normal traffic.
Logging and Monitoring: Routers often have logging capabilities that record
information about network traffic passing through them.
IDS can utilize these router logs as a data source for detecting and analyzing
potential security threats.
keep track of each network connection when from the request is coming
or response is going.
State table
incoming packet that it cannot match in its state table, it refers to its
Access Control List (ACL) to determine whether to allow the packet to
pass.
SCENARIO
• Alice, is browsing the web
• Alice opens her web browser and requests to visit a website
• The firewall examines the packet and sees that it's the beginning of a new
outgoing connection.
• The firewall adds an entry to its state table
• recording Alice's computer's IP address, the destination website's IP
address, the source and destination port numbers, and the protocol being
used (usually TCP for web browsing).
• Since the packet is part of a new outgoing connection and complies with
the firewall's security policies, it's allowed to pass through the firewall.
• her computer sends and receives packets back and forth. The firewall
inspects each packet, checking them against the state table to ensure
they belong to the established connection.
• the stateful firewall dynamically updates its state table, keeping track of
the connection's status.
• If Alice closes her browser or finishes her session, the firewall removes the
corresponding entry from the state table
• If an attacker were to attempt to initiate a malicious connection to Alice's
computer, the stateful firewall would block
•
incoming packet doesnot match in its state table, it refers to its Access
Control List (ACL) to determine whether to allow the packet to pass.
Single Point of Access: single point of entry for remote users or systems.
• Username
• email address
• digital certificate
1. Access requestor
2. Policy server:
• Provide access
• The users can allow general, unrestricted access, or they can allow specific people
or groups of people to access these resources.
• For example, a user might have a hard drive that contains information to be shared
with office coworkers.
• Lattice based control specifies the level of access each subject has to each object
Role based control:
• Users are grouped into roles, and permissions are associated with each role.
that users only have access to resources necessary for their roles.
Mandatory access controls
(MACs)
• In MAC, access control is determined by the system based on security labels
assigned to each resource and each user.
• Users and resources are assigned sensitivity labels, and access is granted or
denied based on predefined rules or policies.