Sunteți pe pagina 1din 19

Intrusion Detection Systems

Submitted by
Hradayesh pathak
CONTENT
Network Security System
Fire wall
Introduction
 Development
Type of IDS
CONTENT
Technology
Disadvantage
Conclusion
network Security System
Fire wall
A firewall is a part of a computer system or
network that is designed to block
unauthorized access while permitting
authorized communications
Introduction

Intrusion Detection System


Meaning of IDS – “Intrusion Detection
System”, is a security system that detects
inappropriate or malicious activity on a
computer or network.
Functioning of IDs
Audit Records
system activities are
observable
Audit Data
Preprocessor

Activity Data

Detection normal and intrusive


Detection Engine activities have distinct
Models
evidence
Alarms
Action/Report
Decision Decision Engine
Table
Development

In 1984 -
Type of IDS
 Network Based IDS

 Host Based IDS


Network Based IDS

 An independent platform that identifies


intrusions by examining network traffic and
monitors multiple hosts.
e.g.-snort.
Host Based IDS

It consists of an agent on a host that identifies


intrusions by analyzing system calls, application logs,
file-system modifications and other host activities and
state.
E.g.-ossec
Network Based IDSs
Internet Gateway routers

Our network

Host based
detection

 At the early stage of the worm, only limited worm


samples.
 Host based sensors can only cover limited IP space,
which might have scalability issues. Thus they might not
be able to detect the worm in its early stage
Detection Technology

Signature detection

Anomaly detection
Signature Detection
pattern
matching

Intrusion intrusion
Patterns

activities

Example: if (src_ip == dst_ip) then “land attack”

Can’t detect new attacks


Anomaly Detection
90
80 probable
70 intrusion
60
activity 50
measures40 normal profile
30 abnormal
20
10
0
CPU Process
Any problem ? Size

Relatively high false positive rate


• Anomalies can just be new normal activities.
• Anomalies caused by other element faults
• E.g., router failure or misconfiguration, P2P
misconfiguration
Disadvantage
False alarm

Signature updates

Slow processing
Conclusion
We have a good fire wall so why we
need intrusion detection
system…………….?
REFERENCES
www.wikipedia.com
www.ieee.org
www.juhuj.com
Thank you!

CSE 597E Fall 2001 PennState University 19

S-ar putea să vă placă și