SlideShare a Scribd company logo
Intrusion DetectionIntrusion Detection
SystemSystem
Intrusion and IntrusionIntrusion and Intrusion
DetectionDetection
 Intrusion : Attempting to break into orIntrusion : Attempting to break into or
misuse your system.misuse your system.
 Intruders may be from outside theIntruders may be from outside the
network or legitimate users of thenetwork or legitimate users of the
network.network.
 Intrusion can be a physical, system orIntrusion can be a physical, system or
remote intrusion.remote intrusion.
Different ways to intrudeDifferent ways to intrude
 Buffer overflowsBuffer overflows
 Unexpected combinationsUnexpected combinations
 Unhandled inputUnhandled input
 Race conditionsRace conditions
Intrusion Detection SystemIntrusion Detection System
Knowledge
Base
Response
Model
Alert
Data-
base
Event
Provider
Analysis Engine
Other
machines
Intrusion DetectionIntrusion Detection
Systems (IDS)Systems (IDS)
 Different ways of classifying an IDSDifferent ways of classifying an IDS
IDS based onIDS based on
– anomaly detectionanomaly detection
– signature based misusesignature based misuse
– host basedhost based
– network basednetwork based
– Stack basedStack based
Intrusion DetectionIntrusion Detection
Systems (IDS)Systems (IDS)
Intrusion Detection Systems look forIntrusion Detection Systems look for
attack signatures, which are specificattack signatures, which are specific
patterns that usually indicate maliciouspatterns that usually indicate malicious
or suspicious intent.or suspicious intent.
Anomaly based IDSAnomaly based IDS
 This IDS models the normal usage ofThis IDS models the normal usage of
the network as a noisethe network as a noise
characterization.characterization.
 Anything distinct from the noise isAnything distinct from the noise is
assumed to be an intrusion activity.assumed to be an intrusion activity.
– E.g flooding a host with lots of packet.E.g flooding a host with lots of packet.
 The primary strength is its ability toThe primary strength is its ability to
recognize novel attacks.recognize novel attacks.
Drawbacks of AnomalyDrawbacks of Anomaly
detection IDSdetection IDS
 Assumes that intrusions will beAssumes that intrusions will be
accompanied by manifestations that areaccompanied by manifestations that are
sufficiently unusual so as to permitsufficiently unusual so as to permit
detection.detection.
 These generate many false alarms andThese generate many false alarms and
hence compromise the effectiveness of thehence compromise the effectiveness of the
IDS.IDS.
Signature based IDSSignature based IDS
 This IDS possess an attackedThis IDS possess an attacked
description that can be matched todescription that can be matched to
sensed attack manifestations.sensed attack manifestations.
 The question of what information isThe question of what information is
relevant to an IDS depends upon whatrelevant to an IDS depends upon what
it is trying to detect.it is trying to detect.
– E.g DNS, FTP etc.E.g DNS, FTP etc.
Signature based IDSSignature based IDS
(contd.)(contd.)
 ID system is programmed to interpret a certainID system is programmed to interpret a certain
series of packets, or a certain piece of dataseries of packets, or a certain piece of data
contained in those packets,as an attack. Forcontained in those packets,as an attack. For
example, an IDS that watches web servers mightexample, an IDS that watches web servers might
be programmed to look for the string “phf” as anbe programmed to look for the string “phf” as an
indicator of a CGI program attack.indicator of a CGI program attack.
 Most signature analysis systems are based off ofMost signature analysis systems are based off of
simple pattern matching algorithms. In most cases,simple pattern matching algorithms. In most cases,
the IDS simply looks for a sub string within a streamthe IDS simply looks for a sub string within a stream
of data carried by network packets. When it findsof data carried by network packets. When it finds
this sub string (for example, the ``phf'' in ``GET /cgi-this sub string (for example, the ``phf'' in ``GET /cgi-
bin/phf?''), it identifies those network packets asbin/phf?''), it identifies those network packets as
vehicles of an attack.vehicles of an attack.
Drawbacks of SignatureDrawbacks of Signature
based IDSbased IDS
 They are unable to detect novelThey are unable to detect novel
attacks.attacks.
 Suffer from false alarmsSuffer from false alarms
 Have to programmed again for everyHave to programmed again for every
new pattern to be detected.new pattern to be detected.
Host/Applications basedHost/Applications based
IDSIDS
 The host operating system or theThe host operating system or the
application logs in the auditapplication logs in the audit
information.information.
 These audit information includesThese audit information includes
events like the use of identification andevents like the use of identification and
authentication mechanisms (loginsauthentication mechanisms (logins
etc.) , file opens and programetc.) , file opens and program
executions, admin activities etc.executions, admin activities etc.
 This audit is then analyzed to detectThis audit is then analyzed to detect
trails of intrusion.trails of intrusion.
Drawbacks of the hostDrawbacks of the host
based IDSbased IDS
 The kind of information needed to beThe kind of information needed to be
logged in is a matter of experience.logged in is a matter of experience.
 Unselective logging of messages mayUnselective logging of messages may
greatly increase the audit and analysisgreatly increase the audit and analysis
burdens.burdens.
 Selective logging runs the risk thatSelective logging runs the risk that
attack manifestations could be missed.attack manifestations could be missed.
Strengths of the hostStrengths of the host
based IDSbased IDS
 Attack verificationAttack verification
 System specific activitySystem specific activity
 Encrypted and switch environmentsEncrypted and switch environments
 Monitoring key componentsMonitoring key components
 Near Real-Time detection andNear Real-Time detection and
response.response.
 No additional hardwareNo additional hardware
Stack based IDSStack based IDS
 They are integrated closely with theThey are integrated closely with the
TCP/IP stack, allowing packets to beTCP/IP stack, allowing packets to be
watched as they traverse their way upwatched as they traverse their way up
the OSI layers.the OSI layers.
 This allows the IDS to pull the packetsThis allows the IDS to pull the packets
from the stack before the OS or thefrom the stack before the OS or the
application have a chance to processapplication have a chance to process
the packets.the packets.
Network based IDSNetwork based IDS
 This IDS looks for attack signatures inThis IDS looks for attack signatures in
network traffic via a promiscuousnetwork traffic via a promiscuous
interface.interface.
 A filter is usually applied to determineA filter is usually applied to determine
which traffic will be discarded orwhich traffic will be discarded or
passed on to an attack recognitionpassed on to an attack recognition
module. This helps to filter out knownmodule. This helps to filter out known
un-malicious traffic.un-malicious traffic.
Strengths of NetworkStrengths of Network
based IDSbased IDS
 Cost of ownership reducedCost of ownership reduced
 Packet analysisPacket analysis
 Evidence removalEvidence removal
 Real time detection and responseReal time detection and response
 Malicious intent detectionMalicious intent detection
 Complement and verificationComplement and verification
 Operating system independenceOperating system independence
Future of IDSFuture of IDS
 To integrate the network and hostTo integrate the network and host
based IDS for better detection.based IDS for better detection.
 Developing IDS schemes for detectingDeveloping IDS schemes for detecting
novel attacks rather than individualnovel attacks rather than individual
instantiations.instantiations.
Ad

More Related Content

What's hot (20)

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
Umesh Dhital
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
CAS
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
lalithambiga kamaraj
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
Vishwanath Badiger
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
Santosh Khadsare
 
IoT Security
IoT SecurityIoT Security
IoT Security
Narudom Roongsiriwong, CISSP
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
Sanjay Kumar (Seeking options outside India)
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
Vivek Gandhi
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
noornabi16
 
Spoofing
SpoofingSpoofing
Spoofing
Sanjeev
 
Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
Cleverence Kombe
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
sreelekha appakondappagari
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Sweta Sharma
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Network attacks
Network attacksNetwork attacks
Network attacks
Manjushree Mashal
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
david rom
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
MOHIT AGARWAL
 

Viewers also liked (20)

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Aparna Bhadran
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Akhil Kumar
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
Paul Green
 
Honeypots
HoneypotsHoneypots
Honeypots
Jayant Gandhi
 
Push N Pull
Push N PullPush N Pull
Push N Pull
Christine Tay
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
 
Push & Pull
Push & PullPush & Pull
Push & Pull
Nicola Wilson
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
Riya Choudhary
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Devil's Cafe
 
Key management
Key managementKey management
Key management
Brandon Byungyong Jo
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
primeteacher32
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
Anton Chuvakin
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
Disha Bedi
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
Yoram Orzach
 
Snort
SnortSnort
Snort
Michael Boman
 
Snort IDS/IPS Basics
Snort IDS/IPS BasicsSnort IDS/IPS Basics
Snort IDS/IPS Basics
Mahendra Pratap Singh
 
Hcl
HclHcl
Hcl
Riya Choudhary
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
Narudom Roongsiriwong, CISSP
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]
SISA Information Security Pvt.Ltd
 
Snort ppt
Snort pptSnort ppt
Snort ppt
aAlcantar93
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Aparna Bhadran
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Akhil Kumar
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
Paul Green
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
Riya Choudhary
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Devil's Cafe
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
primeteacher32
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
Anton Chuvakin
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
Disha Bedi
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]
SISA Information Security Pvt.Ltd
 
Ad

Similar to Intrusion detection system ppt (20)

Chapter 3- Intrusion Detection.pdf
Chapter 3- Intrusion Detection.pdfChapter 3- Intrusion Detection.pdf
Chapter 3- Intrusion Detection.pdf
AmanuelZewdie4
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
Apoorv Pandey
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
OECLIB Odisha Electronics Control Library
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
Loay Elbasyouni
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
Netwax Lab
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
whitehat 'People'
 
Ips and-ids
Ips and-idsIps and-ids
Ips and-ids
Adam Viet
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
Disha Bedi
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention
MohammedAlmuhaimeed
 
Intrusion Detection systems detaild.pptx
Intrusion Detection systems detaild.pptxIntrusion Detection systems detaild.pptx
Intrusion Detection systems detaild.pptx
SoundariyaSathish
 
Ids vs ips
Ids vs ipsIds vs ips
Ids vs ips
Tapan Khilar
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptx
AnonymousEImkf6RGdQ
 
Intrusion Detection in WLANs
Intrusion Detection in WLANsIntrusion Detection in WLANs
Intrusion Detection in WLANs
ronrulzzz
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
Wail Hassan
 
L5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxL5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptx
RebeccaMunasheChimhe
 
IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPS
Minhaz A V
 
Exploring the Insights of Intrusion Detection Systems in Cybercrime.pdf
Exploring the Insights of Intrusion Detection Systems in Cybercrime.pdfExploring the Insights of Intrusion Detection Systems in Cybercrime.pdf
Exploring the Insights of Intrusion Detection Systems in Cybercrime.pdf
CyberPro Magazine
 
Intrusion detection system (ids)
Intrusion detection system (ids)Intrusion detection system (ids)
Intrusion detection system (ids)
nishiyath
 
Information Security.pptx
Information Security.pptxInformation Security.pptx
Information Security.pptx
DrRajapraveen
 
IS - Firewall
IS - FirewallIS - Firewall
IS - Firewall
FumikageTokoyami4
 
Chapter 3- Intrusion Detection.pdf
Chapter 3- Intrusion Detection.pdfChapter 3- Intrusion Detection.pdf
Chapter 3- Intrusion Detection.pdf
AmanuelZewdie4
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
Apoorv Pandey
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
Loay Elbasyouni
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
Netwax Lab
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
whitehat 'People'
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
Disha Bedi
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention
MohammedAlmuhaimeed
 
Intrusion Detection systems detaild.pptx
Intrusion Detection systems detaild.pptxIntrusion Detection systems detaild.pptx
Intrusion Detection systems detaild.pptx
SoundariyaSathish
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptx
AnonymousEImkf6RGdQ
 
Intrusion Detection in WLANs
Intrusion Detection in WLANsIntrusion Detection in WLANs
Intrusion Detection in WLANs
ronrulzzz
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
Wail Hassan
 
L5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxL5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptx
RebeccaMunasheChimhe
 
IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPS
Minhaz A V
 
Exploring the Insights of Intrusion Detection Systems in Cybercrime.pdf
Exploring the Insights of Intrusion Detection Systems in Cybercrime.pdfExploring the Insights of Intrusion Detection Systems in Cybercrime.pdf
Exploring the Insights of Intrusion Detection Systems in Cybercrime.pdf
CyberPro Magazine
 
Intrusion detection system (ids)
Intrusion detection system (ids)Intrusion detection system (ids)
Intrusion detection system (ids)
nishiyath
 
Information Security.pptx
Information Security.pptxInformation Security.pptx
Information Security.pptx
DrRajapraveen
 
Ad

More from Sheetal Verma (11)

Unit 3a
Unit 3aUnit 3a
Unit 3a
Sheetal Verma
 
Unit 2aa
Unit 2aaUnit 2aa
Unit 2aa
Sheetal Verma
 
Unit 1c
Unit 1cUnit 1c
Unit 1c
Sheetal Verma
 
Unit 1 b
Unit 1 bUnit 1 b
Unit 1 b
Sheetal Verma
 
Unit 1 a
Unit 1 aUnit 1 a
Unit 1 a
Sheetal Verma
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
Sheetal Verma
 
Extra unit 2
Extra unit 2Extra unit 2
Extra unit 2
Sheetal Verma
 
Edi ppt
Edi pptEdi ppt
Edi ppt
Sheetal Verma
 
Edi layer
Edi layerEdi layer
Edi layer
Sheetal Verma
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 
Unit 4
Unit 4Unit 4
Unit 4
Sheetal Verma
 

Recently uploaded (20)

Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
Q1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor PresentationQ1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor Presentation
Dropbox
 
AI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of DocumentsAI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of Documents
UiPathCommunity
 
Webinar - Top 5 Backup Mistakes MSPs and Businesses Make .pptx
Webinar - Top 5 Backup Mistakes MSPs and Businesses Make   .pptxWebinar - Top 5 Backup Mistakes MSPs and Businesses Make   .pptx
Webinar - Top 5 Backup Mistakes MSPs and Businesses Make .pptx
MSP360
 
The Future of Cisco Cloud Security: Innovations and AI Integration
The Future of Cisco Cloud Security: Innovations and AI IntegrationThe Future of Cisco Cloud Security: Innovations and AI Integration
The Future of Cisco Cloud Security: Innovations and AI Integration
Re-solution Data Ltd
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
AI You Can Trust: The Critical Role of Governance and Quality.pdf
AI You Can Trust: The Critical Role of Governance and Quality.pdfAI You Can Trust: The Critical Role of Governance and Quality.pdf
AI You Can Trust: The Critical Role of Governance and Quality.pdf
Precisely
 
Financial Services Technology Summit 2025
Financial Services Technology Summit 2025Financial Services Technology Summit 2025
Financial Services Technology Summit 2025
Ray Bugg
 
Does Pornify Allow NSFW? Everything You Should Know
Does Pornify Allow NSFW? Everything You Should KnowDoes Pornify Allow NSFW? Everything You Should Know
Does Pornify Allow NSFW? Everything You Should Know
Pornify CC
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
AsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API DesignAsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API Design
leonid54
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptxReimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
John Moore
 
UiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer OpportunitiesUiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer Opportunities
DianaGray10
 
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptxSmart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Seasia Infotech
 
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Markus Eisele
 
Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and MitigationCybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation
VICTOR MAESTRE RAMIREZ
 
UiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer OpportunitiesUiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer Opportunities
DianaGray10
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
Q1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor PresentationQ1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor Presentation
Dropbox
 
AI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of DocumentsAI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of Documents
UiPathCommunity
 
Webinar - Top 5 Backup Mistakes MSPs and Businesses Make .pptx
Webinar - Top 5 Backup Mistakes MSPs and Businesses Make   .pptxWebinar - Top 5 Backup Mistakes MSPs and Businesses Make   .pptx
Webinar - Top 5 Backup Mistakes MSPs and Businesses Make .pptx
MSP360
 
The Future of Cisco Cloud Security: Innovations and AI Integration
The Future of Cisco Cloud Security: Innovations and AI IntegrationThe Future of Cisco Cloud Security: Innovations and AI Integration
The Future of Cisco Cloud Security: Innovations and AI Integration
Re-solution Data Ltd
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
AI You Can Trust: The Critical Role of Governance and Quality.pdf
AI You Can Trust: The Critical Role of Governance and Quality.pdfAI You Can Trust: The Critical Role of Governance and Quality.pdf
AI You Can Trust: The Critical Role of Governance and Quality.pdf
Precisely
 
Financial Services Technology Summit 2025
Financial Services Technology Summit 2025Financial Services Technology Summit 2025
Financial Services Technology Summit 2025
Ray Bugg
 
Does Pornify Allow NSFW? Everything You Should Know
Does Pornify Allow NSFW? Everything You Should KnowDoes Pornify Allow NSFW? Everything You Should Know
Does Pornify Allow NSFW? Everything You Should Know
Pornify CC
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
AsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API DesignAsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API Design
leonid54
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptxReimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
John Moore
 
UiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer OpportunitiesUiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer Opportunities
DianaGray10
 
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptxSmart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Seasia Infotech
 
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Markus Eisele
 
Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and MitigationCybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation
VICTOR MAESTRE RAMIREZ
 
UiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer OpportunitiesUiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer Opportunities
DianaGray10
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 

Intrusion detection system ppt

  • 2. Intrusion and IntrusionIntrusion and Intrusion DetectionDetection  Intrusion : Attempting to break into orIntrusion : Attempting to break into or misuse your system.misuse your system.  Intruders may be from outside theIntruders may be from outside the network or legitimate users of thenetwork or legitimate users of the network.network.  Intrusion can be a physical, system orIntrusion can be a physical, system or remote intrusion.remote intrusion.
  • 3. Different ways to intrudeDifferent ways to intrude  Buffer overflowsBuffer overflows  Unexpected combinationsUnexpected combinations  Unhandled inputUnhandled input  Race conditionsRace conditions
  • 4. Intrusion Detection SystemIntrusion Detection System Knowledge Base Response Model Alert Data- base Event Provider Analysis Engine Other machines
  • 5. Intrusion DetectionIntrusion Detection Systems (IDS)Systems (IDS)  Different ways of classifying an IDSDifferent ways of classifying an IDS IDS based onIDS based on – anomaly detectionanomaly detection – signature based misusesignature based misuse – host basedhost based – network basednetwork based – Stack basedStack based
  • 6. Intrusion DetectionIntrusion Detection Systems (IDS)Systems (IDS) Intrusion Detection Systems look forIntrusion Detection Systems look for attack signatures, which are specificattack signatures, which are specific patterns that usually indicate maliciouspatterns that usually indicate malicious or suspicious intent.or suspicious intent.
  • 7. Anomaly based IDSAnomaly based IDS  This IDS models the normal usage ofThis IDS models the normal usage of the network as a noisethe network as a noise characterization.characterization.  Anything distinct from the noise isAnything distinct from the noise is assumed to be an intrusion activity.assumed to be an intrusion activity. – E.g flooding a host with lots of packet.E.g flooding a host with lots of packet.  The primary strength is its ability toThe primary strength is its ability to recognize novel attacks.recognize novel attacks.
  • 8. Drawbacks of AnomalyDrawbacks of Anomaly detection IDSdetection IDS  Assumes that intrusions will beAssumes that intrusions will be accompanied by manifestations that areaccompanied by manifestations that are sufficiently unusual so as to permitsufficiently unusual so as to permit detection.detection.  These generate many false alarms andThese generate many false alarms and hence compromise the effectiveness of thehence compromise the effectiveness of the IDS.IDS.
  • 9. Signature based IDSSignature based IDS  This IDS possess an attackedThis IDS possess an attacked description that can be matched todescription that can be matched to sensed attack manifestations.sensed attack manifestations.  The question of what information isThe question of what information is relevant to an IDS depends upon whatrelevant to an IDS depends upon what it is trying to detect.it is trying to detect. – E.g DNS, FTP etc.E.g DNS, FTP etc.
  • 10. Signature based IDSSignature based IDS (contd.)(contd.)  ID system is programmed to interpret a certainID system is programmed to interpret a certain series of packets, or a certain piece of dataseries of packets, or a certain piece of data contained in those packets,as an attack. Forcontained in those packets,as an attack. For example, an IDS that watches web servers mightexample, an IDS that watches web servers might be programmed to look for the string “phf” as anbe programmed to look for the string “phf” as an indicator of a CGI program attack.indicator of a CGI program attack.  Most signature analysis systems are based off ofMost signature analysis systems are based off of simple pattern matching algorithms. In most cases,simple pattern matching algorithms. In most cases, the IDS simply looks for a sub string within a streamthe IDS simply looks for a sub string within a stream of data carried by network packets. When it findsof data carried by network packets. When it finds this sub string (for example, the ``phf'' in ``GET /cgi-this sub string (for example, the ``phf'' in ``GET /cgi- bin/phf?''), it identifies those network packets asbin/phf?''), it identifies those network packets as vehicles of an attack.vehicles of an attack.
  • 11. Drawbacks of SignatureDrawbacks of Signature based IDSbased IDS  They are unable to detect novelThey are unable to detect novel attacks.attacks.  Suffer from false alarmsSuffer from false alarms  Have to programmed again for everyHave to programmed again for every new pattern to be detected.new pattern to be detected.
  • 12. Host/Applications basedHost/Applications based IDSIDS  The host operating system or theThe host operating system or the application logs in the auditapplication logs in the audit information.information.  These audit information includesThese audit information includes events like the use of identification andevents like the use of identification and authentication mechanisms (loginsauthentication mechanisms (logins etc.) , file opens and programetc.) , file opens and program executions, admin activities etc.executions, admin activities etc.  This audit is then analyzed to detectThis audit is then analyzed to detect trails of intrusion.trails of intrusion.
  • 13. Drawbacks of the hostDrawbacks of the host based IDSbased IDS  The kind of information needed to beThe kind of information needed to be logged in is a matter of experience.logged in is a matter of experience.  Unselective logging of messages mayUnselective logging of messages may greatly increase the audit and analysisgreatly increase the audit and analysis burdens.burdens.  Selective logging runs the risk thatSelective logging runs the risk that attack manifestations could be missed.attack manifestations could be missed.
  • 14. Strengths of the hostStrengths of the host based IDSbased IDS  Attack verificationAttack verification  System specific activitySystem specific activity  Encrypted and switch environmentsEncrypted and switch environments  Monitoring key componentsMonitoring key components  Near Real-Time detection andNear Real-Time detection and response.response.  No additional hardwareNo additional hardware
  • 15. Stack based IDSStack based IDS  They are integrated closely with theThey are integrated closely with the TCP/IP stack, allowing packets to beTCP/IP stack, allowing packets to be watched as they traverse their way upwatched as they traverse their way up the OSI layers.the OSI layers.  This allows the IDS to pull the packetsThis allows the IDS to pull the packets from the stack before the OS or thefrom the stack before the OS or the application have a chance to processapplication have a chance to process the packets.the packets.
  • 16. Network based IDSNetwork based IDS  This IDS looks for attack signatures inThis IDS looks for attack signatures in network traffic via a promiscuousnetwork traffic via a promiscuous interface.interface.  A filter is usually applied to determineA filter is usually applied to determine which traffic will be discarded orwhich traffic will be discarded or passed on to an attack recognitionpassed on to an attack recognition module. This helps to filter out knownmodule. This helps to filter out known un-malicious traffic.un-malicious traffic.
  • 17. Strengths of NetworkStrengths of Network based IDSbased IDS  Cost of ownership reducedCost of ownership reduced  Packet analysisPacket analysis  Evidence removalEvidence removal  Real time detection and responseReal time detection and response  Malicious intent detectionMalicious intent detection  Complement and verificationComplement and verification  Operating system independenceOperating system independence
  • 18. Future of IDSFuture of IDS  To integrate the network and hostTo integrate the network and host based IDS for better detection.based IDS for better detection.  Developing IDS schemes for detectingDeveloping IDS schemes for detecting novel attacks rather than individualnovel attacks rather than individual instantiations.instantiations.
  翻译: