ch 7 IAS
ch 7 IAS
ch 7 IAS
1
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
These actions seek to limit the loss from an intrusion and return
operations to a normal state as rapidly as possible.
2
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
INTRUSION DETECTION AND PREVENTION SYSTEMS
3
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
INTRUSION DETECTION AND PREVENTION SYSTEMS
This alarm can be audible and/or visual (producing noise and lights,
4
respectively), or it can be silent (an e-mail message or pager alert).
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
INTRUSION DETECTION AND PREVENTION SYSTEMS
5
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
6
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
IDPS TERMINOLOGY
Alert or alarm: An indication that a system has just been attacked or
is under attack.
7
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
I D P S T E R M I N O LO GY
Noise: Alarm events that are accurate and noteworthy but that do not
pose significant threats to information security.
8
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
I D P S T E R M I N O LO GY
TYPES OF IDPS
1. NETWORK-BASED IDPS
A network-based IDPS (NIDPS) resides on a computer or
appliance connected to a segment of an organization’s network
and monitors network traffic on that network segment, looking for
9
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
10
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
11
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
12
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
13
Wireless IDPS capability can be built into a device that provides a
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
14
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
15
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
16
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
17
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
5. An HIDPS can use large amounts of disk space to retain the host OS
audit logs; to function properly, it may be necessary to add disk
capacity to the system.
18
patterns that match known signatures—that is, preconfigured,
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
For example
(1) footprinting and fingerprinting activities use ICMP, DNS querying,
and e-mail routing analysis;
(3) DoS and DDoS attacks, during which the attacker tries to prevent
the normal usage of a system, overload the system with requests so
19
that the system’s ability to process them efficiently is compromised or
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
20
alert to the administrator. .
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
21
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
22
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
23
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
24
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
25
mechanisms, and virus detection and eradication software
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
26
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
HONEYPOTS
A computer set up as a sacrificial lamb on the network in the hope that
attackers will attack this system instead of actual production systems.
The system is not locked down and has open ports and services enabled.
This is to entice a would-be attacker to this computer instead of attacking
authentic production systems on a network.
Honeypots are decoy systems designed to lure potential attackers away from
critical systems.
27
attack, thereby revealing themselves.
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
H O N E Y P O T S , H O N E Y N E T S , A N D PA D D E D C E L L S Y S T E M S
28
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
H O N E Y P O T S , H O N E Y N E T S , A N D PA D D E D C E L L S Y S T E M S
29
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
H O N E Y P O T S , H O N E Y N E T S , A N D PA D D E D C E L L S Y S T E M S
Advantages:
Attackers can be diverted to targets that they cannot damage.
Administrators have time to decide how to respond to an
attacker.
Attackers’ actions can be easily and more extensively
monitored, and the records can be used to refine threat models
and improve system protections.
30
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
H O N E Y P O T S , H O N E Y N E T S , A N D PA D D E D C E L L S Y S T E M S
Disadvantages:
The legal implications of using such devices are not well
understood.
31
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
PORT SCANNERS
port scanners are tools used by both attackers and defenders to identify
(or fingerprint);
the computers that are active on a network, as well as the ports and
services active on those computers,
the functions and roles the machines are fulfilling, and other useful
information.
32
communications system.
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
S C A N N I N G A N D A N A LY S I S T O O L S
33
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
S C A N N I N G A N D A N A LY S I S T O O L S
The Nmap tool mentioned earlier has some advanced options that
are useful for firewall analysis.
34
It supports multiple protocols and has a command-line method of
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
S C A N N I N G A N D A N A LY S I S T O O L S
VULNERABILITY SCANNERS
Active vulnerability scanners scan networks for highly detailed
information.
35
to determine security holes.
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
S C A N N I N G A N D A N A LY S I S T O O L S
36
dozens of other characteristics of the network.
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
37
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
S C A N N I N G A N D A N A LY S I S T O O L S
Three tools that can perform this action are Core Impact,
Immunity’s CANVAS, and the Metasploit Framework.
38
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
S C A N N I N G A N D A N A LY S I S T O O L S
39
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
S C A N N I N G A N D A N A LY S I S T O O L S
40
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
S C A N N I N G A N D A N A LY S I S T O O L S
PACKET SNIFFERS
A packet sniffer (sometimes called a network protocol analyzer) is a
network tool that collects copies of packets from the network and
analyzes them.
It can provide a network administrator with valuable information for
diagnosing and resolving networking issues.
41
Wireshark allows the administrator to examine data from both live
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
S C A N N I N G A N D A N A LY S I S T O O L S
42
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
S C A N N I N G A N D A N A LY S I S T O O L S
43
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
44
security guard compares the supplicant’s face to a photo
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
B I O M E T R I C A C C E SS C O N T R O L S
45
including freckles, pits, striations, vasculature, coronas, and
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
B I O M E T R I C A C C E SS C O N T R O L S
A problem with this method is that some human characteristics can change
over time, due to normal development, injury, or illness, which means that
system designers must create fallback or failsafe authentication
mechanisms.
46
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
B I O M E T R I C A C C E SS C O N T R O L S
second, the false accept rate, which is the percentage of supplicants who
are unauthorized users but are granted access;
third, the crossover error rate, which is the level at which the number of
false rejections equals the false acceptances.
PHYSICAL SECURITY
Physical security encompasses the design, implementation, and
maintenance of countermeasures that protect the physical resources of an
organization, including the people, hardware, and supporting system
elements and resources that control information in all its states
(transmission, storage, and processing).
47
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
48
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
In his book, Fighting Computer Crime, Donn B. Parker lists the following
“Seven Major Sources of Physical Loss”:
49
CH-7
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS, AND OTHER SECURITY
TOOLS
50
Interior walls and doors
51