intrusion detection methods

7
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking resources.”

Upload: bonita

Post on 06-Jan-2016

20 views

Category:

Documents


0 download

DESCRIPTION

Intrusion Detection Methods. “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking resources.”. The Seven Fundamentals. What are the methods used How are IDS Organized What is an intrusion - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Intrusion Detection  Methods

1

Intrusion Detection Methods

“Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking resources.”

Page 2: Intrusion Detection  Methods

2

The Seven Fundamentals

1. What are the methods used2. How are IDS Organized3. What is an intrusion4. How do we trace and how do they hide5. How do we correlate information

6. How can we trap intruders7. Incident response

Page 3: Intrusion Detection  Methods

3

Internet Trap

• A set of functional and procedural components that use legal and authorized deception to divert the activity of potential intruder from real valued asset to bogus assets (and vice versa) for the purpose of gathering intrusion related information and initiating response.

Page 4: Intrusion Detection  Methods

4

Technical considerations

• Detecting the intruder

• Detecting the trigger

• Reversing decision about activity

• Remain Stealth

Real system

Trap

Real system

Page 5: Intrusion Detection  Methods

5

Types of Internet Traps

• Real environment with trap elements– Unix system with fake password file– Win2K with phony open shares– Web servers with phony vulnerable CGIs

• Small environment to large trap• Large environment to small trap• Mirrored environment and trap

– Trap serves as hot stand by system

Page 6: Intrusion Detection  Methods

6

Design considerations

• Proper design– Advisory notice– Keep the intruder in mind (what would cs485

students like to break into?)– Don’t be too obvious– Software tools as gifts

Page 7: Intrusion Detection  Methods

7

Design considerations (cont.)

• Bait– Administrator correspondence– Rigged email– Rigged scan points– System messages

• OOB Traps

• Legal considerations