ppt.1

14
INSTRUSION DETECTION SYSTEM ( I D S )

Upload: veeresh35

Post on 24-Dec-2014

743 views

Category:

Documents


4 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Ppt.1

INSTRUSION DETECTION

SYSTEM ( I D S )

Page 2: Ppt.1

The OSI Security architecture• Security attacks• Security services• Security mechanism

A model for network security

Introduction

Page 3: Ppt.1

The OSI security architecture focuses on security attacks, mechanisms, and services.

Security attack:Any action that compromises the

security of information owned by an organization. Two types of security attacks a) Passive attack b) active attack

The OSI security architecture

Page 4: Ppt.1

Passive attack attempts to learn or make use of information from the system but does not affect system resources.

Two types of passive attacks are release of message contents and traffic analysis.

Passive attack

Page 5: Ppt.1

Passive attack

Page 6: Ppt.1

Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories : masquerade , replay, modification of messages, and denial of service.

Active attack

Page 7: Ppt.1

Active attack

Page 8: Ppt.1

Active attack

Page 9: Ppt.1

X.800 defines it is the service provided by protocol layer of communicating open system which ensures adequate security of the systems or of data transfers.

RFC 2828 defines as a communication service that is provided by a system to give a specific kind of protection to system resources;

Security service

Page 10: Ppt.1

Authentication Access control Data confidentiality Data integrity Nonrepudiation

Security services are divided into

five categories

Page 11: Ppt.1

Is a process that is designed to detect, prevent or recover from a security attack.

Encipherment : It uses a mathematical algorithm to transfer the data into a form that can not be read by unauthorized user.

Two types: Reversible encipherment Irreversible encipherment

Security mechanism

Page 12: Ppt.1

Model for Network Security

Page 13: Ppt.1

A security-related transformation on the information to be sent.

Some secret information shared by the two principals and, it is hoped, unknown to the opponent.

Techniques for providing security

Page 14: Ppt.1

Thank You