tailieunhanh - Chapter 11 – Intrusion Detection Systems

IDS are a tool in a layered security model. The purpose of an IDS is to identify suspicious activity log activity Respond (alert people) | Security+ All-In-One Edition Chapter 11 – Intrusion Detection Systems Brian E. Brzezicki Intrusion Detection Systems No the other kind IDS IDS are a tool in a layered security model. The purpose of an IDS is to identify suspicious activity log activity Respond (alert people) IDS history (298) First few products where Stalker – Haystack Labs 1989 NetRanger – WheelGroup 1995 RealSecure – ISS 1996 Snort (open source) – Martin Roesch / SourceFire 1998 IDS categories (299) HIDS – Host Based Intrusion Detection System NIDS – Network Intrusion Detection System We will talk about each type in depth later IDS Components (299) Both type of IDS have several components that make up the product Sensor – Data Collector On network segments (NIDS) Or on Hosts (HIDS) Analysis Engine – Analyzes data collected by the sensor, determines if there is suspicious activity Signature Database – Used by the AE, defines signatures of previously known attacks User Interface and Reporting – the way the system . | Security+ All-In-One Edition Chapter 11 – Intrusion Detection Systems Brian E. Brzezicki Intrusion Detection Systems No the other kind IDS IDS are a tool in a layered security model. The purpose of an IDS is to identify suspicious activity log activity Respond (alert people) IDS history (298) First few products where Stalker – Haystack Labs 1989 NetRanger – WheelGroup 1995 RealSecure – ISS 1996 Snort (open source) – Martin Roesch / SourceFire 1998 IDS categories (299) HIDS – Host Based Intrusion Detection System NIDS – Network Intrusion Detection System We will talk about each type in depth later IDS Components (299) Both type of IDS have several components that make up the product Sensor – Data Collector On network segments (NIDS) Or on Hosts (HIDS) Analysis Engine – Analyzes data collected by the sensor, determines if there is suspicious activity Signature Database – Used by the AE, defines signatures of previously known attacks User Interface and Reporting – the way the system interacts with users (visualization next) IDS Components HIDS (300) Hosts Based Intrusion Detection Systems – Examine the operation of a SINGLE system independently to determine of anything “of note” is going on. Some things a HIDS will looks at Logins System Log files / audit files Application Log Files / audit files File Activity / Changes to software Configuration Files changes Processes being launched or stopped Use of certain programs CPU usage Network Traffic to/from Computer Advantages of HIDS (304) Can be operating system and application specific – might understand the latest attack against a certain service on a host (example, web server) They can look at data after it’s been decrypted (network traffic is often encrypted) Disadvantages of HIDS (305) Only protect one machine (or must be loaded on every machine you want to protect) Use local system resources (CPU/memory) They don’t see what’s going on, on other machines. Scalability The HIDS could be disabled if machine is hacked .

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.