Intrusion
Intrusion
Intrusion
c
c
¯
Ã
c
î c
à x xxx x
c
Ã
c
c
c
c
c
In layman¶sview intrusion is an act of thrusting in or enteringinto a
place withoutinvitation,welcome or right.
In technologicalview:
An intrusion is a deliberate, unauthorizedattempt to access
or manipulate information or system and to
renderthemunreliable or unusable.
Whensuspiciousactivityisfromyourinternal network
itcanalsobeclassified as misuseèc
c
c
0rocess of monitoring the events or a set of events occurring in a
system or a computer network for the signs of intrusive activity
manually or via software expert system is called Intrusion
Detection.
c
IDSs generally can be broken into two components: the sensor
and the console. The sensor sits upon the network and acts as a
sniffer, listening to network traffic in promiscuous mode. The
console is the point of central management for an IDS system. By
using the console, an administrator may take notice of any current
attack alerts. In many cases, the console may be used to
customize certain preferences for the IDS.
c
The IDS CAN provide the following: c
· CAN add a greater degree of integrity to the rest of You
infrastructure
· CAN trace user activity from point of entry to point of impact
· CAN recognize and report alterations to data
· CAN automate a task of monitoring the Internet searching for
the latest attacks
· CAN detect when your system is under attack
· CAN detect errors in your system configuration
· CAN guide system administrator in the vital step of establishing
a policy for your computing assets
· CAN make the security management of your system possible by
non-expert staff
0
IDS can be set up either inside or outside of a firewall, depending
on the needs of an organization. An external IDS monitors attacks
that occur on a firewall that are not allowed into a network;
therefore potential attacks are discovered, but internal threats go
undetected. Internal IDS configurations do not see attacks that
are repelled by the firewall, but monitor attacks that penetrate the
firewall as well as internal attacks.
"
To protect your network, your IDS must generate alarms when it
detects intrusive activity on your network. Different IDSs trigger
ô Anomaly detection
ô Misuse detection
$
To examine network traffic and trigger alarms when your network
is under attack, your IDS must somehow monitor your network at
specific points. The two common monitoring locations are as
follows:
ô Host-based
ô Network-based
Ã
à Ã
sing OS auditing mechanisms: e.g. BSM in Solaris logs all
direct and indirect events generated by a user; strace monitors
system calls made by a program.
Monitoring user activities: analyzing shell commands.
Monitoring executions of system programs, e.g. sendmail's
system calls.
Advantages:
Can detect attacks that cannot be seen by NIDS.
Can operate in an environment in which network traffic is
encrypted.
naffected by switched networks .
Can help detect Trojan horse or other attacks that involve
software integrity breaches.
Disadvantages :
Since at least the information sources reside on the host
targeted by attacks, the IDS may be attacked and disabled as port
of the attack .
Are not well suited by detecting network scans or other such
surveillance that targets an entire network.
Since they use the computing resources of the hosts they are
monitoring, therefore
inflicting a performance cost on the monitored systems.
#'
We have examined the different mechanisms that different IDSs
use to signal or trigger alarms on your network. We have also
examined two locations that IDSs use to search for intrusive
activity. Each of these approaches has benefits and drawbacks.
By combining multiple techniques into a single hybrid system,
however, it is possible to create an IDS that possesses the
benefits of multiple approaches, while overcoming many of the
drawbacks.
You use an IDS to monitor your network for signs of intrusive
activity. An IDS triggers alarms when it detects intrusive activity.
The triggering mechanism is probably based on one of the
following two techniques:
ô Anomaly detection
ô Misuse detection
ô Host-based
ô Network-based