IPS and IDS
IPS and IDS
IPS and IDS
IDS:*** An IDS-enabled device copies the traffic stream, and analyzes the
monitored traffic rather than the actual forwarded packets. It compares the
captured traffic stream with known malicious signatures in an offline
manner similar to software that checks for viruses. This offline IDS
implementation is referred to as promiscuous mode.
Disadvantages:-
Response action cannot stop trigger packets
Correct tuning required for response actions
Must have a well thought-out security policy
More vulnerable to network evasion techniques
Disadvantages:-
Host-Based Implementation:-
• HIPS audits host log files, host file systems, and resources.
CSA provides host security to enterprises by deploying agents that defend against the
proliferation of attacks across networks. These agents operate using a set of policies that
are selectively assigned to each system node on the network by the network
administrator.
CSA contains two components:
Management Center - Installed on a central server and is managed by a network
administrator.
Security Agent - Installed and runs on a host system. It displays the agent flag icon (small
red flag) in the system tray.
*A warning message appears when CSA detects a Problem.
CSA maintains a log file allowing the user to verify problems and learn more
information.
Host-Based Solutions:-
Advantages:-
Disadvantages:-
**IPS Sensors:-
• Factors that impact IPS sensor selection and deployment:
– Amount of network traffic
– Network topology
– Security budget
– Available security staff
HIPS
Advantages:-
Is host-specific
Protects host after decryption
Provides application-level encryption protection
Disadvantages:-
Operating system dependent
Lower level network events not seen
Host is visible to attackers
Network IPS
Advantages:-
Is cost-effective
Not visible on the network
Operating system independent
Lower level network events seen
Disadvantages:-
Cannot examine encrypted traffic
Does not know whether an attack was successful
Signature Characteristics:-