Unit IV
Unit IV
Unit IV
What is Intrusion?
A network intrusion is any unauthorized activity on a
computer network. Detecting an intrusion depends on the
defenders having a clear understanding of how attacks
work.
In most cases, such unwanted activity absorbs
network resources intended for other uses, and nearly
always threatens the security of the network and/or its
data. Properly designing and deploying a network
intrusion detection system will help block the
intruders.
Some popular attack vectors-
• Asymmetric Routing
In this method, the attacker attempts to utilize more
than one route to the targeted network device. The
idea is to have the overall attack evade detection by
having a significant portion of the offending packets
bypass certain network segments and their network
intrusion sensors.
The data source: Flow data and packet data come from
different sources, and not all NTA tools collect both. Be
sure to look through your network traffic and decide which
pieces are critical, and then compare capabilities against
the tools to ensure everything you need is covered.
Real-time data vs. historical data: Historical data is
critical to analyzing past events, but some tools for
monitoring network traffic don’t retain that data as time
goes on. Also check whether the tool is priced based on the
amount of data you want to store. Have a clear
understanding of which data you care about most to find
the option best suited to your needs and budget.