码迷,mamicode.com
首页 > 其他好文 > 详细

IPS and IDS

时间:2015-08-16 22:49:52      阅读:154      评论:0      收藏:0      [点我收藏+]

标签:

Part 1: Instrusion Detection VS Instrusion Prevention

Instrusion Detection System (IDS) is a security control or countermeasure that has the capability to detect misuse and abuse of, and unauthorized access to, network resources.

Instrusion Prevention System (IPS) is a security control or countermeasure that has the capaility to detect and prevent misuse and abuse of, and unauthorized access to, netwrok resources.

技术分享

 

 

技术分享

 

 

Some of the most commonly detected attacks by networks IDS are as follows:

  • Application Layer attacks; (directory traversal attacks, buffer overflows, various form of command injection)
  • Network sweeps and scans
  • DoS attacks( TCP SYN, ICMP)
  • Common network anomalies on most OSI Layers (Invalid IP datagrams, Invalid TCP packets, Malformed application Layer protocol units, Malformed ARP request or replies) 

 

After an IDS detects an anomaly or offending traffic, it generaes alerts. An IDS cannot stop an attack or malicious traffic along.

 

Part 2: IPS

Security controls are classified in one of the following terms:

True positive: A situation in which a signature fires correctly when intrusive traffic for that signature is detected on the network. The signature correctly identifies an attack against the netwrok. This represents normal and optimal operation. 

False positiveA situation in which normal user activity triggers an alarm or response. This is a consequence of nonmailcious activity. This represents an error and generally is caused by excessively tight proactive controls or excessively relaxed reactives controls.

Ture negative: A situation in which a signature does not fire during normal user traffic on the network. The securirty control has not acted and there was no malicious activity. This represents normal and optimal operation.

False negativeA situatoin in which a detection system fails to detect instrusive traffic although there is a signature designed to catch the activity. In this situation, there was malicious activity, but the security control did not act. This represents an error and generally is caused by excessively relaxed proactive controls or excessively tight reactive controls.

 

 

A vulnerability is a weakness that compromises either the security or the functionality of a system. You‘ll often hear the following examples listed as vulnerabilitys:

  • Insecure communications
  • Poor passwords
  • improper input handling

 

An exploit is the mchanism used to leverge a vulnerability to compromise the security functionality of a system.

  • Executable code
  • password-guessing tools
  • shell or batch scripts

 

A threat is defined as any circumstance or event with the expressed potential for the occurrence of a harmful event to an information system in the form of destruction, disclosure, adverse modification of data, or DoS.

 

A risk is the likelihood that a particular threat using a specific attack will exploit a particular vulnerability of an asset or system that results in an undesirable consequence.

 

There are different aspects in which a network IPS analyzes traffic, such as following:

  • Reassembles Layer 4 sessions and analyzes their contents
  • Monitors packet and session rates to detect and/or prevent deviation from the baseline (or normal) netwrok profiles
  • analyzes groups of packets to determine whether they represent reconnaissance attempts
  • Decodes applicatoin layer protocols and analyzes their contents
  • analyzes packets to address malicious activity contained in a single packet

 

There are three commonly used approaches to network instrusion prevention by security manages today:

  • Signature-based:
  • Anomaly-based:
  • Policy-based:

 

Endpoint Security Controls

Host IPS(HIPS) is another form of instrusion prevention. consists of operating system security controls or security agent software installed on hosts that can include desktops PCs, laptops, or servers.

 

IPS and IDS

标签:

原文地址:http://www.cnblogs.com/elewei/p/4735088.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!