Network Sales and Services Handbook (Cisco Press Networking Technology)

Intrusion detection is the detection of inappropriate, incorrect, or anomalous activity. An intrusion can include a network attack from the outside (intruder) or from an internal network user (misuse). IDSs monitor network systems detecting these types of attacks. IDSs collect information from several points within networks and analyze this information for signs of intrusion and misuse.

Intruders are unauthorized users, and they are classified as follows:

IDSs must protect network and system integrity from several different types of attacks and users. All users are considered possible threats, regardless of origin or how the users were authenticated.

IDSs use various techniques to trace unauthorized use of network and system resources. These techniques include the analysis of audit trail data and network traffic, either real-time or off-line (after-the-fact). The goal of intrusion detection is catching the intruder in the act. Real-time testing and monitoring of audit data is the most prevalent technique used to catch intruders.

Intrusion Detection System Methodologies

IDSs use two methodologies to detect unauthorized use of a network or system:

IDS Implementation

IDSs are implemented in one of two ways: host-based or network-based.

Host-Based Intrusion Detection

Detection software is loaded on the host the IDS will be monitoring, and data is audited from this single host. Each network host will need the intrusion detection software running in order to be effective in identifying attacks. Host-based IDSs monitor system, event, and security logs on Windows NT and syslog in UNIX environments. If any changes in these files are detected by the IDS, the IDS compares the new log entry with attack signatures to see whether a match exists. If a match is found, the system alerts the administrator.

There are two classes of host-based intrusion detection software:

Network Intrusion Detection Systems (NIDS)

Packets on the network and audit data from several hosts are monitored on the particular segment the NIDS is covering. As the packets pass the sensor, they are examined for their similarities to a signature. NIDs are primarily concerned with remote intrusion from an external source outside of the network. If an attack is detected, the NIDS will notify the administrator, terminate the connection, and/or record the session for forensic analysis and evidence collection.

NOTE

More information regarding Cisco Systems IDS (formerly NetRanger) platform can be found at http://www.cisco.com/warp/public/cc/pd/sqsw/sqidsz/index.shtml.

Signatures

Signatures represent an activity pattern required to gain access to a computer network or system. Signatures enable the IDS to verify whether the monitored sequence of events is a threat to the integrity of the network or system.

The following is a list of signatures monitored by IDSs:

As you can see, the list of signatures for which IDSs watch is quite extensive. Network attackers change and/or update their attack methods on a continuing basis, in turn requiring IDS vendors to update their signature databases to watch for these attacks.

Категории