SlideShare a Scribd company logo
1 of 27
BY
M.SUDHEER REDDY
AGENDA
 INTRODUCTION

 TYPES OF IDS

 NETWORK INTRUSION DETECTION SYSTEM

 HOW DOES IT PROTECT THE SENSITIVE SYSTEM

 WORKING OF NIDS

 DIFFERENCES BETWEEN NIDS AND FIREWALL
MISUSE DETECTION SYSTEMS

NEW ARCHITECTURE

IMPLEMENTED APPROACHES

 ADVANTAGES AND DISADVANTAGES

 CONCLUSION
INTRODUCTION
 An intrusion is somebody attempting to break into or
 misuse your system.

 An intrusion detection system (IDS) is a device (or
 application) that monitors network and/or system
 activities for malicious activities or policy violations.
TYPES OF INTRUSION DETECTION
SYSTEM
  Intrusion Detection Systems are categorized into two
  types
          a) Network intrusion detection system(NIDS)
           b) Host based intrusion detection system(HIDS)
NETWORK INTRUSION
DETECTION SYSTEM (NIDS)
   A network-based IDS or NIDS resides on a computer or
   appliance connected to a segment of an organization's
   network and monitors network traffic on that network.
   In a network-based intrusion-detection system
   (NIDS), the sensors are located at choke points in
   network to be monitored, often in the dematerialized
   zone (DMZ) or at network borders.
HOW DOES NIDS PROTECT
 SENSITIVE MATERIALS
 A Network Intrusion Detection System (NIDS)
 performs the same function as a sophisticated alarm
 system.
 NIDS observes and alerts. It will not affect network
 performance. NIDS maintains a database – updated
 daily – that contains a history, nearly a decade’s worth
 of documented attack attempts, detecting similarities.
WORKING OF NIDS
 HUBS:
 The NIDS device connects to a network hub or a switch that
  connects to the network router or Firewall. All traffic
  passing to or from the customer is inspected by the NIDS
  device.
TAP:
 The network tap is another approach to
allowing the NIDS to see all the traffic on a
switched network.
 A tap is similar in function to a phone tap.
The tap will typically look like 3-port switch.
Port 1 will attach to Switch 1 Port 2 will attach to
Switch 2 and Port 3 will attach to the NIDS.
SPAN PORT:
 Another popular option for adding a sniffer of
any type to a network is the use of a span port
on the switch being monitored
  A span port is a port that is configured to have
a copy of all packets sent to it
  The major disadvantage of spanning ports is
that they can have a detrimental effect on other
traffic traversing the switch.
An inline NIDS looks essentially like a bridge.
   The NIDS will be configured without an IP so
that it will not respond to any trafficThe final
option is an inline NIDS.
   The IPS will simply accept traffic on one NIC
and pass it back out unchanged on a second NIC
like a bridge.
TYPES OF DETECTION METHODS:
  Two types of detection methods are:
       a) Anomaly Detection model
       b) Signature detection model
 ANOMALY DETECTION MODEL:
  IDS methodology is an approach called anomaly
  detection or behavior-based detection.
  This model works by establishing accepted baselines
  or rules and noting exceptional differences
 If an ids looks only at network packet headers for
  differences it is called as protocol anomaly detection.
 This model triggers off when the following events occur
         a) Unusual user account activity
         b) Excessive file and object accesses
         c) High cpu utilization
         d) Inappropriate protocol use
         e) Unusual login frequency
         f) High number of sessions
         g) Unusual content
Anomaly Detection :
Advantages:
 Analyzes ongoing traffic, activity, transactions,
and behavior for anomalies.
 Potential to detect previously unknown types of
attacks.
 Catalogs the differences between baseline
behavior and ongoing activity.
Disadvantages:
 Prone to false positives.
 Heavy processing overhead.
 Vulnerable to attack while creating time
consuming, statistically significant baselines.
Signature detection model:
     The defined patterns of code are called as signatures
  and often treated as a rule when included in ids.
     Signature-based IDS use a database of traffic and
  activity patterns related to known attacks. The patterns
  are called attack signatures.
     These signatures and rules can be collected together
  into larger sets called signature databases or rule sets.
 Advantages:
    Examines ongoing activity and matches against patterns
  of previously observed attacks.
   Works extremely well against previously observed
  attacks.
 Disadvantages:
    Signature databases must be constantly updated.
    Must compare and match activities against large
  collections of attack signatures.
    Specific signature definitions may miss variations on
  known attacks.
    May impose noticeable performance drags on systems.
Misuse Detection:

                Expert Systems

                Keystroke monitoring

                 Model Based Intrusion Detection
NEW ARCHITECTURE
   Mobile IDS Agents
       The Local Audit Trial
       The Local Intrusion Database ( LID )
       The Secure Communication Module
       The Anomaly Detection Modules ( ADM s
       The Misuse Detection Modules ( MDM) s

     Stationary Secure Database
IMPLEMENTED APPROACHES
       IEEE 802.11
          a) Open System Authentication.
          b) Shared Key Authentication.
       Secure key generation and distribution
       Mitigating Routing Misbehavior:( Sergio
       Marti et al. [19])
ADVANTAGES:
 Monitors an entire network with only a few well-placed
  nodes
 Mostly passive devices
 Low Overhead and limited number of resources are used
  even in the large network.
 Easy to secure against attack
 Mostly undetectable to attackers or intruders because
  they are completely hidden in the network.
 Easy to install
 NIDS can be used in the present networks without
  interrupting conventional network operations.
DISADVANTAGES:
 May not be able to monitor and analyze all traffic on
  large, busy networks
 Vulnerable to attacks launched during peak traffic periods
  on large busy networks
 Not able to monitor switch-based (high-speed) networks
  effectively
 Typically unable to analyze encrypted data or not suitable
  for encrypted traffic.
 Does not always report success or failure of attempted
  attacks
 Require active manual involvement by network
  administrators or security administrators.
CONCLUSION:
 As NIDS technologies continue to evolve, they will more
 closely resemble their real-world counterparts. In the
 future, NIDS, firewalls, VPNs, and related security
 technologies will all come to interoperate to a much higher
 degree. The current generation of IDS (HIDS and NIDS) is
 quite effective already; as they continue to improve they will
 become the backbone of the more flexible security systems
 we expect to see in the not-too-distant future.
QUERIES…????
Intrusion detection system

More Related Content

What's hot

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAAKASH S
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAparna Bhadran
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)shraddha_b
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project ReportRaghav Bisht
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortDisha Bedi
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)LJ PROJECTS
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)david rom
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemMohit Belwal
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsPaul Green
 
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemDeep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemAvinash Kumar
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection PresentationMustafash79
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 

What's hot (20)

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Ids(final)
Ids(final)Ids(final)
Ids(final)
 
Snort
SnortSnort
Snort
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
 
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemDeep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection system
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 

Viewers also liked

Cyb 5675 class project final
Cyb 5675   class project finalCyb 5675   class project final
Cyb 5675 class project finalCraig Cannon
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]SISA Information Security Pvt.Ltd
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Securityprimeteacher32
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortDisha Bedi
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distributionRiya Choudhary
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypotmmubashirkhan
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemDevil's Cafe
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection SolutionGreg Stone
 

Viewers also liked (19)

Cyb 5675 class project final
Cyb 5675   class project finalCyb 5675   class project final
Cyb 5675 class project final
 
Push N Pull
Push N PullPush N Pull
Push N Pull
 
Push & Pull
Push & PullPush & Pull
Push & Pull
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
 
Key management
Key managementKey management
Key management
 
Snort
SnortSnort
Snort
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
 
Hcl
HclHcl
Hcl
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Snort ppt
Snort pptSnort ppt
Snort ppt
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypot
 
Snort IDS/IPS Basics
Snort IDS/IPS BasicsSnort IDS/IPS Basics
Snort IDS/IPS Basics
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection Solution
 
Wireshark
WiresharkWireshark
Wireshark
 

Similar to Intrusion detection system

Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detectioneditor1knowledgecuddle
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
 
A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...vishnuRajan20
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemEswar Publications
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...IJERA Editor
 
Database security project-presentation-2-v1
Database security project-presentation-2-v1Database security project-presentation-2-v1
Database security project-presentation-2-v1galibhussain
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithmijtsrd
 
Intrusion Detection in WLANs
Intrusion Detection in WLANsIntrusion Detection in WLANs
Intrusion Detection in WLANsronrulzzz
 
Intrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIntrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIJERA Editor
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionProgrammer
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...IJNSA Journal
 
Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systemsvamsi_xmen
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYJournal For Research
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIRJET Journal
 
Information Security.pptx
Information Security.pptxInformation Security.pptx
Information Security.pptxDrRajapraveen
 

Similar to Intrusion detection system (20)

Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detection
 
IS-Types of IDPSs.pptx
IS-Types of IDPSs.pptxIS-Types of IDPSs.pptx
IS-Types of IDPSs.pptx
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
 
idps
idpsidps
idps
 
Database security project-presentation-2-v1
Database security project-presentation-2-v1Database security project-presentation-2-v1
Database security project-presentation-2-v1
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
Intrusion Detection in WLANs
Intrusion Detection in WLANsIntrusion Detection in WLANs
Intrusion Detection in WLANs
 
Intrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIntrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring System
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
N44096972
N44096972N44096972
N44096972
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
 
Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
 
Ijnsa050208
Ijnsa050208Ijnsa050208
Ijnsa050208
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
 
Day4
Day4Day4
Day4
 
Information Security.pptx
Information Security.pptxInformation Security.pptx
Information Security.pptx
 

More from Akhil Kumar

Edp section of solids
Edp  section of solidsEdp  section of solids
Edp section of solidsAkhil Kumar
 
Edp projection of solids
Edp  projection of solidsEdp  projection of solids
Edp projection of solidsAkhil Kumar
 
Edp projection of planes
Edp  projection of planesEdp  projection of planes
Edp projection of planesAkhil Kumar
 
Edp projection of lines
Edp  projection of linesEdp  projection of lines
Edp projection of linesAkhil Kumar
 
Edp ortographic projection
Edp  ortographic projectionEdp  ortographic projection
Edp ortographic projectionAkhil Kumar
 
Edp intersection
Edp  intersectionEdp  intersection
Edp intersectionAkhil Kumar
 
Edp ellipse by gen method
Edp  ellipse by gen methodEdp  ellipse by gen method
Edp ellipse by gen methodAkhil Kumar
 
Edp development of surfaces of solids
Edp  development of surfaces of solidsEdp  development of surfaces of solids
Edp development of surfaces of solidsAkhil Kumar
 
Edp typical problem
Edp  typical problemEdp  typical problem
Edp typical problemAkhil Kumar
 
Edp st line(new)
Edp  st line(new)Edp  st line(new)
Edp st line(new)Akhil Kumar
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 

More from Akhil Kumar (20)

Edp section of solids
Edp  section of solidsEdp  section of solids
Edp section of solids
 
Edp scales
Edp  scalesEdp  scales
Edp scales
 
Edp projection of solids
Edp  projection of solidsEdp  projection of solids
Edp projection of solids
 
Edp projection of planes
Edp  projection of planesEdp  projection of planes
Edp projection of planes
 
Edp projection of lines
Edp  projection of linesEdp  projection of lines
Edp projection of lines
 
Edp ortographic projection
Edp  ortographic projectionEdp  ortographic projection
Edp ortographic projection
 
Edp isometric
Edp  isometricEdp  isometric
Edp isometric
 
Edp intersection
Edp  intersectionEdp  intersection
Edp intersection
 
Edp excerciseeg
Edp  excerciseegEdp  excerciseeg
Edp excerciseeg
 
Edp ellipse by gen method
Edp  ellipse by gen methodEdp  ellipse by gen method
Edp ellipse by gen method
 
Edp development of surfaces of solids
Edp  development of surfaces of solidsEdp  development of surfaces of solids
Edp development of surfaces of solids
 
Edp curves2
Edp  curves2Edp  curves2
Edp curves2
 
Edp curve1
Edp  curve1Edp  curve1
Edp curve1
 
Edp typical problem
Edp  typical problemEdp  typical problem
Edp typical problem
 
Edp st line(new)
Edp  st line(new)Edp  st line(new)
Edp st line(new)
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
yii framework
yii frameworkyii framework
yii framework
 
cloud computing
cloud computingcloud computing
cloud computing
 
WORDPRESS
WORDPRESSWORDPRESS
WORDPRESS
 
AJAX
AJAXAJAX
AJAX
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Intrusion detection system

  • 2.
  • 3. AGENDA INTRODUCTION TYPES OF IDS NETWORK INTRUSION DETECTION SYSTEM HOW DOES IT PROTECT THE SENSITIVE SYSTEM WORKING OF NIDS DIFFERENCES BETWEEN NIDS AND FIREWALL
  • 4. MISUSE DETECTION SYSTEMS NEW ARCHITECTURE IMPLEMENTED APPROACHES ADVANTAGES AND DISADVANTAGES CONCLUSION
  • 5. INTRODUCTION  An intrusion is somebody attempting to break into or misuse your system.  An intrusion detection system (IDS) is a device (or application) that monitors network and/or system activities for malicious activities or policy violations.
  • 6. TYPES OF INTRUSION DETECTION SYSTEM  Intrusion Detection Systems are categorized into two types a) Network intrusion detection system(NIDS) b) Host based intrusion detection system(HIDS)
  • 7. NETWORK INTRUSION DETECTION SYSTEM (NIDS)  A network-based IDS or NIDS resides on a computer or appliance connected to a segment of an organization's network and monitors network traffic on that network.  In a network-based intrusion-detection system (NIDS), the sensors are located at choke points in network to be monitored, often in the dematerialized zone (DMZ) or at network borders.
  • 8. HOW DOES NIDS PROTECT SENSITIVE MATERIALS  A Network Intrusion Detection System (NIDS) performs the same function as a sophisticated alarm system.  NIDS observes and alerts. It will not affect network performance. NIDS maintains a database – updated daily – that contains a history, nearly a decade’s worth of documented attack attempts, detecting similarities.
  • 9. WORKING OF NIDS HUBS:  The NIDS device connects to a network hub or a switch that connects to the network router or Firewall. All traffic passing to or from the customer is inspected by the NIDS device.
  • 10. TAP:  The network tap is another approach to allowing the NIDS to see all the traffic on a switched network.  A tap is similar in function to a phone tap. The tap will typically look like 3-port switch. Port 1 will attach to Switch 1 Port 2 will attach to Switch 2 and Port 3 will attach to the NIDS.
  • 11. SPAN PORT: Another popular option for adding a sniffer of any type to a network is the use of a span port on the switch being monitored A span port is a port that is configured to have a copy of all packets sent to it The major disadvantage of spanning ports is that they can have a detrimental effect on other traffic traversing the switch.
  • 12. An inline NIDS looks essentially like a bridge. The NIDS will be configured without an IP so that it will not respond to any trafficThe final option is an inline NIDS. The IPS will simply accept traffic on one NIC and pass it back out unchanged on a second NIC like a bridge.
  • 13. TYPES OF DETECTION METHODS:  Two types of detection methods are: a) Anomaly Detection model b) Signature detection model ANOMALY DETECTION MODEL:  IDS methodology is an approach called anomaly detection or behavior-based detection.  This model works by establishing accepted baselines or rules and noting exceptional differences
  • 14.  If an ids looks only at network packet headers for differences it is called as protocol anomaly detection. This model triggers off when the following events occur a) Unusual user account activity b) Excessive file and object accesses c) High cpu utilization d) Inappropriate protocol use e) Unusual login frequency f) High number of sessions g) Unusual content
  • 16. Advantages:  Analyzes ongoing traffic, activity, transactions, and behavior for anomalies.  Potential to detect previously unknown types of attacks.  Catalogs the differences between baseline behavior and ongoing activity. Disadvantages:  Prone to false positives.  Heavy processing overhead.  Vulnerable to attack while creating time consuming, statistically significant baselines.
  • 17. Signature detection model:  The defined patterns of code are called as signatures and often treated as a rule when included in ids.  Signature-based IDS use a database of traffic and activity patterns related to known attacks. The patterns are called attack signatures.  These signatures and rules can be collected together into larger sets called signature databases or rule sets.
  • 18.  Advantages: Examines ongoing activity and matches against patterns of previously observed attacks. Works extremely well against previously observed attacks.  Disadvantages: Signature databases must be constantly updated. Must compare and match activities against large collections of attack signatures. Specific signature definitions may miss variations on known attacks. May impose noticeable performance drags on systems.
  • 19. Misuse Detection:  Expert Systems Keystroke monitoring  Model Based Intrusion Detection
  • 20. NEW ARCHITECTURE Mobile IDS Agents The Local Audit Trial The Local Intrusion Database ( LID ) The Secure Communication Module The Anomaly Detection Modules ( ADM s The Misuse Detection Modules ( MDM) s Stationary Secure Database
  • 21.
  • 22. IMPLEMENTED APPROACHES IEEE 802.11 a) Open System Authentication. b) Shared Key Authentication. Secure key generation and distribution Mitigating Routing Misbehavior:( Sergio Marti et al. [19])
  • 23. ADVANTAGES:  Monitors an entire network with only a few well-placed nodes  Mostly passive devices  Low Overhead and limited number of resources are used even in the large network.  Easy to secure against attack  Mostly undetectable to attackers or intruders because they are completely hidden in the network.  Easy to install  NIDS can be used in the present networks without interrupting conventional network operations.
  • 24. DISADVANTAGES:  May not be able to monitor and analyze all traffic on large, busy networks  Vulnerable to attacks launched during peak traffic periods on large busy networks  Not able to monitor switch-based (high-speed) networks effectively  Typically unable to analyze encrypted data or not suitable for encrypted traffic.  Does not always report success or failure of attempted attacks  Require active manual involvement by network administrators or security administrators.
  • 25. CONCLUSION:  As NIDS technologies continue to evolve, they will more closely resemble their real-world counterparts. In the future, NIDS, firewalls, VPNs, and related security technologies will all come to interoperate to a much higher degree. The current generation of IDS (HIDS and NIDS) is quite effective already; as they continue to improve they will become the backbone of the more flexible security systems we expect to see in the not-too-distant future.