SlideShare una empresa de Scribd logo
1 de 15
Intrusion Devices
IDS & IPS Ver1.0
Created : 06 March 2015
Agenda
 Understand Intrusion detection and Purpose
 Detecting and Prevention system
 Understand Products
 Implementation Models
 Type of detections and Signature tuning
Intrusion!!!!
 Intrusion !
 Who know where is value data || (APT, Spearfishing)
 Security = visibility + control || (CIA)
 Active visibility >>Visibility is paramount to decision making
 Store information, Analysis and Reporting as retro prospective
 Mitigating the Risk: Defense in Depth
 Firewall Vs Deep packet Inspection Vs IPS
Intrusion Detection is the art of detecting inappropriate, incorrect, or anomalous activity.
Among other tools, an Intrusion Detection System can be used to determine if a computer
network or server has experienced an unauthorized intrusion.
Intrusion Detection System
 IDS || IPS
 Network Sensors - Network Based – NIDS & NIPS
 Host Agents - Host based IDS & IPS - HIPS& HIDS
 Management Consoles
 Where to place
 SIEM
 Incident Management Process
 Risk management
4
Terminologies
 Signatures explicitly define what activity should be considered malicious
 Simple pattern matching
 Protocol decode-based analysis
 Anomaly detection involves defining “normal” activity and looking for deviations
from this baseline
 False Alarms: State in which the ID system mistakenly reports a benign activity as
being malicious
 False Negative: State in which the ID system does not detect and report actual
malicious activity even though it is monitored
 IBM - PAM : X-Force Protocol Analysis Module (PAM)
Host Vs Network IDS
Cons
Network-
Based
Host-
Based
Pros
• Can verify success or failure
of attack
• Generally not impacted by
bandwidth or encryption
• Understands host context and
may be able to stop attack
• Impacts host resources
• Operating system dependent
• Scalability—Requires one
agent per host
• Protects all hosts on
monitored network
• No host impact
• Can detect network probes
and denial of service attacks
• Switched environments pose
challenges
• Monitoring >100Mbps is
currently challenging
• Generally can’t proactively
stop attacks
Promiscuous / TAP
mode: Here we can only
put the agent in
Detection mode only
even its IPS support
Inline mode: Here we can
put the agent in
Detection / Prevention
mode according to device
capability or design wise.
7
Understand products
 IBM – Proventia Hardware (G/GX) / Software- ISS have two line of product
Proventia (IPS) and real sensor (IDS), Proventia have Software version for
Linux & windows serves and Desktop along with Appliance (HW + customized
OS + Application) GX series.
 Cisco FirePower hardware and VM model , IDSM Module
 Checkpoint – IPS Blades
 Juniper – IDP Module
 McAcfee –Intrushield
 Soucrefire (Snort IDS)
Create or Edit Signature !
Concerns…
 Return on investment based on visibility, control, and uptime.
 Greatest risk comes from insider threats. Disgruntled employees, curious
employees, outsourced services, and the trends of greater volumes of
contracted services provide a higher level of vulnerability from within the
network
 a known fact is that current IDS implementations have a tendency to drop
packets due to the high throughput of today’s high bandwidth network
devices
 most IDS solutions do not have the ability to decrypt packets inbound or
outbound and this blinds security administrators
What’s next – NG!
 “Real-time Network Awareness (RNA)” - RNA enables organizations to more confidently
protect their networks through a unique patent pending combination of passive network
discovery, behavioral profiling, and integrated vulnerability analysis to deliver the
benefits of real-time network profiling and change management without the drawbacks of
traditional approaches to identifying network assets and vulnerabilities
 Certifications
 Test C2150-561: IBM Security Network Intrusion Prevention System V4.3 Implementation
 McAfee Certified Product Specialist — HIPs; The MCPS — HIPs certification validates
knowledge and experience in working with the McAfee Host Intrusion Prevention system.
 Cisco CCNA Sec- Implementing Cisco Threat Control Solutions; IPS , FW , Cloud and Email
Security
 References
 SANS Documents
 Cisco docs
Why and Where IDP
Any IP
Allowed
10.1.1.1:*
Allowed
10.1.1.1:80
From Internet
will hit all
types of
request from
various subnets
Interne
t
Router will drop all other IP
subnets, allowed inside only
10.* subnet as Rule specified.
But still its pass all port in
that 10.* subnet.
*Router can only limited port
level rule
Router
Firewall will default drop all
request, unless any allowed
rule presents in it.
Example on IP 10.1.1.1, its
allow HTTP(80) traffic but
may block SMTP(25)
Firewall IDP
We can place IDP any where as required, in simple network its place after the firewall as below.
• Network level (May be one or multiple if network is huge)
• Host level (for critical servers)
1.Router will allow only internal IP address traffic to inside from internet
2.Firewall will allow only specified protocols / ports to inside, even Its Internal IP address
3.IDP will check what is inside that traffic payload in specified protocol/port.
Demo & Practice
 Untangle Administrator Login : demo.untangle.com
 Go to IDS module and go through Settings where can find all IDS related options
, include signatures , policies, etc.
 This will provide most security technologies demo (FW, AntiSpam..), not
limited to IDS.
 To practice real one, please use GNS3 and original IOS from Cisco in your
laptop.
QA & Thank you
Finto Thomas, CISSP

Más contenido relacionado

La actualidad más candente

Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection Systemjohnb0118
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systemssamis
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentationdavebrosnan
 
Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityPass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityHecrocro
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewallsSapna Kumari
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security DefinitionPatten John
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Digital Bond
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)Jainam Shah
 
Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies sushmil123
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?EnergySec
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS CommunicationsDigital Bond
 
IoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignIoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignPriyanka Aash
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefLancope, Inc.
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewallMd Shihab
 

La actualidad más candente (20)

Network-Based Intrusion Detection System
Network-Based Intrusion Detection SystemNetwork-Based Intrusion Detection System
Network-Based Intrusion Detection System
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
 
Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityPass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network Security
 
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)
 
Firewall Basing
Firewall BasingFirewall Basing
Firewall Basing
 
Android Firewall project
Android Firewall projectAndroid Firewall project
Android Firewall project
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS Communications
 
IoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignIoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control Design
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
 

Similar a Idps technology starter v2.0

Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention systemNikhil Raj
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniLoay Elbasyouni
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemSweta Sharma
 
Cours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptxCours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptxssuserc517ee1
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceChristopher Gerritz
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overviewali raza
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentationlaonap166
 
Intrusion detection and prevention
Intrusion detection and preventionIntrusion detection and prevention
Intrusion detection and preventionNicholas Davis
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And PreventionNicholas Davis
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosHaltdos
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsAhmed Habib
 

Similar a Idps technology starter v2.0 (20)

Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Day4
Day4Day4
Day4
 
ids.ppt
ids.pptids.ppt
ids.ppt
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Cours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptxCours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptx
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overview
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
IDS VS IPS.pptx
IDS VS IPS.pptxIDS VS IPS.pptx
IDS VS IPS.pptx
 
Intrusion detection and prevention
Intrusion detection and preventionIntrusion detection and prevention
Intrusion detection and prevention
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And Prevention
 
Aensis idps 1000 v ext_eng
Aensis idps 1000  v ext_engAensis idps 1000  v ext_eng
Aensis idps 1000 v ext_eng
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
OSSIM Overview
OSSIM OverviewOSSIM Overview
OSSIM Overview
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
Ids vs ips
Ids vs ipsIds vs ips
Ids vs ips
 
CCNP Security-IPS
CCNP Security-IPSCCNP Security-IPS
CCNP Security-IPS
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
 

Más de Finto Thomas , CISSP, TOGAF, CCSP, ITIL. JNCIS (9)

Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Benefits of DevSecOps
 
Gdpr brief and controls ver2.0
Gdpr brief and controls ver2.0Gdpr brief and controls ver2.0
Gdpr brief and controls ver2.0
 
Deception ey
Deception ey Deception ey
Deception ey
 
Threathunting v0.1
Threathunting v0.1Threathunting v0.1
Threathunting v0.1
 
Vulnerability manager v1.0
Vulnerability manager v1.0Vulnerability manager v1.0
Vulnerability manager v1.0
 
Network & security startup
Network & security startupNetwork & security startup
Network & security startup
 
Data lake protection ft 3119 -ver1.0
Data lake protection   ft 3119 -ver1.0Data lake protection   ft 3119 -ver1.0
Data lake protection ft 3119 -ver1.0
 
Virtualization & tipping point
Virtualization & tipping pointVirtualization & tipping point
Virtualization & tipping point
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Idps technology starter v2.0

  • 1. Intrusion Devices IDS & IPS Ver1.0 Created : 06 March 2015
  • 2. Agenda  Understand Intrusion detection and Purpose  Detecting and Prevention system  Understand Products  Implementation Models  Type of detections and Signature tuning
  • 3. Intrusion!!!!  Intrusion !  Who know where is value data || (APT, Spearfishing)  Security = visibility + control || (CIA)  Active visibility >>Visibility is paramount to decision making  Store information, Analysis and Reporting as retro prospective  Mitigating the Risk: Defense in Depth  Firewall Vs Deep packet Inspection Vs IPS Intrusion Detection is the art of detecting inappropriate, incorrect, or anomalous activity. Among other tools, an Intrusion Detection System can be used to determine if a computer network or server has experienced an unauthorized intrusion.
  • 4. Intrusion Detection System  IDS || IPS  Network Sensors - Network Based – NIDS & NIPS  Host Agents - Host based IDS & IPS - HIPS& HIDS  Management Consoles  Where to place  SIEM  Incident Management Process  Risk management 4
  • 5. Terminologies  Signatures explicitly define what activity should be considered malicious  Simple pattern matching  Protocol decode-based analysis  Anomaly detection involves defining “normal” activity and looking for deviations from this baseline  False Alarms: State in which the ID system mistakenly reports a benign activity as being malicious  False Negative: State in which the ID system does not detect and report actual malicious activity even though it is monitored  IBM - PAM : X-Force Protocol Analysis Module (PAM)
  • 6. Host Vs Network IDS Cons Network- Based Host- Based Pros • Can verify success or failure of attack • Generally not impacted by bandwidth or encryption • Understands host context and may be able to stop attack • Impacts host resources • Operating system dependent • Scalability—Requires one agent per host • Protects all hosts on monitored network • No host impact • Can detect network probes and denial of service attacks • Switched environments pose challenges • Monitoring >100Mbps is currently challenging • Generally can’t proactively stop attacks
  • 7. Promiscuous / TAP mode: Here we can only put the agent in Detection mode only even its IPS support Inline mode: Here we can put the agent in Detection / Prevention mode according to device capability or design wise. 7
  • 8. Understand products  IBM – Proventia Hardware (G/GX) / Software- ISS have two line of product Proventia (IPS) and real sensor (IDS), Proventia have Software version for Linux & windows serves and Desktop along with Appliance (HW + customized OS + Application) GX series.  Cisco FirePower hardware and VM model , IDSM Module  Checkpoint – IPS Blades  Juniper – IDP Module  McAcfee –Intrushield  Soucrefire (Snort IDS)
  • 9.
  • 10. Create or Edit Signature !
  • 11. Concerns…  Return on investment based on visibility, control, and uptime.  Greatest risk comes from insider threats. Disgruntled employees, curious employees, outsourced services, and the trends of greater volumes of contracted services provide a higher level of vulnerability from within the network  a known fact is that current IDS implementations have a tendency to drop packets due to the high throughput of today’s high bandwidth network devices  most IDS solutions do not have the ability to decrypt packets inbound or outbound and this blinds security administrators
  • 12. What’s next – NG!  “Real-time Network Awareness (RNA)” - RNA enables organizations to more confidently protect their networks through a unique patent pending combination of passive network discovery, behavioral profiling, and integrated vulnerability analysis to deliver the benefits of real-time network profiling and change management without the drawbacks of traditional approaches to identifying network assets and vulnerabilities  Certifications  Test C2150-561: IBM Security Network Intrusion Prevention System V4.3 Implementation  McAfee Certified Product Specialist — HIPs; The MCPS — HIPs certification validates knowledge and experience in working with the McAfee Host Intrusion Prevention system.  Cisco CCNA Sec- Implementing Cisco Threat Control Solutions; IPS , FW , Cloud and Email Security  References  SANS Documents  Cisco docs
  • 13. Why and Where IDP Any IP Allowed 10.1.1.1:* Allowed 10.1.1.1:80 From Internet will hit all types of request from various subnets Interne t Router will drop all other IP subnets, allowed inside only 10.* subnet as Rule specified. But still its pass all port in that 10.* subnet. *Router can only limited port level rule Router Firewall will default drop all request, unless any allowed rule presents in it. Example on IP 10.1.1.1, its allow HTTP(80) traffic but may block SMTP(25) Firewall IDP We can place IDP any where as required, in simple network its place after the firewall as below. • Network level (May be one or multiple if network is huge) • Host level (for critical servers) 1.Router will allow only internal IP address traffic to inside from internet 2.Firewall will allow only specified protocols / ports to inside, even Its Internal IP address 3.IDP will check what is inside that traffic payload in specified protocol/port.
  • 14. Demo & Practice  Untangle Administrator Login : demo.untangle.com  Go to IDS module and go through Settings where can find all IDS related options , include signatures , policies, etc.  This will provide most security technologies demo (FW, AntiSpam..), not limited to IDS.  To practice real one, please use GNS3 and original IOS from Cisco in your laptop.
  • 15. QA & Thank you Finto Thomas, CISSP