Page 177 - DCAP516_COMPUTER_SECURITY
P. 177

Unit 14: Intrusion Detection System and Secure E-mail




          should be allowed to pass. In addition, they enforce access control over the ports they leave  Notes
          open, so that only traffic from allowed IP addresses gets through. For these reasons, firewalls
          have proven effective against many types of intrusions.
          Of course, organizations can’t use a firewall to block everything from passing through, as key
          business critical applications are require to access external networks and allow access from
          outside. Security is always a balance between accessibility and potential vulnerability, and
          organization need to keep this balance. Potential attackers will learn to exploit any entry left
          open.
          Attacks can take many forms and manifest in multiple ways against which the firewall, which is
          access control based, are not built to protect. Hybrid attacks, Denial of Service (DoS) attacks,
          Distributed Denial of Service (DDoS) attacks and application level attacks and protocol anomalies
          get through most firewall deployments.
          Some companies deploy Intrusion Detection Systems (IDS), which inspect the network traffic
          and report their findings to log files and databases. IDS tools continue to be instrumental in
          providing forensics about attacks and in determining over time what segments of the network
          become compromised. While IDS’s facilitate record-keeping, an alarm function, and eventual
          analysis and remediation, they do not prevent or mitigate damage from malicious attacks in
          real-time, like the proverbial horse that bolted.

          14.1 Intruders


          One of the most publicized threats to security is the intruder generally referred to as a hacker or
          cracker. In an important early study of intrusion. Anderson identified three classes of intruders:

               Masquerader: An individual who is not authorized to use the computer and who penetrates
               a systems’ access controls to exploit a legitimate user’s account.
               Misfeasor: A legitimate user who accesses data, programs, or resources for which such
               access is not authorized, or who is authorized for such access but misuses his or her
               privileges.

               Clandestine user: An individual who seizes supervisory control of the system and uses
               this control to evade auditing and access controls or to suppress audit collection.
          The masquerader is likely to be an outsider the misfeasor generally is an insider and the
          clandestine user can be either an outsider or an insider.
          Intruder attacks range from the benign to the serious. At the benign end of the scale there are
          many people who simply wish to explore internets and see what is out there. At the serious end
          are individuals who are attempting to read privileged data perform unauthorized modifications
          to data, or disrupt the system.

          Benign intruders might be tolerable although they do consume resources and may slow
          performance for legitimate users. However, there is no way in advance to know whether an
          intruder will be benign or malign. Consequently, even for systems with no particularly sensitive
          resources there is a motivation to control this problem.

          Intruders attempt to exploit networks in various ways. Some use other computers to launch
          attacks. This is done by customizing malicious software to cripple a system. Malware is currently
          one of the biggest threats facing computer networks today. Targeted attacks that focus on a
          single network are often able to avoid signature detection. Because the malware is designed to
          penetrate a certain form of network computer security, it’s likely that no signature exists. This
          means that no detection mechanism will be able to identify it whether it’s an anti-virus or
          intrusion detection solution. Malicious software can also be hidden from detection through




                                           LOVELY PROFESSIONAL UNIVERSITY                                   171
   172   173   174   175   176   177   178   179   180   181   182