Page 68 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 68

Information  Security and Privacy




                    Notes          In  systems,  PIDS  and  APIDS  are  used  to  monitor  the  transport and  protocols  illegal  or
                                   inappropriate traffic or constructs of language (say SQL). In a host-based system, the  sensor
                                   usually consists of a software agent, which monitors all activity of the  host on which it  is
                                   installed. Hybrids of these two systems also exist.
                                   1.  A  network  intrusion  detection  system  is  an independent  platform  which  identifies
                                       intrusions by examining network traffic and monitors multiple hosts. Network Intrusion
                                       Detection Systems gain access to network traffic by connecting to a hub, network switch
                                       configured for port mirroring, or network tap.
                                       An example of a NIDS is Snort.
                                   2.  A Protocol-based  Intrusion Detection System (PIDS) consists of a system or agent that
                                       would  typically  sit  at  the  front  end  of  a  server,  monitoring  and  analyzing  the
                                       communication protocol between a connected device (a user/PC or system). For a web
                                       server this would typically monitor the HTTPS protocol stream and understand the HTTP
                                       protocol relative to the web server/system it is trying to protect. Where HTTPS is in use
                                       then this system would need to reside in the “shim” or interface between where HTTPS is
                                       un-encrypted and immediately prior to it entering the Web presentation layer.

                                   3.  An Application Protocol-based Intrusion Detection System (APIDS) consists of a system or
                                       agent that would typically sit within a group of servers, monitoring and analyzing the
                                       communication on application specific protocols.


                                          Example: In a web server with database this would monitor the SQL protocol specific to
                                   the middleware/business-login as it transacts with the database.
                                   4.  A Host-based Intrusion Detection System (HIDS) consists of an agent on a host which
                                       identifies intrusions by analyzing system calls, application logs, file-system modifications
                                       (binaries, password files, capability/acl databases) and other host activities and state.
                                       An example of a HIDS is OSSEC.

                                   5.  A hybrid intrusion detection system combines two or more approaches. Host agent data
                                       is combined with network information to form a comprehensive view of the network.
                                       An example of a Hybrid IDS is Prelude.

                                   Self Assessment


                                   Fill in the blanks:
                                   9.  An ........................... gathers and analyzes information from various areas within a computer
                                       or a network to identify possible security breaches, which include both intrusions and
                                       misuse.
                                   10.  A ........................... system is  an independent  platform which  identifies intrusions  by
                                       examining network traffic and monitors multiple hosts.
                                   5.6 Intrusion  Prevention System


                                   An Intrusion Prevention System is a  network security device that monitors network and/or
                                   system activities for malicious or unwanted behavior and can react, in real-time, to block or
                                   prevent those activities.
                                   Network-based IPS, for example, will operate in-line to monitor all network traffic for malicious
                                   code or attacks. When an attack is detected, it can drop the offending packets while still allowing



          62                                LOVELY PROFESSIONAL UNIVERSITY
   63   64   65   66   67   68   69   70   71   72   73