Page 224 - DCAP403_Operating System
P. 224

Unit 11: System Security




          Alternatively if HIPS is combined with an AV product utilising whitelisting technology then   Notes
          there is far less use of system resources as many applications on the PC are trusted (whitelisted).
          HIPS as an application then becomes a real alternative to traditional antivirus products.

          Network-based

          A network-based IPS is one where the IPS application/hardware and any actions taken to

          prevent an intrusion on a specific network host(s) is done from a host with another IP address on
          the network (This could be on a front-end fi rewall appliance.).
          Network Intrusion Prevention Systems (NIPSs) are purpose-built hardware/software platforms
          that are designed to analyze, detect and report on security related events. NIPS are designed

          to inspect traffic and based on their configuration or security policy, they can drop malicious

          traffi c.
          Content-based


          A Content-based IPS (CBIPS) inspects the content of network packets for unique sequences,
          called signatures, to detect and hopefully prevent known types of attack such as worm infections
          and hacks.

          Protocol Analysis

          A key development in IDS/IPS technologies was the use of protocol analyzers. Protocol analyzers
          can natively decode application-layer network protocols, like HTTP or FTP. Once the protocols are
          fully decoded, the IPS analysis engine can evaluate different parts of the protocol for anomalous


          behavior or exploits. For example, the existence of a large binary file in the User-Agent field of an
          HTTP request would be very unusual and likely an intrusion. A protocol analyzer could detect
          this anomalous behavior and instruct the IPS engine to drop the offending packets.
          Not all IPS/IDS engines are full protocol analyzers. Some products rely on simple pattern

          recognition techniques to look for known attack patterns. While this can be sufficient in many
          cases, it creates an overall weakness in the detection capabilities. Since many vulnerabilities have
          dozens or even hundreds of exploit variants, pattern recognition-based IPS/IDS engines can be
          evaded. For example, some pattern recognition engines require hundreds of different signatures
          (patterns) to protect against a single vulnerability. This is because they must have a different
          pattern for each exploit variant. Protocol analysis-based products can often block exploits with a

          single signature that monitors for the specific vulnerability in the network communications.
          Rate-based

          Rate-based IPS (RBIPS) are primarily intended to prevent Denial of Service and Distributed
          Denial of Service attacks. They work by monitoring and learning normal network behaviors.

          Through real-time traffic monitoring and comparison with stored statistics, RBIPS can identify
          abnormal rates for certain types of traffic e.g. TCP, UDP or ARP packets, connections per second,


          packets per connection, packets to specific ports etc. Attacks are detected when thresholds are
          exceeded. The thresholds are dynamically adjusted based on time of day, day of the week etc.,
          drawing on stored traffi c statistics.
          Unusual but legitimate network traffic patterns may create false alarms. The system’s effectiveness

          is related to the granularity of the RBIPS rulebase and the quality of the stored statistics.
          Once an attack is detected, various prevention techniques may be used such as rate-limiting

          specific attack-related traffic types, source or connection tracking and source-address, port or

          protocol filtering (black-listing) or validation (white-listing).



                                           LOVELY PROFESSIONAL UNIVERSITY                                   217
   219   220   221   222   223   224   225   226   227   228   229