Tech Report
Tech Report
Tech Report
I. INTRODUCTION
In today’s world internet security has become a challenge for organizations. To protect
credential data from the intruders. In process of safeguarding the data Web Firewalls, encryption,
authentication and Virtual Private Networks (VPN) have been deployed since a long time to
secure the network infrastructure and communication over the internet. Intrusion detection is a
relatively new addition to set of security technologies. IDS is an evolution which enhance the
network security and safeguarding the data of the organisation. The IDS helps the network
administrator to detect any malicious activity on the network and alerts the administrator to get
the data secured by taking the appropriate actions against those attacks. An intrusion refers to
any unauthorized access or malicious utilization of information resources.
An intruder or an attacker is a real world entity that tries to find a means to gain
unauthorized access to information, causes harm or engage in other malicious activities. The
Intrusion detection system is about the firewall security. The firewall protects an organization
from the malicious attacks from the Internet and the IDS detects if someone tries to access in
through the firewall or manages to break in the firewall security and tries to have an access on
any system in the organization and alerts the system administrator if there is an undesired
activity in the firewall. Therefore, an Intrusion detection system (IDS) is a security system that
monitors network traffic and computer systems and works to analyse that traffic for possible
hostile attacks originating from outside the organization and also for misuse of system or attacks
originating from inside the organization.
1
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
Cyber attacks are the actions that attempt to bypass the security mechanisms of computer
system. Any set of actions that threatens the integrity, availability or confidentiality of network
resource. Cyber attacks are deliberate and malicious attempts to disrupt, damage, or gain
unauthorized access to computer systems, networks, or digital devices. They are carried out by
individuals or groups of hackers with various motives, such as financial gain, political activism,
espionage, or just for fun.
Ex:
Malware,
Phishing,
Worms and Viruses,
Denial of service(DoS), etc.
2
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
Intrusion: Any set of actions that threatens the integrity, availability or confidentiality of
network resource.
Now a day’s internet has become part of our daily life infect, the business world is
getting connected to Internet. Number of peoples are getting connected to the Internet every
day to take advantage of the new business model which is known as e-Business.
Connectivity enhancement has therefore become very critical aspect of today's e- business. There
are two phases of business on the Internet. First phase is the Internet brings in outstanding
potential to business in terms of reaching the users and at the same time it also brings a lot of risk
to the business. There are both harmless and harmful users on the Internet. Whereas an
organization makes its information system accessible to harmless Internet users. Malicious users
or hackers can also get an access to organization’s internal systems in various reasons.
These are,
Software bugs called vulnerabilities in a system
Failure in administration security
Leaving systems to default configuration
The intruders are use different types of techniques like Password cracking, peer-to-peer
attack, Sniffing attack, Dos attacks, Eavesdropping attack, Application layer attack etc. to
exploit the system vulnerabilities mentioned above and compromise critical systems.
Therefore, there required to be some kind of security to the private resources of the
organization from the Internet as well as from users inside the organization.
3
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
The block diagram fig 6.2 of Intrusion detection system consist of Network Traffic
(input), Intrusion Detection (analysis), Alert generation (output). The data packet which is
present in the network traffic is given as input to the intrusion detection system and it analyse the
packet then decides whether it is malicious or normal data packet, if it contains the malicious
activity then it generates the alert and send it to the server.
The Intrusion detection system is about the firewall security. The firewall protects an
organization from the malicious attacks from the Internet and the IDS detects if someone tries
to access in through the firewall or manages to break in the firewall security and tries to have an
access on any system in the organization and alerts the system administrator if there is an
undesired activity in the firewall.
4
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
There are two types of IDS they are Network based intrusion detection system and Host based
intrusion detection system.
The above fig 7.1 of Network intrusion detection systems (NIDS) are set up at a planned
point within the network to examine traffic from all devices on the network. It performs an
observation of passing traffic on the entire subnet and matches the traffic that is passed on the
subnets to the collection of known attacks. Once an attack is identified or abnormal behavior is
observed, the alert can be sent to the administrator. An example of a NIDS is installing it on the
subnet where firewalls are located in order to see if someone is trying to crack the firewall.
NIDS looks for attack patterns within a network traffic, such as large collections of
related items that are of a certain type that could specify that a denial-of-service attack is
ongoing, or it looks for the exchange of a sequence of related packets in a certain pattern, which
could indicate that a port scan is in progress.
5
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
The above fig 7.2 of Host Based Intrusion Detection System (HIDS) is placed on a
particular computer or server, known as the host, and monitors activity only on that
system. Host based intrusion detection systems can be further divided into two categories:
signature-based (i.e. misuse detection) and anomaly based detection techniques. HIDS monitor
the status of key system files and detect when an intruder creates, modifies, or deletes the
monitored files. Then the HIDS triggers an alert when one of the following changes occurs: file
attributes are changed, new files are created, or existing files are deleted. The main difference
between NIDS and HIDS is that the NIDS can access information that is encrypted when
traveling through the network. A HIDS monitors the incoming and outgoing packets from the
device only and will alert the administrator if suspicious or malicious activity is detected.
6
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
The above fig 8.1 of Signature-based IDS refers to the detection of attacks by looking for
specific patterns, such as byte sequences in network traffic, or known malicious instruction
sequences used by malware. The terminology is generated by anti- virus software, which refers
to these detected patterns as signatures. Even though signature-based IDS can easily detect
known attacks, it is impossible to detect new attacks, for which no pattern is available.
Signature-based IDS detects the attacks on the basis of the specific patterns such as the
number of bytes or a number of 1s or the number of 0s in the network traffic. It also detects on
the basis of the already known malicious instruction sequence that is used by the malware. The
detected patterns in the IDS are known as signatures. Signature-based IDS can easily detect the
attacks whose pattern (signature) already exists in the system but it is quite difficult to detect
new malware attacks as their pattern (signature) is not known. Signature-based IDSs have a
database of known attack signatures and constantly compare network traffic or system activity
against this database. If the IDS detects activity that matches a known attack signature, it
generates an alert. The IDS can also be configured to take action automatically, such as blocking
traffic from a particular IP address or shutting down a particular service or port.
7
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
The above flowchart of fig 8.2 shows Anomaly-based intrusion detection systems can
alert you to suspicious behaviour that is unknown. Instead of searching for known threats, an
anomaly-based detection system utilizes machine learning to train the detection system to
recognize a normalized baseline. The baseline represents how the system normally behaves, and
then all network activity is compared to that baseline. Rather than searching for known IOCs,
anomaly-based IDS simply identifies any out-of-the-ordinary behaviour to trigger alerts.
8
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
With an anomaly-based IDS, anything that does not align with the existing normalized
baseline such as a user trying to log in outside of standard business hours, new devices being
added to a network without authorization, or a flood of new IP addresses trying to establish a
connection with a network—will raise a potential flag for concern. The disadvantage here is that
many non-malicious behaviours will get flagged simply for being atypical. The increased
likelihood for false positives with anomaly-based intrusion detection can require additional time
and resources to investigate all the alerts to potential threats.
9
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
IX. APPLICATIONS
Intrusion detection systems (IDS) are used to identify and respond to security breaches in
computer networks or systems. Here are some common applications of intrusion detection
systems:
1. Network Security: IDS can be used to monitor network traffic and detect suspicious
activity, such as attempts to exploit known vulnerabilities, port scanning, or denial-of-
service attacks.
2. Incident Response: IDS can help identify the source and extent of an attack, providing
valuable information for incident response teams to contain and mitigate the damage.
3. Compliance: IDS can assist organizations in meeting regulatory requirements for security
monitoring, such as HIPAA, PCI-DSS, or GDPR.
4. Fraud Detection: IDS can be used to detect fraudulent activity in financial transactions or
e-commerce, such as credit card fraud, identity theft, or money laundering.
5. Insider Threat Detection: IDS can identify insider threats, such as unauthorized access or
data theft by employees or contractors.
6. Vulnerability Assessment: IDS can be used to identify vulnerabilities in a network or
system by monitoring for attempts to exploit known weaknesses.
7. Advanced Threat Detection: IDS can detect advanced threats that bypass traditional
security measures, such as zero-day exploits or advanced persistent threats (APTs).
10
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
X. LEARNING
1. Providing data privacy, integrity and confidentiality to the stored data using Cyber
Security.
2. Cyber Security process of working.
3. Significance of Cyber Security and Intrusion Detection System in preventing the Cyber
Attacks and securing the database.
4. Process of Network and Host based IDS system.
5. Detection methods like signature and anomaly based detection.
6. Implementation of Intrusion Detection System using Cisco packet tracer.
7. The system which consists of Intrusion detection system can detects the abnormal
activities or any malicious activities and sends an alert immediately to the administrator
this can helps the system from cyber attacks .
8. Intrusion detection systems (IDS) can use various learning techniques to detect malicious
activity and protect computer networks from cyber attacks.
11
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
Configure IOS Intrusion Detection and Prevention System Using the CLI.
1. Topology
The above fig 11.1 shows the topology of configuration of IOS intrusion detection and
prevention system using Cisco Packet trace with CLI configuration. In this topology there are to
switches are used (2960 24TT switch), three routers are used (1941 router), one server is used for
syslog configuration, and some PC’s connect to switches and switches are intern connected to
routers. Here IDS is installed in router 0 (IP address 10.1.1.1), the router which is configured
should not allow the unknown packets to enter into the network. This is IDS works. PC’s within
the network are connected but PC’s of different network are not connected with each other.
2. Objectives
To Enable IDS system in the routers.
12
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
3. Working
The first task is to enable IDS on router (router 0 ) to scan traffic entering into the
network.
The server labeled Syslog is used to track all activities.
Then configure the router to identify the syslog server to track all abnormal
activities.
Finally, enable IDS to produce an alert.
The server and PCs have been preconfigured.
On R1, issue the show version command to view the Technology Package license
information.
If the Security Technology package has not been enabled, use the following
command to enable the package. R1(config)# license boot module c1900
technology-package securityk9
Accept the end user license agreement.
Save the running-config and reload the router to enable the security license.
Verify that the Security Technology package has been enabled by using the show
version command.
13
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
On R1, configure the IPS signature storage location to be the directory you just
created. R1(config)# ip ips config location flash:ipsdir
On R1, create an IPS rule name using the ip ips name name command in global
configuration mode. Name the IPS rule iosips. R1(config)# ip ips name iosips
IOS IPS supports the use of syslog to send event notification. Syslog notification
is enabled by default. If logging console is enabled, IPS syslog messages display.
Enable syslog if it is not enabled.
R1(config)# ip ips notify log
If necessary, use the clock set command from privileged EXEC mode to reset the
clock.
R1# clock set 10:20:00
Verify that the timestamp service for logging is enabled on the router using the
show run command. Enable the timestamp service if it is not enabled.
R1(config)# service timestamps log datetime msec
Retire the all signature category with the retired true command (all signatures
within the signature release).
Unretire the IOS_IPS Basic category with the retired false command.
R1(config)# ip ips signaturecategory
R1(config-ips-category)# category all
R1(config-ips-category-action)# retired true
R1(config-ips-category-action)# exit
R1(config-ips-category)# category ios_ips basic
R1(config-ips-category-action)# retired false
R1(config-ips-category-action)# exit
14
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
R1(config-ips-cateogry)# exit
Do you want to accept these changes? [confirm]
Apply the IPS rule to an interface with the ip ips name direction command in
interface configuration mode.
Apply the rule outbound on the G0/1 interface of R1.
After you enable IPS, some log messages will be sent to the console line
indicating that the IPS engines are being initialized.
Note: The direction in means that IPS inspects only traffic going into the interface. Similarly, out
means that IPS inspects only traffic going out of the interface.
15
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
Use the show ip ips all command to view the IPS configuration status summary. To
which interfaces and in which direction is the iosips rule applied?.
Step 3: Ping PCs within the network. The ping should be successful.
Step 4: Ping PCs of different network. The ping should not be successful.
16
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
4. Result
Bluetooth Connection:
C:\>ping 192.168.10.1
17
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
Bluetooth Connection:
C:\>ping 192.168.10.3
18
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
XII. CONCLUSION
19
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot
Intrusion Detection System in Cyber Security
REFERENCE
3. C. Yin, Y. Zhu, J. Fei and X. He, "A deep learning approach for intrusion detection using
recurrent neural networks", IEEE Access, vol. 5, pp. 21954-21961, 2017
5. F. Iglesias and T. Zseby, "Analysis of network traffic features for anomaly detection" in
Machine Learning, Cham, Switzerland:Springer, vol. 101, no. 1, pp. 59-84, 2015.
6. K. Kato and V. Klyuev, "Large-scale network packet analysis for intelligent DDoS attack
detection development", Proc. 9th Int. Conf. for Internet Technol. Secured Trans.
(ICITST), pp. 360-365, Dec. 2014.
20
Department of Electronics and Communication Engineering
Basaveshwar Engineering College , Bagalkot