Chapter 2 Overview of Commercial Issues
Chapter 2 Overview of Commercial Issues
Chapter 2 Overview of Commercial Issues
Security
Chapter 2
• Signature-based Detection: Involves comparing observed events against a database of known attack signatures
or patterns. If a match is found, the IDS raises an alert.
• Anomaly-based Detection: Establishes a baseline of normal behavior and alerts on any deviations from this
baseline. This method is effective at detecting previously unknown threats but may generate false positives.
• Heuristic-based Detection: Involves the use of rule sets or algorithms to identify suspicious behavior that may
indicate an attack. This method is more flexible than signature-based detection but may also produce false
positives.
• Behavioral Analysis: Focuses on understanding the normal behavior of systems or users and identifies
deviations from this behavior. This can be particularly useful for detecting advanced persistent threats (APTs)
that may operate stealthily over an extended period.
• Once an IDS detects a potential security incident, it can respond in various ways, such as generating alerts,
logging the event, or triggering automated responses.
• In some cases, an IDS may work in conjunction with other security measures, such as firewalls or intrusion
prevention systems (IPS), to provide a comprehensive security posture for a network or system.
IDS Taxonomy
• Intrusion Detection Systems (IDS) can be classified into different categories based on various criteria,
resulting in a taxonomy that helps categorize and understand the diverse approaches and functionalities of
IDS. Here is a common taxonomy for IDS:
1.Based on Deployment Location:
1. Network-Based IDS (NIDS): Monitors network traffic for suspicious patterns and behaviors. It is typically deployed at
strategic points within the network.
2. Host-Based IDS (HIDS): Monitors activities on individual devices or hosts, looking for signs of malicious behavior or
unauthorized access.
2.Based on Detection Methodology:
1. Signature-Based IDS (Knowledge-Based or Misuse Detection): Relies on predefined patterns or signatures of known
attacks. It identifies threats by comparing observed data to a database of signatures.
2. Anomaly-Based IDS (Behavioral or Heuristic Detection): Establishes a baseline of normal behavior and raises alerts
when deviations from this baseline are detected. It looks for abnormal activities that might indicate a security threat.
3.Based on Detection Timing:
1. Real-Time IDS: Analyzes events and generates alerts in real-time as suspicious activities occur.
2. Batch IDS: Collects and analyzes data periodically, often after the fact. It may not provide real-time alerts but can assist
in forensic analysis.
4.Based on Response Mechanism:
1. IDS with Passive Response: Generates alerts but does not take direct action to prevent or stop the detected activity.
2. IDS with Active Response: Can take automated actions to respond to detected threats, such as blocking malicious
traffic or reconfiguring firewall rules.
5.Based on Implementation Architecture:
1. Traditional IDS (Signature-Based): Uses pattern matching to identify known threats based on signatures.
2. Machine Learning-Based IDS: Utilizes machine learning algorithms to detect anomalies or patterns indicative of
malicious behavior.
IDS Taxonomy (Cont…)
6. Based on Scope:
1. Single-Point IDS: Monitors a specific segment or point within the network or on a host.
2. Distributed IDS: Involves multiple sensors or agents distributed across various points in the network
or on multiple hosts.
7. Based on Openness:
3. Closed IDS: Relies on proprietary algorithms and databases.
4. Open-Source IDS: Uses open-source technologies, allowing users to modify and extend the system.
8. Based on Purpose:
5. Signature-Based IDS for Specific Threats: Focuses on detecting specific types of threats with
known signatures.
6. Generic Signature-Based IDS: Covers a broader range of threats but may have a higher false
positive rate.
7. Behavioral IDS: Focuses on identifying unusual behaviors and deviations from normal patterns.
Understanding these different classifications helps organizations choose or design an IDS that best fits
their security needs and the characteristics of their network environment.
Often, a combination of different IDS types is used in a layered security strategy to provide
comprehensive coverage against a wide range of threats.
• A distributed intrusion detection system is one where data is collected and
analyzed in multiple hosts, as opposed to a centralized intrusion detection
system.
• Both distributed and centralized intrusion detection systems may use host-
or network-based data collection methods, or most likely a combination of
the two.
• IDS can react to intrusion in two ways:
• Active - takes some action as a reaction to intrusion (such shutting down
services, connection, logging user...)
• Passive - generates alarms or notification.
• Audit information analysis can be done generally in two modes.
• Intrusion detection process can run continuously, also called in real-
time.
• The term "real-time" indicates not more than a fact that IDS reacts to
an intrusion "quick enough".
• Intrusion detection process also can be run periodically.
IDS Analysis: