







































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
This lecture is part of lecture series on Information Technology course. This lecture includes: Ids, Software Application, Comparison with Firewalls, Reactive Ids, Passive Ids, Need of Ids, Advantages of Ids, Types of Ids, Host Based Id System, Network Based Id System, Teardrop Attack
Typology: Slides
1 / 47
This page cannot be seen from the preview
Don't miss anything!
-^ This^ includes
network^
attacks
against^ services,
attacks^
on applications,^
unauthorized^
logins and access to sensitive files etc… • IDS^ thus^ forms
the^ second^
line^ of defence against malicious hacker &attackers.
relate^ to^ network security, an IDS differs from a firewallin that a firewall looks outwardly forintrusions in order to stop them fromhappening. • Firewalls^ limit
access^ between networks to prevent intrusion and donot signal an attack from inside thenetwork.
-^ Normally^
-^ There are two types of intrusiondetection system: -1. Reactive IDS 2. Passive IDS 1. Reactive IDS: - It is one in which ifthe intruder or attack is detected itdoes not alert the user.2. Passive IDS: - In it the user is alertedin silent mode i.e. through mails,pagers etc.
-^ But^ this^ firewall
cannot^ detect
if^ that
authorized^ person
has^ some^ malicious intentions or not. • But they can be detected by IDS. • IDS^ are^ combination
of^ early^ warning
& alarm system. • When someone attempts to force entry intoyour house, your alarm will sound to scareof intruder (a “reactive” IDS), or it mightmake a silent phone call to a local policestation(a “reactive” IDS).
in^ your security is to use an IDS.
cracking^ & denial of services. • It^ can^ catch
illegal^
data manipulations.
-^ It^ monitors^
&^ analysis^ the
system
events & user behavior. • Managing^ OS
audit^ &^
logging mechanisms^
&^ the^ data
they generate. • Alerting^ appropriate
staff^ by appropriate means when attacks aredetected.
-^ Most of them are unable to detect &prevent^ the^
misuse^ or^ unintendedconsequences.
-^ A direct attack on IDS by an attackeralso^ finishes
up^ its^ ability
to^ detect intrusion. So the attacker tries to shutdown the IDS & then attack on network. • Not^ all^ IDS^ are
compatible^ with
all routers.
-^ The IDS CAN provide the following: •^ CAN add a greater degree of integrity tothe rest of you infrastructure. •^ CAN trace user activity from point of entryto point of impact. •^ CAN recognize and report alterations todata. •^ CAN automate a task of monitoring theInternet searching for the latest attacks.
-^ CAN^ detect^
when^ your^ system
is
under attack. • CAN^ detect^ errors
in^ your^ system configuration. • CAN guide system administrator in thevital step of establishing a policy foryour computing assets. • CAN make the security managementof your system possible by non-expertstaff.