1、1 2003, Cisco Systems, Inc. All rights reserved.SEC-20308175_05_2003_c1Advanced Enterprise IDS Deployment and Tuning2 2003, Cisco Systems, Inc. All rights reserved.SEC-20308175_05_2003_c1The Potential Impact to the Bottom Line Is SignificantThe Number of Security Incidents Continues to Rise Exponent
2、iallyThe Complexity and Sophistication of Attacks and Vulnerabilities Continues to RiseThe Challenge: Security in Modern Networks3 2003, Cisco Systems, Inc. All rights reserved.SEC-20308175_05_2003_c1Mitigating the Risk: Defense in Depth Comprehensive security policy Pervasive securityend to end Sec
3、urity in layers Multiple technologies, working together4 2003, Cisco Systems, Inc. All rights reserved.SEC-20308175_05_2003_c1Defense in Depth:The Role of Intrusion Detection Complementary technology to firewalls Been around for more than a decade, started coming into prominence in the late 90s Perf
4、orms deep packet inspection, gaining visibility into detail often missed by firewallsInternet5 2003, Cisco Systems, Inc. All rights reserved.SEC-20308175_05_2003_c1Advanced Enterprise IDS Deployment: Agenda Intrusion Protection Systems Network Sensors Host Agents Management Consoles Case Studies6 20
5、03, Cisco Systems, Inc. All rights reserved.SEC-20308175_05_2003_c1Intrusion Protection Systems7 2003, Cisco Systems, Inc. All rights reserved.SEC-20308175_05_2003_c1Intrusion Protection Agenda Terminology and Technologies Complete Architecture:Sensors, Agents, Management Consoles Placement Strategi
6、esWhere to Place Your Sensors, what Traffic to Watch, How to Get Traffic to Them Organization-Level ConcernsResponding to Intrusions, Ownership and Organization, Outsourcing8 2003, Cisco Systems, Inc. All rights reserved.SEC-20308175_05_2003_c1IDS Terminology: False Positives A False Alarm occurs wh
7、en an IDS reports an attack even though noattack is underway Benign activity that the system mistakenly reports as malicious Typically due to improper tuning Can easily overwhelm alarm consoles creating enormous amount of background noise Can result in mistrust of the IDS by security personnel9 2003
8、, Cisco Systems, Inc. All rights reserved.SEC-20308175_05_2003_c1IDS Terminology False Negatives A False Negative occurs when an IDS fails to report an ongoing attack Malicious activity that the system does not detect or report Tend to be worse because the purpose of an IDS is to detect such events
9、Can be due to a variety of eventsCan be the result of IDS evasion efforts by an attackerCan also be due to out-of-date signature knowledge base (misuse detection systems)Minor state transition that is below a detectable threshold (anomaly-based systems)10 2003, Cisco Systems, Inc. All rights reserve
10、d.SEC-20308175_05_2003_c1IDS Terminology:Signatures and Anomalies Signatures explicitly define what activity should be considered maliciousSimple pattern matchingStateful pattern matchingProtocol decode-based analysisHeuristic-based analysis Anomaly detection involves defining “normal” activity and looking for deviations from this baseline
Copyright © 2018-2021 Wenke99.com All rights reserved
工信部备案号:浙ICP备20026746号-2
公安局备案号:浙公网安备33038302330469号
本站为C2C交文档易平台,即用户上传的文档直接卖给下载用户,本站只是网络服务中间平台,所有原创文档下载所得归上传人所有,若您发现上传作品侵犯了您的权利,请立刻联系网站客服并提供证据,平台将在3个工作日内予以改正。