cisco企业IDS解决方案.ppt

上传人:99****p 文档编号:1436798 上传时间:2019-02-27 格式:PPT 页数:98 大小:1.62MB
下载 相关 举报
cisco企业IDS解决方案.ppt_第1页
第1页 / 共98页
cisco企业IDS解决方案.ppt_第2页
第2页 / 共98页
cisco企业IDS解决方案.ppt_第3页
第3页 / 共98页
cisco企业IDS解决方案.ppt_第4页
第4页 / 共98页
cisco企业IDS解决方案.ppt_第5页
第5页 / 共98页
点击查看更多>>
资源描述

1、1 2003, Cisco Systems, Inc. All rights reserved.SEC-20308175_05_2003_c1Advanced Enterprise IDS Deployment and Tuning2 2003, Cisco Systems, Inc. All rights reserved.SEC-20308175_05_2003_c1The Potential Impact to the Bottom Line Is SignificantThe Number of Security Incidents Continues to Rise Exponent

2、iallyThe Complexity and Sophistication of Attacks and Vulnerabilities Continues to RiseThe Challenge: Security in Modern Networks3 2003, Cisco Systems, Inc. All rights reserved.SEC-20308175_05_2003_c1Mitigating the Risk: Defense in Depth Comprehensive security policy Pervasive securityend to end Sec

3、urity in layers Multiple technologies, working together4 2003, Cisco Systems, Inc. All rights reserved.SEC-20308175_05_2003_c1Defense in Depth:The Role of Intrusion Detection Complementary technology to firewalls Been around for more than a decade, started coming into prominence in the late 90s Perf

4、orms deep packet inspection, gaining visibility into detail often missed by firewallsInternet5 2003, Cisco Systems, Inc. All rights reserved.SEC-20308175_05_2003_c1Advanced Enterprise IDS Deployment: Agenda Intrusion Protection Systems Network Sensors Host Agents Management Consoles Case Studies6 20

5、03, Cisco Systems, Inc. All rights reserved.SEC-20308175_05_2003_c1Intrusion Protection Systems7 2003, Cisco Systems, Inc. All rights reserved.SEC-20308175_05_2003_c1Intrusion Protection Agenda Terminology and Technologies Complete Architecture:Sensors, Agents, Management Consoles Placement Strategi

6、esWhere to Place Your Sensors, what Traffic to Watch, How to Get Traffic to Them Organization-Level ConcernsResponding to Intrusions, Ownership and Organization, Outsourcing8 2003, Cisco Systems, Inc. All rights reserved.SEC-20308175_05_2003_c1IDS Terminology: False Positives A False Alarm occurs wh

7、en an IDS reports an attack even though noattack is underway Benign activity that the system mistakenly reports as malicious Typically due to improper tuning Can easily overwhelm alarm consoles creating enormous amount of background noise Can result in mistrust of the IDS by security personnel9 2003

8、, Cisco Systems, Inc. All rights reserved.SEC-20308175_05_2003_c1IDS Terminology False Negatives A False Negative occurs when an IDS fails to report an ongoing attack Malicious activity that the system does not detect or report Tend to be worse because the purpose of an IDS is to detect such events

9、Can be due to a variety of eventsCan be the result of IDS evasion efforts by an attackerCan also be due to out-of-date signature knowledge base (misuse detection systems)Minor state transition that is below a detectable threshold (anomaly-based systems)10 2003, Cisco Systems, Inc. All rights reserve

10、d.SEC-20308175_05_2003_c1IDS Terminology:Signatures and Anomalies Signatures explicitly define what activity should be considered maliciousSimple pattern matchingStateful pattern matchingProtocol decode-based analysisHeuristic-based analysis Anomaly detection involves defining “normal” activity and looking for deviations from this baseline

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 教育教学资料库 > 课件讲义

Copyright © 2018-2021 Wenke99.com All rights reserved

工信部备案号浙ICP备20026746号-2  

公安局备案号:浙公网安备33038302330469号

本站为C2C交文档易平台,即用户上传的文档直接卖给下载用户,本站只是网络服务中间平台,所有原创文档下载所得归上传人所有,若您发现上传作品侵犯了您的权利,请立刻联系网站客服并提供证据,平台将在3个工作日内予以改正。