6.3.2 IDS
Differences between an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS)
IDS vs. IPS Overview
Passive IDS:
Monitors, logs, and detects security breaches.
Takes no action to prevent the attack.
Can send alerts, requiring interpretation and action by a security administrator.
Cannot be detected on the network due to lack of active response.
Active IDS (IPS):
Performs all functions of an IDS but can react to security breaches.
Automates responses to malicious traffic.
Can terminate sessions using the TCP-RST command or restart other processes.
Actions are visible to network observers and necessary to block detectable attacks.
Functional Comparison Table
Feature | IDS | IPS
Passive monitoring | Yes | No
Alerting capabilities | Yes | Yes
Automated response to threats | No | Yes
Visibility of actions on the network | No | Yes
Key Concepts of IDS and IPS
Knowing unauthorized access is the first step in network defense.
An IDS detects attacks and suspicious activity, whether active (IPS) or passive.
Utilization of both IDS and IPS together maximizes network detection and protection.
If an IPS fails to detect a malicious packet, the IDS serves as a backup to alert the security operations team.
IDS Operations
Monitoring Steps
A sensor passes data from the source to the analyzer.
The engine/analyzer analyzes data and events, generating alerts and logging activities.
Alert Definition
An alert is a message indicating an event of interest, such as a potential attack.
Traffic is labeled based on system interpretation of threat levels:
Positive Assessment: Malicious activities identified or an intruder's identity discovered.
False Positive: Harmless traffic wrongly identified as offensive, generating alerts.
Negative Assessment: Traffic deemed harmless is allowed to pass.
False Negative: Harmful traffic allowed to pass without alerts, representing the worst scenario.
Detection Methods
1. Signature-based Detection
Also known as pattern matching, dictionary recognition, or misuse-detection (MD-IDS).
Looks for patterns in network traffic that match known attack patterns (signatures).
Signatures are unique identifiers for known malicious packets and are continuously updated by IDS vendors.
Cannot detect unknown attacks; thus, regular updates of signature files are crucial.
Commercial software requires a paid subscription for updates and must be configured to update from secure repositories (ideally over HTTPS).
Typically causes more false negatives compared to heuristic detection.
2. Heuristic-based Detection
Also referred to as behavior, anomaly, or statistical-based detection.
Establishes a baseline of normal network traffic to identify deviations.
Clipping levels (thresholds) define acceptable variances from the baseline
Can identify some unknown attacks that lack corresponding signature files.
Usually results in more false positives relative to signature-based detection.
Device Implementation
Implementation Methods
1. Host-based (HIDS)
Installed on the host system to monitor all incoming traffic.
Detects unique attacks targeted to specific services and applications.
Monitors application activity, modifications, local files, and logon audits.
Limited to the host system's view; possible target for attacks.
Can analyze encrypted traffic, as services running on the host decrypt the data.
Common example: Antivirus software.
Issues: Requires installation on each system monitored, potentially leading to excessive administrative efforts.
If compromised, the reliability of log reports drops, as attackers may modify logs.
2. Network-based (NIDS)
A dedicated device set up in the network to analyze traffic in real-time.
Can be installed as:
Out of Band: Monitors traffic without interfering (connected via a network tap).
Inline: Traffic passes through the NIDS for analysis before continuation.
Characteristics:
Unaware of individual hosts and undetectable by attacking systems.
Effective for detecting and preventing port scanning and Denial of Service (DoS) attacks.
Cannot analyze encrypted traffic.
Should be placed at critical network junctions (such as inside screened subnets, between firewalls and LANs, and near valuable information assets).
For switches, must connect via a spanning or diagnostic port to observe all traffic on that segment.
Trend Analysis
Essential for managing IDS and IPS, directing attention to patterns and potential threats over time.
Helps analysts identify trends suggesting targeted attacks or exploited vulnerabilities.
Analyzing trend data allows tuning of IDS/IPS systems to reduce false positives and unnecessary alerts.
Contributes to operational security strategies by revealing frequently targeted systems and common threats.
These insights can inform necessary changes in security policy, tool investments, and training requirements.