Focus on the various types of intruders and their behavior
Discusses intrusion detection systems (IDS) and their requirements
Definition: Individuals or organized crime groups seeking financial gain.
Activities Include:
Identity theft.
Theft of financial data.
Corporate espionage.
Data theft and ransoming.
Characteristics:
Often young hackers from Eastern Europe or Southeast Asia.
Operate in underground forums to exchange information and coordinate attacks.
Definition: Individuals or groups motivated by political or social causes.
Motivation:
Typically have a low skill level.
Aim to publicize their cause through actions like:
Website defacement.
Denial of Service (DoS) attacks.
Data theft and distribution for negative publicity.
Definition: Groups of hackers funded by governments for espionage or sabotage.
Key Features:
Known as Advanced Persistent Threats (APTs).
Engage in covert and prolonged attacks.
Activities span a wide range of countries including the USA, UK, and China.
Definition: Hackers with diverse motivations like technical challenges or notoriety.
Examples include:
Classic hackers and crackers.
Hobby hackers utilizing toolkits for exploration of systems.
Characteristics:
Minimal technical skills.
Use existing attack toolkits.
Largest demographic of attackers, including criminals and activists.
Easier to defend against due to reliance on known tools.
Characteristics:
Sufficient skill to modify attack tools.
Can identify new vulnerabilities to exploit.
Found across all categories of intruders.
Characteristics:
High-level technical skill.
Capable of discovering new vulnerabilities.
Develops attack toolkits.
Includes known classical hackers, often employed by governments.
Defense against their attacks is very challenging.
Actions like:
Remote root compromises.
Web server defacements.
Password cracking.
Unauthorized viewing of sensitive data.
Use of packet sniffers, pirated software distribution.
Target Acquisition: Gathering information about the target.
Initial Access: Gaining entry into the system.
Privilege Escalation: Obtaining elevated access rights.
Information Gathering: Collecting sensitive data.
Maintaining Access: Ensuring continued entry into the network.
Covering Tracks: Hiding the intrusion evidence.
Host-Based IDS (HIDS): Monitors individual host activities.
Network-Based IDS (NIDS): Monitors network traffic comprehensively.
Distributed/Hybrid IDS: Utilizes multiple sensors for better detection and response.
Must run continuously and be fault tolerant.
Required to resist subversion and have minimal system impact.
Should scale efficiently and allow for dynamic reconfiguration.
Focuses on normal user behavior over time to detect intrusions.
Compares data against known malicious patterns to identify attacks.
Purpose: Lure attackers away from critical systems and gather intelligence on their actions.
Types of Honeypots:
Low Interaction Honeypots: Simulations that limit engagement.
High Interaction Honeypots: Fully operational systems to engage attackers longer but require more resources.
Extends IDS functionality to block or prevent detected threats.
Can leverage various detection techniques for proactive defense.
Understanding intrusion detection and prevention is crucial for maintaining security across systems and networks.