-
NIDS and NIPS
-
Network Intrusion Detection System (NIDS):
- A type of IDS that attempts to detect malicious network activities—for example, port scans and DoS attacks—by constantly monitoring network traffic.
-
Network Intrusion Prevention System (NIPS):
- A type of network hardware security device designed to inspect traffic and, based on its configuration or security policy, remove, detain, or redirect malicious traffic.
-
Comparison
-
NIDS:
- Detects malicious network activities
-
Pro:
- Only a limited number of NIDS are necessary on a network.
-
Con:
- Only detects malicious activities.
- Other controls must be put in place to prevent malicious activities.
-
NIPS:
- Detects, removes, detains, and redirects traffic
-
Pros:
- Detects and mitigates malicious activity.
- Can act as a protocol analyzer.
-
Cons:
- Possibility of false positives and false negatives.
- Uses more resources.
-
Inline vs Passive
-
Promiscuous (Inline) Mode:
- In a network, promiscuous mode allows a network device to intercept and read each network packet that arrives in its entirety.
- This mode of operation is sometimes given to a network snoop server that captures and saves all packets for analysis
-
Non-Promiscuous (Passive) Mode:
- Promiscuous mode is the opposite of non-promiscuous mode.
- When a data packet is transmitted in non-promiscuous mode, all the LAN devices "listen to" the data to determine if the network address included in the data packet is theirs.
- If it isn't, the data packet is passed onto the next LAN device until the device with the correct network address is reached.
- That device then receives and reads the data.
-
In-Band vs Out-of-Band
-
In-Band:
- Network management is performed from within the local network, using SSH, SNMP, or OpenFlow.
- In-band is the most common (and the default) way to manage a network.
-
Out-of-Band:
- Network management is performed from outside the local network.
- In large organizations, network dependent organizations, and/or organizations that highly value redundancy and resiliency, out-of-band network management may be deployed in parallel to in-band management as a failsafe or secondary system.
- In systems that do not have access to a direct (local) network connection, such as SCADA, PLC, and other embedded systems used in critical infrastructure and manufacturing, out-of-band network management is also an option.
-
Operation
-
Rules
-
Manual Monitoring:
- Manually viewing log files, policies, and permissions
-
Automatic Monitoring:
- Using a program to sift through logs and files for specific information, and using anti-virus, IDS and IPS programs to automatically scan for errors, attacks, and anomalies.
-
Three Types:
- Signature-Based Monitoring:
- Network traffic is analyzed for predetermined attack patterns, known as signatures.
- Anomaly-Based Monitoring:
- Establishes a performance baseline based on a set of normal network traffic evaluations. Requires a baseline.
- Behavior-Based Monitoring:
- Looks at the previous behavior of applications, executables, and/or the operating system and compares that to current activity on the system.
- If an application later behaves improperly, the monitoring system will attempt to stop the behavior. Requires a baseline.
- Heuristic:
- A process that:
- Meets a minimum threshold of competence
- Uses a defined set of rules
- Reaches an immediate set of goals
- Heuristic Algorithm:
- An algorithm that quickly finds a practical solution or set of solutions for a given problem, though perhaps not the best solution.
- In situations where finding the best solution is impossible or impractical, heuristic algorithms are used to find an acceptable (practical) solution.
-
Comparison:
- Because the number of potential threats to a network is so large, signature-based and anomaly-based systems are much more computationally expensive, and require more updates, than behavior-based monitoring systems.
- However, if the heuristic is not carefully configured, this monitoring system may lead to considerably more false positives than the other two types.
-
Analytics
-
False Positive
- The IDS identifies legitimate activity as something malicious.
- Wastes resources tracking down a non-existent threat.
-
False Negative
- The IDS identifies an attack as legitimate activity.
- Allows a threat to enter the trusted network.