Week-9
Course Code: P19133 Course Name: Cybersecurity Fundamental Credits: 20 Module Leader: Ali Jaddoa
A security posture defines how an organisation documents initial configurations, monitors activity, and remediates any detected issues.
The primary purpose of monitoring is to detect abnormal behavior.
You can’t remediate behavior that you can’t detect!
Technical (ADS/IDS), or administrative—for (observing, CCTV, etc).
Technical
administrative—for
obvious enough
discourage
breaches
hidden
not
overbearing
notifying
potential
incidents
more sever
immediate
may
Activities: Host-Based Activity; and Network and Network devices (traffic, patterns, malware, and performance.).
seem malicious
not real security
Failure
catch
Monitoring solution that spots suspicious network incidents.
spots
suspicious
network
It monitors traffic that gets through the firewall to detect malicious activity.
traffic
gets through the firewall
IDS will not be detectable from the network
detectable
Two main network deployment locations exist for
HIDS
NIDS
is a network security hardware or software that continuously observes network behavior for threats, just like an intrusion detection system.
continuously observes
takes
appropriate
action
Some IPS solutions can also be configured to use a ‘honeypot’ (a decoy that contains dummy data) to misdirect attackers and divert them from their original targets that contain accurate data.
IPS solutions
configured
‘honeypot’
misdirect
divert
original
targets
Network packets comparision; addresses to rules, whereas others look at the frequency and type of activity.
Find network, host traffic patterns that match known signatures
Advantage: Many attacks have distinct signatures
Disadvantages:
Malicious code authors intentionally use tricks to fool these IDSs
2. Statistical anomaly-based IDS:
Statistical anomaly-based IDS sample network activity, compare to “known normal” traffic
IDS operation
Resides
Look
patterns
TCP/IP stack
invalid
unexpected
improper
runs
computer
detects
intruders’
Application-based systems (AppIDS)
Detection Rate: Measures the percentage of attacks detected from a known set of probes or attack vectors.
Measures
percentage
detected
Bandwidth Threshold: Indicates the network bandwidth at which the IDS's performance begins to degrade or fail.
Indicates
begins
fail
Vendor Test Suites:
Common Test Methods:
Record
retransmit
traces
known
viruses
Honeypots: decoy systems designed to lure potential attackers away from critical systems
lure
from
critical
systems
Divert
Gather
Encourage
linger
Honeynets: collection of honeypots connected in a subnet.
collection
honeypots
mimicking
analyse
behaviors
E.g, A simulated corporate network with fake email servers, file shares, and user accounts.
Padded cell: honeypot protected in order to hinder compromise.
honeypot
protected
hinder
compromise
tandem
IDS
transfers
“special environment”
deception
engage
attackers
Redirecting
virtual server
observation
- Scan packets for specific byte sequences associated with known threats, often linked to specific services and ports.