SlideShare a Scribd company logo
IT AUDIT INTRUSION DETECTION SYSTEMS MUSTAFA SHAH
INTRODUCTION INTRUSION DETECTION Process of monitoring events occurring in a computer system or network and analyzing them for signs of  intrusions Intrusions are attempts to compromise the  Confidentiality ,  Integrity ,  Availability , and  Control  of a computer network
OVERVIEW Intrusion detection allows organizations to protect their systems from threats that come from increasing network connectivity and information systems ID is an important part of the Security Infrastructure:  Firewalls Password Authentication Encryption Anti-virus software Incident response plan
TYPES Network-Based Intrusion Detection: Monitors traffic on the network Examines packets as they pass by a sensor Packets are examined if they match a signature String signature Port signature Header signature Port State Service 104/tcp    open    acr-nema 655/tcp    open    unknown 658/tcp    open    unknown 670/tcp    open    unknown 723/tcp    open    unknown 725/tcp    open    unknown 727/tcp    open    unknown 728/tcp    open    unknown
TYPES Host-Based IDS: Works by intercepting operating system and application calls on an individual host Checks the integrity of system files Watches for suspicious processes
METHODS Knowledge-Based: Applies knowledge about specific attacks and system vulnerabilities Contains information about these vulnerabilities An alarm is triggered when an attempt is detected Completeness depends on regular update of knowledge about attack methods
METHODS Behavior-Based: Intrusion can be detected by observing a deviation from normal behavior Maintain a model of expected behavior and compare activities against this model An alarm is generated when a deviation is observed
DEPLOYENT Behind each external Firewall in the network DMZ Outside an external Firewall On major backbones On critical subnets
RISK Network Security is a crucial component of every company Loss of business  Loss of intellectual property Loss of Reputation Stock price Loss of third-party confidence Legal implications HIPAA 1996 Gram-Leach Bliley Act 1999 Homeland Security Act 2002 State Laws
Homeland Security Secretary Michael Chertoff speaks about computer security at the RSA Conference on information security in San Francisco, Tuesday, April 8, 2008.  AP Photo/Paul Sakuma   Zombie Computers Decried As Imminent National Threat
ATTACK TYPES Scanning attacks Denial of Service  Penetration attacks User to Root Remote to User Authorized User Public User
MALWARE Infectious: Viruses Worms For Profit: Spyware Adware Botnets Keystroke loggers
AUDIT CHECKLIST Proactive Auditing and monitoring are essential
STEPS Examine Log Files Look for Unauthorized User Rights Look for Unusual or Hidden Files Check for Changes in Computer or User Policies Check for Odd User Accounts  Check for Altered Permissions on Files or Registry Keys Audit for Intrusion Detection
AREAS Security policies, guidelines, and procedures Security awareness programs Software-based (Logical) Access controls including: Change control Data and program access Audit trails Access control software Authentication procedures Hiring Policy for Network Administrators
SURVEY
 
 
 
CONCLUSION IDS is an important tool in the Security Hierarchy It is mostly outsourced to third-parties IDS will be replaced with Intrusion Prevention Systems in the future IP systems prevent attacks in real-time Able to decode layer 7 protocols like HTTP, FTP, and SMTP An Incident Response Plan is a must
SOURCES http://en.wikipedia.org/wiki/Intrusion-prevention_system http://en.wikipedia.org/wiki/Zombie_computer http://en.wikipedia.org/wiki/Botnet http://en.wikipedia.org/wiki/Cyber-security_regulation http://blog.wired.com/27bstroke6/2008/04/zombie-computer.html?nup=1&mbid=yhp http://en.wikipedia.org/wiki/Intrusion_detection_system http://en.wikipedia.org/wiki/Malware
SOURCES http://www.cert.org/tech_tips/WIDC.html#C16 http://www.sans.org/top20/#z1 http://www.nist.org/news.php http://www.snort.org/ http://www.sans.org/resources/idfaq/ http://csrc.nist.gov/publications/nistpubs/800-31/sp800-31.pdf http://www.pwc.com/extweb/pwcpublications.nsf/docid/ 114E0DE67DE6965385257341005AED7B/$FILE/PwC_GISS2007.pdf

More Related Content

PPTX
DoS or DDoS attack
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PPT
intrusion detection system (IDS)
PDF
Computer Security and Intrusion Detection(IDS/IPS)
PPT
IoT Security – Executing an Effective Security Testing Process
PDF
Ethical hacking and social engineering
PPT
Port scanning
PPTX
Intrusion detection system
DoS or DDoS attack
Intrusion Detection Systems and Intrusion Prevention Systems
intrusion detection system (IDS)
Computer Security and Intrusion Detection(IDS/IPS)
IoT Security – Executing an Effective Security Testing Process
Ethical hacking and social engineering
Port scanning
Intrusion detection system

What's hot (20)

PPT
IDS and IPS
PPTX
VAPT PRESENTATION full.pptx
PPTX
Intrusion Detection Systems (IDS)
PPTX
Intrusion detection system
PDF
Understanding Cyber Attack - Cyber Kill Chain.pdf
PPTX
Network security
PPSX
Intrusion detection system
PPTX
Intrusion Prevention System
PPTX
Pen Testing Explained
PDF
SIEM and Threat Hunting
PDF
Overview of the Cyber Kill Chain [TM]
PPTX
Intrusion detection system
PPTX
Intrusion Detection System(IDS)
PPTX
Cyber security landscape
PPTX
Network security
PPT
Cryptography
PPTX
Vulnerability assessment and penetration testing
PDF
1. introduction to cyber security
PDF
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
IDS and IPS
VAPT PRESENTATION full.pptx
Intrusion Detection Systems (IDS)
Intrusion detection system
Understanding Cyber Attack - Cyber Kill Chain.pdf
Network security
Intrusion detection system
Intrusion Prevention System
Pen Testing Explained
SIEM and Threat Hunting
Overview of the Cyber Kill Chain [TM]
Intrusion detection system
Intrusion Detection System(IDS)
Cyber security landscape
Network security
Cryptography
Vulnerability assessment and penetration testing
1. introduction to cyber security
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Ad

Viewers also liked (12)

PPT
Intrusion detection system ppt
PPTX
Intrusion detection and prevention system
PDF
New Fuzzy Logic Based Intrusion Detection System
PPTX
Intrusion detection in MANETS
PPT
Introduction To Intrusion Detection Systems
PPTX
Intrusion detection system
PPTX
Intrusion detection
PPTX
Firewall presentation
PPTX
Security issues in manet
PPTX
Five Major Types of Intrusion Detection System (IDS)
PDF
3 Things Every Sales Team Needs to Be Thinking About in 2017
PDF
How to Become a Thought Leader in Your Niche
Intrusion detection system ppt
Intrusion detection and prevention system
New Fuzzy Logic Based Intrusion Detection System
Intrusion detection in MANETS
Introduction To Intrusion Detection Systems
Intrusion detection system
Intrusion detection
Firewall presentation
Security issues in manet
Five Major Types of Intrusion Detection System (IDS)
3 Things Every Sales Team Needs to Be Thinking About in 2017
How to Become a Thought Leader in Your Niche
Ad

Similar to Intrusion Detection Presentation (20)

PPTX
Intrusion detection system
PPT
Chapter-3-Intrusion-Detection-Systems-part-1.ppt
PPTX
Understanding Intrusion Detection & Prevention Systems (1).pptx
PPT
ch08.ppt
PPTX
Intusion detection system in visualizati
PPTX
Intrusion Detection Systems of Cyber Security
PPSX
Intrusion prevension
PPTX
Presentation (3) cybersecurity wd imp.pptx
DOCX
Network and web security
PPTX
Intrusion Detection systems detaild.pptx
PPSX
Ids 00 introduction_ intrusion detection & prevention systems
PPTX
Intruders in cns. Various intrusion detection and prevention technique.pptx
PPT
Intrusion Detection System
PPT
Intrusion detection 2001
PDF
BAIT1103 Chapter 7
PDF
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
PPTX
Intrusion Detection Systems Pedagogy.pptx
PPTX
computer security principles and practice chapter 8
PPT
ids.ppt
PPTX
Cyber-Security-Unit-4.pptx
Intrusion detection system
Chapter-3-Intrusion-Detection-Systems-part-1.ppt
Understanding Intrusion Detection & Prevention Systems (1).pptx
ch08.ppt
Intusion detection system in visualizati
Intrusion Detection Systems of Cyber Security
Intrusion prevension
Presentation (3) cybersecurity wd imp.pptx
Network and web security
Intrusion Detection systems detaild.pptx
Ids 00 introduction_ intrusion detection & prevention systems
Intruders in cns. Various intrusion detection and prevention technique.pptx
Intrusion Detection System
Intrusion detection 2001
BAIT1103 Chapter 7
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
Intrusion Detection Systems Pedagogy.pptx
computer security principles and practice chapter 8
ids.ppt
Cyber-Security-Unit-4.pptx

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation theory and applications.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PPT
Teaching material agriculture food technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
KodekX | Application Modernization Development
PPTX
Spectroscopy.pptx food analysis technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation theory and applications.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
sap open course for s4hana steps from ECC to s4
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KodekX | Application Modernization Development
Spectroscopy.pptx food analysis technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Programs and apps: productivity, graphics, security and other tools
Review of recent advances in non-invasive hemoglobin estimation
Building Integrated photovoltaic BIPV_UPV.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Encapsulation_ Review paper, used for researhc scholars
The Rise and Fall of 3GPP – Time for a Sabbatical?
The AUB Centre for AI in Media Proposal.docx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Intrusion Detection Presentation

  • 1. IT AUDIT INTRUSION DETECTION SYSTEMS MUSTAFA SHAH
  • 2. INTRODUCTION INTRUSION DETECTION Process of monitoring events occurring in a computer system or network and analyzing them for signs of intrusions Intrusions are attempts to compromise the Confidentiality , Integrity , Availability , and Control of a computer network
  • 3. OVERVIEW Intrusion detection allows organizations to protect their systems from threats that come from increasing network connectivity and information systems ID is an important part of the Security Infrastructure: Firewalls Password Authentication Encryption Anti-virus software Incident response plan
  • 4. TYPES Network-Based Intrusion Detection: Monitors traffic on the network Examines packets as they pass by a sensor Packets are examined if they match a signature String signature Port signature Header signature Port State Service 104/tcp    open    acr-nema 655/tcp    open    unknown 658/tcp    open    unknown 670/tcp    open    unknown 723/tcp    open    unknown 725/tcp    open    unknown 727/tcp    open    unknown 728/tcp    open    unknown
  • 5. TYPES Host-Based IDS: Works by intercepting operating system and application calls on an individual host Checks the integrity of system files Watches for suspicious processes
  • 6. METHODS Knowledge-Based: Applies knowledge about specific attacks and system vulnerabilities Contains information about these vulnerabilities An alarm is triggered when an attempt is detected Completeness depends on regular update of knowledge about attack methods
  • 7. METHODS Behavior-Based: Intrusion can be detected by observing a deviation from normal behavior Maintain a model of expected behavior and compare activities against this model An alarm is generated when a deviation is observed
  • 8. DEPLOYENT Behind each external Firewall in the network DMZ Outside an external Firewall On major backbones On critical subnets
  • 9. RISK Network Security is a crucial component of every company Loss of business Loss of intellectual property Loss of Reputation Stock price Loss of third-party confidence Legal implications HIPAA 1996 Gram-Leach Bliley Act 1999 Homeland Security Act 2002 State Laws
  • 10. Homeland Security Secretary Michael Chertoff speaks about computer security at the RSA Conference on information security in San Francisco, Tuesday, April 8, 2008. AP Photo/Paul Sakuma Zombie Computers Decried As Imminent National Threat
  • 11. ATTACK TYPES Scanning attacks Denial of Service Penetration attacks User to Root Remote to User Authorized User Public User
  • 12. MALWARE Infectious: Viruses Worms For Profit: Spyware Adware Botnets Keystroke loggers
  • 13. AUDIT CHECKLIST Proactive Auditing and monitoring are essential
  • 14. STEPS Examine Log Files Look for Unauthorized User Rights Look for Unusual or Hidden Files Check for Changes in Computer or User Policies Check for Odd User Accounts Check for Altered Permissions on Files or Registry Keys Audit for Intrusion Detection
  • 15. AREAS Security policies, guidelines, and procedures Security awareness programs Software-based (Logical) Access controls including: Change control Data and program access Audit trails Access control software Authentication procedures Hiring Policy for Network Administrators
  • 17.  
  • 18.  
  • 19.  
  • 20. CONCLUSION IDS is an important tool in the Security Hierarchy It is mostly outsourced to third-parties IDS will be replaced with Intrusion Prevention Systems in the future IP systems prevent attacks in real-time Able to decode layer 7 protocols like HTTP, FTP, and SMTP An Incident Response Plan is a must
  • 21. SOURCES http://en.wikipedia.org/wiki/Intrusion-prevention_system http://en.wikipedia.org/wiki/Zombie_computer http://en.wikipedia.org/wiki/Botnet http://en.wikipedia.org/wiki/Cyber-security_regulation http://blog.wired.com/27bstroke6/2008/04/zombie-computer.html?nup=1&mbid=yhp http://en.wikipedia.org/wiki/Intrusion_detection_system http://en.wikipedia.org/wiki/Malware
  • 22. SOURCES http://www.cert.org/tech_tips/WIDC.html#C16 http://www.sans.org/top20/#z1 http://www.nist.org/news.php http://www.snort.org/ http://www.sans.org/resources/idfaq/ http://csrc.nist.gov/publications/nistpubs/800-31/sp800-31.pdf http://www.pwc.com/extweb/pwcpublications.nsf/docid/ 114E0DE67DE6965385257341005AED7B/$FILE/PwC_GISS2007.pdf