SlideShare a Scribd company logo
Network Intrusion
Detection System
And Analysis
BIKRANT GAUTAM
SECURITY AND CRYPTOGRAPHIC PROTOCOL – 606
SCSU 2015
Intrusion Detection System Overview
What is Intrusion?
Restricted Access to computer Infrastructure
What is intrusion detection System?
Mechanism to trace the intrusion
Why is it required?
Protect CIA triad
How does IDS work?
Intrusion Detection System
• Two IDS in this model
• One external for monitoring external traffic
• One internal for monitoring internal traffic
Types of IDS
HIDs examine specific host-based
actions, such as what applications
are being used, what files are being
accessed and what information
resides in the kernel logs.
NIDs analyze the flow of
information between
computers, i.e., network
traffic. They essentially "sniff"
the network for suspicious
behavior.
NIDS Introduction
Why NIDS?
Monitor network traffic
Alert the responsible personnel or the target
Apply preventive measures-(Network Intrusion Prevention System)
NIDS Functionality
How it works?
Sniffing
collect and inspect incoming traffic
Protocol awareness
protocol reassembly and normalization
Alerting
Send email / log events / Sending SNMP
Modes of Detection
Signature Based
Old method
Compare data packets against known malicious sequence
Protocol Awareness
Compare the network packets against standard protocol
Behavioral Analysis
Recent Development
Learn pattern, alert when pattern changes
Types of NIDS/NIPSs
Commercial
Check Point IPS, CISO IPS, IBM Security NIPS
Roll on your own
Free to use for users, SNORT, BRO
Output of NIDS/NIPS
Depends upon the vendor
General evidences/output
Configuration: Configuration of devices being monitored
Alert Data: Alert through text files emails sms
Packet headers/flow Information: logged malicious packets headers
Content Data: Captured full data packets
Correlated Activates: Correlated event data
NIDS EXAMPLE
SNORT
The single most widely used IDS in the world.
Signature Based
Open Source
Large support community
SNORT ARCHITECTURE
Trucia Victor / url / http://truica-victor.com/snort-architecture/
SNORT CONFIGURATIONS
RULES
Rules written in a single line
Rules are created with known intrusion signatures
Stored in /etc/snort/rules
Native alerts are stored in /var/log/snort
Global values are stored at /etc/snort/snort.conf
Header
Example rule header
log tcp 192.168.1.12 123 -> 192.168.1.19 27
RULE BODY
Rule Body
Used to extract meta data about the events
rule options: msg, sid, rev, reference
Example:
SNORT EXAMPLES
Snort rule
alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:”ICMP PING”; icode:0;
itype:8; classtype:misc-activity: sid:384; rev:5;)
Snort packet
IP 10.0.1.10 > 10.0.1.254: ICMP echo request, id 32335, seq 0, length 64
0x0000: 4500 0045 a023 ab00 87ef 0a00 abc8 01oe E . . T . . . . .@ . X . . . . .
0x0010: 3400 0145 02a3 acd0 84af 0000 dbc5 0101 .u . T . - &. . . . . . . . . . I
Snort Alert
[**] [1:384:5] ICMP PING [**] [Classification: Misc Activity] [Priority: 3] 04/13 -
03:12:08.359790 10.0.1.10 -> 10.0.1.254 ICMP TTL:64 TOS: 0X0 ID:38125
IpLen:20 DmgLen:84 Type:8 Code:0 ID:32335 Seq:1 ECHO
Malicious Packet
Snort rule to capture malicious packet
Alert Fired
Challenges with current NIDS
SNORT/Signature based
More processing for packet logging
Requires high disk capacity to log information
Conclusion
NIDS/NIPS are the first step on against malicious activities
Investigators leverage evidence from NIDS to find the root of the problem
Field of further study and research
Case Study
Case Study
Corresponding packet analysis
SNORT ALERT Corresponding Packet
Case Study
Further exploring the Packet content
Packet Content
Analysis:
Case Study
Analysis of HEX Values
Case Study
Further Action:
Case Study
Further analysis of Target IP (192.168.1.69)
Searching all the alerts related with this IP
Count of Malicious Alert for same IP
Alert Message
Case Study
Alert Message Analysis:
The alert
TCP windows scale option found with length > 14
Findings:
Case Study
Investigation Findings and Conclusion Further Steps
Thank you

More Related Content

PPTX
Machine Learning Overview.pptx
PDF
Social Engineering Attacks & Principles
PPT
DB security
PPTX
Deep learning approach for network intrusion detection system
PPTX
My dream company-Google
PPTX
Evolutionary Game Theory
PPTX
Evolutionary Game Theory
PPTX
1. entrepreneurship
Machine Learning Overview.pptx
Social Engineering Attacks & Principles
DB security
Deep learning approach for network intrusion detection system
My dream company-Google
Evolutionary Game Theory
Evolutionary Game Theory
1. entrepreneurship

What's hot (20)

PPT
IDS and IPS
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PPTX
Intrusion prevention system(ips)
PPT
Intrusion detection system ppt
PPTX
Intrusion detection
 
PPT
IoT security (Internet of Things)
PPT
Intrusion Detection System
PPTX
OSI Security Architecture
PPTX
Intrusion detection system
PPTX
Intrusion detection and prevention system
PPTX
Intrusion detection system
PPT
Secure Socket Layer
PPTX
DDoS - Distributed Denial of Service
PPTX
Five Major Types of Intrusion Detection System (IDS)
PPTX
Encryption
PPSX
Intrusion detection system
PPTX
Denial of service
PPTX
Network security (vulnerabilities, threats, and attacks)
PDF
Network forensics
PPTX
Symmetric and asymmetric key
IDS and IPS
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion prevention system(ips)
Intrusion detection system ppt
Intrusion detection
 
IoT security (Internet of Things)
Intrusion Detection System
OSI Security Architecture
Intrusion detection system
Intrusion detection and prevention system
Intrusion detection system
Secure Socket Layer
DDoS - Distributed Denial of Service
Five Major Types of Intrusion Detection System (IDS)
Encryption
Intrusion detection system
Denial of service
Network security (vulnerabilities, threats, and attacks)
Network forensics
Symmetric and asymmetric key
Ad

Viewers also liked (19)

PPT
Network-Based Intrusion Detection System
PPTX
Introduction to IDS & IPS - Part 1
PDF
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
PDF
Cehv8 - Module 17: Evading, IDS, firewalls, and honeypots
PPT
Network Intrusion Detection System Using Snort
ODP
Introduction To NIDS
PPT
Using Genetic algorithm for Network Intrusion Detection
PPTX
IDS+Honeypots Making Security Simple
PPTX
Intrusion detection system
PPTX
Intrusion Prevention System
PPT
Introduction To Intrusion Detection Systems
PPTX
Intrusion detection
PPTX
Intrusion Detection System(IDS)
PPTX
Network Intrusion Detection and Countermeasure Selection
PPTX
Firewall presentation
PDF
How to Present Data in PowerPoint
DOC
Firewall
 
PPTX
My research proposal.ppt
PPT
FireWall
Network-Based Intrusion Detection System
Introduction to IDS & IPS - Part 1
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
Cehv8 - Module 17: Evading, IDS, firewalls, and honeypots
Network Intrusion Detection System Using Snort
Introduction To NIDS
Using Genetic algorithm for Network Intrusion Detection
IDS+Honeypots Making Security Simple
Intrusion detection system
Intrusion Prevention System
Introduction To Intrusion Detection Systems
Intrusion detection
Intrusion Detection System(IDS)
Network Intrusion Detection and Countermeasure Selection
Firewall presentation
How to Present Data in PowerPoint
Firewall
 
My research proposal.ppt
FireWall
Ad

Similar to Network intrusion detection system and analysis (20)

PPTX
IDS_WK_Arsalan.pptx
PDF
Pertemuan 9 intrusion detection system
PDF
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
PDF
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
PPT
Snort
PPT
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
PPT
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
PDF
An analysis of Network Intrusion Detection System using SNORT
PPTX
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
DOCX
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
PPTX
INSECS: Intelligent networks security system
PPT
snorteeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee.ppt
PPT
snort.ppt
PPT
Chapter-3-Intrusion-Detection-Systems-part-1.ppt
PPTX
Snort
PDF
Report on SNORT Intrusion Detection System.pdf
PDF
A Study of Intrusion Detection and Prevention System for Network Security
PDF
Intrusion_Detection_By_loay_elbasyouni
PDF
Cryptography Project by Aelsayed & Kyasser.pdf
IDS_WK_Arsalan.pptx
Pertemuan 9 intrusion detection system
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
Snort
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
An analysis of Network Intrusion Detection System using SNORT
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
INSECS: Intelligent networks security system
snorteeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee.ppt
snort.ppt
Chapter-3-Intrusion-Detection-Systems-part-1.ppt
Snort
Report on SNORT Intrusion Detection System.pdf
A Study of Intrusion Detection and Prevention System for Network Security
Intrusion_Detection_By_loay_elbasyouni
Cryptography Project by Aelsayed & Kyasser.pdf

Recently uploaded (20)

PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Reimagine Home Health with the Power of Agentic AI​
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Digital Strategies for Manufacturing Companies
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
Transform Your Business with a Software ERP System
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
System and Network Administraation Chapter 3
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Understanding Forklifts - TECH EHS Solution
PDF
System and Network Administration Chapter 2
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Navsoft: AI-Powered Business Solutions & Custom Software Development
How to Migrate SBCGlobal Email to Yahoo Easily
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Design an Analysis of Algorithms I-SECS-1021-03
Reimagine Home Health with the Power of Agentic AI​
Operating system designcfffgfgggggggvggggggggg
Digital Strategies for Manufacturing Companies
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Transform Your Business with a Software ERP System
Which alternative to Crystal Reports is best for small or large businesses.pdf
System and Network Administraation Chapter 3
PTS Company Brochure 2025 (1).pdf.......
2025 Textile ERP Trends: SAP, Odoo & Oracle
CHAPTER 2 - PM Management and IT Context
Understanding Forklifts - TECH EHS Solution
System and Network Administration Chapter 2
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free

Network intrusion detection system and analysis

  • 1. Network Intrusion Detection System And Analysis BIKRANT GAUTAM SECURITY AND CRYPTOGRAPHIC PROTOCOL – 606 SCSU 2015
  • 2. Intrusion Detection System Overview What is Intrusion? Restricted Access to computer Infrastructure What is intrusion detection System? Mechanism to trace the intrusion Why is it required? Protect CIA triad How does IDS work?
  • 3. Intrusion Detection System • Two IDS in this model • One external for monitoring external traffic • One internal for monitoring internal traffic
  • 4. Types of IDS HIDs examine specific host-based actions, such as what applications are being used, what files are being accessed and what information resides in the kernel logs. NIDs analyze the flow of information between computers, i.e., network traffic. They essentially "sniff" the network for suspicious behavior.
  • 5. NIDS Introduction Why NIDS? Monitor network traffic Alert the responsible personnel or the target Apply preventive measures-(Network Intrusion Prevention System)
  • 6. NIDS Functionality How it works? Sniffing collect and inspect incoming traffic Protocol awareness protocol reassembly and normalization Alerting Send email / log events / Sending SNMP
  • 7. Modes of Detection Signature Based Old method Compare data packets against known malicious sequence Protocol Awareness Compare the network packets against standard protocol Behavioral Analysis Recent Development Learn pattern, alert when pattern changes
  • 8. Types of NIDS/NIPSs Commercial Check Point IPS, CISO IPS, IBM Security NIPS Roll on your own Free to use for users, SNORT, BRO
  • 9. Output of NIDS/NIPS Depends upon the vendor General evidences/output Configuration: Configuration of devices being monitored Alert Data: Alert through text files emails sms Packet headers/flow Information: logged malicious packets headers Content Data: Captured full data packets Correlated Activates: Correlated event data
  • 10. NIDS EXAMPLE SNORT The single most widely used IDS in the world. Signature Based Open Source Large support community
  • 11. SNORT ARCHITECTURE Trucia Victor / url / http://truica-victor.com/snort-architecture/
  • 12. SNORT CONFIGURATIONS RULES Rules written in a single line Rules are created with known intrusion signatures Stored in /etc/snort/rules Native alerts are stored in /var/log/snort Global values are stored at /etc/snort/snort.conf
  • 13. Header Example rule header log tcp 192.168.1.12 123 -> 192.168.1.19 27
  • 14. RULE BODY Rule Body Used to extract meta data about the events rule options: msg, sid, rev, reference Example:
  • 15. SNORT EXAMPLES Snort rule alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:”ICMP PING”; icode:0; itype:8; classtype:misc-activity: sid:384; rev:5;) Snort packet IP 10.0.1.10 > 10.0.1.254: ICMP echo request, id 32335, seq 0, length 64 0x0000: 4500 0045 a023 ab00 87ef 0a00 abc8 01oe E . . T . . . . .@ . X . . . . . 0x0010: 3400 0145 02a3 acd0 84af 0000 dbc5 0101 .u . T . - &. . . . . . . . . . I Snort Alert [**] [1:384:5] ICMP PING [**] [Classification: Misc Activity] [Priority: 3] 04/13 - 03:12:08.359790 10.0.1.10 -> 10.0.1.254 ICMP TTL:64 TOS: 0X0 ID:38125 IpLen:20 DmgLen:84 Type:8 Code:0 ID:32335 Seq:1 ECHO Malicious Packet Snort rule to capture malicious packet Alert Fired
  • 16. Challenges with current NIDS SNORT/Signature based More processing for packet logging Requires high disk capacity to log information
  • 17. Conclusion NIDS/NIPS are the first step on against malicious activities Investigators leverage evidence from NIDS to find the root of the problem Field of further study and research
  • 19. Case Study Corresponding packet analysis SNORT ALERT Corresponding Packet
  • 20. Case Study Further exploring the Packet content Packet Content Analysis:
  • 23. Case Study Further analysis of Target IP (192.168.1.69) Searching all the alerts related with this IP Count of Malicious Alert for same IP Alert Message
  • 24. Case Study Alert Message Analysis: The alert TCP windows scale option found with length > 14 Findings:
  • 25. Case Study Investigation Findings and Conclusion Further Steps