SlideShare a Scribd company logo
4/17/20142014/4/17
Network Security
By
RUBAN D
System Team
4/17/20142014/4/17
Security Overview!
What is Security
Major threat to Security
Importance of having IDS inside security
Tools used in IDS
Security Onion - an Overview
Practical Scenarios with Security Onion
Conclusion
4/17/20142014/4/17
Network Security Monitoring
4/17/20142014/4/17
THREATS
Viruses
Virus back doors
Password Attacks
Sniffers
Worms
Penetrations
DOS
Malicious Websites
4/17/20142014/4/17
Need For
IDS
Antivirus vs Firewall vs
IDS
4/17/20142014/4/17
Tools Used in IDS
• Snort now Snorby
• Squil
• Sqert
• ElSA
• Wireshark
• BRO
• OSSEC
• Last but not least - "Nmap"
4/17/20142014/4/17
Security Onion
Security Onion is a FREE Linux distro for Network Security Monitoring (NSM)
Security Onion is primarily for:
intrusion detection
network security monitoring
log management
Security onion How it helps analyst:
• Was an EXE downloaded?
• Was it executed?
• Was the computer compromised?
4/17/20142014/4/17
4/17/20142014/4/17
4/17/20142014/4/17
Thank youThank you

More Related Content

PPT
IP Security over VPN
PPTX
VenkaSure Total Security+
PDF
Ccna sec
PPT
Heartbleed
PDF
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...
PDF
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
PPTX
Kali linux
PDF
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
IP Security over VPN
VenkaSure Total Security+
Ccna sec
Heartbleed
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Kali linux
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014

What's hot (6)

PPTX
Kali linux
DOCX
kali linix
PDF
Beginners guide on how to start exploring IoT 2nd session
PPTX
WordPress Security Hardening
PPTX
Firmware analysis 101
PPTX
Kali linux
Kali linux
kali linix
Beginners guide on how to start exploring IoT 2nd session
WordPress Security Hardening
Firmware analysis 101
Kali linux
Ad

Viewers also liked (20)

DOCX
Day to day text
PDF
Tp mdt resi_120814
PPTX
German exchange program 2014
PPSX
Armsburg myspace 210814
PDF
Untitled Presentation
PPTX
Edshelf-Castellanos
PPTX
Accommodation in germany
PPTX
Ankitha
PPTX
German exchange program 2014
PPTX
NIVEDITA THIAGARAJAN Project
DOCX
Trip to stadthagen
DOCX
Vulnerability in libxml2
PDF
EU wide overview of phosphorus flows & data quality
PPTX
TERMINACIÓN CONTRATO
PPTX
The school
PPTX
Phosphorus flows in Europe and future scenarios
PPTX
My dayss in germany
PPTX
Personality development classes project 2
PPTX
Proceso del estado de la materia
Day to day text
Tp mdt resi_120814
German exchange program 2014
Armsburg myspace 210814
Untitled Presentation
Edshelf-Castellanos
Accommodation in germany
Ankitha
German exchange program 2014
NIVEDITA THIAGARAJAN Project
Trip to stadthagen
Vulnerability in libxml2
EU wide overview of phosphorus flows & data quality
TERMINACIÓN CONTRATO
The school
Phosphorus flows in Europe and future scenarios
My dayss in germany
Personality development classes project 2
Proceso del estado de la materia
Ad

Similar to Securing the infrastructure using IDS (20)

PPTX
Security Onion - Brief
PDF
Security Onion: Peel Back the Layers of Your Network in Minutes
PDF
Security Onion: peeling back the layers of your network in minutes
PPTX
security onion
PPTX
Intro to NSM with Security Onion - AusCERT
PDF
Boni Yeamin Thesis final_report.pdf
PPTX
Security onion
PPTX
Enterprise Security Monitoring, And Log Management.
PPTX
Study And Implemenataion Of Advance Intrusion Detection And Prevention Sysyte...
PPTX
Security Onion
PDF
Security Onion: Watching for Leeks
PDF
Security Onion - Part 1
PDF
Security Onion - Introduction
PDF
$HOME Sweet $HOME SANSFIRE Edition
PPT
Ending the Tyranny of Expensive Security Tools: A New Hope
DOC
Taishaun_OwnensCNS-533_Lab
PDF
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
PPTX
IDS+Honeypots Making Security Simple
PDF
Eximbank security presentation
Security Onion - Brief
Security Onion: Peel Back the Layers of Your Network in Minutes
Security Onion: peeling back the layers of your network in minutes
security onion
Intro to NSM with Security Onion - AusCERT
Boni Yeamin Thesis final_report.pdf
Security onion
Enterprise Security Monitoring, And Log Management.
Study And Implemenataion Of Advance Intrusion Detection And Prevention Sysyte...
Security Onion
Security Onion: Watching for Leeks
Security Onion - Part 1
Security Onion - Introduction
$HOME Sweet $HOME SANSFIRE Edition
Ending the Tyranny of Expensive Security Tools: A New Hope
Taishaun_OwnensCNS-533_Lab
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
IDS+Honeypots Making Security Simple
Eximbank security presentation

Recently uploaded (20)

PPTX
Information Storage and Retrieval Techniques Unit III
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Nature of X-rays, X- Ray Equipment, Fluoroscopy
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPT
Total quality management ppt for engineering students
PDF
Visual Aids for Exploratory Data Analysis.pdf
PDF
737-MAX_SRG.pdf student reference guides
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Information Storage and Retrieval Techniques Unit III
R24 SURVEYING LAB MANUAL for civil enggi
Categorization of Factors Affecting Classification Algorithms Selection
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Nature of X-rays, X- Ray Equipment, Fluoroscopy
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
Total quality management ppt for engineering students
Visual Aids for Exploratory Data Analysis.pdf
737-MAX_SRG.pdf student reference guides
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION

Securing the infrastructure using IDS