IDS and IPS - Paiet/SEC-335 GitHub Wiki
Objectives:
- Define what an IDS/IPS is and explain its function and basic process
- List and define the different types of IDS/IPS
-
What is an IDS?
- Network traffic inspection for known attack signatures/behaviors
- Protocol Anomaly Detection
- Placement can be inside, outside, or on both sides of your network
- Detection generates an alert
- Network traffic inspection for known attack signatures/behaviors
-
What is an IPS?
- Like an IDS, but can take action to stop detected attacks
- "Active" IDS
- Like an IDS, but can take action to stop detected attacks
-
Types of Intrusion Detection and Prevention Systems
- Network Based
- Host Based
-
IDS/IPS Alert Types
- True Positive => Attack detected & Alert Sent
- False Positive => False Alarm (no attack but Alert was sent)
- True Negative => No attack and therefore no Alert
- False Negative => Attack not detected & no Alert
-
IDS/IPS Solutions
- Snort
- Snort Rules found in
/etc/snort/rules/
- Check out scan.rules
- Explain some of the details of a rule
- Mention custom rules
- Explain some of the details of a rule
- Check out scan.rules
- DEMO Snort
- FROM LINUX LITE
sudo snort -A console -q -c /etc/snort/snort.conf -i ens33 -K ascii
- -A = Alert Type
- -q = Quiet. Don't show banner or status report
- -c = Config file
- -i = Network adapter
- -K = Output type (default is pcap)
- FROM PARROT
sudo nmap -sX -n -Pn -F 192.168.241.136
- LOGS
/var/log/snort/IP/
- cat files in that dir for packet info (sudo needed)
- Snort Rules found in
- Bro/Zeek
- AlienVault
- Suricata
- Mobile
- Snort
-
IDS/IPS Evasions
- We've talked about some already
- Packet Fragmentation
- Decoys
- Obfuscations
- We've talked about some already
-
Defenses
- Baselines
- Updates and patches
- Block known-bad