Intrusion Detection Systems

Hello Viewers,

Welcome back today lets have some Knowledge about the new technology getting developed for systems to make them more secure

One such Tech we gonna Know today is Intrusion Detection Systems also known as IDS...

So lets dive into the session



What is Intrusion Detection System(IDS)

An IDS is a system that tries to find out the hacks or attempts made by a person to break into a system or misuse it.

so in order to trap the attackers the IDS monitors log files,monitor system files,tracks the packet passing over the network and set up deception systems

IDS not only help to detect the attacks but also provide some notification about the new kind of attacks
so it has become an important tech in the emerging security of the computer systems..

Working of IDS

Most of the several common IDS work in the same way

They form certain kind of patterns by analyzing the network traffic and the logs

Example;-
Let us assume that a firewall continually blocks an hacker to connect to the network but it never provide a notification to an administrator until admin checks his access logs.

But in an IDS the attempts to pass the firewall are logged and analyzed.so at certain point of time the IDS finds that there are huge number of request-reject entry..

Then the IDS will flag the events happening in the IDS and  will alert to an administrator

So it makes the administrator to check whats happening while the attacks are taking place or even after.

It gives the administrator the  advantage to analyze the source of attacks,techniques&methods used

KINDS OF IDS:-

Network Based Intrusion Detection Systems (NIDS):-
Nids detects the attacks by capturing and analyzing the network packets. Nids contain a set of single purpose sensors or hosts placed at various points of a network..the sensors monitor the traffic of a network on a sysytem and perform local analysis of it and report the attacks to a central management console..

Host Based Intrusion Detection Systems (HIDS):- 
Hids are installed as agents on a host.These IDS look into system and application log files to detect intruder activity

Things That Play a Major Role In Intrusion Detection:-

Alerts:- These are any sort notification to the user about the activity of an intruder.when the IDS detect the intruder it has to inform the security administrator about them by using alerts.alerts can be sending an email, pop up windows,logging to a console etc..

False alarms:- False alarms are those alerts which are those alerts which are generated due to an indication that it is not an intruder activity.

Signatures:- Signatures are used to detect one or multiple types of attacks. It is a pattern that you look for inside a data packet

Logs:- Logs messages are generally stored in a file. They can be either in text or binary format

Sensors:- The machine on which an IDS runs is called a sensor because it "sense" the network

Smooth-sec3.0 Intrusion Detection System
Smooth sec is a Light weight and fully-ready IDS/IPS(Intrusion Detection/Prevention System) Linux Distribution based on Debain 7.With minimum Linux experience even security beginners can setup process and deploy a complete IDS/IPS within minutes..The distribution includes snorby,snort,suricata,pulledpork and pigsty..

Download a smoothsec 3.0:-

32BIT ISO:- https://sourceforge.net/projects/smoothsec/files/latest/download?source=files
64BIT ISO:-https://sourceforge.net/projects/smoothsec/files/latest/download?source=files

Comments

Popular Posts