IDS

advertisement
IDS
Mike O’Connor
Eric Tallman
Matt Yasiejko
Overview


IDS defined
What it does
Sample logs
 Why we need it




What it doesn’t do
Setup
Alternatives
IDS defined


IDS = Intrusion Detection System
Cisco IDS-4215


Placed on the switch
IDS vs IPS
IDS = detection; “passive”
 IPS = prevention; “active”


Signature driven (misuse detection)
IDS defined


Used to detect traffic not captured by
conventional firewalls
Network vs. Host IDS
Network = examines traffics and monitors multiple
hosts
 Host = analyzes system calls, file modifications, etc


Misuse (signature based) vs. anomaly (self-learn)
What it does…


Analyzes network traffic that has been sent to or
from FA 0/24
Uses signature database to identify problematic
traffic
Custom signatures may be added
 False positives are quite possible




DNS requests
IP logging, block IP, allow IP, etc
Detects port scans
DNS request logged
Signature 4003 details
Port scan detected
Why we need IDS



Nmap sweeps
Vulnerability sought constantly
Many attack types

Above is one type of TCP sweep (SYN packets)
What our IDS doesn’t do

Intrusion Prevention!!


The administrator must take action
Does not log traffic that does not pass through
FA 0/24
This was a choice
 Internal traffic is undetected at this time

Setup



Used CLI for IDS configuration
Setup IP, gateway, name, netmask
Set access list

Console only at the moment (134.198.161.100)
SPAN


Switched Port ANalyzer
Mirrors 0/24 onto 0/23
Monitor session on the switch
#configure terminal
#monitor session 1 source interface fastethernet 0/24
both
#monitor session 1 destination interface fastethernet
0/23
#end
Alternatives

Snort
Software solution to IDS/IPS
 Traffic analysis
 Packet logging
 Detects port scans, buffer overflows, etc


IPS
Download