Lect 01 Unit-III
Lect 01 Unit-III
Behavior-Based IPS
Types of IDPS
•Network-based IDPS (NIPS): Monitors traffic across the entire network.
•Host-based IDPS (HIPS): Focuses on monitoring traffic on individual hosts or devices.
Detection Methods
•Signature-based Detection: Compares network activity against a database of known
threat signatures.
•Anomaly-based Detection: Identifies deviations from normal network behavior.
•Hybrid Detection: Combines multiple detection methods for improved accuracy.
A Network-Based Intrusion Detection System (NIDS) is a type of Intrusion Detection
System (IDS) that monitors network traffic at strategic points within a network to
detect suspicious activities and potential threats. Here are some key points about
NIDS:
1.Functionality: NIDS analyzes data packet headers and payloads as they flow across
the network. It can detect various types of malicious activities, such as unauthorized
access attempts, malware, and other security breaches.
2.Detection Methods:
1. Signature-Based Detection: Identifies known threats by comparing network
traffic against a database of known attack signatures.
2. Anomaly-Based Detection: Detects deviations from normal network behavior,
which could indicate potential threats.
3. Hybrid Detection: Combines both signature-based and anomaly-based methods
to improve detection accuracy.
3.Deployment: NIDS can be deployed as dedicated hardware appliances, software
applications, or cloud-based services. They are typically placed at key points in the
network, such as routers or switches, to monitor traffic effectively.
4.Passive Monitoring: NIDS operates passively, meaning it only observes network
traffic and generates alerts when suspicious activity is detected. It does not take
direct action to block or mitigate threats.
5.Complementary Role: NIDS works alongside other security measures like firewalls
and antivirus software to provide a comprehensive security posture.
Signature-Based IPS
•How it works: This type of IPS uses a database of known attack patterns or
signatures. When network traffic matches one of these signatures, the IPS
takes action to block the threat.
•Strengths: Effective at identifying and stopping known threats quickly.
•Limitations: It can only detect attacks that have been previously identified
and added to the signature database.
Behavior-Based IPS
•How it works: This type of IPS monitors the behavior of network traffic and
systems. It looks for anomalies or deviations from normal behavior that
might indicate a potential threat.
•Strengths: Capable of detecting new, unknown threats (zero-day attacks) by
identifying unusual activity.
•Limitations: May produce more false positives, as legitimate activities
might sometimes be flagged as suspicious.
A Virtual Private Network (VPN) is a technology that creates a secure and
encrypted connection over a less secure network, such as the internet. This
allows users to send and receive data as if their devices were directly
connected to a private network, ensuring privacy and security.
Key Components of a VPN
1.Encryption: This ensures that data transmitted over the VPN is unreadable
to anyone who intercepts it. Common encryption protocols include IPsec,
SSL/TLS, and AES.
2.Authentication: This verifies the identity of users and devices before
allowing access to the VPN. Methods include passwords, digital
certificates, and multi-factor authentication.
3.Tunneling: This involves encapsulating data packets within other packets
to create a secure “tunnel” through the internet. Protocols like PPTP, L2TP/
IPsec, and OpenVPN are used for tunneling.
4.VPN Server: This is the endpoint that users connect to. It handles the
encryption and decryption of data and routes traffic between the user and
the internet.
5.VPN Client: This is the software or hardware on the user’s device that
connects to the VPN server and manages the encryption and tunneling
processes.
Technologies Used in VPNs
•IPsec (Internet Protocol Security): Provides secure communication by
authenticating and encrypting each IP packet in a communication session.